Hi [[ session.user.profile.firstName ]]

Virtualization

  • Nutanix Technical Webinar
    Nutanix Technical Webinar Grant Friend Recorded: Sep 22 2017 63 mins
    Nutanix 101: An introduction to the nuts and bolts of Nutanix and Prism Management

    Nutanix Overview - Naming conventions and agnostic hardware and hypervisor support
    Nutanix technical detail - where and how the software runs and handles data
    Prism Management Demo - Detailed run through the core entities in Prism
  • Win and Wow Customers – 6 Best Practices for Onboarding in Banking and Insurance
    Win and Wow Customers – 6 Best Practices for Onboarding in Banking and Insurance Sheryl Kingstone-451 Research, Jim Marous-Financial Brand, and Sarah Johnson-Kofax Recorded: Sep 21 2017 59 mins
    Banks, credit unions and insurance companies may have differing business models, but they all have a common goal: better conversion and retention rates.

    Fortunately, better customer onboarding usually translates to better conversion and retention. For this reason, organizations continue to invest in digital technologies to streamline operations and eliminate time-consuming online interactions in areas such as new account opening, loan origination and policy applications.

    Those first information-intensive interactions, of course, are the most critical: you usually only get once chance to win a new customer’s business. But winning is only part of the equation. What if you could win—and wow—customers from those first moments and keep them engaged throughout the onboarding process?

    Mark your calendars for this upcoming webinar, where industry experts will share six best practices to help your organization win and wow customers:

    • Easy—Enable instant image and data capture via web and mobile technology
    • Accurate—Extract data from pictures of physical documents without error-prone manual entry
    • Automated—Invest in workflow tools to automate and track completion of process steps
    • Visible—Empower staff and customers with process transparency and timely communication
    • Consistent—Ensure data is complete and integrated across internal systems
    • Efficient—Meet expectations for speed, while effectively managing regulatory risks

    Speakers will include:
    •Sheryl Kingstone, Director, 451 Research
    •Sarah Johnson, Industry Solutions Architect, Kofax
    •Jim Marous, Owner and Publisher, Digital Banking Report

    Don’t miss out! Register now >>
  • 4 Hybrid data storage strategies for healthcare providers.
    4 Hybrid data storage strategies for healthcare providers. Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: Sep 21 2017 54 mins
    Healthcare providers have specific and unique requirements around storing and accessing sensitive patient data and meeting HIPAA compliance. But this shouldn’t mean you can’t take advantage of the cost and scalability benefits of the cloud. In this webinar, we’ll discuss four common questions healthcare providers ask when they’re thinking of moving to the cloud and the corresponding strategies to employ a hybrid cloud approach.
  • The Four Requirements of a Cloud-Era File System
    The Four Requirements of a Cloud-Era File System Storage Switzerland, Nasuni Recorded: Sep 21 2017 63 mins
    File systems are the heart of most organizations. They’re how critical unstructured data assets are stored, organized, and shared. But with files exploding in size and quantity as well as the cloud offering potentially cheaper and more scalable storage than traditional NAS, a new set of requirements is needed. Is your file system ready? Find out in this live webinar.
  • Hyper-personalization: Marketing to a segment of one
    Hyper-personalization: Marketing to a segment of one Cherie Yu, Head of Local Marketing, Lyft Recorded: Sep 21 2017 61 mins
    Consumers aren’t actually impressed by just a "Hi!" And as deluged by content as they are, they know they have the luxury of simply ignoring you. To catch their interest, you need to demonstrate that you know what they want, and you can deliver it.

    In other words, hyper-personalization. Innovations in marketing tech, like AI, machine learning, and shopping bots, enable you to microsegment all the way down to a customer’s purchase and interest patterns to develop messaging that triggers powerful interest, creates deep engagement, and drives sales.

    Learn more about the tech you need, the strategies that win, and how to deliver the “you know me” satisfaction that keeps customers coming back for more when you join this VB Live event!

    Don’t miss out!

    You’ll learn:
    * Why broad segmentation is no longer enough
    * How shopping bots, AI + more enable one-to-one marketing
    * How psychographics, lifecycle data, and multi-channel behavior can build customer profiles
    * How engagement, experience and retention improve one-to-one marketing
    * The importance of not being creepy
    * The trends and future of hyper-personalization

    Speakers:
    * Cherie Yu, Head of Local Marketing, Lyft
    * Dr. Martin Prescher, CTO of AutoGravity
    * Stewart Rogers, Direct of Marketing Technology, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat
  • Accelerate the BusDevOps Cycle with Storyteller and HPE ALM
    Accelerate the BusDevOps Cycle with Storyteller and HPE ALM Susan D'Angelo Recorded: Sep 21 2017 52 mins
    Agile works well for small, co-located teams that can hover around sticky notes on a Kanban board, and collaborate on-demand. But as initiatives become more complex, and teams become dispersed, Agile can be difficult to scale across the enterprise.

    What’s missing in Agile practices today is the ability to see the whole picture. With user stories as the source of record for an application, it’s hard to connect all the dots to see the complete functionality of a feature or capability. Think about the new team who will be developing additional features on that capability - where can they learn everything it does today? How will they know the impact their changes will have on that capability or potentially other capabilities? How will they collaborate on those changes and get them reviewed in a timely manner? How will your business stakeholder understand the impact of new those changes to the overall business process? Storyteller provides a centralized reusable searchable repository of exiting business and technical process models and requirements (business, non-functional and regulatory). In addition we also offer rich visualization, collaboration and review functionalities. These base capabilities are being used today to address the questions above. And - we do it in a way that everyone can understand from Business Stakeholders down to developers and testers.

    Storyteller is a key player in Enterprise Agile. We bridge the business gaps in the current agile process. For companies struggling with Agile Transformation, we providing guardrails around writing user stories and feature decomposition. Project teams can save time and effort by using our user story and test plan generation which can them be automatically synched over to ALM tools. We are also a key player in the BizDevOps chain by providing that upfront business alignment so what is produced though “Dev” and delivered and maintained by “Ops” is exactly what “Biz” wanted.
  • Adding intelligence to your Digital Transformation process
    Adding intelligence to your Digital Transformation process Brent Leary, Co-founder and partner of CRM Essentials LLC; Co-presenter: Matt Tharp, Chief Evangelist at bpm’online Recorded: Sep 21 2017 63 mins
    Bpm'online invites you to a free webinar “Adding intelligence to your Digital Transformation process: driving innovation and flexibility” with Brent Leary, one of the most influential CRM industry experts, as a guest speaker.

    Today 87% of businesses treat Digital Transformation as their competitive opportunity, however, only 10% of companies describe themselves as fully digital.

    Bpm’online has invited Brent Leary, one of the most regarded industry experts, to share his expertise on how to tackle the challenges of Digital Transformation and how intelligent technology impacts the future business landscape.

    REGISTER FOR THE WEBINAR AND LEARN:
    • Best practices in strategy execution: how to upgrade your Digital Transformation strategy with Artificial Intelligence.
    • How companies will have to adjust and adopt new ways of thinking to stay connected with customers and serve them moving forward.
    • Why AI is destined to change how businesses engage with customers forever and how to respond to this change.
    • How intelligent technology can enrich your customer engagement strategy by providing profound insights and better workflow visibility.
    • How today’s intelligent CRM solutions are driving growth for organizations from various industries.

    Featured Guest Speaker: BRENT LEARY, Co-founder and partner of CRM Essentials LLC
    Co-presenter: MATT THARP, Chief Evangelist at bpm’online

    Don’t miss out the opportunity to acquire extensive knowledge on how to accelerate your time-to-strategy execution with intelligent technology powered by AI from one of the most regarded industry experts!
  • Protecting the business with SD-WAN segmentation
    Protecting the business with SD-WAN segmentation Robert McBride, Director of Enterprise and Telco Solutions Recorded: Sep 21 2017 33 mins
    Guest Wi-Fi services, partner networks and multi-tenancy all are drivers to segment the branch and WAN infrastructure to secure and prevent unauthorized access of corporate assets. However, what is segmentation when it comes to the next-generation branch architecture and SD-WAN? Is it really only VLANs and encrypted traffic?

    Attend this webinar to understand what is segmentation and how it is applied to software-defined WAN to address:

    •Optimal application experience
    •Secure and authorized connectivity
    •Third party network access and integration
    •Local guest services like Wi-Fi
  • Solving the last encryption problem. Never exposing keys in memory!
    Solving the last encryption problem. Never exposing keys in memory! Steve Pate – HyTrust Chief Architect & Hari Tadepalli - Security Architect, Intel Recorded: Sep 21 2017 47 mins
    It wasn’t long ago that encryption projects were thwart with problems. The performance was terrible. Key management was a nightmare. Encryption was only implemented as a “must have” for compliance or national security. Around 10 years ago, performance started to be addressed with the introduction of AES acceleration in modern Intel processors. A new range of key management solutions started to appear to simplify encryption projects. Coupled with a “move to the cloud” the demand for encryption is now at an all-time high. But there is still one problem left to be solved. To perform encryption, even with hardware acceleration that AES-NI provides, encryption keys need to be memory resident. As such, the keys are vulnerable to attack.

    With the introduction of Intel QuickAssist and Key Protection Technology and, in conjunction with HyTrust DataControl, this webinar will introduce you to some new and exciting technology where encryption keys are never exposed in memory and high-performance encryption is performed by the QuickAssist hardware. We’ll also be exploring the use of SGX in conjunction with QuickAssist to build secure, distributed HSMs.
  • A Day in the Life of a GDPR Breach
    A Day in the Life of a GDPR Breach Adrian Davis, (ISC)² EMEA, Matthias Maier, Elizabeth Davies, Splunk Recorded: Sep 21 2017 62 mins
    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organisation has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?

    Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.

    What you will learn:
    - What breach response will look like under the GDPR
    - What tools and processes a data privacy officer will rely on in case of a breach
    - What departments and entities will be involved beyond IT
    - What activities are currently happening within organisations to prepare for the GDPR
    - What the consequences of the breach could be
  • Colocation: What Customers Want
    Colocation: What Customers Want Jeff Fidacaro, Senior Analyst, Datacenter Technologies, 451 Research Recorded: Sep 20 2017 24 mins
    While the top-level forecasts for colocation are rosy, a closer analysis points to significant disruption ahead. The opportunities for providers will be uneven but those that adapt will carve a profitable role for themselves.

    This session will delve into customer research on changing patterns of demand and emerging requirements, and will answer questions such as:
    •What drives customers to colocation today and what will attract them in the future?
    •How can providers remain relevant?
    •How can they compete against cloud and other colo providers?
  • How to pick a winning IoT business model
    How to pick a winning IoT business model Mike Bell Canonical, Ian Hughes 451 Research Recorded: Sep 20 2017 63 mins
    Getting started on an IoT project? Are you going to build a business or a liability for yourself? Canonical commissioned a research of 361 IoT professionals to find out how their projects are progressing. The findings were compiled in a report titled Defining IoT Business Models, which explored the practices of organisations currently implementing IoT projects. You can read it for yourself at http://ubunt.eu/vkTPIW

    In this webinar, Canonical's EVP of Devices & IoT and 451 Research's IoT Analyst will discuss our findings as well as the challenges and opportunities businesses will face with the internet of things!

    Join our webinar to find out...
    >How businesses can monetise the internet of things in the long term
    >What skills they need and where to find them
    >How to address fundamental security considerations.
  • IoT and Smart Buildings: The New Construct
    IoT and Smart Buildings: The New Construct Yann Palmore, JLL; Ray Moya, COO/CTO, Argent Associates, Inc., Moderated by Limor Schafman, TIA Recorded: Sep 20 2017 61 mins
    Real estate developers, owners and tenants are rethinking the office building experience. Not only are buildings becoming increasingly efficient in in-door energy management and operations, they are also beginning to interact with the people who work within the walls, and with the out of doors environment.

    This type of sentient building design is making use of increased connectivity to and in buildings, as well as the use of sensors and IoT applications. This webcast will discuss communications and connectivity infrastructure that is being deployed in and to current real estate developments; what buiding owners, operators and tenants expect; the impact smart community development is having on smart buildings; and sample smart building IoT applications.

    Speakers:
    Yann Palmore, Vice President, Smart Building Solutions, JLL
    Ray Moya, COO/CTO, Argent Associates, Inc.

    >> Yann Palmore helps CRE investors, owners, and operators understand how to rethink building system infrastructure to support Internet of Things (IoT) technologies and drive smart building strategies. Yann’s key responsibilities are to guide clients through a structured process that prioritizes program goals, defines specific smart building strategies, specifies appropriate technologies, and oversees program implementation.

    >> Ray Moya has over 25 years of network engineering and organizational management experience. His specializations include, wireline and wireless voice and data networks, network security, software development, and finance. He has designed, engineered and installed hundreds of Fortune 500 Company and Government networks. He leads network-consulting teams in LAN/WAN, software development, wireless technologies, and Network security.

    For more about the speakers, please visit: http://www.tiaonline.org/webcast-iot-and-smart-buildings-new-construct
  • Digital Transformation: How Europe will turn disruption into differentiation
    Digital Transformation: How Europe will turn disruption into differentiation Nick Patience 451 Research, Matt Leonard CenturyLink Recorded: Sep 20 2017 59 mins
    Join 451 Research and CenturyLink on the 20th September at 3:00pm UK time, 4:00pm CET, to discuss how enterprises are choosing and deploying digital transformation initiatives for business gain. This webinar will focus on the strategies and actions impacting the European market.

    Organisations of all sizes and in every sector are busy redefining their IT priorities for a digital future, identifying the goals of enhanced customer experience, operational efficiency, business agility and improved risk management as four key pillars for their digital transformation strategies.

    Digital transformation can play out differently depending on a company’s maturity, the vertical sector in which it operates, its employees, its infrastructure, and its ability to innovate. Knowing where to start, and how to maintain momentum is critical.

    Join 451 Research and CenturyLink to learn how European enterprises are making assured first steps, and discover the following:

    - Understand how companies with more progressive digital transformation strategies are prioritising their efforts for competitive differentiation, changing the nature of their business with innovative technologies, and making service provider choices to accelerate results.

    - Gain insights and recommendations from a major survey of the IT priorities of enterprises in Europe.

    - Identify the key shifts in business context that will continue to shape digitisation efforts, and how these need to be reflected in a digital transformation roadmap for IT organisations.
  • Cognitive Security in Action: Watson at Wimbledon
    Cognitive Security in Action: Watson at Wimbledon Adrian Davis, Managing Director, (ISC)² EMEA, Mike Spradbery, IBM's UK & Ireland Security Technical Leader Recorded: Sep 20 2017 60 mins
    Cognitive Security has game-changing potential to help tackle cybercrime, but how is this playing out in reality? In February this year IBM announced Watson for Cyber Security, described as 'the industry’s first augmented intelligence technology designed to power cognitive Security Operations Centres'. What do customers say about their experiences working with Watson for Cyber Security and how is it helping security analysts improve response times?

    Mike Spradbery, IBM's UK&I Security Technical Leader, will discuss not only the promise of Watson for Cyber Security but the client results that IBM is seeing. Mike will talk live to Brian Jensen, the analyst responsible for Cyber Security during the high-profile Wimbledon tennis tournament, to understand the scale and type of attacks the team saw, and how innovative new technologies like Watson for Cyber Security helped the team keep Wimbledon safe and secure.
  • How Smart Security Teams Use Cyber Threat Intelligence
    How Smart Security Teams Use Cyber Threat Intelligence Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Sep 19 2017 58 mins
    As malware and ransomware become more commercialized, and the evolution of threats accelerates, it’s hard for organizations to keep up – even when they have multiple security products deployed. The latest SANS Cyber Threat Intelligence Survey showed that organizations using threat intelligence can gain dramatic improvements in visibility into threats, to enable a faster and more accurate response.

    Join AlienVault for this practical session to learn how smart security teams are integrating cyber threat intelligence into their day to day operations. You'll learn:
    - What threat intelligence is, and how it speeds threat detection and incident response
    - Key questions to help you evaluate threat intelligence sources and plan for integrating it into your operations
    - How AlienVault USM Anywhere integrates threat intelligence with other security capabilities to save valuable time
    - A demo of AlienVault USM Anywhere showing how threat intelligence adds valuable context to alarms
  • Thinking of SD-WAN? Critical Factors for a Successful Network Transformation
    Thinking of SD-WAN? Critical Factors for a Successful Network Transformation Jim Duffy 451Research, Karim Eljai NTT Recorded: Sep 19 2017 55 mins
    In a rapidly evolving and digitized economy, the adoption of cloud services is accelerating for companies both small and large who want to remain competitive and relevant to their market and clients. Network transformation becomes critical for enterprises to support these cloud initiatives and in this context the emergence of SD-WAN is very timely. If you are considering SD-WAN to access cloud applications and leverage the Internet for your wide area network, this webinar will provide insight into real life SD-WAN deployment considerations. This knowledge will help you fast track your SD-WAN decision-making process and avoid costly mistakes.

    Join this webinar to learn:
    • How connectivity and security need to be a critical consideration of SD-WAN deployment, both at the data center and small branch office level
    • How SD-WAN network analytics can provide you with detailed visibility into the behavior of your network and can help your IT organization better manage workload and performance
    • Why it’s important to select a partner who is flexible and can offer choices from the design, deployment and management of the transformation
    • And more
  • Introducing the Network Operations Management Suite from HPE/Micro Focus
    Introducing the Network Operations Management Suite from HPE/Micro Focus Joe Reves, Brian Kaplan, Jon Kies Recorded: Sep 19 2017 57 mins
    Network engineering and operations teams face a complex, moving target. But unfortunately, they’re typically armed with only a disparate collection of management tools - with little or no integration. Network teams deal with equipment outages, slowdowns, security breaches, inability to reach resources, access denials, and other issues that can be caused by anything from a bad connection to devious hackers.

    To address these challenges, we are now offering the 5th suite in the ITOM portfolio – Network Operations Management (NOM). Combining the functionality of Network Node Manager i (NNMi) and Network Automation (NA) and additional suite functionality such as reporting, NOM represents our path forward to managing web-scale networks with their evolving mix of physical, virtual, and software-defined networks.
    Join this webinar to get an in-depth understanding about Network Operations Management including:
    •Enhanced workflows designed to drive productivity and reduce
    •Ongoing capability and content enhancements for both the suite and standalone products
    •New licensing models to enable upgrades at an average of half the cost of a la carte purchases
  • Navigating a Multi-Cloud World: Application Solutions for Tomorrow's IT
    Navigating a Multi-Cloud World: Application Solutions for Tomorrow's IT Sam Barnett, Director of Solutions Marketing, John Giacomoni, Senior Director of Product Development Recorded: Sep 19 2017 43 mins
    The cloud has transformed business and IT. By moving to the cloud, businesses are rapidly changing to become faster, innovative, and more connected. Many organizations are starting to embrace a multi-cloud world. However, this has added architectural complexity in ways not previously considered. Where and how you choose to deploy an application in the cloud could become an advantage or a liability.

    Join us for an informative webinar where you will learn:
    •The emerging challenges of multi-cloud environments
    •How to reduce complexity with consistent application services for any environment
    •Solutions to manage your applications in a multi-cloud world
  • Synchrone Replikation mit Tintri
    Synchrone Replikation mit Tintri Christopher Knörle, Tintri Recorded: Sep 18 2017 56 mins
    Eine synchrone Replikation ist für die Verfügbarkeit unternehmenswichtiger virtualisierter und cloudbasierter Anwendungen unverzichtbar.
    Wer seine Anwendungen bislang durch synchrone Replikation mit einem Recovery Point Objective (RPO) von 0 Minuten schützen wollte, musste auf komplexe und teure Speicherlösungen zurückgreifen.

    Jetzt bietet die synchrone Replikation von Tintri die Vorteile ohne die Komplexität, und das mit einfacher Einrichtung, Failover mit einem Klick, unkompliziertem Betrieb und allen Leistungsvorteilen von Tintri VM-Aware Storage (VAS) für virtualisierte und Cloud-Infrastrukturen.

    In diesem Webcast zeigen wir Ihnen u. a.:
    - wie Sie Ihre Anwendungen mit einem Recovery Point Objective (RPO) von 0 schützen können,
    - wie eine einfache Administration von Notfallwiederherstellung und Datenschutz aussehen kann,
    - eine Live-Demo der synchronen Replikation mit Tintri.
  • Human vs Machine: Is Hybrid AI SOC in Your Security's Future?
    Human vs Machine: Is Hybrid AI SOC in Your Security's Future? Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine Recorded: Sep 14 2017 31 mins
    Watch this webcast for an in-depth conversation about Hybrid AI and get clarification on the following:

    - Artificial Intelligence versus Hybrid AI
    - Hybrid AI when applied to a SOC
    - Incident response (human versus machine-driven)

    There will also be discussions around the following questions:

    - Can machines make decisions?
    - Can Hybrid AI systems operate autonomously?
    - What is missing in a SOC? How can Hybrid AI be added to a SOC?
    - Can Hybrid AI help alleviate staffing shortage?
  • 3 Pitfalls to avoid in traditional data protection.
    3 Pitfalls to avoid in traditional data protection. Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: Sep 14 2017 42 mins
    The cost and complexity of traditional enterprise storage are exacerbated when it comes to data protection. Every piece of data written turns into 15 or more copies for backups, disaster recovery, testing, etc. There are costs for onsite and offsite infrastructure, the corresponding software licenses, all the integration, and management. How do you eliminate all of this? Join us to learn about a fundamentally different approach to enterprise data storage and protection that removes significant cost and complexity from how you manage and access your data.
  • Tracking Access, Sharing and Administration of Files in SharePoint Online
    Tracking Access, Sharing and Administration of Files in SharePoint Online Sacha Dawes, Principal Product Marketing Manager, AlienVault. Randy Smith, CEO, Monterey Technology Group, Inc. Recorded: Sep 14 2017 83 mins
    Cloud-based file applications like SharePoint and OneDrive for business mean any document in your company is seconds away from being shared to the world with a unique URL that takes people directly to the file.

    Given this, how do you remain compliant and exert some level of control and accountability over your organization’s documents?

    In this webinar, Randy Smith of Ultimate Windows Security will zero in on how the UAL can answer these questions:

    -Who viewed this file?
    - Who was been downloading an abnormal amount of files?
    -When was this file downloaded and by whom?
    -…and more!

    Sacha Dawes of AlienVault will then show you how AlienVault Unified Security Management (USM) accomplishes all of this and more – such as enriching audit events with geo location based on the ClientIP field, and enabling alerting and reporting on SharePoint and OneDrive events.
  • VMworld 2017 Wrap Up: Top Trends You Need to Know
    VMworld 2017 Wrap Up: Top Trends You Need to Know Sushant Rao, Sr. Dir. Product & Solutions Marketing& Paul Nashawaty Product Evangelist & Dir. of Technical Marketing DataCore Recorded: Sep 13 2017 51 mins
    Did you attend VMworld 2017?

    If so, then let us summarize the top trends we observed at the show and compare notes with you.

    Missed the event? Don’t worry, we have you covered. Join us as we cover the top trends and highlights of the news and interesting tidbits from VMworld. It’s the next best thing to being there!
  • Using Machine Learning in Software License Discovery for Greater SAM Maturity
    Using Machine Learning in Software License Discovery for Greater SAM Maturity Bill Dyck, Nick Rendall Recorded: Sep 13 2017 56 mins
    Accurate software asset management (SAM) is critical to a company’s IT operations in order to optimize usage and cost, and ensure that license compliance is achieved to avoid true-ups and penalties. Keeping a company’s software application library up-to-date for SAM has been a continuous struggle for asset managers given the time it takes for manual entry of new titles, the changing information in software titles, and the sheer number of titles across an enterprise organization. Every software title not recognized in their library causes potential license compliance breaches (leading to true-ups and potential fines) and reduces an organization’s ability to optimize their software license usage for cost optimization.

    Micro Focus (HPE Software) has added the industry leading IDOL unstructured search engine to add machine learning to Universal Discovery, drastically improving in the process of software license recognition and teaching for quicker software license recognition and a consistently up-to-date SAI over time. Join us on September 13th for an introduction to this exciting new capability and to understand the business value it can bring to your SAM program.

    • Introduction to machine learning and the IDOL engine
    • Machine learning in Universal Discovery
    • Current SAM with Machine Learning Success StoriesLive
    • Q&A about this new technology
  • High Availability Clusters with SUSE on Azure
    High Availability Clusters with SUSE on Azure David Rocha | public cloud architect Sep 26 2017 2:00 pm UTC 60 mins
    In this webinar you'll learn how SUSE has worked with Microsoft to enable HA clusters on Azure. Learn how to launch via the Azure Resource Manager; and how this applies to even the most demanding enterprise databases such as SAP HANA.
  • 6WIND & Intel Deliver 50%  Performance Increase for SW-based Security Gateways
    6WIND & Intel Deliver 50% Performance Increase for SW-based Security Gateways Kelly LeBlanc, VP of Marketing for 6WIND Sep 26 2017 3:00 pm UTC 60 mins
    Data centers and managed network operators looking for performance-oriented IPsec applications can now turn to Intel® Xeon® Platinum 8170 processors and 6WIND Turbo IPsec™ network software on commercial-off-the-shelf (COTS) servers.

    In this Webinar, attendees will learn how 6WIND Turbo IPsec performance tests on servers based on Intel® Xeon® Platinum processors demonstrate a 50% increase in processing power for common applications such as multi-site VPNs and backhaul security gateways. This performance benefit also scales in conjunction with the addition of cores. These applications are designed for today’s multi-core processor environments, driving a significant price/performance value proposition over legacy hardware.
  • The Blockchain Bubble: Identifying viable  opportunities for blockchain
    The Blockchain Bubble: Identifying viable opportunities for blockchain Joe Pindar, CTO Office Director of Strategy Sep 26 2017 3:00 pm UTC 60 mins
    Blockchain technology is popping up everywhere from the currency market to smart contracts. The growth in the technology is evident from the investments being made, for example, PwC estimated that in the last nine last nine months of 2016, $1.4 billion had been invested globally in blockchain startups. This stems from its potential to enable efficiencies and cost-saving opportunities based on moving to a decentralized approach and away from the current centralized systems. With all the hype around blockchain, companies need to cut through the hype and ask the question - when does blockchain actually make business sense?

    Blockchain is not a silver bullet and cannot solve every problem. There is also the added complexity of managing the security of many distributed nodes can only be justified by gaining business benefits from using blockchain. In this webinar, we will look at a business qualifying approach to blockchain to help you evaluate valid blockchain use cases and identify the security needs surrounding blockchain operations. Join us to learn more on:
    •Securing blockchain from the edge to the core
    •The operational benefits and pitfalls of blockchain technology
    •Our 4 step qualification process for blockchain business opportunities:
    1.Is there an established business process?
    2.Are there more 3 parties involved – i.e. is it a distributed problem?
    3.Is it important that the data being exchanged is trusted and considered to be factually accurate?
    4.Would automation improve the performance of the process?
  • Hitting Your Data Protection Sweet Spot
    Hitting Your Data Protection Sweet Spot Storage Switzerland, Carbonite Sep 26 2017 4:00 pm UTC 60 mins
    The data protection process sometimes has objectives that seem to be in opposition to one another. On one side, the organization needs rapid and frequent data captures so that RPOs and RTOs are met. On the other side, there is a need for cost effective long term retention so that the organization is protected from ransomware. Finding the right balance between these extremes is called hitting the data protection sweet spot. In this live webinar, experts from Storage Switzerland and Carbonite will help you get there.
  • Improve application response times with Software-defined Storage?
    Improve application response times with Software-defined Storage? Sushant Rao,Sr. Director of Product Marketing, DataCore & Bill Hansen, Sr. Product Manager & Product Planner, Lenovo Sep 26 2017 6:00 pm UTC 45 mins
    Surveys show that 61% of companies have experienced slow applications after server virtualization, with 77% pointing to I/O problems as the culprit. Companies are desperately trying to improve their I/O performance to speed-up applications and increase VM density.

    The most common performance measurement is IOPS, but is this the best metric?

    IOPS depends on a number of variables, including the type of workload being simulated, read/write percentages, sequent/random percentages and block size. Most importantly, IOPS doesn’t indicate the response time.

    In this webinar, we’ll discuss better ways to measure response times as I/O increases. These metrics will help you understand why some storage products can claim high number of IOPS but still perform poorly when they are used for critical applications in production.

    We will also show how a software-defined storage appliance (the Lenovo DX8200D Powered by DataCore) can speed up your applications.
  • IMMERSIVE EXPERIENCES - PASSING THE “SO WHAT?” TEST FOR BRANDS
    IMMERSIVE EXPERIENCES - PASSING THE “SO WHAT?” TEST FOR BRANDS Chris Helm, COO & Co-Founder, Blend Media Sep 27 2017 1:00 pm UTC 45 mins
    Brands typically invest in one-off, high end immersive experiences that
    deliver difficult to measure ROI metrics whilst also being challenging to
    consume for viewers.

    Multiple friction points along this journey make us ask “So What?” when it comes to the immersive visual experience.

    Blend Media specialise in 360˚ video and have built a creator network,
    content library and web editor to pass the ‘So What?’ test.

    We enable brands to create immersive, affordable visual experiences that deliver longer term campaign value that are engaging and easy for consumers to enjoy.
  • Virtualizing Media Broadcast: TV Transformed
    Virtualizing Media Broadcast: TV Transformed Steve Smith, Limor Schafman Sep 27 2017 3:00 pm UTC 75 mins
    Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.

    Speakers:
    Steve Smith, CTO, Cloud, Imagine Communications
    Stephen Smith is the CTO, Cloud, for Imagine Communications, where he leads the transformation of solutions to support media and entertainment markets in a future defined by IP, software, virtualization and cloud. Previously, Smith was the Executive Director of Media Systems at Starz Entertainment in Colorado, where he was responsible for the technology, implementation and operation of their Media Asset Management and Content Processing platforms. With 20+ years in the industry, Stephen has extensive experience in architecting, deploying, owning and operating complex media processing, origination and distributions systems.

    Host: Limor Schafman, Content Development Director, TIA
  • Why You Should Monitor IT Service Performance in Pre-Production Environments
    Why You Should Monitor IT Service Performance in Pre-Production Environments John Worthington, Director of Product Management at eG Innovations Sep 27 2017 6:00 pm UTC 60 mins
    A converged APM/IPM solution can facilitate true root-cause analysis from an end-to-end IT service management (ITSM) perspective, inclusive of both supporting and customer-facing IT services, as well as across multiple service lifecycle stages. In addition, by having all service team members share an easy-to-use interface that is tailored to each of their requirements minimizes learning curves, enhances operational efficiency and ensures user satisfaction by providing a production-grade monitor to IT staff that are working in staging environments.

    Attend this webinar to discover how a converged APM/IPM solution can be leveraged effectively in pre-production to eliminate bottlenecks in testing, delays, re-work or increased deployment risk.
  • Privacy and Protection in the Changing World of SSL
    Privacy and Protection in the Changing World of SSL Scott Register, VP of Product Management, Ixia Sep 27 2017 7:00 pm UTC 60 mins
    SSL encryption is one of the key enabling technologies of the Internet. We use it for e-commerce, collaborating with partners, and even email. But increasingly, encryption is also used to shield malicious activities – such as malware and ransomware downloads – from detection by network security devices.

    Join this interactive webinar to learn:
    - How the new TLS1.3 standard increases both privacy and the difficulty in detecting malware and data leak
    - Understand best practices for adapting to the changing environment
  • Making Storage Evergreen: A Cloud-Like Approach to On-Prem Storage Solutions
    Making Storage Evergreen: A Cloud-Like Approach to On-Prem Storage Solutions Kevin Rickson, Business Value Marketing, Pure Storage Sep 28 2017 10:00 am UTC 30 mins
    Pure Storage's Evergreen™ Storage has changed the way organizations view, pay for, and even think about their storage. Evergreen Storage applies a cloud-like approach to on-premise storage, enabling you to simply subscribe to a storage experience that keeps getting better with age. Imagine buying your storage once, and upgrading it as needed, all without any disruption, and without rebuying any TBs you already own*. Evergreen Storage subscriptions mean you can frequently harness rapid software, hardware, and flash innovation – annually or even faster – with no need to wait for a 4-5 year refresh. In this session we'll go over the basics of Pure's Evergreen Subscriptions and how they can save any organization 30% and more over traditional storage.

    In this webinar you will learn:

    - Get a subscription to innovation and a storage experience that keeps getting better with age
    - Buy your storage once, upgrade it as needed without disruption, and without rebuying any TBs you already own
    - Frequently harness rapid software and hardware innovation, with no disruptive refresh cycles
    - Learn the basics of Pure's Evergreen Subscriptions and how you can save 30% and more over traditional storage
  • Virtual Umbrella: Why We Chose Virtual Reality
    Virtual Umbrella: Why We Chose Virtual Reality Samantha Kingston, Founder, Virtual Umbrella Sep 28 2017 1:00 pm UTC 45 mins
    Samantha Kingston will explore why she bet her career on virtual reality and what it’s really like running a marketing company solely for VR, looking at trends and what challenges are ahead for 2018.

    Virtual Umbrella is an award-winning marketing consultancy specialising in Virtual Reality. Virtual Umbrella has worked on a number of notable projects including creating a virtual reality cinema in Cannes, curating and running a technology hub as part of the Edinburgh Fringe Festival and providing immersive experiences along the BBC and Imperial War Museum.

    Speaker bio:

    Samantha Kingston is the award-winning client director at Virtual Umbrella. Virtual Umbrella is a marketing and PR agency specialising in virtual reality. Samantha fell into the VR industry by accident but has spent her time in the industry building up her own company and working with the VR industry in the UK, Europe, and US. Samantha is an advocate for Women in tech and VR and she is often found moderating panels on equality in the workplace. In 2016 she won the regional and national ‘New Business’ award at Venus Awards, highlighted as one of MCV 30 under 30 and one of the rising stars of BIMA100 2016.
  • Branding VR: Thoughts on Creating an Identity
    Branding VR: Thoughts on Creating an Identity David Mullett, Founder & Chief Design Officer, hellopupil Sep 28 2017 2:00 pm UTC 45 mins
    The public’s perception of virtual reality runs the spectrum from excitement to unknowing to downright confusion. When creating a VR product and brand, how should you navigate the landmines of being associated with virtual reality for better or worse. The science fiction, futuristic, and gaming-oriented identity of the medium can be appeal to fanboys and VR aficionados, but how do you build a brand that fosters frictionless adoption of your product? How does your VR technology product enter the market next to existing products and services? We’ll chat through visual and verbal branding and marketing issues that you may encounter in launching a VR product.
  • CEO Insights on Overcoming Ransomware
    CEO Insights on Overcoming Ransomware Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks Sep 28 2017 4:00 pm UTC 45 mins
    With the changing nature of the cyber-threat landscape, companies are now looking at ransomware differently than your typical malware attack. Ransomware can attack your company's infrastructure which in turn can debilitate your day-to-day operations and cause billions of dollars in losses annually. Ransomware is hardly new, but continues to be a very dangerous trend.

    With over 30 years of experience, tune into this intriguing fireside chat to hear insights from Arctic Wolf's CEO, Brian NeSmith. In this webinar, Brian will discuss the following:

    - Why traditional backup strategies fail
    - 5 Things IT should do if exposed
    - Preventative measures to ensure your company's data security

    Security solutions and users now have to be more smarter than ever before, so don't let a ransomware attack outsmart you. Register today to learn how!

    About the Speaker
    Brian NeSmith brings more than 30 years of experience, most recently as former CEO of Blue Coat Systems, where he increased company revenues from $5M/year to over $500M/year as the industry’s leading web proxy platform. Prior to Blue Coat Brian was the CEO of Ipsilon Networks (acquired by Nokia) which became the leading appliance platform for Check Point firewalls. His early career includes product management, marketing, and general management at Newbridge Networks. He was also a consultant for Network Strategies, Inc. Brian graduated from Massachusetts Institute of Technology with a bachelors of science in electrical engineering.
  • The Increasing Risk of DDoS Attacks – Are You Adequately Prepared?
    The Increasing Risk of DDoS Attacks – Are You Adequately Prepared? Tom Bienkowski Director of DDoS Product Marketing Arbor Networks + John Pearson Founder and Chief Strategist IP Networks Inc. Sep 28 2017 4:00 pm UTC 60 mins
    The data is crystal clear. DDoS attacks are dramatically increasing in size, frequency and complexity. Unfortunately, many organizations have been severely impacted by DDoS attacks simply because they either assumed they would never be the target or they thought they had adequate protection in place. Join IP Networks and Arbor Networks - the industry leader in DDoS attack protection products and services to learn:

    -The latest trends in DDoS attacks
    -The importance of proper network visibility for anomaly & DDoS attack detection.
    -Best practices in DDoS attack defense; including an intelligent combination of in-cloud and on-premises attack protection solutions - which offers the most comprehensive form of protection.
  • Everything You Wanted to Know About Storage - Cyan: Storage Management
    Everything You Wanted to Know About Storage - Cyan: Storage Management Richelle Ahlvers, Broadcom, Mark Rogov, Dell EMC, Alex McDonald, NetApp, J Metz, Cisco Sep 28 2017 5:00 pm UTC 75 mins
    Storage can be something of a “black box,” a monolithic entity that is at once mysterious and scary. That’s why we created “The Everything You Wanted To Know About Storage But Were Too Proud to Ask” webcast series. So far, we’ve explored various and sundry aspects of storage, focusing on “the naming of the parts.” Our goal has been to break down some of the components of storage and explain how they fit into the greater whole.

    This time, however, we’re going to open up Pandora’s Box and peer inside the world of storage management, uncovering some of the key technologies that are used to manage devices, storage traffic, and storage architectures. In particular, we’ll be discussing:

    •Storage networking management protocols
    •SMI-S – The bread-and-butter of vendor-neutral storage management
    •SNIA Swordfish – The new storage management solution gaining widespread momentum
    •Software-Defined Storage – the catch-all term for storage that includes architectures and management

    There’s so much to say on each of these subjects we could do a full webcast on any one of them, but for a quick overview of many of the technologies that affect storage in one place, we think you will find your time has been well spent.

    Join us on September 28th, 2017, for our continuation of the “Too Proud To Ask” series with Cyan, the Storage Management Pod.
  • Azure, AWS move toward the edge: have they gone far enough?
    Azure, AWS move toward the edge: have they gone far enough? Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Sep 28 2017 5:00 pm UTC 60 mins
    While Amazon and other cloud vendors shouldn't predicate their businesses on huge data centers in the middle of nowhere, most IoT applications that require instantaneous response and user interactivity shouldn't be in the cloud, either. With AWS' recent announcement of Greengrass, and Microsoft allowing customers to run its Azure cloud technology directly on their own infrastructure, more organizations are making a move to the edge. So, what does this mean for your business? During this webinar, we'll discuss the future of the edge and how your organization can best leverage it.
  • 5G Revolution, Not Evolution
    5G Revolution, Not Evolution Kevin McTiernan, Vice President of Solutions, SS8 Networks Sep 28 2017 5:00 pm UTC 60 mins
    The fifth generation of mobile network technologies, or 5G, is being rolled out for commercial launch in 2018, with trials already underway around the world. 5G brings on new challenges for regulatory compliance. In this webinar, we will discuss what 5G brings in terms of new capabilities and challenges. We do this through a case study of an SS8 customer who has added 5G to their existing 2G, 3G and 4G services.
  • Standing in the Gap: Ransomware and the Role of the MSP
    Standing in the Gap: Ransomware and the Role of the MSP Garrett Gross, Director of Field Enablement, AlienVault Sep 28 2017 5:00 pm UTC 60 mins
    Ransomware continues to be one of the most intrusive and pervasive threats today. With organizations of every size and vertical being a potential target, the opportunity exists for traditional MSPs to offer security-as-a-service to help customers protect, detect and respond to such threats.

    But, just how bad is the ransomware threat? It's worse than you may think and organizations are not doing enough to combat it.

    Hear from industry expert Nick Cavalancia and Garrett Gross, Director of Field Enablement, from AlienVault as they discuss:

    - The current state of the ransomware threat
    - Common ransomware scenarios, responses, and outcomes
    - The opportunity that exists for MSPs to stand in the gap
  • Three Case Studies in SD-WAN Deployments
    Three Case Studies in SD-WAN Deployments Lloyd Noronha, Head of Global Marketing, Viptela Sep 28 2017 5:00 pm UTC 45 mins
    This webinar will discuss case studies from customers across healthcare, financial, and manufacturing that underwent transformations to SD-WAN technology. We will walk through the major issues that drove the transformation, and the migration journey for each customer. Beyond significant reduction in WAN Opex, there are common themes of challenges that SD-WAN solves across industries. These include resiliency for critical applications, agile change control, secure isolation of critical assets, and building a cloud-aware infrastructure.

    Webinar Highlights:

    · Key WAN problems for three customers in healthcare, financial, and manufacturing
    · Different drivers for SD-WAN (M&A, Bandwidth shortage, long times for change control, lack of app visibility)
    · Difference in choices of Hybrid WAN architecture
    · Walking through the testing process, pilots and full deployments
  • Automating Critical Security Controls for Threat Remediation and Compliance
    Automating Critical Security Controls for Threat Remediation and Compliance John Pescatore and Tim White Sep 28 2017 5:00 pm UTC 60 mins
    Trends like the increased use of cloud computing by businesses and their vendors introduce new complexities in reducing risk and assessing security across the supply chain. Demonstrating continuous risk reduction and compliance with internal policies and external regulations, fixing violations and configuration drift, centrally managing exceptions, and documenting progress are all common challenges.

    The Center for Internet Security’s (CIS) Critical Security Controls (CSCs) were selected and prioritized by leading security experts to stop today’s most common and serious cyber threats. By implementing these controls, organizations can improve their security posture and reduce the risk of threats to critical assets, data, and network infrastructure.

    In this webcast, SANS Senior Analyst John Pescatore and Tim White, Director of Product Management for Qualys Policy Compliance (PC), will discuss how you can achieve continuous security and compliance, and leverage Qualys solutions to address all 20 CSCs.

    The presentation will encompass:

    • An overview of the CIS Critical Security Controls, including ongoing updates
    • Success patterns organizations have demonstrated for using the controls to their advantage
    • How an automation can reduce the staffing load to determine whether controls are in place and effective
    • How to prioritize remediation efforts
    • Real-world examples of recent attacks that leveraged misconfigured systems

    This webcast will include a demo and Q&A session with the speakers.
  • Is SD-WAN the Killer Application for vCPE?
    Is SD-WAN the Killer Application for vCPE? Tim Verrall, Principal Engineering, Intel and Steve Yates, ADI Engineering Sep 29 2017 3:00 pm UTC 60 mins
    vCPE and SD-WAN are hot new technologies in networking and are forecasted to drive explosive growth over the next several years. To help understand the opportunity and challenges these technologies represent, Intel is hosting a series of webinars to explore vCPE and SD-WAN in detail. In our first webinar, we will review the technologies, the potential disruption they represent, the deployment strategies and highlight some of the key issues and challenges being addressed. We are also inviting ADI Engineering, an Intel Network Builder partner, to review some of their new vCPE product reference designs, including a discussion on features, performance, market drivers and differentiation.

    For next steps, I’ll send out a few meeting invites to review progress on the content development over the next couple of weeks. In addition, Renee Hunsaker, our host and coordinator for the webinar will send out a separate invite for a dry run and to work through logistics.
  • Phishing Response: Stop the Chaos
    Phishing Response: Stop the Chaos Adrian Davis, Managing Director, (ISC)² EMEA, John ‘Lex’ Robinson, Marcel Feller, PhishMe Oct 3 2017 11:00 am UTC 60 mins
    During a survey recently conducted among security professionals, 90% said phishing is the #1 threat. Yet many acknowledged they’re unprepared to deal with phishing attacks.

    Attend this webinar to learn why responders are drowning in emails instead of hunting real threats. See why they’re betting on automation whilst we know, tech alone won’t stop threats from getting through and wreaking serious havoc. Learn what rapid changes and investments your peers are planning to turn the tide against phishing and protect their organisations.

    You will also find out:
    •How bad is the phishing threat?
    •How confident are companies in their phishing responses?
    •What solutions are companies using—and which ones should they add?
    •How can automation and technology help? Why are humans important, too?
  • Using DevOps to get from Problems to Solutions - Including War stories
    Using DevOps to get from Problems to Solutions - Including War stories Jeff Kirkpatrick, Rob Healy Oct 3 2017 2:00 pm UTC 45 mins
    Transformation, despite all the hype, is difficult. People can be stubborn, processes inflexible and technology deeply embedded. In this webinar, Rob Healy, a Principal Consultant at SUSE Partner - Ammeon, will discuss some short real-world DevOps war stories. You will gain tips and techniques on how you and your teams can overcome wicked problems to deliver faster, cheaper and better.
  • VMware vSphere 6.5 Series: Why Upgrade?
    VMware vSphere 6.5 Series: Why Upgrade? Jeremy Lemmon, Senior Systems Engineer, VMware Oct 3 2017 4:00 pm UTC 60 mins
    Find out how VMware customers benefited from upgrading to vSphere 6.5. During this webcast, VMware technical experts will review common business challenges and benefits of upgrading including:

    - Simplified user experience
    - Comprehensive built-in security
    - Universal applications support (any app anywhere)
    - Proactive Data Center Management
  • Mobile ad dollars ripe for the capture
    Mobile ad dollars ripe for the capture Alex Tarrand, VP of Marketing, Lucktastic Oct 3 2017 5:00 pm UTC 60 mins
    The smartphone is the world’s first three-foot device — the only piece of technology that’s never out of your reach, from waking to sleeping. It’s the first thing a consumer reaches for in the morning, the tool they rely on throughout the day, and the last thing they look at in the evening.

    While some might argue that this has some troubling psychological implications, what it really represents is a huge opportunity for app publishers and developers. In-app advertising ad revenue is expected to generate $53.4 billion dollars by 2020.

    To get in on a chunk of that pie, don’t miss our latest VB Live event. We’ll explore all the ins and outs of in-app advertising, including innovative monetization tools and tactics, pitfalls to avoid, and how to find out where the money is.

    Don’t miss out!

    You’ll learn about:
    * Tools and tactics for publishers to monetize mobile apps (capture form, overlay, banner ads)
    * The role of sponsors and partnerships in mobile app monetization
    * Overcoming the challenges posed by technology fragmentation
    * How to NOT leave money on the table.

    Speakers:
    * Alex Tarrand, VP of Marketing, Lucktastic
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat