Hi [[ session.user.profile.firstName ]]

Virtualization

  • 8 Essentials for SDI, Including Support for New Cloud Native Applications
    8 Essentials for SDI, Including Support for New Cloud Native Applications John Abbott of 451 Research and Jennifer Kotzen at SUSE Recorded: Oct 23 2018 54 mins
    Moving to software defined infrastructure is all about getting rid of rigid system silos that can hold companies back from digital transformation, replacing them with more fluid resources that provide the flexibility and agility required to support a rapidly evolving mix of existing and new cloud native workloads. It’s the direction of travel for most enterprises and service providers alike. But how do you get there?

    451 Research has identified a core set of essentials for companies looking to become software-defined organizations. In this webinar we’ll examine these principles, explore their importance to IT decision makers, and look at the new cloud native workloads and modern DevOps processes that they enable. Join us to hear from John Abbott, co-founder and distinguished analyst at 451 Research and Jennifer Kotzen, Applications Delivery Solutions Team Lead at SUSE.
  • Automating your way past NFV complexity
    Automating your way past NFV complexity Paul Brittain, VP Product Strategy, Metaswitch Recorded: Oct 23 2018 47 mins
    Network Functions Virtualization (NFV) is the future network architecture that almost all Telcos/CSPs desire. For many, though, it is proving an elusive goal despite the shift that IT made to cloud several years back. Network Functions are just another class of x86 workload, so why is this seemingly so hard?

    Much of the problem is due to treating NFV as purely an engineering challenge, characterized by chasing a “Telco Cloud” fit for all possible purposes. That is genuinely a tough project, but NFV will also impact many processes and people across your organization. Automation may appear to add yet more change to be managed, but it is actually key to making NFV attainable. This webinar will show how, with Cloud Native VNFs and an agile approach to Automation, you can clear both the technical and operational roadblocks on the path to a fully virtualized network.
  • The ONE complete digital workspace is here: All apps and data unified and secure
    The ONE complete digital workspace is here: All apps and data unified and secure Mark Bowker, Sr. Analyst, ESG; P.J. Hough, Chief Product Officer, Citrix Recorded: Oct 23 2018 48 mins
    Just a few short months ago, Citrix announced the unveiling of the industry’s first digital workspace to enable people-centric computing within organizations. Join us for this webinar and learn how the new Citrix Workspace unifies and secures all apps and content for all devices.

    Discover how Citrix Workspace:

    • Delivers a consistent and unified experience across all devices and provides users SSO access to virtual apps, desktops, mobile apps, SaaS apps and their data
    • Extends the perimeter into cloud apps and across multiple devices and networks
    • Automates image management and provisioning to move workloads from datacenters to any cloud
    • Enables choices of devices from a single endpoint management solution
    • Provides user-centric analytics combined with machine learning to provide actionable intelligence to manage threats
    • Improves the experience of mobile apps with secure email integrated with Slack
  • Enriching Your Security Product Stack With The Power of IPAM and DNS
    Enriching Your Security Product Stack With The Power of IPAM and DNS Lindsay Drabwell, (ISC)² EMEA, Gary Cox, Infoblox, Alastair Broom, Logicalis Recorded: Oct 23 2018 58 mins
    Today’s enterprise network has a vast number of network and security devices – all generating their own incidents, but they don’t always share information. According to the ESG research report on Security Operations Challenges, Priorities and Strategies in 2017, keeping up with the volume of security alerts and lack of integration between different security tools are the biggest challenges related to security. Organizations are investing heavily in automation/orchestration of incident response to improve collaboration, prioritize alerts and shorten time for incident response.

    This webinar will discuss how integration of different network and security tools can:
    •Provide better visibility across your entire network and remove silos
    •Improve agility and automate IT workflows
    •Enable faster remediation to threats

    Please join Infoblox and Logicalis for this key discussion on the integrated ecosystem -- taking your organization to the next level of security.
  • Modern Cyberattacks and How to Keep Businesses Safe
    Modern Cyberattacks and How to Keep Businesses Safe Kelvin Murray, Sr. Threat Research Analyst, Webroot Recorded: Oct 23 2018 30 mins
    Small and medium-sized businesses and the MSPs who serve them are major targets for cybercriminals. To stay safe, today’s businesses and MSPs must understand the different types of cyberattacks they may encounter and implement strong cybersecurity practices.

    Register for this 30-minute webinar on the key threats businesses will face this year to get details and tips that will help you keep your business and clients safe.

    Some of the topics Kelvin Murray, Sr. Threat Research Analyst, Webroot will cover:

    • Ransomware, banking Trojans, and phishing
    • Cryptomining, cryptojacking, and other crypto-crime
    • Best practices for keeping businesses safe
  • Cloud Security: The next generation
    Cloud Security: The next generation Chris Hill, RVP, Public Cloud EMEA; Alex Hilton, Chief Executive, Cloud Industry Forum Recorded: Oct 22 2018 51 mins
    Multi-Cloud or hybrid environments has become a growing strategy for many organisations moving their applications and data in the cloud as it gives organisations the ability to be flexible in what they need for their business. In fact, according to recent research by Computing, 26 per cent of enterprises surveyed were using a multi-cloud approach compared with 22 per cent last year. However, along with this approach one thing organisations should not forget is that the need for security does not diminish. As the cloud continues to offer more in services, organisations need to be aware of the protection they are responsible for to ensure their applications and workloads are safe.

    So how do organisations stay ahead of the curve with security as well as being able to manage these multi-cloud or hybrid environments?

    Join our latest webinar where, Chris Hill, VP Public Cloud EMEA at Barracuda, and Alex Hilton, Chief Executive and Cloud Industry Forum (CIF)will discuss the latest challenges when it comes to migrating to the cloud, especially in a multi-cloud environment as well as analyse CIFs latest research findings on what organisations need to consider when adopting these cloud services.
  • A Review of High Availability Options in the Cloud
    A Review of High Availability Options in the Cloud Phil Ekins, Principal Architect, House of Brick Technologies Recorded: Oct 19 2018 48 mins
    Join us as we explore the options available to cloud users for ensuring High Availability (HA) in the cloud. Our discussion will include both native cloud options and Microsoft offerings on top of the cloud stack.

    As your Recovery Point Objective (RPO) and Recovery Time Objective (RTO) needs increasing, so do your HA needs. So let’s look at your options and examine best practices and how they can be applied to your environment.
  • Enterprise-Wide Kubernetes: Episode 2 - Security
    Enterprise-Wide Kubernetes: Episode 2 - Security Patrick Maddox and Jim Bugwadia Recorded: Oct 18 2018 54 mins
    Kubernetes has become the multi-cloud OS for enterprises. In this series, we will look at what makes up an enterprise-grade Kubernetes stack, and the key tradeoffs for each component.

    In this episode, we will take a close look at end-to-end security for Kubernetes. Here are some of the key questions that we will discuss:

    1. What are the top 5 things I need to do to secure my cluster?
    2. What do I need to consider for securing applications deployed in the Kubernetes cluster?
    3. How do you recommend customers evaluate and compare the security solutions in the CNCF ecosystem?


    Presenters:

    Patrick Maddox, Senior Director, Solution Architecture at Twistlock
    Jim Bugwadia, CEO at Nirmata
  • Solving The Cybersecurity Skills Shortage in Financial Institution
    Solving The Cybersecurity Skills Shortage in Financial Institution Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Recorded: Oct 18 2018 40 mins
    Financial institutions face a daunting combination of cybersecurity threats and compliance requirements. IT teams at regional banks and credit unions have a relatively small staff but facing similar security and compliance burden to what larger, well-resourced financial institutions carry. How can small and mid-sized financial institutions counter sophisticated cyberthreats, provide monitoring and incident response needed for compliance, and do so with tight budgets that do not allow for staffing an elaborate security operations center? Managed detection and response provides a “force multiplier” to address all three issues.

    Attend this webinar and learn about:

    • Top cyberthreats facing financial institutions
    • Financial services compliance evolution, security monitoring and incident response
    • Differences between SIEM, SOC, and SOC-as-a-service
    • Monitoring on premises and cloud resources without adding headcount

    To gain insights on these challenges and how to solve them, save your seat now!
  • How to Detect Cryptomining in your Environment with AlienVault
    How to Detect Cryptomining in your Environment with AlienVault Danielle Russell, Group Product Marketing Manager & Amy Pace, Principal Product Marketing Manager | AlienVault Recorded: Oct 18 2018 60 mins
    Cryptominers are built to turn computing power into revenue. To make cryptomining a profitable venture, cyber criminals are writing and distributing malware to steal computing resources to mine for cryptocurrencies like Bitcoin and Monero by attacking victims' endpoints, public cloud accounts, and websites. Through various attack vectors, cyber attackers can turn compromised systems into a silent zombie army of cryptocurrency miners. Unless you have advanced threat detection capabilities to detect crypto-mining activities on your endpoints, in the cloud and on premises, you might be unknowingly sharing your valuable computing resources with cryptomining criminals.

    Join this webcast to learn:

    - The what, why and how of cryptomining
    - How cryptomining can evade traditional antivirus and other security controls
    - Best practices and essential tools for detecting cryptomining quickly
    - How AlienVault Unified Security Management (USM) can alert you immediately of cryptomining activity

    Speakers: Danielle Russell, Group Product Marketing Manager
    Amy Pace, Principal Product Marketing Manager
  • Data Management vs GDPR and Data Privacy-Solve the Right to Be Forgotten Problem
    Data Management vs GDPR and Data Privacy-Solve the Right to Be Forgotten Problem Storage Switzerland and Aparavi Recorded: Oct 18 2018 56 mins
    The General Data Protection Regulation (GDPR) makes specific demands on organizations based in and doing business in the European Union (EU). Now several US states are considering similar legislation and California has already passed a GDPR-like law. Clearly this is not solely an EU problem.

    From a data management standpoint, GDPR presents IT with two challenges. First it has to ensure the on-going protection of data which given the growth of unstructured data is increasingly a challenge. The size and number of files is an ongoing data management problem but meeting the specific demands on retention of discrete files within the data set is a bigger problem.

    An even bigger challenge comes from the right to be forgotten aspect of these regulations where a user can request the removal of all their data from a backup set. Vendors are working on several potential solutions like delete on restore and isolated recovery zones but each of these creates their own challenges.

    In this live webinar, join Storage Switzerland and Aparavi as we dive deep into the impact of GDPR and similar regulations to data management and the data protection process. The time is now to get prepared to meet the ever-increasing demands on data retention and data privacy.
  • Connecting Application Enablement to Business Results
    Connecting Application Enablement to Business Results Verizon and Equinix Recorded: Oct 18 2018 39 mins
    Network and security are more critical than ever, but they need to be application centric and a virtualized extension of your business. Learn how to re-architect your cloud to drive better business results and take advantage of technologies like Software Defined Networking (SDN), Network Function Virtualization (NFV), and Everything-as-a-Service (XaaS). We’ll discuss how cloud solutions can enable you to take control of your digital strategies and form the foundation for your enterprise’s Digital Transformation.
  • The 1/10/60 Challenge: Stopping Breaches Faster
    The 1/10/60 Challenge: Stopping Breaches Faster Brandon Dunlap, Moderator, (ISC)², Zeki Turedi, Technology Strategist EMEA, CrowdStrike Recorded: Oct 18 2018 58 mins
    Breakout time, the time that it takes an intruder to jump from the machine that’s initially compromised and move laterally through your network, on average is 1h and 58m*. This is your critical window to take action and stop the breach. When an attack is in progress, we’re seeing world leading security teams take one minute to detect it, 10 minutes to understand it and one hour to contain it. Is your organisation ready to meet the 1/10/60 minute challenge?

    Attend this webcast to learn:

    -What breakout time is and what it means for defenders that are responding to attacks in real time
    -How the incident response process unfolds and the barriers that keep organisations from mounting a rapid and efficient response
    -The key steps you can take to improve your organisation’s ability to rapidly detect, investigate and remediate threats
  • Data Virtualization: Key Foundation of a Cloud-First Strategy
    Data Virtualization: Key Foundation of a Cloud-First Strategy Kevin Moos, Eric Greenfeder, Jay Livens Recorded: Oct 17 2018 58 mins
    As more organizations adopt a cloud-first strategy, the task of migrating high-volume transactional workloads presents a unique set of challenges, particularly in handling the large amounts of data involved. Join Primitive Logic and Actifio as we discuss the most pressing challenges around transactional data migrations … and the solutions that can help address them.

    You will learn:
    The unique challenges in migrating transactional data to the cloud
    How to handle data for applications with both on-prem and cloud components
    How to approach transactional data as part of a multi-cloud strategy
    How data virtualization helps resolve issues of security, governance, multi-cloud coordination, and more
  • A Review of High Availability Options in the Cloud
    A Review of High Availability Options in the Cloud Phil Ekins, Principal Architect, House of Brick Technologies Recorded: Oct 17 2018 48 mins
    Join us as we explore the options available to cloud users for ensuring High Availability (HA) in the cloud. Our discussion will include both native cloud options and Microsoft offerings on top of the cloud stack.

    As your Recovery Point Objective (RPO) and Recovery Time Objective (RTO) needs increasing, so do your HA needs. So let’s look at your options and examine best practices and how they can be applied to your environment.
  • Nutanix Files: Simple, Scalable, and Reliable File Storage for Citrix EUC
    Nutanix Files: Simple, Scalable, and Reliable File Storage for Citrix EUC Kees Baggerman,EUC Technical Director Nutanix & Dave Brear,Enterprise Architect EMEA Professional Services Citrix UK Recorded: Oct 17 2018 50 mins
    The benefits of a modern digital workspace are well documented; but not all solution stacks are created equal.

    Join Nutanix EUC Technical Director, Kees Baggerman and Dave Brear,Enterprise Architect, Citrix Professional Services, as they discuss how Citrix EUC with Nutanix Files, which is natively integrated into the Nutanix Enterprise Cloud OS, eliminates costs and complexities at any scale to successfully deliver a modern digital workspace.


    In this webinar, attendees will learn:

    1. What is Nutanix Files?
    2. Why is Nutanix Files applicable to Citrix EUC environments and its successful deployment?
    3. Best practices to integrate and deliver Nutanix Files in Citrix EUC environments.
  • Mehr Sicherheit bei gleichzeitiger Sicherstellung der Netzwerk-Uptime
    Mehr Sicherheit bei gleichzeitiger Sicherstellung der Netzwerk-Uptime Daniela Fusaro, Senior Solutions Architect Recorded: Oct 17 2018 18 mins
    Ihr IT Netzwerk ist von entscheidender Bedeutung für den Betrieb, und das macht es zu einem beliebten Ziel für Cyber-Bedrohungen wie Ransomware und Verstöße gegen den Datenschutz. Was können Sie dagegen tun? Inline-Sicherheitstools können eine effektive Lösung sein, stellen aber mehrere mögliche Fehlerpunkte dar, zumal die Netzwerkgeschwindigkeiten steigen, und viele Tools sich diesen nicht anpassen können. Wenn diese Tools ausfallen, dann ist auch Ihr Netzwerk betroffen.

    Um eine umfassende Transparenz über die übertragenen Daten zu erhalten und die Compliance in Hochgeschwindigkeitsnetzen aufrechtzuerhalten, haben sich viele Firmen für die Next Generation Network Packet Broker (NGNPB) entschieden, die einen flexiblen Inline-Bypass-Schutz bieten. Diese Funktion automatisiert den Zugriff auf den Datenverkehr, skaliert und optimiert die bestehende Überwachungsinfrastruktur und vereinfacht die Einführung neuer Technologien. NGNPB bieten zudem Folgendes:

    • Vollständige netzwerkweite Transparenz in physikalischen, virtuellen und Cloud-Umgebungen,
    • Skalierbare Metadatenextraktion für verbesserte Forensik,
    • Isolierung von Anwendungen zur gezielten Untersuchung,
    • Sichtbarkeit für verschlüsselten Datenverkehr zur Erkennung von Bedrohungen.

    Erfahren Sie, wie Sie die Sicherheit erhöhen und gleichzeitig die Netzwerk-Uptime sicherstellen und so Kosten senken können. Erfahren Sie, wie eine vereinfachte, belastbare und skalierbare Architektur Folgendes leistet:

    Maximierung der Tool-Effizienz durch Bereitstellung der relevanten Daten für die relevanten Tools und durch das Auslagern prozessorintensiver Aufgaben wie der SSL-Entschlüsselung.
    Und mehr.

    Finden Sie heraus, wie sowohl Netzwerk- als auch Sicherheitsteams in einer sich schnell entwickelnden Cybersicherheitslandschaft schneller und sicherer arbeiten können.

    Network-Packet-Broker der nächsten Generation (NGNPB)
  • The Power of a Complete View of the Customer (APAC)
    The Power of a Complete View of the Customer (APAC) Paul Moxon, VP Data Architecture and Chief Evangelist, Denodo Recorded: Oct 17 2018 59 mins
    A complete view of the customer encompasses a single view of the customer, the customer’s relationships, and the customer’s transactions and interactions, resulting in increased customer satisfaction and retention as well as increased revenue through up-sell and cross-sell opportunities.

    Attend this session to learn how data virtualization supports complete view of the customer by:

    - Facilitating integration of master data with any other data throughout the enterprise
    - Providing real-time data access to the complete customer view, for any individual or organization across the company.
    - Reducing data replication and its associated costs and risks and providing access to cross-company data.

    Agenda:
    - DV benefits for Complete View of Customer
    - Product Demonstration
    - Summary & Next Steps
    - Q&A
  • Secure and Successful Deployments of NSX: Extend Your Visibility with NETSCOUT
    Secure and Successful Deployments of NSX: Extend Your Visibility with NETSCOUT Ray Krug, Enterprise Solutions Architect NETSCOUT Recorded: Oct 16 2018 60 mins
    Making the decision to evolve to the agile NSX SDDC environment as part of your Digital Transformation initiative brings its own challenges of security design and application deployment; and is not without risk. This means that maintaining visibility to assure your business service into this new virtual, secure world is critical to migration success.

    Join Ray Krug, Enterprise Solutions Architect as he discusses how you can leverage NETSCOUT, a VMware Ready Certified Partner in Networking and Security for SDDC space, and your existing nGenusONE Service Assurance platform to extend continuous visibility of your micro-segmented environment, to assure the successful deployment and ongoing security and performance of services in your NSX environment.

    Key takeaways from this session:

    •The challenges faced by IT, DevOPs and Security in the NSX SDDC

    •How NETSCOUT can extend the visibility you already depend on with deployment in an NSX environment.

    •An example use case of application deployed in NSX being monitored by NETSCOUT

    •Demonstrate how NETSCOUT provides visibility for SDDC in NSX and beyond into the public cloud.
  • Data Privacy’s Surprising Impact on Test Data Management
    Data Privacy’s Surprising Impact on Test Data Management Jeff Hughes Recorded: Oct 16 2018 44 mins
    You’re all too familiar with data privacy laws touching every aspect of your business. You can’t be too careful with customer data and with each passing law, the stakes get even higher. Join us for this webcast to learn how test data management practices can not only survive but thrive with all the new data privacy laws enacted in the past year. You’ll learn best practices and experience some of the tools available to help you demonstrate compliance.

    Test Data Management is the utilization of a platform of tools by which test data is identified, masked, generated and delivered to testers and testing teams.

    Learn more:
    https://www.ca.com/us/products/test-data-management.html
  • Understanding the Challenges of Hybrid and Multi-Cloud Management
    Understanding the Challenges of Hybrid and Multi-Cloud Management Sirish Raghuram, CEO, Platform9 and Roy Illsley, Distinguished Analyst, Ovum Recorded: Oct 16 2018 56 mins
    Organizations are moving to cloud to increase operational efficiencies and revenues, and most are using more than one. A hybrid cloud or multi-cloud environment can help organizations advance their digital transformation strategy, but if not properly planned, it can lead to a complex environment.

    Platform9’s centralized management plane transforms your existing IT infrastructure to leverage a cloud model while making it easy to incorporate public clouds as business requirements change.

    In this webinar, you will hear Roy Illsley, Distinguished Analyst from Ovum, and Sirish Ragharum, CEO of Platform9, to learn:

    - The business drivers behind cloud adoption
    - The benefits of a multi-cloud and hybrid cloud strategy and how it advances your business objectives
    - How to transform your existing infrastructure into a cloud and leverage public cloud, so you can seamlessly meet changing business requirements
    - Key insights from the Ovum Decision Matrix: Selecting a Multicloud and Hybrid Cloud Management Solution, 2018–19

    Join us on October 16th at 10 AM PDT!
  • Why Accudata Relies on Citrix Cloud
    Why Accudata Relies on Citrix Cloud Vid Sista, Director of Technology Solutions Recorded: Oct 16 2018 24 mins
    Accudata Systems isn’t just a Citrix Platinum Partner—we rely on Citrix Cloud internally to provide the agility and depth of service we need to compete in today’s business landscape. Join Accudata’s director of technology, Vid Sista, for a 30-minute webinar on October 16 at 11 a.m. CST to learn how Accudata uses Citrix Cloud to:

    •Protect sensitive data outside our corporate network.
    •Leverage Citrix’s Virtual Apps and Desktop environments to reduce resource needs.
    •Provide a consistent experience for all Accudata team members, regardless of location.
  • DevOps to DevSecOps
    DevOps to DevSecOps Speaker: Mike Bursell, Chief Security Architect Recorded: Oct 16 2018 38 mins
    Join us to hear how service providers are making the transition from DevOps to DevSecOps. We will explore the differences between DevOps and DevSecOps, identify security capabilities needed at each layer and how culture plays a significant role.

    You will learn:
    · Security shifting from an afterthought to critical, foundational and pervasive
    · Learn about the 'shiny things' problem - ensure that only approved components and libraries get deployed
    · Recommend processes are enabled and controlled via automation
    · Love your inner auditor
    · Tools, process and culture are fundamental, but you will need culture and executive buy-in to success
  • Domine la Explosión de Datos con SUSE Enterprise Storage 5.5
    Domine la Explosión de Datos con SUSE Enterprise Storage 5.5 Roberto Isidoro, Sales Engineer en SUSE Recorded: Oct 16 2018 38 mins
    Todo lo que necesita saber acerca de la nueva versión de nuestra Solución de Almacenamiento definida por Software: SUSE Enterprise Storage
  • The Criminal Chase for Cryptocurrency
    The Criminal Chase for Cryptocurrency Tyler Moffitt | Sr. Threat Research Analyst Recorded: Oct 16 2018 47 mins
    For years, cybercriminals have been experimenting with new ways to steal and extort money from their victims. In the last few years, the biggest trend is cryptocurrency. Join our informative webinar to learn more about how it works, and how you can keep your business safe.

    Join Webroot's 30 minute webinar with Sr. Threat Research Analyst, Tyler Moffitt, as he explores:

    • The pre-cryptocurrency money mules
    • Bitcoin and Silk Road
    • The ransomware business model
    • Cryptomining in all its forms
    • How to keep your business safe from cyber-extortion
  • Use In-Sprint Test Automation to Continuously Test at the Speed of Agile
    Use In-Sprint Test Automation to Continuously Test at the Speed of Agile Alex Martins, CA Technologies Oct 24 2018 8:00 am UTC 62 mins
    What's keeping you from testing continuously within sprints?

    As your organization adopts test-driven, agile development methods, you’ll want to automate testing even more so you’re not lagging behind the development sprint.

    Join this web seminar to learn how to use in-sprint test automation related practices around requirements engineering, test design automation and test case optimization to help you test at the speed of agile – thus, allowing you to:

    - Shift testing all the way to the left—to your business requirements design phase
    - Automatically generate test automation scripts for both open source and commercial frameworks
    - Achieve maximum coverage with the smallest set of test cases, directly from clearly modeled requirements
  • Container Connection Live! Morning Sessions
    Container Connection Live! Morning Sessions Dan Walsh | Brian Harrington | Eric Jacobs | Chris Morgan | Thomas Cameron | Ken Chenis | Timothy Hunt Oct 24 2018 1:00 pm UTC 225 mins
    Connect with Red Hat and Intel for an information-packed day focused on all things containers—current trends, key benefits, best practices, and how containers can help evolve your infrastructure.

    Agenda:
    9:00–10:05 a.m. | How a modern IT infrastructure can make disruption an opportunity
    10:20–11.00 a.m. | Container Adoption at Scale
    11:00–11:30 a.m. | Risk analytics for real-time fraud detection on OpenShift
    11:30 a.m.–12:15 p.m. | OpenShift architecture 101

    (All times above in Eastern Time and are approximate)
  • Top 5 Office 365 Backup Concerns - Best Practices for Protecting Your Data
    Top 5 Office 365 Backup Concerns - Best Practices for Protecting Your Data Sarah Beaudoin, Product Marketing Manager, Druva Oct 24 2018 1:00 pm UTC 45 mins
    As organizations continue to migrate to Office 365 for their email, productivity and collaboration tools, they’re quickly realizing that Office 365’s native capabilities do not provide the essential data protection capabilities they need.

    Join us for a technical webinar on Tuesday, August 21st at 3PM SGT/ 5PM AEST and learn best practices for safeguarding your Office 365 data, including:
    - Gaps within OneDrive, Exchange Online and SharePoint Online that lead to increased risk of data loss
    - How a third party backup solution can automate data protection and ensure data recoverability from user error, malicious behavior or malware
    - How to build a data management strategy for the future that leverages the cloud and improves alignment with organizational policies and SLAs
  • Nutanix Files: Simple, Scalable, and Reliable File Storage for Citrix EUC
    Nutanix Files: Simple, Scalable, and Reliable File Storage for Citrix EUC Kees Baggerman,EUC Technical Director Nutanix & Dave Brear,Enterprise Architect EMEA Professional Services Citrix UK Oct 24 2018 1:00 pm UTC 50 mins
    The benefits of a modern digital workspace are well documented; but not all solution stacks are created equal.

    Join Nutanix EUC Technical Director, Kees Baggerman and Dave Brear,Enterprise Architect, Citrix Professional Services, as they discuss how Citrix EUC with Nutanix Files, which is natively integrated into the Nutanix Enterprise Cloud OS, eliminates costs and complexities at any scale to successfully deliver a modern digital workspace.


    In this webinar, attendees will learn:

    1. What is Nutanix Files?
    2. Why is Nutanix Files applicable to Citrix EUC environments and its successful deployment?
    3. Best practices to integrate and deliver Nutanix Files in Citrix EUC environments.
  • Container Connection Live! Afternoon Sessions
    Container Connection Live! Afternoon Sessions Dan Walsh | Brian Harrington | Eric Jacobs | Chris Morgan | Thomas Cameron | Ken Chenis | Timothy Hunt Oct 24 2018 5:00 pm UTC 240 mins
    Connect with Red Hat and Intel for an information-packed day focused on all things containers—current trends, key benefits, best practices, and how containers can help evolve your infrastructure.

    Agenda:
    1:00–1:45 p.m. | 10 layers of container security
    1:45–2:30 p.m. | Container supply chain
    2:50–3.30 p.m. | Bringing Istio to OpenStack: Mesh expansion across OpenStack instances
    3:30–4:15 p.m. | Ask the experts panel

    (All times above in Eastern Time and are approximate)
  • NVMe and Flash – Make Your Storage Great Again!
    NVMe and Flash – Make Your Storage Great Again! Alfons Michels, Sr. Product Marketing Manager - DataCore Software Oct 24 2018 5:00 pm UTC 60 mins
    NVMe and all-flash systems can solve any performance, floor space and energy problems. At least this is the marketing message many vendors and analysts spread today – but actually, sounds too good to be true, right?

    Like always in real life, there is no clear black or white, but some circumstances you should be aware of – especially if you intend to leverage these technologies.
    You may ask yourself: Do I need to rip and replace my existing storage? What is the best way to integrate both? What benefits do I receive?

    Well, just join our brief webinar, which also includes a live demo and audience Q&A so you can get the most out of these technologies, make your storage great again and discover:
    • How to integrate Flash over NVMe in real life
    • How to benefit of some Flash/NVMe for your entire applications
  • Evolving Data Protection from Backup to Copy Data Management
    Evolving Data Protection from Backup to Copy Data Management Storage Switzerland and Hitachi Oct 24 2018 5:00 pm UTC 60 mins
    Copy Data Management promises to not only improve the data protection process, it promises to provide value to the organization even without a looming disaster. It can reduce storage costs by presenting virtual copies of data to test/dev, analytics and reporting. It also can make sure those copies are refreshed so those use cases are always dealing with the latest copy of data.

    Join Storage Switzerland and Hitachi Vantara for our live panel discussion where we will show how copy data management better protects the organization and makes protection more than an insurance policy by adding value to the organization. We’ll show how Copy Data Management can reduce the cost of storage throughout the data center while at the same time improving processes like test/dev, analytics and reporting. Finally we’ll also explain why copy data management solutions may actually be better at protection since they store data in its native form, enabling it to be recovered more quickly.

    The webinar will also include a live demo of Hitachi’s Data Instance Director. See Copy Data Management in action!
  • DAMA Webinar:Turn Grand Designs into a reality with Data Virtualization
    DAMA Webinar:Turn Grand Designs into a reality with Data Virtualization Becky Smith, Senior Product Marketing Manager, Denodo Oct 24 2018 11:30 pm UTC 60 mins
    What started to evolve as the most agile and real-time enterprise data fabric, data virtualization is proving to go beyond its initial promise and is becoming one of the most important enterprise big data fabrics.

    Attend this session to learn:

    - What data virtualization really is,
    - How it differs from other enterprise data integration technologies
    - Real-world examples of data virtualization in action from companies such as Logitech, Autodesk and Festo.
  • The ONE complete digital workspace is here: All apps and data unified and secure
    The ONE complete digital workspace is here: All apps and data unified and secure Mark Bowker, Sr. Analyst, ESG; P.J. Hough, Chief Product Officer, Citrix Oct 25 2018 10:00 am UTC 48 mins
    Just a few short months ago, Citrix announced the unveiling of the industry’s first digital workspace to enable people-centric computing within organizations. Join us for this webinar and learn how the new Citrix Workspace unifies and secures all apps and content for all devices.

    Discover how Citrix Workspace:

    • Delivers a consistent and unified experience across all devices and provides users SSO access to virtual apps, desktops, mobile apps, SaaS apps and their data
    • Extends the perimeter into cloud apps and across multiple devices and networks
    • Automates image management and provisioning to move workloads from datacenters to any cloud
    • Enables choices of devices from a single endpoint management solution
    • Provides user-centric analytics combined with machine learning to provide actionable intelligence to manage threats
    • Improves the experience of mobile apps with secure email integrated with Slack
  • Trust No One Part 1: Exploring Zero Trust Security Models
    Trust No One Part 1: Exploring Zero Trust Security Models Lindsay Drabwell, Head of Membership, (ISC)² EMEA, Wendy Nather, Director, Advisory CISO, Richard Archdeacon, Advisory CISO Oct 25 2018 1:00 pm UTC 60 mins
    Although “zero trust” is a popular term for the alternative security model that everyone’s talking about, it’s not always clear what it means, or whether it describes what policy changes you may want to make in your organisation.
    Join Wendy Nather and Richard Archdeacon to find out more about Zero Trust Security models, implemented by Google in their BeyondCorp initiative.

    Register for Part 2 in the Zero Trust Series: https://www.isc2.org/News-and-Events/Webinars/EMEA-Webinars?commid=334792&Part1
  • Extending RDMA for Persistent Memory over Fabrics
    Extending RDMA for Persistent Memory over Fabrics Tony Hurson, Intel; Rob Davis, Mellanox; John Kim, Mellanox Oct 25 2018 5:00 pm UTC 75 mins
    For datacenter applications requiring low-latency access to persistent storage, byte-addressable persistent memory (PM) technologies like 3D XPoint and MRAM are attractive solutions. Network-based access to PM, labeled here PM over Fabrics (PMoF), is driven by data scalability and/or availability requirements. Remote Direct Memory Access (RDMA) network protocols are a good match for PMoF, allowing direct RDMA Write of data to remote PM. However, the completion of an RDMA Write at the sending node offers no guarantee that data has reached persistence at the target. This webcast will outline extensions to RDMA protocols that confirm such persistence and additionally can order successive writes to different memories within the target system.

    The primary target audience is developers of low-latency and/or high-availability datacenter storage applications. The presentation will also be of broader interest to datacenter developers, administrators and users.
  • Big Data Analytics: What is Changing and How Do You Prepare?
    Big Data Analytics: What is Changing and How Do You Prepare? Ivan Jibaja, Tech Lead, Pure Storage; Joshua Robinson, Founding Engineer, FlashBlade, Pure Storage Oct 25 2018 5:00 pm UTC 46 mins
    Learn the origin of big data applications, how new data pipelines require a new infrastructure toolset and why both containers and shared storage are the fundamental infrastructure building blocks for future data pipelines.

    We will first discuss the factors driving changes in the big-data ecosystem: ever-greater increases in the three Vs of data volume, velocity, and variety. The data lake concept was originally conceived as a single location for all data, but the reality is that multiple pipelines and storage systems quickly lead to complex data silos. We then contrast the legacy Hadoop applications, which are built only for volume, and the next generation of applications, like Spark and Kafka, which solves for all three Vs. Finally, we end with how to build infrastructure to support this new generation of applications, as well as applications not yet in existence.

    About the Speakers:

    Ivan Jibaja, Tech Lead, Pure Storage Ivan Jibaja is currently a tech lead for the Big Data Analytics team inside Pure Engineering. Prior to this, he was a part of the core development team that built the FlashBlade from the ground-up. Ivan graduated with a PhD in Computer Science from the University of Texas at Austin, with a focus on systems and compilers.

    Joshua Robinson, Founding Engineer, FlashBlade, Pure Storage Joshua builds Pure's expertise in big-data, advanced analytics, and AI. His focus is on organizing a cross-functional team, technical validation, performance benchmarking, solution architectures, collecting customer feedback, customer consultations, and company-wide trainings. Joshua specializes in several data analytics tools, including Hadoop, Spark, ElasticSearch, Kafka, and TensorFlow.
  • Cloud Modernization with Data Virtualization - A Case Study by TransAlta
    Cloud Modernization with Data Virtualization - A Case Study by TransAlta Paul Moxon, VP Data Architecture and Chief Evangelist, Denodo and Alejandro Ocando, System Analyst , TransAlta Oct 25 2018 7:00 pm UTC 60 mins
    TransAlta is an electric power generator company headquartered in Calgary, Alberta. TransAlta developed a Energy Trading and Risk Management System (ETRM) for hourly energy pricing, but business users needed the ETRM data to be blended with many other sources of data in near real-time. At the same time TransAlta's IT department wanted to move their entire data layer to the cloud for flexibility, agility and lower TCO. Data virtualization technology played a central role in TransAlta's real-time data integration, while helping them move to the cloud with zero down-time. Attend this webinar to learn:

    * Who is TransAlta and why data driven insight is critical for their energy trading system
    * Why Data Virtualization played a critical role in TransAlta's cloud modernization effort
    * How Data Virtualization offers a faster and better data integration over legacy systems
  • Protégez votre entreprise contre les ransomwares avec Rubrik
    Protégez votre entreprise contre les ransomwares avec Rubrik Gatien Gheza, Systems Engineer, Rubrik France Oct 26 2018 9:00 am UTC 39 mins
    Participez à ce webinaire pour découvrir comment Rubrik Radar peut vous aider à renforcer les défenses de votre entreprise face aux attaques de sécurité.

    À l'heure où les attaques de ransomwares s'intensifient et continuent à se sophistiquer, les assaillants ne cessent de passer à travers les mailles du filet.

    Durant ce webinaire, Gatien Gheza, Sales Engineer, proposera une démo live de Radar : l'occasion de découvrir comment ce nouvel outil permet aux entreprises de réagir plus rapidement aux attaques de sécurité grâce à une connaissance approfondie des attaques et de leur impact sur les données d'applications stratégiques.

    Participez à notre webinaire pour en savoir plus sur la défense multiniveau de Radar :

    Surveillance – détection des anomalies grâce à des modèles de machine learning
    Analyse – diagnostic rapide de l'impact des menaces grâce à la data intelligence
    Reprise – minimisation de l'impact sur les activités et les pertes de données grâce à une reprise simplifiée
  • Migrate PC & Mobility with Unified Endpoint Management
    Migrate PC & Mobility with Unified Endpoint Management Suzanne Dickson Sr. Dir. Product Marketing, Mobility Citrix; Amandeep Nagra Sr. Product Marketing Manager, Citrix Oct 26 2018 10:00 am UTC 53 mins
    Windows 10 and the proliferation of BYO devices introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embrace unified endpoint management (UEM) to solve the challenges of managing PC, IoT and mobile devices with a centralized solution to manage and secure endpoints.

    Register for this webinar to hear from Suzanne Dickson, Sr. Director, Product Marketing and Citrix Workspace Product Marketing Expert, Amandeep Nagra on how to manage and secure your endpoints.

    This session will address how UEM helps solve challenges of traditional client management in the context of the new digital workspace. Learn more about:

    • UEM and how it fits into a Digital Workspace
    • Managing endpoints through Citrix UEM
    • The future of Citrix UEM
  • Secure the Cloud: Combat the Top Threats to Your SaaS Applications
    Secure the Cloud: Combat the Top Threats to Your SaaS Applications Sonu Shankar - Sr. Product Marketing Manager - Arctic Wolf Networks Oct 26 2018 8:00 pm UTC 60 mins
    Organizations of all sizes are increasingly adopting cloud services to transform business processes. Unfortunately, the cloud also brings serious security concerns. SaaS applications add new attack surfaces beyond the traditional network perimeter, with employees accessing business data on various devices and from multiple locations.

    In this borderless ecosystem, adopting a fragmented approach to securing on-premises infrastructure, endpoints, and cloud resources, like SaaS apps, has proven to be dangerously ineffective. As early as 2016, the average business experienced around 23 cloud-based security incidents each month. That number is rapidly rising, indicative of the need for a new, centralized approach to security.

    While larger enterprises can achieve comprehensive coverage across cloud and on-premises resources with a 24x7 security operations center (SOC), smaller businesses may be leaving their critical infrastructure exposed. Without the resources to build an in-house SOC, or the ability to hire a large internal team of security experts to operate the SOC, what can you do to secure your data and network infrastructure?

    In this Arctic Wolf webinar, we dive into:

    - The top cyber threats relevant to your SaaS applications today

    - A detailed, step-by-step walk thru of what it takes to secure the use of SaaS apps, and

    - How all businesses can cost-effectively implement centralized threat detection

    Register now to save your seat!
  • The Elephant in the Datacenter - Protect, Manage, & Leverage Unstructured Data
    The Elephant in the Datacenter - Protect, Manage, & Leverage Unstructured Data Storage Switzerland and Igneous Oct 29 2018 5:00 pm UTC 60 mins
    IT is facing new challenges in managing unstructured data. Organizations want to store more unstructured data and keep it longer for future analysis. However, the protection and retention methods of traditional backup and archive solutions are not keeping pace with new volumes of unstructured data, nor are they able to meet new business expectations. Given the growth in terms of quantity, total capacity, and criticality of unstructured data, IT needs to fundamentally change how it protects, manages, and leverages unstructured data.

    Join Storage Switzerland and Igneous for a live webinar, where we will dive into the results of a recent survey on the impact of unstructured data management and its challenges on organizations. During the webinar, we will discuss best practices that organizations like yours can implement to effectively manage the unstructured data elephant.

    Key Webinar Takeaways - The True Value of Unstructured Data - The Challenges Unstructured Data Creates - Best Practices for Protection, Management, and Monetization
  • Deliver Better Software Faster with Continuous Testing
    Deliver Better Software Faster with Continuous Testing Steve Feloney, VP Product Management CA Technologies Oct 30 2018 9:00 am UTC 49 mins
    To compete successfully in today’s economy, companies from all industries require the ability to deliver software faster, with higher quality, and reduced risk and costs. This is only possible with a modern software factory that can deliver quality software continuously. Yet for most enterprises, testing has not kept pace with modern development methodologies. A new approach to software testing is required: Continuous Testing.

    In the first session in a series, join product management leadership to gain in-depth insights on how by shifting testing left, and automating all aspects of test case generation and execution, continuous testing, it enables you to deliver quality software faster than ever.
  • The SecOps Imperative: How to Bridge the Security and Operations Gap
    The SecOps Imperative: How to Bridge the Security and Operations Gap Lindsay Drabwell (ISC)², Tristan Morris, Stacia Tympanick Carbon Black Oct 30 2018 2:00 pm UTC 60 mins
    According to ESG research, 72% of organizations believe that security operations are more difficult now than they were two years earlier.
    This stems from security and IT operations teams lacking a reliable way to assess the current state of endpoints across their enterprise and leads to an increased risk of breaches, an inability to make informed remediation decisions, and unnecessary spending on infrastructure maintenance.
    On this webinar we look at the current need to bridge the gap between Security and IT Operations with shared toolsets and shared goals, why IT hygiene and proactive vulnerability assessments are now vital aspects of any successful endpoint security program and how to leverage real-time query and remediation tools to better understand the state of endpoints.

    Key takeaways:

    •How businesses can understand and adopt a SecOps strategy
    •How you can leverage real-time query and remediation tools to get a better understanding of the current state of your endpoints
    •The need to bridge the gap between security and IT operations and with shared toolsets, shared goals and shared priorities

    Tristan Morris – Security Strategist, Carbon Black
    Stacia Tympanick – Solution Engineer, Carbon Black
  • Accelerating Global Operations with a Business-driven SD-WAN
    Accelerating Global Operations with a Business-driven SD-WAN Derek Granath, VP Product Marketing, Silver Peak; Greg Taylor, Head of IT infrastructure, Gerresheimer AG; Sab Gosal, Intel Oct 30 2018 3:00 pm UTC 60 mins
    Today’s digitally-driven business model, the rapid adoption of cloud services and shifting traffic patterns are causing IT professionals to re-evaluate WAN architecture. In parallel, there is increasing pressure on enterprise IT to enhance business agility by bringing new sites and new applications online more quickly.

    Software-defined Wide Area Networks (SD-WAN) provide an entirely new, business-driven approach to the WAN. They enable active, secure use of multiple forms of transport services, including broadband, to connect users to applications – wherever they reside. This not only improves application performance but also increases resiliency. Centralized orchestration and zero-touch provisioning greatly simplify the tasks of deploying new sites or applications, often eliminating the requirement to send IT experts out to branch locations.

    This webinar will reveal how an advanced business-driven SD-WAN can become a strategic accelerant for an enterprise’s digital transformation initiatives. You will learn how Gerresheimer, a global manufacturer of specialty glass products, deployed the Silver Peak EdgeConnect SD-WAN platform to augment MPLS with lower cost, high speed broadband services to achieve a 2x to 3x increase in application performance while lowering overall bandwidth costs. Greg Taylor, Head of IT Infrastructure, will describe how adopting a business-driven SD-WAN delivers a better, more predictable and consistent quality of experience for Gerresheimer employees around the world.
  • Redefining Storage for the Post-Data Lake Era
    Redefining Storage for the Post-Data Lake Era Roy KIm, FlashBlade Product & Solutions Marketing, Pure Storage Oct 30 2018 4:00 pm UTC 14 mins
    Data is the fuel for the modern enterprise. Yet most data is stored in silos, out of reach of analytics and AI applications. The storage industry is largely to blame for offering legacy solutions like data lake and data silos that lock them away. It’s time for the storage industry to step up and deliver a fresh architecture for the modern era. At Pure Storage, we call this new architecture, data hub. Listen in and learn more.
  • Use In-Sprint Test Data to Help Relieve Your DevOps Bottleneck
    Use In-Sprint Test Data to Help Relieve Your DevOps Bottleneck Jeff Hughes, Continuous Testing – CA Technologies Oct 30 2018 5:00 pm UTC 60 mins
    What's keeping you from testing continuously within your sprints? Learn how to find, reserve and use the right test data to help you test at the speed of agile and allow your teams to lead rather than follow each sprint.
  • Get off Your Lazy NAS by Transforming Your Data Management Strategy
    Get off Your Lazy NAS by Transforming Your Data Management Strategy Stefaan Vervaet, Sr. Director, DCS Solutions & Alliances, Western Digital; Krishna Subramanian, COO, Komprise Oct 30 2018 5:00 pm UTC 30 mins
    NAS is essential to your IT environment, but a lazy NAS can hurt performance, cause you extra work and bust your budget.

    Join experts from Western Digital and Komprise to learn how to transform your data management strategy by gaining visibility and an understanding of your data, automating the movement of inactive data to less expensive storage and optimizing your storage environment.

    In this webinar you’ll learn how to:
    •Increase NAS performance
    •Free up NAS capacity
    •Reduce costs by up to 50% or more
    •Reduce backup times by up to 60 percent or more

    A small investment of time can deliver BIG cost savings!
  • Frost & Sullivan TCO Analysis: Building Your Own SOC vs. Buying SOC-as-a-Service
    Frost & Sullivan TCO Analysis: Building Your Own SOC vs. Buying SOC-as-a-Service Michael Suby, VP, Research & Development - Frost & Sullivan & Louis Evans, Product Marketing Manager - Arctic Wolf Networks Oct 30 2018 6:00 pm UTC 60 mins
    For modern businesses, a Security Operations Center (SOC) is no longer an option. It is a necessity. But building and maintaining a fully functional SOC is a daunting proposition. Cost is a top consideration, driven overwhelmingly by a SOC’s need for a high number of in-demand security experts. Hiring, training, and retaining the necessary talent to staff a SOC is flatly impractical for many businesses.

    Fortunately there is a viable alternative to a DIY SOC: SOC-as-a-Service.

    In this webinar, Michael Suby, VP of Research at Frost & Sullivan, will highlight the compelling value proposition of SOC-as-a-Service compared to building and maintaining an in-house SOC. Included in this webinar are:

    - Real-world use cases of businesses subscribing to SOC-as-a-Service
    - Head-to-Head quantitative cost comparisons between SOC-as-a-Service and DIY SOC
    - Attributes to demand in a SOC-as-a-Service offering

    About our key speaker:

    A 17-year veteran at Frost & Sullivan, Michael Suby, VP of Research, has concentrated on the evolving threat landscape, practices, and technologies in cybersecurity. Quick to engage on risk and response, Mr. Suby habitually examines emerging cybersecurity technologies before they reach mainstream. Recent examples include server-less security, deception, dynamic defenses, content disarm & reconstruct, remote browser isolation, and cloud access & security brokers (CASB). In partnership with a team of highly experienced cybersecurity analysts at Frost & Sullivan, Mr. Suby is also intimately involved in researching how traditional cybersecurity solutions and platforms are addressing the diverse challenges and pressures encountered by IT and security practitioners.
  • (Replay) How to Modernize your Private Cloud
    (Replay) How to Modernize your Private Cloud Vaughn Stewart, VP of Technology at Pure Storage Oct 30 2018 10:00 pm UTC 45 mins
    Pure Storage presents how to simplify private cloud operations with FlashStackTM. During this presentation, Pure Storage will discuss the advantages of FlashStack including:

    - Why clouds providers deploy disaggregated architecture and the benefits compared to hyper-converged
    - Evergreen Storage as a Subscription
    - Operational simplicity enabled by a no trade-off storage architecture
    - How to meet the performance and availability needs of tier-1 workloads at they price point of tier-2 VMs simultaneously from a single platform
    - How operational simplicity allows cloud admins to manage storage in a cloud infrastructure
    - Discuss the depth of Pure's integrations with vSphere and Public Cloud providers