Hi [[ session.user.profile.firstName ]]

Virtualization

  • What’s the latest in CA Service Virtualization v10.3 and why consider upgrading.
    What’s the latest in CA Service Virtualization v10.3 and why consider upgrading. Beverly Mindle and Koustubh Warty, CA Technologies Recorded: Aug 10 2018 63 mins
    This session will walk you through the new and exciting features in our latest release- CA Service Virtualization v10.3 and offer some pointers on how to upgrade & stay current.

    Hear from our expert on tips and tricks to best upgrade to the latest version of CA Service Virtualization. Our experts will be at hand to take all of your questions on the new version and the upgrading process.

    Don’t miss the opportunity.
  • Hybrid Defense: Boost Cybersecurity with Human Augmented Machine Learning
    Hybrid Defense: Boost Cybersecurity with Human Augmented Machine Learning Matthew Thurston, Chief Architect - Arctic Wolf Networks Recorded: Aug 9 2018 49 mins
    Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?

    In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.

    We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.

    After attending, you will be able to:

    - Recognize how AI and Machine Learning are typically used in Cybersecurity, and what are the gaps
    - Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
    - Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks

    About our guest speaker:

    Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
  • Active-Active File Services for the Nutanix Enterprise Cloud
    Active-Active File Services for the Nutanix Enterprise Cloud Duane Laflotte - Chief Technology Officer at Peer Software, Inc. , Mike McGhee - Technical Marketing Engineer at Nutanix Recorded: Aug 9 2018 41 mins
    Customers need the ability to optimize the placement of applications and data workloads to ensure both performance and availability. These challenges are further complicated when applications, data, and people are spread across multiple storage platforms, data centers, and remote office locations.

    As a fileserver built for the cloud era, Peer and Nutanix Acropolis File Services (AFS) work in concert to conquer the toughest challenges. Featuring a globally-distributed Active-Active file services fabric, the combined solution seamlessly weaves AFS clusters and existing storage systems together with real-time synchronization and distributed file locking. Data can now be made local to users and applications, ensuring optimal performance, integrity, and high availability.

    Key use cases include:
    - Active-Active Global File Sharing and Collaboration
    - Active-Active Continuous Availability and Load Balancing for VDI Implementations
    - Extending the Reach of Nutanix Across Multiple Storage Platforms
  • Can your data infrastructure support AI marketing?
    Can your data infrastructure support AI marketing? Rolf Schromgens, CEO, Trivago Recorded: Aug 9 2018 62 mins
    Are you AI-ready? You need to be. Artificial intelligence marketing applications are delivering on their promise to source new insights to grow your business fast, AI technology is becoming available to any company looking for a competitive edge, and now’s the time to move, if you want to stay ahead of the curve.

    But the challenge is not just in defining an AI strategy; it requires developing the infrastructure to support it.

    Should you be developing in-house, or look to available technology and collaborate with outside experts? Keep deployment on-premise, or reach for the cloud? Can your current infrastructure, from server performance to processing power, stand up to the demands of increasingly complex AI applications?

    Get ready to level up your marketing strategy with AI, advance your technological capabilities in smart, strategic ways, learn how to make sure your next infrastructure move helps you exploit the AI advantage and more when you join this VB Live event!

    Register for free!

    Attend this webinar and learn:
    * How to tell if your marketing and IT departments are AI-ready
    * The fundamentals of an AI-driven infrastructure
    * The role of clean, definable data goals in successful AI implementation
    * How to scale the AI workload

    Speakers:
    * Andrew Malinow, PhD., Principal Data Scientist, Zylotech
    * Rolf Schromgens, CEO, Trivago
    * Sherif Mityas, Chief Experience Officer, TGI Friday's
    * Michele Goetz, Principal Analyst, Forrester
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Zylotech
  • Adding the S to MSP: Making Money in a Competitive Market
    Adding the S to MSP: Making Money in a Competitive Market Mike LaPeters, VP Global Channel Sales & Mike Calonica, VP American Sales Recorded: Aug 9 2018 35 mins
    Anybody can deliver technology, but these days Managed Service Providers (MSPs) also need to protect their customers’ networks and data. Cyber threats are a growing concern, and if you can’t provide security, your customers will find a provider who can. That’s why adding security to an MSP’s palette of services isn’t just an option; it’s a must.

    In this webcast, experts from Penton and AlienVault will discuss how to turn your MSP into a profitable MSSP by adding security for customers to protect their business from the scourge of cybercrime. Join this session to learn more about:
    - Current threats and how they are evolving
    - Comprehensive threat protection for the cloud
    - Unified security for detecting threats and responding to incidents
  • The Total Economic Impact of the INFINIDAT InfiniBox - A Forrester TEI Study
    The Total Economic Impact of the INFINIDAT InfiniBox - A Forrester TEI Study Bob Cormier, VP & PRINCIPAL CONSULTANT, FORRESTER CONSULTING Recorded: Aug 8 2018 31 mins
    As organizations continue their digital transformation to capitalize on the benefits of big data, many have already discovered that the key to success lies in selecting the right infrastructure solution that also enables economic transformation. INFINIDAT’s InfiniBox, based on a software-defined storage architecture, delivers the performance, availability, and continuous data protection at an exceptional value necessary to support both goals. 

    In April 2018, INFINIDAT commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study to illustrate the economic benefits of implementing the InfiniBox for high performance, high capacity use cases including virtualization, analytics, cloud services and backup. Forrester uncovered some remarkable results and shares them with you in this comprehensive presentation.

    The study revealed the following business benefits:

    • Payback in less than six months
    • A 125% Return on Investment (ROI)
    • An investment with a very positive Net Present Value (NPV) of $10.2M
    • A total benefit of $18.4 million over three years
    • Downtime cost savings of over $1.1 million
  • How "sticky" is your mobile user experience?
    How "sticky" is your mobile user experience? Amit Kapoor - Dir. of Virtual Networks Verizon; Jeff Aaron, Chief Marketing Officer, MIST; Randall Crowder- COO, Phunware Recorded: Aug 8 2018 29 mins
    Give customers, staff, and contractors a Wi-Fi experience that makes them want to stay around. Join us for a joint webinar with Verizon, Mist Systems, and Phunware to discover how sticky, deep customer engagement drives clear and compelling business outcomes.
  • Kubernetes for the Platform Operator: Maintenance and Monitoring
    Kubernetes for the Platform Operator: Maintenance and Monitoring Rob de Canha-Knight, EMEA Technical Director, SUSE Recorded: Aug 8 2018 30 mins
    Join our SUSE StandUp webinar! In this 30 minute session, our subject-matter experts will give you a technical deep-dive/live demo on our SUSE solutions.
  • Cloud Mobility and Data Movement
    Cloud Mobility and Data Movement Eric Lakin, University of Michigan; Michelle Tidwell, IBM; Alex McDonald, NetApp Recorded: Aug 7 2018 60 mins
    We’re increasingly in a multi-cloud environment, with potentially multiple private, public and hybrid cloud implementations in support of a single enterprise. Organizations want to leverage the agility of public cloud resources to run existing workloads without having to re-plumb or re-architect them and their processes. In many cases, applications and data have been moved individually to the public cloud. Over time, some applications and data might need to be moved back on premises, or moved partially or entirely from one cloud to another.

    That means simplifying the movement of data from cloud to cloud. Data movement and data liberation – the seamless transfer of data from one cloud to another – has become a major requirement.

    In this webcast, we’re going to explore some of these data movement and mobility issues with real-world examples from the University of Michigan. Register now for discussions on:

    •How do we secure data both at-rest and in-transit?
    •Why is data so hard to move? What cloud processes and interfaces should we use to make data movement easier?
    •How should we organize our data to simplify its mobility? Should we use block, file or object technologies?
    •Should the application of the data influence how (and even if) we move the data?
    •How can data in the cloud be leveraged for multiple use cases?
  • Automation and Distributed Computing
    Automation and Distributed Computing Chris Simon, Director of the Service Provider and NFV Business Unit, Dorado Software Recorded: Aug 7 2018 45 mins
    Innovation driven by cloud, NFV, IOT, video content and virtual reality is compelling the delivery of increasingly distributed computing options. These environments will need to support technical requirements such as latency, connectivity and power management while adhering to regulator factors such as HIPPA data security. Distributed computing will require a number of infrastructure form factors such as HCI, private cloud and embedded computing paired with a myriad of operational environments process such Nutanix, Azure and OpenStack. All these are delivered in diverse partnerships and business models.

    In this presentation, we will discuss automation opportunities that allow all stakeholders to effectively deploy and monitor the underlying infrastructure while orchestrating and managing individual functions that make up the distributed computing services - all with minimal and often remote support staff.
  • HPE Nimble Storage: The chameleon that’s here, there, and everywhere
    HPE Nimble Storage: The chameleon that’s here, there, and everywhere Andre Franklin - Product Marketing Manager HPE Storage Recorded: Aug 7 2018 43 mins
    Abstract:
    Why a chameleon? The rich enterprise features, robustness, and adaptability of HPE Nimble Storage arrays is sometimes unknown or misunderstood. This overview summarizes product value while positioning HPE Nimble Storage as the bulletproof and flexible enterprise product that it is. Yes, InfoSight is key, but is only half of the benefit provided by the new next-gen platform HPE Nimble Storage platform.

    Summary bullet points:
    •Predictive, cloud ready, and timeless benefits
    •What’s new in the next-gen platform?
    •Unspoken benefits of the predictive flash platform
    •Data protection for the data loss paranoid IT manager
    •App-centric and scale-to-fit benefits
  • IT Ops: SIG Talk Series - OpenStack Cloud & SUSE Integration [Complete Edition]
    IT Ops: SIG Talk Series - OpenStack Cloud & SUSE Integration [Complete Edition] Dr. Kenneth Tan Recorded: Aug 6 2018 46 mins
    This Vivit SIG Talk session will feature a thought leader who will share his vast knowledge and experience with OpenStack Cloud. Join us to hear a customer story on how a full OpenStack solution increased productivity and its implementation from start to finish.

    Speaker: Dr. Kenneth Tan
    How to build an OpenStack cloud in Academic sector: University of Edinburgh: University of Edinburgh: The popularity of private cloud adoption even in the academic sector is rapidly rising. Today, OpenStack in academia is not just a subject we discussed at summits or conferences anymore. But how can you successfully adopt OpenStack when even log management and monitoring seems to be piecemeal for operators? It is clear that full OpenStack solution would be beneficial for efficient, automated, and cost effective cloud computing solutions, without requiring large OpenStack operations teams. Not all operators have the luxury of having teams dedicated to operate OpenStack.

    During the presentation we will talk about how University of Edinburgh is more productive than ever with a full OpenStack solutions - Deploy, Operate, Upgrade, about how we put into production in 8 weeks the research services department of one of the UK’s largest academic private cloud system, and what is still missing for OpenStack to make the adoption of cloud computing more flexible and self-served.
  • Hyperconverged Secondary Storage: One Platform. Infinite Possibilities.
    Hyperconverged Secondary Storage: One Platform. Infinite Possibilities. Chris Colotti, Principal Solutions Architect, Cohesity Recorded: Aug 3 2018 24 mins
    Catch this on-demand recording from the Storage, Flash, NVMe Megacast to learn more about Cohesity's hyperconverged secondary storage platform, which solves multiple use cases all on ONE platform.
  • Pure Service Orchestrator - Introduction and Demo Webinar
    Pure Service Orchestrator - Introduction and Demo Webinar Jon Owings, Principal Systems Engineer, Pure Storage Recorded: Aug 3 2018 23 mins
    With Pure Service Orchestrator, customers can now extend their shared infrastructure beyond existing scale-up and virtualised applications to support containerised, persistent applications – all on Shared Accelerated Storage infrastructure.

    Join Principal Systems Engineer, Jon Owings for this overview and demonstration.
  • 30 minutes to a more secure, predictable, and stable infrastructure
    30 minutes to a more secure, predictable, and stable infrastructure Amaya Gil Pippino, senior technical marketing manager, Red Hat Recorded: Aug 2 2018 26 mins
    To keep pace with digital transformation and the rapid changes it brings, modern IT infrastructures have become increasingly complex. However, this complexity often equals added risk. To succeed, businesses must reduce downtime—and ultimately help their stakeholders succeed.
    If you are using the management and provisioning capabilities of Red Hat® Satellite, you may find additional benefit from adding Red Hat Insights to monitor your IT environment. Insights helps to reduce complexity by proactively identifying and remediating issues before business operations are affected.

    In this short webinar, you'll learn:

    > Why Red Hat Insights might be of interest to your team.
    > How to quickly and easily get your team started with Red Hat Insights.
    > How to use Red Hat Ansible® Automation to streamline large and small deployments.
    > The answers to your question from Red Hat experts.
    > Get proactive infrastructure management by viewing your entire Red Hat ecosystem from one Satellite dashboard—to quickly view risks to stability, security, availability, and performance and get clear, prioritized, and actionable remediation instructions.
  • Backup vs. Ransomware - 5 Requirements for Backup Success
    Backup vs. Ransomware - 5 Requirements for Backup Success Storage Switzerland, Micro Focus Recorded: Aug 2 2018 62 mins
    Ransomware is the universal threat. No matter an organization's data center location, or its size, it can be devastated by a ransomware attack. While most organizations focus on the periphery, they also need to be prepared for a breach, something that ransomware is particularly adept. In case of a breach, an advanced backup and disaster recovery solution can ensure safe and timely recovery of data without paying ransom.

    In this live webinar join experts from Storage Switzerland and Micro Focus as they discuss the impact of ransomware and the core features of a backup solution that can mitigate the associated risks.
  • How to Secure Your Business: Getting Back to the Basics
    How to Secure Your Business: Getting Back to the Basics Roger Thornton, Chief Technology Officer, AlienVault Recorded: Aug 2 2018 13 mins
    Roger Thornton, Chief Technology Officer of AlienVault, discusses why it is so important to start with cyber security basics and master that before adding all the latest shiny objects available in the InfoSec industry.

    Video highlights:

    - Detection and response of a breach is key to effectively mitigate risk for organizations of all sizes.
    - Democratizing data sharing through Open Threat Exchange to find the bad actors more quickly.
    - There are different strategic imperatives based on company size, industry and skilled resources.
    - The AlienVault approach: unified, simplified, democratized.

    To learn more about AlienVault, go to http://ow.ly/LMKB30kVijd. To join the AlienVault Open Threat Exchange, go to http://ow.ly/MuLJ30kVinb.

    Interview with
    Roger Thornton
    Chief Technical Officer, AlienVault

    Roger Thornton is the Chief Technical Officer for AlienVault. Roger’s career has been dedicated to the development of technology and new business ventures based on technical innovation. Over 25 years in the Silicon Valley and abroad, he has driven the formation and growth of dozens of new companies and hundreds of products, serving in a wide range of roles from engineering, marketing, and management, to investor/advisor.
  • Using Microsoft Azure Stack Solutions as Foundation for IT Transformation
    Using Microsoft Azure Stack Solutions as Foundation for IT Transformation Todd Christ, Enterprise Solutions Architect, Intel Corporation Recorded: Aug 2 2018 34 mins
    Are you sold on the idea of hybrid cloud but questioning how to bring your strategy to life? This webcast will offer insights into Intel architecture benefitting the business value and primary use cases of Microsoft® Azure Stack.

    Intel Select Solutions for Azure Stack deliver an optimized, hyper-converged platform, with the Intel® Xeon® Scalable Processors, Intel® DC SSD, Intel® Optane™ SSD, and Intel® Ethernet Connections featuring iWARP that improve your Azure “on-premise” model for Microsoft’s Hybrid Cloud. Tune in to learn more about the reference design, the featured products, and solution configurations in this Intel-optimized, Microsoft Hybrid Cloud platform to enable you to go further into your hybrid cloud journey.
  • Technical Briefing - Open, vendor neutral, infrastructure management with SUSE
    Technical Briefing - Open, vendor neutral, infrastructure management with SUSE Don Vosburg, Sales Engineer, SUSE Recorded: Aug 2 2018 29 mins
    Join our SUSE StandUp webinar! In this 30 minute session, our subject-matter experts will give you a technical deep-dive/live demo on our SUSE solutions.
  • Letnia Akademia SUSE - premierowy pokaz SUSE CaaS Platform 3
    Letnia Akademia SUSE - premierowy pokaz SUSE CaaS Platform 3 Paweł Mirończuk, Rafał Kruschewski Recorded: Aug 2 2018 93 mins
    W ramach Letniej Akademii SUSE 2018 organizowanej on-line poznasz najnowsze rozwiązania open source. Przedstawiamy krok po kroku najbardziej interesujące funkcje rozwiązań SUSE oraz pokazujemy, jak zacząć z nich korzystać.

    W ramach tych zajęć Akademii prezentujemy najnowszą wersję SUSE CaaS Platform 3 – kompletne rozwiązanie do zarządzania kontenerami, do budowy którego wykorzystano technologię Kubernetes. Z pomocą SUSE CaaS działy zajmujące się rozwijaniem aplikacji oraz DevOps mogą znacznie łatwiej wdrażać, zarządzać i skalować aplikacje oraz usługi oparte na kontenerach.
  • Data Protection Megacast
    Data Protection Megacast Raj Dutt, Director of Product Marketing, Cohesity Recorded: Aug 1 2018 30 mins
    With massively growing data sets and expectations of 100% uptime with long term retention, companies are struggling to meet data protection and disaster recovery demands. These problems are prevalent, no matter the size of the organization. To compound that, IT organizations simply don’t have time to research and compare the latest software and hardware solutions available for enterprise data protection.

    In this webinar you'll learn:
    -How Cohesity provides enterprise-grade data protection
    -How we're solving legacy data protection challenges
    -Customer use cases & success
  • What Every Security Professional Should Know About Cloud Hacking
    What Every Security Professional Should Know About Cloud Hacking Manuel Nedbal, ShieldX CTO Recorded: Aug 1 2018 43 mins
    As organizations adopt cloud computing, the perimeter moves into unprotected territory within these new environments. Where IT sees the cloud as an opportunity, security sees a new attack surface. Most companies have heavily invested in traditional multi-layer, security appliances—like firewalls and intrusion prevention systems which help with “north-south” protection. But, these controls are less effective in securing lateral or “east-west” traffic where the new perimeters sit. Worse, they were not designed to handle the sheer volume of cloud traffic--a significant operational hurdle.

    Join this interactive webinar to learn more about:
    - The latest cloud attack methods every security team should understand
    - Anatomy of specific attack types including cross cloud, cross workload, cross data center, cross tenant, as well as, orchestration and serverless attacks
    - Best practices on how to guard your enterprise
  • Making Application Mobility a Reality Across VMware & Public Clouds
    Making Application Mobility a Reality Across VMware & Public Clouds Rawlinson Rivera, Global Field CTO, Cohesity Recorded: Aug 1 2018 65 mins
    Meet Cohesity CloudSpin, a new feature on our DataPlatform that accelerates your test/dev initiatives in the cloud!

    In this on-demand webinar you will learn how Cohesity CloudSpin is used in VMware infrastructures to:
    -Make on-premises backup data easily reusable in the public cloud
    -Deliver on the promise of application mobility for test/dev
    -Ensure that format conversion need no longer be a cumbersome process
  • SUSE and Lenovo: Maximising Performance with Software-Defined Storage
    SUSE and Lenovo: Maximising Performance with Software-Defined Storage Joao Almeida, Lenovo and Michael Bukva, SUSE Recorded: Aug 1 2018 46 mins
    Software-defined storage, built on the open source Ceph project, offers a cost-effective way of addressing largescale storage challenges. SUSE and Lenovo are working together to build fully supported software-defined storage solutions that maximise performance and availability for a range of commercial and high performance computing applications, while offering the assurance of reliable SES-based backup. In this co-hosted webinar, Joao Almeida (CTO for Lenovo in ANZ) and Michael Bukva (SDS SME at SUSE) will take an in-depth look at how software-defined technology is driving the storage market.
  • DCX Series [Ep.1]: The Technologies & Vendors Driving Customer Engagement
    DCX Series [Ep.1]: The Technologies & Vendors Driving Customer Engagement Robin Gareiss, President & Founder, Nemertes Research Recorded: Jul 31 2018 44 mins
    Hundreds of companies, both old and new, are providing technology designed to improve customer engagement, ultimately raising customer experience scores. Everything from contact center to CRM to user sentiment to in-app contextual communications to many more areas are part of the customer engagement movement.

    This first episode of our Digital Customer Experience series serves as a tutorial of technology categories and providers assisting in any customer interaction and analytics to evaluate success.
  • Secrets to Strengthening and Preventing Unauthorized Access to Sensitive Data
    Secrets to Strengthening and Preventing Unauthorized Access to Sensitive Data Lindsay Drabwell, Head of Membership Services, (ISC)² EMEA, Daniel Harris of Okta and Przemek Dybowski, CyberArk Aug 14 2018 11:00 am UTC 60 mins
    Unauthorised access is the leading cause of breaches today, whether it comes from external threat actors or insider activity. To mitigate this risk, Okta and CyberArk have integrated technologies to provide a comprehensive solution for unauthorised access protection. In this webinar, Daniel Harris of Okta and Przemek Dybowski of CyberArk will discuss how to:

    •eliminate identity sprawl and prevent privileged access abuse
    •enable strong authentication and reduce the attack surface
    •identify and respond to account compromise.
  • Be ready for anything with HPE 3PAR Storage
    Be ready for anything with HPE 3PAR Storage Mathew Morrissey - World Wide 3PAR Product Marketing & Ryan Brooks - North America 3PAR Product Category Manager Aug 14 2018 3:00 pm UTC 75 mins
    When your applications slow down, you’ve hit the app-data gap. This session will go beyond what’s new with HPE 3PAR StoreServ flash arrays to highlight how HPE 3PAR can close that gap. With predictive analytics and cloud-ready flash, HPE 3PAR delivers fast and reliable access to data both on-premises and off. Hear from a HPE 3PAR user on how all-flash improves business operations and addresses requirements such as risk mitigation and operational simplicity, making the all-flash data center a reality.
  • Strengthen Security While Ensuring Network Uptime
    Strengthen Security While Ensuring Network Uptime Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Aug 14 2018 4:00 pm UTC 45 mins
    Your financial services network is critical to operations and that makes it a juicy target for cyberthreats like ransomware and data breaches. What can you do? Inline security tools can be an effective solution, but represent multiple points of possible failure, particularly as network speeds increase because they simply can’t keep up. But if they go down, so can your network. And the difference of a nanosecond can severely impact currency, stock trading, and critical financial transactions.

    To provide pervasive visibility into data in motion and maintain compliance in high-speed networks, many financial services companies have turned to next-generation network packet brokers (NGNPB), which offer flexible inline bypass protection. This feature automates access to traffic, scales and optimizes existing monitoring infrastructure, and simplifies rollout of new technology. NGNPB also:

    • Delivers complete network-wide visibility across physical, virtual and cloud environments.
    • Scales metadata extraction for improved forensics.
    • Isolates applications for targeted inspection.
    • Gives you visibility into encrypted traffic for threat detection.

    See how you can strengthen security while ensuring network uptime and reducing costs. Learn how a simplified, resilient, and scalable architecture can:

    • Maximize tool efficiency by providing the right data to the right tools and by offloading processor-intensive tasks such as SSL decryption.
    • Scale to speed of the network without “rip and replace” by load balancing across tool groups.
    • Remove single points of failure and increase availability of both the tools and the network.
    • Give you operational agility to seamlessly add, remove, and upgrade tools, and instantly change between detection and prevention modes.

    Find out how both network and security teams can operate faster and safer in a swiftly evolving cybersecurity landscape within regulated industries such as financial services–register today!
  • Solving the Financial Services Security Talent Shortage with Managed Detection
    Solving the Financial Services Security Talent Shortage with Managed Detection Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Aug 14 2018 7:00 pm UTC 60 mins
    Financial institutions face a daunting combination of cybersecurity threats and compliance requirements. IT teams at regional banks and credit unions have a relatively small staff but facing similar security and compliance burden to what larger, well-resourced financial institutions carry. How can small and mid-sized financial institutions counter sophisticated cyberthreats, provide monitoring and incident response needed for compliance, and do so with tight budgets that do not allow for staffing an elaborate security operations center? Managed detection and response provides a “force multiplier” to address all three issues.

    Attend this webinar and learn about:

    • Top cyberthreats facing financial institutions
    • Financial services compliance evolution, security monitoring and incident response
    • Differences between SIEM, SOC, and SOC-as-a-service
    • Monitoring on premises and cloud resources without adding headcount

    To gain insights on these challenges and how to solve them, save your seat now!
  • Verizon Threat Research Advisory Center - Data Breach Digest 2018
    Verizon Threat Research Advisory Center - Data Breach Digest 2018 John Grim and David Kennedy, Verizon Enterprise Solutions Aug 15 2018 2:00 pm UTC 90 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Data Breach Digest Highlights

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    For this month's theme: 'Data Breach Digest Highlights', we'll feature John Grim, Senior Manager, Investigative Response – Americas, who'll highlight the latest in terms of data breaches.

    Specifically, John will discuss scenarios in this year's Data Breach Digest, reveal how these scenarios match up against the 2018 Data Breach Investigations Report incident classification patterns, and in doing so, provide detection and validation, response and investigation, and mitigation and prevention countermeasures from an incident response and cybersecurity perspective.

    We'll then see what's happening with the IR Pulse and our caseload trends, followed by:

    •Current Intelligence
    •Attacks & Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • The Future of Work in the 21st Century: Multigenerational Teams
    The Future of Work in the 21st Century: Multigenerational Teams Monique Morrow, President & Co-Founder, The Humanized Internet Aug 15 2018 5:00 pm UTC 60 mins
    The way in which we work is changing. Technology, social norms and economic influences are impacting the working world every day.

    Did you know the right to work is a human right? It allows men and women of all ages and backgrounds to become self-reliant in dignity and free from discrimination. At a time when technology is taking over the workplace and a younger demographic is entering most workforces, it's more imperative than ever to understand the future of work and how multi-generational teams can make a meaningful impact on your business.

    Tune in with Monique Morrow, Dedicated Futurist, Technologist and Advisor, as she discusses these ever-important topics, opportunities and calls to action.
  • What's Breaking Your VMware Backups? And How You Can Fix Them Quickly
    What's Breaking Your VMware Backups? And How You Can Fix Them Quickly George Crump, Storage Switzerland and W. Curtis Preston, Druva Aug 15 2018 6:00 pm UTC 60 mins
    Backing up VMware successfully has always been a challenge. The introduction of the cloud ever increasing scale of VMware infrastructure continues to give backups fits and makes it even harder.

    Please join George Crump, Lead Analyst at Storage Switzerland and our guest speaker W. Curtis Preston, Chief Technical Architect at Druva, for a discussion on the new challenges with VMware backups, and how to address them successfully.

    The Top 5 Reasons VMware Backups Still Break
    * Lack of Auto-Discovery
    * Lack of Full Cloud Support
    * Too Much Backup Infrastructure
    * Expensive and Complicated Disaster Recovery
    * No VMware on AWS Support
  • SUSE OpenStack Cloud 8
    SUSE OpenStack Cloud 8 Hargitai Zsolt Aug 16 2018 8:00 am UTC 90 mins
    Az OpenStack Pike kiadására épülő SUSE OpenStack Cloud 8 az első olyan verzió, amely integrálja a SUSE OpenStack Cloud képességeit és a SUSE által tavaly megvásárolt HPE OpenStack technológiákat. A megoldás felgyorsítja a szoftveresen vezérelt infrastruktúrák bevezetését, emellett továbbfejlesztett interoperabilitása, skálázhatósága és rugalmassága révén támogatja a nagyvállalatokat az IT-rendszer modernizálásában, és ezen keresztül az éles piaci versenyben jelentkező, új üzleti kihívások legyőzésében is. A webinárban bemutatjuk a termék legfontosabb újdonságait, valamint a legfontosabb felhasználási területeket, beleértve a szoftver alapú hálózatokat (SDN) és a konténereket. További információ a termékről: https://www.suse.com/products/suse-openstack-cloud/
  • [Ep.19] Ask the Expert: From the Office of the CTO
    [Ep.19] Ask the Expert: From the Office of the CTO Simon Evans, CTO, Amido & Kelly Harris, Senior Content Manager, BrightTALK Aug 16 2018 4:00 pm UTC 45 mins
    This webinar is part of BrightTALK's Ask the Expert Series.

    Join Simon Evans, CTO of Amido, as he takes a technical deep dive into key priorities for next-gen CTOs and what they should be considering for their 2020 strategy and beyond.

    Simon will bring perspective from both the CTO of a consultancy, but also from the perspective of their clientele who are primarily Enterprise CTOs.

    Join us for this live Q&A and get all of your questions answered!
  • How to Simplify PCI DSS Compliance with a Unified Approach to Security
    How to Simplify PCI DSS Compliance with a Unified Approach to Security Sanjay Ramnath, AlienVault; Jacques Lucas, Terra Verde; Zuri Cortez, AlienVault Aug 16 2018 4:00 pm UTC 60 mins
    Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of time and effort to access the necessary data and reports from many different systems and tools. And, after an audit is complete many teams struggle to maintain compliance.

    In this webcast, you'll hear from Jacques Lucas, a Qualified Security Assessor (QSA) with Terra Verde, and Sanjay Ramnath, VP of Product Marketing at AlienVault, sharing best practices to help you simplify implementation of PCI DSS security controls and reporting.

    Join us for this webcast to learn:

    - The most common challenges in meeting and maintaining compliance with PCI DSS
    - Best practices to help you plan and prepare for an audit
    - The core security capabilities you need to demonstrate compliance
    - How AlienVault Unified Security Management can simplify the compliance process

    Hosted By
    Sanjay Ramnath
    VP of Product Marketing at AlienVault
    Jacques Lucas
    Qualified Security Assessor (QSA) with Terra Verde
    Zuri Cortez
    Sales Engineer at AlienVault
  • Solving the Gordian Knot of DevOps in the Hybrid Cloud
    Solving the Gordian Knot of DevOps in the Hybrid Cloud Darren Pulsipher Aug 16 2018 4:00 pm UTC 60 mins
    As software developers move to micro-service and cloud aware application frameworks, IT and DevOps professionals are having a harder time untying the complexity of managing multiple environments across multiple clouds with the number of artifacts increasing exponentially. Just like Alexander the Great, we will look at techniques and principles that cut through the Gordian knot that is being tied by the invisible hands of complexity.
  • Overcoming The Cybersecurity Skills Shortage in Law Firms
    Overcoming The Cybersecurity Skills Shortage in Law Firms Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Aug 16 2018 7:00 pm UTC 60 mins
    The evidence is clear: law firms of all sizes need to securely handle sensitive information associated with their clients, investigators, and witnesses. According to the American Bar Association’s 2017 Legal Technology Survey Report, 22 percent of respondents suffered a security breach at their law firms.*

    Compromised client information can destroy reputations and lead to decreased billables and lost business. While the need for improved security is evident, IT and security teams struggle to locate, retain and train talent needed to maintain and improve their security posture. So, what are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure?

    In this Arctic Wolf webinar, you will:

    - Discover why cybersecurity is top of mind in the legal community
    - Recognize the IT and Cybersecurity skills shortage and its impact on security
    - Understand how SOC-as-a-Service approaches enable law firms to rapidly improve their security posture and provide evidence to satisfy technology audits

    Save your seat today to learn more!

    *https://www.americanbar.org/groups/law_practice/publications/techreport/2017/security.html
  • Aproveite o maximo da sua solução SAP com a SUSE e Lenovo
    Aproveite o maximo da sua solução SAP com a SUSE e Lenovo Aslan Carlos, SUSE Sales Engineer & Adriano Fratelli, Lenovo SE Aug 21 2018 1:00 pm UTC 75 mins
    Suas aplicações SAP são a base de sua transformação digital!

    Juntas, SUSE e Lenovo fazem a plataforma ideal para aplicações SAP como o SAP Hana. Fornecemos uma solução Linux para todas as aplicações SAP e trabalhamos constantemente com SAP para garantir o melhor desempenho, alta disponibilidade e segurança para sistemas SAP de missão crítica.
    Saiba o valor de seus aplicativos SAP com suporte para migração de plataforma, simplificação e consolidação:

    - Lenovo entregou mais de 7.200 sistemas SAP Hana em todo o mundo.
    - SUSE Linux Enterprise Server para aplicativos SAP é o sistema operacional recomendado e suportado para SAP Hana.
    - SUSE Manager permite que você gerencie várias distribuições Linux.
  • DPI: The key technology for vEPC Solutions - Build or Buy?
    DPI: The key technology for vEPC Solutions - Build or Buy? Alexander Mueller, Product Manager DPI, Ipoque, Rhode & Schwarz Cybersecurity Aug 21 2018 5:00 pm UTC 60 mins
    When your virtual Evolved Packet Core (vEPC) solution needs deep packet inspection (DPI) as a key enabling feature, highly reliable and accurate real-time identification of network traffic and applications is an important requirement.
    Whether it is for analytics, policy enforcement, tiered pricing, web and video optimization, content filtering, parental control or security services, DPI is a crucial technology to implement virtualized network equipment solutions.
    vEPC vendors looking at the business case can decide to build DPI software in-house, use open source solutions or to license software from a DPI specialist. Within this webinar, we will do a deep dive explaining the different sourcing options and the respective evaluation criteria, which should be considered.
    The real-life vendor scenario of a vEPC vendor will be used to illustrate the different aspects of a realistic use case.
    By the end of this session, attendees will have learned:
    •How DPI has become a crucial technology for vEPC solutions
    •How the scope of needed know-how has changed for vEPC vendors
    •What the benefits of DPI for vEPC use cases are
    •What the sourcing options for DPI solutions are
    •How to evaluate and answer the important aspects of the build or buy DPI decision
  • Kubernetes for the Platform Operator: Security and Cloud Native Deployments
    Kubernetes for the Platform Operator: Security and Cloud Native Deployments Rob de Canha-Knight, EMEA Technical Director, SUSE Aug 22 2018 2:00 pm UTC 45 mins
    Join our SUSE StandUp webinar! In this 30 minute session, our subject-matter experts will give you a technical deep-dive/live demo on our SUSE solutions.
  • RoCE vs. iWARP
    RoCE vs. iWARP Tim Lustig, Mellanox; Fred Zhang, Intel; John Kim, Mellanox Aug 22 2018 5:00 pm UTC 75 mins
    Network-intensive applications, like networked storage or clustered computing, require a network infrastructure with high bandwidth and low latency. Remote Direct Memory Access (RDMA) supports zero-copy data transfers by enabling movement of data directly to or from application memory. This results in high bandwidth, low latency networking with little involvement from the CPU.

    In the next SNIA ESF “Great Storage Debates” series webcasts, we’ll be examining two commonly known RDMA protocols that run over Ethernet; RDMA over Converged Ethernet (RoCE) and IETF-standard iWARP. Both are Ethernet-based RDMA technologies that reduce the amount of CPU overhead in transferring data among servers and storage systems.

    The goal of this presentation is to provide a solid foundation on both RDMA technologies in a vendor-neutral setting that discusses the capabilities and use cases for each so that attendees can become more informed and make educated decisions.

    Join to hear the following questions addressed:

    •Both RoCE and iWARP support RDMA over Ethernet, but what are the differences?
    •Use cases for RoCE and iWARP and what differentiates them?
    •UDP/IP and TCP/IP: which uses which and what are the advantages and disadvantages?
    •What are the software and hardware requirements for each?
    •What are the performance/latency differences of each?

    Join our SNIA experts as they answer all these questions and more on this next Great Storage Debate
  • Don't Wait for Disaster to Strike! How to Create a Great Disaster Recovery Plan
    Don't Wait for Disaster to Strike! How to Create a Great Disaster Recovery Plan Storage Switzerland, KeepItSafe, Veeam Aug 22 2018 5:00 pm UTC 60 mins
    Many studies indicate that organizations have a shallow confidence level in their ability to recover from a disaster. The disaster recovery plan is often an ad-hoc plan that requires IT to scramble when disaster strikes. If the recovery effort succeeds, it is often well behind schedule and well over budget.

    The first step in creating a great disaster recovery plan is creating one that isn't bad at the very least. In this live webinar join Storage Switzerland, Veeam, and KeepItSafe as we discuss how to go from a bad disaster recovery situation to a great disaster recovery plan for better business continuity.
  • Converged Tape Appliance for Veeam
    Converged Tape Appliance for Veeam Ronn Martin, Solutions Architect at Veeam & Eric Bassier, Senior Director, Product Marketing at Quantum Aug 22 2018 5:00 pm UTC 60 mins
    Tape is as relevant as ever, but it may not be for the reasons that you think. In fact, as part of delivering hyper-availability, one best practice is to use tape as an “offline” storage copy to protect against ransomware and malware, which is a key part of a comprehensive data protection strategy.

    In this webinar, join experts from Veeam and Quantum to learn about tape’s role in tomorrow’s infrastructures, best practices for tape in a Veeam environment, and to introduce Quantum’s new converged tape appliance for Veeam – which makes it easier to create tape to protect against ransomware.
  • Zero Downtime, Zero Touch Stretch Clusters from Software-Defined Storage
    Zero Downtime, Zero Touch Stretch Clusters from Software-Defined Storage Augie Gonzalez, Director of Product Marketing, DataCore Software Aug 22 2018 6:00 pm UTC 60 mins
    Business continuity, especially across data centers in nearby locations often depends on complicated scripts, manual intervention and numerous checklists. Those error-prone processes are exponentially more difficult when the data storage equipment differs between sites.

    Such difficulties force many organizations to settle for partial disaster recovery measures, conceding data loss and hours of downtime during occasional facility outages.

    In this webcast and live demo, you’ll learn about:
    • Software-defined storage services capable of continuously mirroring data in
    real-time between unlike storage devices.
    • Non-disruptive failover between stretched cluster requiring zero touch.
    • Rapid restoration of normal conditions when the facilities come back up.

    Attend live for a chance to win a $200 Amazon gift card!*

    *Gift card will be sent within 10 days of the webinar date. Void where prohibited.
  • Centralize Security and Governance with Data Virtualization (APAC)
    Centralize Security and Governance with Data Virtualization (APAC) Ravi Shankar, Chief Marketing Officer, Denodo and Danny Thien, Senior Data Architect, Denodo Aug 23 2018 1:30 am UTC 60 mins
    Security, data privacy, and data protection represent concerns for organizations that must comply with policies and regulations that can vary across regions, data assets, and personas.

    Attend this session to learn how to employ data virtualization for:

    - Customizing security policies in the data abstraction layer,
    - Centralizing security when data is spread across multiple systems residing both on-premises and in the cloud, and
    - Controlling and auditing data access across different regions.

    Agenda:
    - DV for Security and Governance
    - Product Demonstration
    - Summary & Next Steps
    - Q&A
  • Hybrid Cloud Kubernetes with Diamanti & Nirmata
    Hybrid Cloud Kubernetes with Diamanti & Nirmata Sean Roth, Director of Product Marketing at Diamanti and Ritesh Patel, Founder & VP of Products at Nirmata Aug 23 2018 3:00 pm UTC 60 mins
    Containers offer enterprises substantial gains in application deployment speed and portability. However, these benefits are often countered by the operational complexities of infrastructure configuration and management, especially when employing a mix of cloud and on-premises container environments.

    This webinar is for IT Operations and enterprise platform teams interested in driving business agilities using cloud-native technologies. You will learn how modern cloud-native technologies can help streamline complex processes, eliminate the need for network and storage overlays, and ensure reliable performance with granular controls for developers and operators.

    In this webinar, Diamanti and Nirmata teams discuss how Nirmata’s federated approach to Kubernetes cluster deployment and application management integrates with the Diamanti platform, seamlessly bridging on-premise bare-metal and hybrid cloud container environments.

    You will learn how to:
    - Deploy an on-premises container stack in minutes
    - Incorporate Diamanti into your multi-cloud environment using Nirmata
    - Simplify application management and governance across on-premises and public cloud environments
  • Best Practices for Reducing Your Attack Surface with Vulnerability Management
    Best Practices for Reducing Your Attack Surface with Vulnerability Management Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Aug 23 2018 6:00 pm UTC 60 mins
    Attack surfaces are rapidly changing by the minute, as IT organizations are provisioning new types of endpoints, IoT devices, servers, web-applications and cloud-based services to increase business efficiencies. Due to this dynamically changing asset landscape, it has become increasiingly difficult for IT security teams to maintain visibility to which ones need to be patched to reduce the risk from being exploited by hackers.

    Narayan Makaram, Sr. Director of Product Marketing, Arctic Wolf Networks, will explore the following, to emphasize the need for regularly running external vulnerability scans to boost your visibility and reduce business risks.

    •Trends affecting your attack surface
    •Need for vulnerability management program
    •What should you look for in an external vulnerability scan report

    Register today to hear from this expert!
  • Artificial Intelligence & Machine Learning Techniques for Service Providers
    Artificial Intelligence & Machine Learning Techniques for Service Providers Prasanna Sivaramakrishnan Senior Solutions Architect, Red Hat Aug 23 2018 6:00 pm UTC 60 mins
    The vast amount of data assets generated by Networks, Users, Traffic and Devices has generated monetization opportunities in the Telco Domain. Daily human interaction with telecommunication networks and services of all kinds contain unconnected gems of information which, when correctly interpreted, reveal how people behave and interact. Machine Learning technologies can be put to good use to reveal how all this information fits into relevant patterns.

    In this session you will learn about the following:
    > Brief Overview of AI and ML
    > Different types of ML Techniques and how to apply them
    > A look at projects such as Jupyter Notebook and Tensorflow and relevance to IoT
  • Eliminate Blind Spots with Nutanix & Zenoss
    Eliminate Blind Spots with Nutanix & Zenoss Anirban Chatterjee - Zenoss, Alex LaMont - Zenoss, Krishnan Badrinarayanan - Nutanix Aug 23 2018 6:00 pm UTC 60 mins
    The integration between Nutanix and Zenoss enables enterprises to ensure the highest levels of performance and availability for applications and services that power their businesses. Zenoss and Nutanix subject matter experts will discuss and showcase how Nutanix uses Zenoss to monitor their HCI and other critical environments at Nutanix data centers. Zenoss enables IT organizations to eliminate blind spots across hybrid IT environments, predict impacts to critical services, resolve issues faster, and operate at any scale the business requires.

    The session will include a demonstration of the Zenoss and Nutanix environments working together via the Nutanix ZenPack. Both teams will answer questions about Zenoss, the Nutanix ZenPack integration and future roadmap.
  • Where are you on the Digital Transformation Journey? Further than you think
    Where are you on the Digital Transformation Journey? Further than you think Vishal Ganeriwala, Senior Director, Product Marketing, Citrix Workspace Aug 23 2018 8:00 pm UTC 45 mins
    Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?

    Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.

    You’ll learn how to:

    • Simplify your systems and ongoing management with a cloud-based approach
    • Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
    • Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution