Hi [[ session.user.profile.firstName ]]


  • FICON 201
    FICON 201
    Patty Driever, IBM; Howard Johnson, Broadcom; Joe Kimpler, ATTO Technologies Recorded: Feb 20 2019 54 mins
    FICON (Fibre Channel Connection) is an upper-level protocol supported by mainframe servers and attached enterprise-class storage controllers that utilizes Fibre Channel as the underlying transport.

    The FCIA FICON 101 webcast (on-demand at http://bit.ly/FICON101) described some of the key characteristics of the mainframe and how FICON satisfies the demands placed on mainframes for reliable and efficient access to data. FCIA experts gave a brief introduction into the layers of architecture (system/device and link) that the FICON protocol bridges. Using the FICON 101 session as a springboard, our experts return for FICON 201 where they will delve deeper into the architectural flow of FICON and how it leverages Fibre Channel to be an optimal mainframe transport.

    Join this live FCIA webcast where you’ll learn:

    - How FICON (FC-SB-x) maps onto the Fibre Channel FC-2 layer
    - The evolution of the FICON protocol optimizations
    - How FICON adapts to new technologies
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Clarence Hill, David Kennedy Recorded: Feb 20 2019 84 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Clarence Hill, Senior Manager, PS Advisory Services
    •David Kennedy, Managing Principal, Open Source Intelligence

    This month's theme: Device Overlays

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Accelerating Virtual Infrastructure Deployment
    Accelerating Virtual Infrastructure Deployment
    Paul Stevens / Advantech, Eric vanVliet / Advantech, Purvi Thakkar / Intel Recorded: Feb 19 2019 55 mins
    Workloads are shifting across platforms that span from entry-level to extreme performance.
    Finding the right balance of compute, acceleration, networking and storage to cost effectively run an application at any location in the network can be challenging.
    More agile solutions are required that meet the challenges of next generation networks with greater elasticity across a scalable range of white box servers.

    This webinar will provide you with deeper insights into Intel® Select Solutions for NFVI and uCPE and how they help:

    •Simplify Network Evolution using platforms verified as Intel® Select Solutions
    •Get on faster, more efficient deployments using tested white box servers
    •Build Reliable Infrastructure with verified configurations that take full advantage of virtual network enhancements
  • 5 Questions to Ask When Considering Cloud Backup for Enterprise Workloads
    5 Questions to Ask When Considering Cloud Backup for Enterprise Workloads
    Sarah Beaudoin, Product Marketing Manager, Druva Recorded: Feb 19 2019 44 mins
    As organizations continue to migrate to Office 365 for their email, productivity and collaboration tools, they’re quickly realizing that Office 365’s native capabilities do not provide the essential data protection capabilities they need.

    Join us for a technical webinar on Tuesday, August 21st at 3PM SGT/ 5PM AEST and learn best practices for safeguarding your Office 365 data, including:
    - Gaps within OneDrive, Exchange Online and SharePoint Online that lead to increased risk of data loss
    - How a third party backup solution can automate data protection and ensure data recoverability from user error, malicious behavior or malware
    - How to build a data management strategy for the future that leverages the cloud and improves alignment with organizational policies and SLAs
  • New Year, New Phishing Threats: 10 Resolutions To Keep You Safe & Secure
    New Year, New Phishing Threats: 10 Resolutions To Keep You Safe & Secure
    Brandon Dunlap, Moderator, (ISC)², David Mount, Cofense, Mollie MacDougall, Cofense Recorded: Feb 19 2019 62 mins
    New year. New resolutions. Every year we make the pledge to eat healthier and exercise more. What is good for the waistline is also good for your phishing defense posture. With more than 90% of breaches attributed to successful phishing campaigns – now is the time to think about how to prepare and prevent attacks. In this session you’ll hear about 10 resolutions for your phishing defense programs that will make your organisation more secure.
    Some of the topics covered include:
    - How to empower humans to be part of the solution
    - Best practices to balance automation with human intuition
    - How the latest features and technologies can make your life easier
  • Aporeto Overview: Zero Trust Security for Microservices, Containers and Cloud
    Aporeto Overview: Zero Trust Security for Microservices, Containers and Cloud
    Jason Schmitt Recorded: Feb 18 2019 12 mins
    Hear from Aporeto’s CEO, Jason Schmitt, on our products, solutions and key use cases.
  • Google Application Layer Transport Security
    Google Application Layer Transport Security
    Ariful Huq Recorded: Feb 18 2019 32 mins
    "Google is known for its brilliant engineering, its infrastructure efficiency, and its approach to robust security.

    In this webinar, learn about how to implement ATLS in your enterprise environment."
  • 15 Minute Friday: How to Move From Legacy DR to DRaaS
    15 Minute Friday: How to Move From Legacy DR to DRaaS
    Storage Switzerland, KeepItSafe, Veeam Recorded: Feb 15 2019 17 mins
    Most data centers still use a legacy DR strategy of replicating or even physically transporting backups to a dedicated disaster recovery (DR) site, or a secondary site owned by the organization. Disaster Recovery as a Service (DRaaS) delivers a compelling alternative to traditional DR, return on investment (ROI). It eliminates the costs associated with a dedicated disaster recovery site like paying for and equipping the site. Organizations though are hesitant to transition to DRaaS following the “if it ain’t broke, don't fix it” philosophy.

    In this live 15 minute webinar join Storage Switzerland, Veeam and KeepItSafe to learn how to transition from a legacy DR strategy to DRaaS without risking data protection downtime.

    In 15 minutes, we cover the areas critical to success:

    1. DRaaS Software selection
    2. Cloud Provider selection
    3. Creating and executing a transition plan
  • Datera High-Performance Software Defined Storage on Fujitsu PRIMERGY Servers
    Datera High-Performance Software Defined Storage on Fujitsu PRIMERGY Servers
    Richard McCormack, Head of Product Solutions at Fujitsu, joins Bill Borsari, Systems Architect Director at Datera Recorded: Feb 14 2019 56 mins
    Discover the architecture behind high-performance storage with Datera data automation on Fujitsu PRIMERGY servers.

    Datera is the only true, software-driven data services platform that:

    •Powers modern application environments at global scale
    •Provides game-changing data orchestration and automation with enterprise-class performance
    •Joint solution takes full advantage of the performance, security and reliability of Fujitsu PRIMERGY servers
    •Delivers up to 70% lower total cost of ownership and operation compared to traditional solutions

    Richard McCormack, Head of Product Solutions at Fujitsu, joins Bill Borsari, Systems Architect Director at Datera, to share how Datera and Fujitsu PRIMERGY systems are leading the software-defined revolution by providing the most powerful and flexible data center innovations across a vast ecosystem of solutions to turn your IT into a business advantage.
  • How to Detect Fileless Attacks with Host-Based IDS in USM Anywhere
    How to Detect Fileless Attacks with Host-Based IDS in USM Anywhere
    Danielle Russell, Group Product Marketing Manager; Aaron Genereaux, Sr. Sales Engineer Recorded: Feb 14 2019 56 mins
    Attackers have figured out how to bypass traditional antivirus software with fileless attacks designed to hide within sanctioned applications and even within the OS itself. Host-based intrusion detection systems (HIDS), which work by monitoring activity that is occurring internally on a host, are an effective way to detect these advanced attacks before they spread.

    Join this webcast to learn:

    - How fileless attacks work and how they evade detection by most traditional antivirus software
    - The types of endpoint activity that can be detected and logged by HIDS to catch threats like fileless attacks
    - Why HIDS is an essential security control for threat detection and compliance
    - How correlation of HIDS data with IP reputation data, vulnerability scans, and more can boost threat detection and response

    Danielle Russell
    Group Product Marketing Manager
    Aaron Genereaux
    Sr. Sales Engineer
  • All in the Cloud - Data Protection Up, Costs Down
    All in the Cloud - Data Protection Up, Costs Down
    George Crump, Storage Switzerland and W. Curtis Preston, Druva Recorded: Feb 13 2019 60 mins
    Managing and protecting critical data across servers and applications in multiple locations around the globe is challenging. And the more decentralized and complex your infrastructure, the more difficult it is to manage your data. The potential bad news? Data loss, site outages, revenue loss, and potential non-compliance with regulations.

    But here’s the good news: centralizing data protection in the cloud can make all the difference. That’s why you should join our webinar and hear from storage expert, George Crump, from Storage Switzerland and Druva’s W. Curtis Preston, Chief Technologist, as they discuss:

    • Why protecting a distributed data center is challenging with traditional methods
    • How a cloud-centralized backup strategy can be a game changer for your organization
    • How Druva can help you drastically improve data protection quality, reduce costs, and simplify global management and configuration?
  • Best Practices for Reducing Your Attack Surface with Vulnerability Management
    Best Practices for Reducing Your Attack Surface with Vulnerability Management
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Feb 13 2019 37 mins
    Attack surfaces are rapidly changing by the minute, as IT organizations are provisioning new types of endpoints, IoT devices, servers, web-applications and cloud-based services to increase business efficiencies. Due to this dynamically changing asset landscape, it has become increasingly difficult for IT security teams to maintain visibility to which ones need to be patched to reduce the risk from being exploited by hackers.

    Narayan Makaram, Sr. Director of Product Marketing, Arctic Wolf Networks, will explore the following, to emphasize the need for regularly running external vulnerability scans to boost your visibility and reduce business risks.

    - Trends affecting your attack surface
    - Need for vulnerability management program
    - What should you look for in an external vulnerability scan report

    Register today to hear from this expert!
  • Optimize Your IT With an Open Hyperconverged Infrastructure
    Optimize Your IT With an Open Hyperconverged Infrastructure
    Daniel Gilfix, Marketing Manager, Storage and Hyperconverged Infrastructure, Red Hat and Sean Murphy, Product Manager, Red Ha Recorded: Feb 13 2019 44 mins
    In the public sector and industries like energy, retail, banking, and telecommunications, organizations increasingly rely on business-critical applications that must be deployed with limited space, budgetary constraints, and scarcity of skilled IT staff. They must extend the reach of these applications from datacenter core to edge of the network with reduced complexity on the infrastructure that best meets their IT requirements.

    Red Hat’s innovative approach to addressing these issues includes Red Hat® Hyperconverged Infrastructure for Virtualization, which provides flexibility and choice for customers seeking low-density, infrastructure consolidation based on our leading virtualization platform. Red Hat Hyperconverged Infrastructure for Virtualization is streamlined with Red Hat Ansible® Automation and is based entirely on code from the open source community.

    During the webinar, we’ll discuss:
    > Market dynamics and challenges customers are facing with too much required by too few resources in too short a period.
    > The emergence of hyperconverged infrastructure as an alternative to inefficient segregated infrastructure.
    > Why hyperconverged infrastructure operational processes are more effective.
    > How an open source subscription model can facilitate maximum benefits of infrastructure consolidation.
  • Teradici PCoIP Management Console Release 3.2.1
    Teradici PCoIP Management Console Release 3.2.1
    Edna Menon – Sr Product Mgr. & Paul Barrett – Systems Specialist - Teradici Recorded: Feb 13 2019 35 mins
    PCoIP Management Console Release 3.2.1 delivers powerful endpoint management capabilities with support for Active Directory and User Roles.
    Learn more about these much requested capabilities, and participate in our live Q&A with Teradici experts Paul Barrett, Systems Specialist, Global Support Services and Edna Menon, Senior Product Manager. This brief webinar will cover everything you need to learn about this important release through a live demonstration, including:
    •Support for Active Directory, including support for sub-domains
    •User Roles: System Administrator and Administrator roles
    •Web Interface performance improvements
    •…and more!

    Register now.
  • Consolidating IT Infrastructure in an M&A World
    Consolidating IT Infrastructure in an M&A World
    Adam Sharp, CIO, International, TBWA | Andy Hardy, VP, EMEA, Nasuni Recorded: Feb 13 2019 36 mins
    Learn from the International CIO of one of the top 10 ad agencies in the world how consolidating infrastructure has become key to streamlining costs, enhancing productivity, and increasing cash flow.

    With operations spanning 295 offices and 11,000 employees, TBWA’s IT staff faced increasing demands to bring storage and data protection costs under control without reducing flexibility or security. Join Adam Sharp, CIO International for TBWA, The Disruption® Company, and Adweek’s 2018 Global Agency of the Year, as he discusses why his team opted for a “disruptive” cloud strategy of its own and what the results to date have been:

    - How the business strategy drove TBWA to the cloud
    - What key decisions enabled them to reduce costs and meet capacity requirements at the same time
    - How they went about a worldwide roll-out of their cloud storage strategy
    - Why multi-cloud capability is important
  • Data Protection, Disaster Recovery & DRaaS Megacast
    Data Protection, Disaster Recovery & DRaaS Megacast
    Hosted by ActualTech Media & Presented by Augie Gonzalez, Director of Product Marketing - DataCore Recorded: Feb 13 2019 26 mins
    The “new normal” is an expectation of 100% uptime of applications and long-term retention of data. Coupled with massively growing data sets, IT organizations are struggling to meet these expectations.

    As an IT professional, you are looking for innovative data protection and disaster recovery solutions to overcome these hurdles, but where do you start? You simply don’t have time to research and compare the latest software and hardware solutions available for enterprise data protection.

    Leave the hard work to us and join us on the Data Protection, Disaster Recovery, and DRaaS Megacast! This single event will help you learn about the latest and most innovative data protection and disaster recovery solutions. In this educational event, you’ll learn what makes each solution unique as well as how they improve your company’s reliability, availability, and efficiency. You’ll learn how each vendor makes data protection easy and how they make disaster recovery fast, reliable, and efficient.

    Register now to join us for this fast-paced, fun, and prize-filled event!
  • Deliver Applications Faster - Here's How
    Deliver Applications Faster - Here's How
    Jennifer Kotzen, Product Marketing Lead, SUSE Application Delivery Solutions Recorded: Feb 13 2019 50 mins
    To thrive today, businesses must act on opportunities, solve problems, and respond to the needs of customers, partners, and employees more quickly than ever before. Increasingly, applications are the vehicles through which these critical needs are addressed, and in this digital economy the key to increasing business agility is no secret: enterprises must deliver applications faster. But how is it done?

    Join us in this webinar for an executive level overview of the path your business can take to reduce application delivery cycle times and increase business agility.  We’ll discuss emerging container technologies, cloud-native application architectures, DevOps processes, and ways you can use them together to effect the change you need.  Application delivery transformation is as exciting as it is important – start your journey with us now!
  • Linux em conformidade, correções em dia , atualizações de Kernel sem downtime e
    Linux em conformidade, correções em dia , atualizações de Kernel sem downtime e
    Aslam Ramos, SUSE Sales Engineer Recorded: Feb 13 2019 55 mins
    Segurança na gestão de sistemas com Live patching e SUSE Manager

    Participe deste webinar e descubra como é possível aumentar a segurança do seu ambiente Linux e SUSE Linux com as ferramentas da SUSE, sistema operacional Linux líder para aplicações SAP e SAP HANA. Como estas ferramentas podem ajudar você na continuidade dos negócios e na redução de custos, diminuindo o tempo de espera, aumentando a disponibilidade dos serviços, aprimorando a segurança e a conformidade, utilizando os recursos de gestão de outros sabores de Linux e o SUSE, utilizando o SUSE Manager e do módulo SUSE Live Patching para correção do Kernel, sem necessidade de reboot.
  • Autonomous Threat Hunting
    Autonomous Threat Hunting
    Alexandre Pinto, Product Manager and Distringuished Engineer Security Services Global Products and Solutions Recorded: Feb 12 2019 57 mins
    Attendees will learn how Verizon's Autonomous Threat Hunting...

    •Improves automation and efficiency on monitoring and incident response processes by mimicking and applying security analyst experience and intuition at unprecedented scale.

    •Automatically builds context and relationship between indicators of compromise (IOCs), their inferred Tactics, Techniques and Procedures (TTPs), and log or event data generated by their organization.

    •Transforms hundreds of millions of raw data events into tens of high confidence alerts, so analysts can focus on investigating qualified leads.
  • IoT Series [Ep.3]: IoT Essentials -- Selecting a Vendor
    IoT Series [Ep.3]: IoT Essentials -- Selecting a Vendor
    Johna Till Johnson, CEO & Founder, Nemertes Research Recorded: Feb 12 2019 49 mins
    Selecting a vendor partner (or partners) is one of the most critical decisions enterprises will make on their IoT journeys. The right partner makes all the difference: enterprises with top-ranked partners report greater success in generating revenue, cutting costs, and optimizing business processes via IoT.
    • Who are the right providers?
    • What are the critical factors to consider in selecting one?

    This webinar reviews the provider landscape and highlights critical selection factors for companies of all sizes and industries.
  • Containerized Workloads on Industry-Standard Hardware and Software for Telco
    Containerized Workloads on Industry-Standard Hardware and Software for Telco
    Nathan Rader, Director of NFV Strategy, Canonical Recorded: Feb 12 2019 30 mins
    The growth path for operators lies beyond legacy VNF models into cloud-native, container-based microservices architectures to meet requirements for 5G and beyond. In this webinar, we will walk you through:
    • Infrastructure implications: Understanding VNF, virtual machines, Openstack and containers
    • Redevelopment path of VNF for containers
    • Laying the groundwork for container technology: proactive planning and prep
    • The impact of containers on strategy for 5G, edge computing, AI, and blockchain
    • Components for core certifications, portability and kubernetes distributions
    • Use cases and deployments
  • 20 SIEM Use Cases in 40 Minutes: Which Ones Have You Mastered?
    20 SIEM Use Cases in 40 Minutes: Which Ones Have You Mastered?
    Brandon Dunlop, Moderator, (ISC)², Matthias Maier, EMEA, Director of Product, Splunk Recorded: Feb 12 2019 62 mins
    Every organisation can, and at some point will be breached. Gone are the days where investing only in preventive security technologies such as firewalls, endpoint protection and proxy servers were considered ‘state-of-the-art’. Instead, security best practices have evolved to build capabilities that detect attacks early, and to respond if all detection and prevention measures have failed. Today’s modernised approach is essential in helping the business recover quickly after a major attack - and helping the CISO keep their job.

    So, your technologies have evolved, but has your approach to data collection? Do you have the right data for detection and response - or do you need to adapt for the future?

    Join this webinar with Splunker, Matthias Maier to walk through 20 security use cases already used by leading organisations. You’ll hear the most relevant questions for each use case, and discover which device or application within your infrastructure can be used to find the answers. Forty minutes later, you’ll be set to take away your learnings, validate them in your own environment, and identify the most relevant gaps that need to be addressed for your business.
  • Deep Dive Demo: Cloud Backup for Enterprise Workloads
    Deep Dive Demo: Cloud Backup for Enterprise Workloads
    Parker Sinclair Sales Engineer, Druva Inc. Recorded: Feb 12 2019 20 mins
    Did you know that you can simplify data protection for enterprise workloads with a single cloud solution for backup, archival, and disaster recovery?

    Attend a 30-minute live demo of Druva Phoenix and our product expert will answer all of your questions!

    During this demo you'll learn how to:

    - Provide global protection for enterprise server and virtual workloads
    - Reduce total cost of ownership (TCO) by up to 60%
    - Isolate and quickly restore data during infrastructure attacks
    - Get started within minutes — Druva Phoenix is offered as-a-service and can be provisioned on-demand
  • Erhalten Sie verlässlichen Datenzugriff für Ihre Security-Tools
    Erhalten Sie verlässlichen Datenzugriff für Ihre Security-Tools
    Daniela Fusaro, Senior Solutions Architect Recorded: Feb 8 2019 20 mins
    Die meisten Security Unternehmen haben viele Applikationen in ihrem Netzwerk laufen. Viele Firmen wissen jedoch nicht, welche Applikationen die meisten Ressourcen benötigen, da ihnen die volle Visibilität in ihre Netzwerkdaten fehlt.

    Security Budgets werden oft gekürzt, so dass viele Unternehmen eine Herausforderung damit haben, den erhöhten Bedarf diesbezüglich zu decken.

    Diese Ineffizienz resultiert oft darin, dass der gesamte Netzwerkverkehr von allen Netzwerk- Security-Tools analysiert wird, auch wenn das gar nicht notwendig wäre.

    Während viele Firmen den Fokus auf ihre Security Tools legen, wird häufig aus den Augen verloren, ob alle relevanten Daten oder zuviele Daten dort ankommen, die diese Tools vielleicht gar nicht analysieren können oder müssen.

    Die Security Operation Center sind jedoch abhängig davon, Netzwerk-Events zu sammeln, zu korrelieren und auswerten zu können, so dass sie potentielle Security Bedrohungen schnell identifizieren und beantworten können.

    An die richtigen Daten aus dem gesamten Netzwerk heranzukommen, und gleichzeitig die Systeme nicht zu überlasten, kann eine große Herausforderung sein.

    Application Intelligence bietet Ihnen spezifische Informationen über alle Applikationen, die durch Ihr Netzwerk fließen. Im Security Kontext ist dies besonders nützlich, weil die Security Appliances sprichwörtlich nach der Nadel im Heuhaufen suchen, um in den steigenden Datenmassen von Netzwerkflows Bedrohungsmuster zu finden.

    Sehen Sie sich unser Webinar an, um zu verstehen, wie Sie Ihre Netzwerk- und Security-Tools effizienter nutzen können, um Ihre Netzwerk Infrastruktur zu schützen.
  • Enterprise Software-Defined Storage on HPE Gen10 Servers
    Enterprise Software-Defined Storage on HPE Gen10 Servers
    Chris Tinker, Chief Technologist, HPE and Hal Woods, CTO, Datera Feb 21 2019 5:00 pm UTC 75 mins
    Chris Tinker, Chief Technologist at Hewlett Packard Enterprise joins Hal Woods, CTO at Datera to discuss some of the leading technologies in the Software Defined Revolution, and how HPE and Datera help cultivate the vast ecosystem of solutions.

    Data is at the center of the Software Defined Data Center, where Datera reimagined enterprise storage and partnered with HPE to deliver a complete solution.

    What you will learn from this webinar:

    • Architecting your data center for high-performance
    • Ease of deployment and management
    • Advanced automation and future-ready choice to orchestrate data for VMs
  • Modernizing VMware with Kubernetes
    Modernizing VMware with Kubernetes
    Kamesh Pemmaraju, Head of Product Marketing at Platform9 Feb 21 2019 6:00 pm UTC 75 mins
    Kubernetes has become the de facto standard today for building and running container workloads. Many organizations would like to leverage their existing investments in VMware to take advantage of the Kubernetes revolution.

    Unfortunately, VMware was never designed to run containerized workloads. Furthermore, Kubernetes is complex and notoriously difficult to deploy and operate at scale for production workloads. The lack of Kubernetes skills adds to the challenge.

    Join us in this Webinar to learn how you can get a production ready, easy to use Kubernetes solution with a 24x7x365 SLA on your very own VMware infrastructure with the following benefits:

    1.Get up and running with Kubernetes in an hour
    2.Eliminate the management overhead
    3.Enable self-service for your developers to deploy Kubernetes applications with a single click
    4.Improve collaboration between your developers and VMware admins
    5.And much more!

    Join us at 1 PM EST/10 AM PST on February 21, 2019 to learn more.
  • Enterprise-Wide Kubernetes, Ep 6: Ingress and Load Balancing
    Enterprise-Wide Kubernetes, Ep 6: Ingress and Load Balancing
    Komal Bhardwaj & Ritesh Patel Feb 21 2019 6:00 pm UTC 60 mins
    When applications that are deployed in Kubernetes need to be accessed from outside the cluster, an Ingress needs to be created. In Kubernetes, Services can also be exposed via a Load Balancer. There are several options available to make your application accessible and the right choice may depend on your requirements.

    In this webinar, we will discuss how Ingress and Load Balancing works in Kubernetes. We will also show a demo of how Citrix ADC serves as an Ingress device on a Nirmata managed Kubernetes distribution.

    Ritesh Patel - VP Products at Nirmata
    Komal Bhardwaj - Principal Product Manager at Citrix
  • Overcoming The Cybersecurity Skills Shortage in Law Firms
    Overcoming The Cybersecurity Skills Shortage in Law Firms
    Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Feb 21 2019 7:00 pm UTC 39 mins
    The evidence is clear: law firms of all sizes need to securely handle sensitive information associated with their clients, investigators, and witnesses. According to the American Bar Association’s 2017 Legal Technology Survey Report, 22 percent of respondents suffered a security breach at their law firms.*

    Compromised client information can destroy reputations and lead to decreased billables and lost business. While the need for improved security is evident, IT and security teams struggle to locate, retain and train talent needed to maintain and improve their security posture. So, what are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure?

    In this Arctic Wolf webinar, you will:

    - Discover why cybersecurity is top of mind in the legal community
    - Recognize the IT and Cybersecurity skills shortage and its impact on security
    - Understand how SOC-as-a-Service approaches enable law firms to rapidly improve their security posture and provide evidence to satisfy technology audits

    Save your seat today to learn more!

  • Cloud Success Series: Control Cost and Mitigate Risk in the Cloud, Session 1
    Cloud Success Series: Control Cost and Mitigate Risk in the Cloud, Session 1
    John Masci, Principal Technologist - Cloud Solutions Feb 21 2019 7:00 pm UTC 60 mins
    Today, 77 percent of enterprises have at least one application on the cloud (IDG State of the Enterprise Cloud, 2018). If you are part of that 77 percent, then cloud is now a critical element of your competitiveness. Heading into 2019, the growing pains of cloud will be cost and security: you’ll face the difficult balance between empowering your teams with the newest cloud technologies and ensuring those teams stay within budgets and comply with organization-wide policies.

    As you take on this challenge, you need a cloud management platform that provides proactive ways to control and minimize costs, while enforcing governance and security.

    In partnership with LiftOff IT, HyperGrid invites you to attend this webinar and demo, highlighting the capabilities we offer to help you optimally manage and benefit from your cloud strategy.

    This webinar focuses on the following critical topics:

    • How your cost, security & governance challenges will change at different stages of cloud adoption
    • Key methods to manage costs including instance optimization, budget tracking, bill analysis and chargebacks
    • Mitigating security risks using risk-based policies, and automated threat detection
    • Maintaining compliance against internal and external standards corporate when operating in the public cloud
    • How the HyperCloud™ platform can simplify all the above

    Receive a complimentary copy of Gartner’s 2019 Magic Quadrant for Cloud Management Platform Report
    As a webinar participant, you’ll receive a courtesy copy of Gartner’s new landmark overview of the CMP marketplace. Learn why Gartner singled out HyperGrid as the only “visionary” in this category in its Magic Quadrant for Cloud Management Platforms.
  • 15 Minute Webinar: Do You Need to Protect Laptops, Office 365, & Salesforce.com?
    15 Minute Webinar: Do You Need to Protect Laptops, Office 365, & Salesforce.com?
    George Crump, Storage Switzerland and W. Curtis Preston, Druva Feb 22 2019 6:00 pm UTC 15 mins
    If you think the cloud provides enough protection for your critical data, you’re putting that data at risk. You can’t assume data is protected because it’s “in the cloud” -- you need to ensure all of the data in your critical applications, including Office 365 and Salesforce.com, get the protection they deserve.

    Join George Crump, Founder, and Lead Analyst at Storage Switzerland, and W. Curtis Preston (a.k.a. Mr. Backup), Chief Technologist at Druva, where they will discuss:

    - What level of protection do cloud services provide?
    - Is the provided level of protection enough for the enterprise?
    - What does the enterprise need to add to achieve complete protection?

    Register Now and get Storage Switzerland’s latest eBook “Protecting the Organization From Its Endpoints.”
  • Secure Your Journey to the Hybrid Cloud
    Secure Your Journey to the Hybrid Cloud
    Tim Woods, Vice President of Technology Alliances | Elisa Lippincott, Director of Product Marketing Feb 22 2019 7:00 pm UTC 60 mins
    Many enterprises are adopting a cloud-first strategy in efforts to drive business innovation and growth. As cloud deployments grow, security requirements grow with them – leading to a trend of security responsibilities becoming dispersed as traditional security implementations impede the speed to delivery. Distributed responsibilities lead to fragmented security implementations - add to the problem the lack of skilled personnel, misconfiguration errors, overly permissive access, shadowed IT, and a lack of consistency between on-premise and cloud security controls, and you can end up with a recipe for disaster.

    Join Tim Woods, VP of Technology Alliances at FireMon and Elisa Lippincott, Director of Product Marketing at FireMon, in this webinar where they will discuss:

    • Steps you need to take to gain full visibility and control to secure your hybrid environment
    • How to ensure consistency of your security controls within hybrid cloud and multi-cloud environments
    • How to manage risk and complexity in your hybrid cloud with a cloud security posture management strategy
  • Where are you on the Digital Transformation Journey? Further than you think
    Where are you on the Digital Transformation Journey? Further than you think
    Vishal Ganeriwala, Senior Director, Product Marketing, Citrix Workspace Feb 26 2019 12:00 pm UTC 37 mins
    Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?

    Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.

    You’ll learn how to:

    • Simplify your systems and ongoing management with a cloud-based approach
    • Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
    • Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
  • How to Gain Visibility into Encrypted Threats
    How to Gain Visibility into Encrypted Threats
    Brandon Dunlop, Moderator, (ISC)², David Warburton, Senior Threat Research Evangelist, F5 Labs Feb 26 2019 1:00 pm UTC 60 mins
    Encrypting data-in-transit with SSL/TLS is standard practice among organisations today. Important security initiatives, such as built-in web browser warnings and stronger legislative GDPR changes, have significantly improved privacy awareness and helped to prevent data breaches. However, cybercriminals commonly hide threats within encrypted payloads and use encrypted channels to propagate malware and exfiltrate data, knowing they can bypass traditional security inspection solutions.

    Join us for this webinar to learn more about:

    • Challenges with encrypted traffic and risks to your business
    • How to efficiently decrypt and orchestrate traffic to reduce latency
    • How to intelligently manage decryption and re-encryption across your entire security inspection solutions (IPS, NGFW, DLP, WAF, Anti-Malware, etc.)
  • Contain the Data Explosion in Universities
    Contain the Data Explosion in Universities
    Darren Soothill Feb 26 2019 2:00 pm UTC 60 mins
    The demand for additional data storage is growing too fast for traditional storage options to continue to be an affordable solution. Continuing down this path means you'll be forced to increase your budget dramatically in order to keep up with your data needs. However, SUSE’s intelligent software-defined storage solution, powered by Ceph technology, enables academic facilities to transform their storage infrastructure and reduce costs while providing unlimited scalability.
  • Ask a Cloud Access Software Expert…
    Ask a Cloud Access Software Expert…
    Jonathan Culver, Solutions Architect & Andrew Waite Brown, Regional Director - EMEA- Teradici Feb 26 2019 2:15 pm UTC 30 mins
    Join our monthly webinar for a quick review on Cloud Access Software followed by a Question and Answer session with our Cloud Access Software expert and Solutions Architect Jonathan Culver.

    1.What graphics adapters does Cloud Access Software support?
    2.What Windows versions does Cloud Access Software support?
    3.Can USB devices be used with Cloud Access Software?
    4.What are the supported hypervisors and cloud platforms for Cloud Access Software?
    5.Can I connect to my Cloud Access Software workstation on a tablet device?

    Submit a question when registering or during the webinar. Our goal is to ensure your deployment is a success!
    Register today.
  • Distributed Cloud and Edge Compute: Deployment Lessons from the Field
    Distributed Cloud and Edge Compute: Deployment Lessons from the Field
    Alessandro Barbieri, VP Product Management at Pluribus Networks Feb 26 2019 4:00 pm UTC 60 mins
    In this webinar we will review a novel network fabric architecture that leverages open source software, distributed SDN intelligence and open networking principals and has been designed for multi-site data center deployments as well as emerging distributed cloud and edge compute environments. We will discuss the technical attributes of the architecture and the rationale behind its design and then we will review three separate deployment examples. The first will be how this architecture has been deployed at regional cloud service provider Econocom Italia for their new Naboo Cloud offering. Econocom is the Digital Transformation Designer that designs, integrates and supports innovation, accelerating the digital transformation of companies. We will review the status of the implementation, learnings to date and next steps in the deployment. Second we will review a common scenario whereby the fabric provides a programmable network fabric to support the deployment of network function virtualization infrastructure (NFVi) in the mobile cores of Tier 1 mobile network operators. The third example will review a hypothetical deployment in a distributed cloud environment to paint a picture of how the network fabric might be deployed in emerging edge compute architectures.
  • 4 Things to Consider with Multi-Cloud and Hybrid Cloud Application Delivery
    4 Things to Consider with Multi-Cloud and Hybrid Cloud Application Delivery
    Sean Leach, Fastly and Sophia Vargas, Forrester Feb 26 2019 5:00 pm UTC 18 mins
    Organizations today are facing 4 main challenges when adopting cloud infrastructure and delivering apps in a multi cloud environment.

    Join this webinar with experts from Fastly and Forrester to learn how to:

    - Maximize availability by ensuring sufficient redundancy and failover options
    - Maintain visibility and control to guarantee app performance
    - Optimize performance across a diverse set of resources, locations and workload types
    - Address interoperability and leverage hybrid app components as one dynamic system

    Tune in with Sophia Vargas from Forrester and Sean Leach from Fastly as they discuss the state of cloud adoption, what to consider when delivering apps in a hybrid/multi cloud and the new approaches to cloud app delivery at the edge.
  • How Cox Automotive Democratized Data with a Self-Service Data Exchange
    How Cox Automotive Democratized Data with a Self-Service Data Exchange
    Nathan Swetye - Sr. Manager of Platform Engineering - Cox Automotive Feb 26 2019 6:00 pm UTC 62 mins
    Cox Automotive comprises more than 25 companies dealing with different aspects of the car ownership lifecycle, with data as the common language they all share. The challenge for Cox Automotive was to create an efficient engine for the timely and trustworthy ingest of data capability for an unknown but large number of data assets from practically any source. Working with StreamSets, they are populating a data lake to democratize data, allowing analysts easy access to data from other companies and producing new data assets unique to the industry.

    In this webinar, Nathan Swetye from Cox Automotive will discuss how they:

    -Took on the challenge of ingesting data at enterprise scale and the initial efficiency and data consistency struggles they faced.
    -Created a self-service data exchange for their companies based on an architecture that decoupled data acquisition from ingestion.
    -Reduced data availability from weeks to hours and developer time by 90%.
  • A Successful Journey to the Cloud (APAC)
    A Successful Journey to the Cloud (APAC)
    Paul Moxon, VP Data Architecture and Chief Evangelist, Denodo Feb 27 2019 1:30 am UTC 57 mins
    By 2020, a corporate "no-cloud" policy will be as rare as a "no-internet" policy is today, according to Gartner, Inc. While cloud makes enterprises more flexible and agile, various cloud adoption scenarios such as hybrid cloud, infrastructure modernization and cloud based analytics present a few challenges of their own.

    Attend this session to learn:

    • Challenges involved with various cloud adoption scenarios
    • How data virtualization solves cloud adoption challenges while centralizing data governance and security mechanism
    • How companies are using data virtualization to tackle complex modern customer segmentation problems such as “customer genomics”


    • Challenges of cloud adoption
    • Data virtualization to the rescue
    • Product demonstration
    • Q&A
  • Como gerenciar suas aplicações na nuvem AWS da melhor forma com a SUSE
    Como gerenciar suas aplicações na nuvem AWS da melhor forma com a SUSE
    João Marcelo, AWS Solutions Architect & Aslan Ramos, SUSE Sales Engineer Feb 27 2019 1:00 pm UTC 60 mins
    Aproveite os benefícios de utilizar SUSE com AWS

    Venha participar do nosso webinar e saiba como a SUSE e a AWS trabalham juntas para atender demandas com soluções inteligentes. O webinar acontece no dia 27 de Fevereiro às 10 horas. Registre-se.

    Juntamente com a AWS e o SUSE, você pode desenvolver e implantar aplicativos de próxima geração e de missão crítica na plataforma de nuvem pública líder do mundo.
    Acompanhe-nos e aprenda como as soluções SUSE na AWS podem permitir que você:

    Transforme seu panorama SAP e mude para o SAP HANA na nuvem da AWS;

    Gerenciar, manter, atualizar e corrigir seu TI Híbrido com o SUSE Manager na AWS;

    Saiba mais sobre soluções de contêineres para a AWS, incluindo a plataforma de aplicativos SUSE Cloud aproveitando Cloud Foundry e kubernetes.
  • Does Your Data Center Need NVMe?
    Does Your Data Center Need NVMe?
    Storage Switzerland, Virtual Instruments, SANBlaze Feb 27 2019 6:00 pm UTC 60 mins
    NVMe storage systems and NVMe networks promise to reduce latency further and increase performance beyond what SAS based flash systems and current networking technology can deliver. To take advantage of that performance gain however, the data center must have workloads that can take advantage of all the latency reduction and performance improvements that NVMe offers. Vendors emphatically state that NVMe is the next must-have technology, yet many still continue to provide SAS based arrays using traditional networks.

    How do IT planners know then, that investing in NVMe will truly provide their organizations the benefits of NVMe for their demanding applications and see a measurable return on investment? Just creating a test environment to perform an NVMe evaluation can break the IT budget!

    Register now to join Storage Switzerland, Virtual Instruments, and SANBlaze as we look at the state of the data center and provide IT planners with the information they need to decide if NVMe is an investment they should make now or if they should wait a year or more. The key is determining which applications can benefit from NVMe-based approaches.

    In this live event, IT professionals will learn
    - About NVMe, NVMe Storage Systems and NVMe over Fabric Networking
    - The Performance Potential of NVMe Storage and Networks
    - What attributes are needed for a workload to take advantage of NVMe
    - Why NVMe creates problems for current IT testing strategies
    - Why a Workload Simulation approach is the only practical way to test NVMe
    - How to build a storage performance validation practice
  • How to Optimize Network Performance During Infrastructure Transformation
    How to Optimize Network Performance During Infrastructure Transformation
    Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Feb 27 2019 6:00 pm UTC 60 mins
    How do you reduce complexity of your transforming infrastructure, gain greater IT tool efficiency and maximize visibility into your network? The right solution should empower you to produce better outcomes with less effort at lower cost. That is where a next-generation packet broker comes into play.

    Join Gigamon to get the latest best practices to:
    • Acquire and aggregate all network traffic for better visibility
    • Stop duplicate packets from overloading your tools
    • Filter traffic to provide the right data to the right tools
    • Optimize compliance and reduce risk across your entire IT environment

    If you need to optimize your tools, improve network performance and availability, get better insights into threats and enable your Network Operations and Security Operations teams to collaborate, you won’t want to miss this technical webinar.
  • 451 Research & Citrix: Accelerating Productivity without Compromise
    451 Research & Citrix: Accelerating Productivity without Compromise
    Chris Marsh of 451 Research & Matt Crawford of Citrix Feb 28 2019 12:00 pm UTC 54 mins
    The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.

    Topics discussed will include:
    * Current sources of friction that hamper productivity
    * Barriers to collaboration and execution
    * The importance of context and automation in enabling workers
    * Tips for selecting technologies that map to the new workforce
  • Edge Computing in Industrial IoT
    Edge Computing in Industrial IoT
    Amir Barnea Feb 28 2019 3:00 pm UTC 60 mins
    Edge Computing has been brought in as an approach to solve some of the main challenges of IIoT, but it is capable of much more than handling secure networking. In this webinar, we’ll share new developments in Edge computing and explain how it can be used to perform IIoT-specific, non-networking functions, such as OpenPLC and SCADA firewall.
  • Contenedores a prueba de balas
    Contenedores a prueba de balas
    Jordi Bruguera, CTO en ITechGrup y Roberto Isidoro, Sales Engineer en SUSE Feb 28 2019 3:00 pm UTC 60 mins
    En el mundo de los contenedores, la Seguridad es fundamental y muchas veces se infravalora. Con SUSE Manager, la potenciamos y...

    ¡...queremos enseñaros cómo!

    Jordi Bruguera, CTO de ITechGrup, nos mostrará un ejemplo práctico de cómo auditar y parchear una imagen de Docker con SUSE Manager.
  • Cloud Truth & WAN Consequences: Remake Your WAN for Zoom, AWS, and Office365
    Cloud Truth & WAN Consequences: Remake Your WAN for Zoom, AWS, and Office365
    John Burke, CIO and Principal Research Analyst, Nemertes Research Feb 28 2019 4:00 pm UTC 60 mins
    You need to rethink your WAN to survive the next 5 years. We can help show you how.

    Think about it: half of your IT services come from the cloud, from folks such as Amazon Web Services, Google Cloud, IBM Cloud, Microsoft Azure and Office365, and Oracle Cloud. Mixing cloud and internal sources, you serve an increasingly scattered and mobile staff. IoT is turning the physical environment into both a provider and a consumer of IT services.

    Is the WAN you built for Client/Server really going to serve?

    No. IT needs to rethink its WAN and re-engineer the economics of wide-area networking.

    Join Nemertes as we bring our WAN technology research study and freshly updated, one-of-a-kind cost and performance benchmarks to bear on the challenges of remaking your WAN to drive success in the cloud age. We'll discuss:
    • SD-WAN and the real benefits it can deliver for performance and cost
    • Other cloud-friendly network technologies such as direct-connect and WAN-Cloud Exchanges
    • Up-to-date cost and provider performance data for MPLS and Internet services.
  • How to Build High Performance Storage Infrastructure on AWS and Nasuni
    How to Build High Performance Storage Infrastructure on AWS and Nasuni
    Murali Selvaraj, CIO, Perkins + Will | Henry Axelrod, Solutions Architect, AWS Feb 28 2019 4:00 pm UTC 60 mins
    Learn from the CIO and Director of IT Infrastructure from one of the world’s top architecture and design firms as they discuss how they built a high-performance infrastructure to support the firm’s global growth.

    Learn from Murali Selvaraj, CIO and Gregory Fait, Director of IT Infrastructure at Perkins + Will, one of the world’s top architecture and design firms, as they discuss how they built a high-performance infrastructure to support the firm’s global growth. Using a solution from AWS and Nasuni, the firm has been able to scale its ability to store and protect unstructured data across 2,500 employees and 28 locations.

    Attend this webinar and hear:
    - How the firm scaled its storage and protection strategy across multiple locations using Amazon S3 and Nasuni
    - How the combined platform increased the firm’s ability to pursue a global growth strategy
    - What capabilities enabled them to increase productivity across distributed design teams
  • Designing a Storage Consolidation Strategy for Today, the Future and the Cloud
    Designing a Storage Consolidation Strategy for Today, the Future and the Cloud
    Storage Switzerland and StorONE Feb 28 2019 5:00 pm UTC 60 mins
    Most storage consolidation strategies fail because they attempt to consolidate to a single piece of storage hardware. To successfully consolidate storage, IT professionals need to look at consolidation strategies that worked. Server consolidation was VMware’s first use case. It was successful because instead of consolidating hardware, VMware consolidated the environment under a single hypervisor (ESXi) and console (vCenter) but still provided organizations with hardware flexibility. A successful storage consolidation strategy needs to follow a similar formula by providing a single software solution that controls a variety of storage hardware, but that software also has to extract maximum performance and value from each hardware platform on which it sits.

    Join Storage Switzerland and StorOne in which we discuss how to design a storage consolidation strategy for today, the future and the cloud.

    In this webinar learn:

    - The problems with a fragmented approach to storage
    - Why storage fragmentation promises to get worse because of AI, ML, and the Cloud
    - Why consolidating to a single storage system won’t work
    - Why hyperconverged architectures fall short
    - Why Software Defined Storage falls short
    - Why the organization needs a Storage Hypervisor
  • The Scale-Out File System Architecture Overview
    The Scale-Out File System Architecture Overview
    Zhiqi Tao, Intel; John Kim, Mellanox Feb 28 2019 6:00 pm UTC 75 mins
    This webcast will present an overview of scale-out file system architectures. To meet the increasingly higher demand on both capacity and performance in large cluster computing environments, the storage subsystem has evolved toward a modular and scalable design. The scale-out file system is one implementation of the trend, in addition to scale-out object and block storage solutions. This presentation will provide an introduction to scale-out-file systems and cover:

    •General principles when architecting a scale-out file system storage solution
    •Hardware and software design considerations for different workloads
    •Storage challenges when serving a large number of compute nodes, e.g. name space consistency, distributed locking, data replication, etc.
    •Use cases for scale-out file systems
    •Common benchmark and performance analysis approaches