Hi [[ session.user.profile.firstName ]]

Virtualization

  • The SIEM That Gives SIEM a Good Name
    The SIEM That Gives SIEM a Good Name Lindsay Drabwell, Head of Membership Services EMEA, (ISC)², Avi Chesla, CTO and Founder, empow Recorded: May 22 2018 59 mins
    In their attempt to defend against the increasing volume of advanced attack campaigns, organisations are buying more and more security solutions, unwittingly creating a complex and cumbersome cybersecurity architecture.
    SIEM systems were supposed to be the industry’s solution to this problem, but they have failed miserably. Today’s SIEM systems create more problems than they solve, are very expensive, and ultimately ineffective.

    This webcast led by Avi Chesla, empow founder and CTO, will review the evolution of SIEM technology over the years, the fundamental flaws in its design, and why it has failed. He will then dive into the technology behind next-generation SIEM, and the major role played by AI in it, so that InfoSec teams can cut through the noise in the cybersecurity arena and effectively evaluate the next wave of solutions: SIEM that finally works for you, instead of the other way around.
  • An Introduction to Data Virtualization
    An Introduction to Data Virtualization Ravi Shankar, Chief Marketing Officer, Denodo and Danny Thien, Senior Data Architect, Denodo Recorded: May 22 2018 59 mins
    According to Gartner "Through 2020, 50% of enterprises will implement some form of data virtualization as one enterprise production option for data integration". That defines how data virtualization has become an undeniable driving force for companies to implement an agile, real-time and flexible enterprise data architecture.

    Attend this session to learn:

    -Fundamentals of data virtualization and how it differs from traditional data integration approaches
    -The key patterns and use cases of Data Virtualization
    -What to expect in subsequent sessions in the Packed Lunch Webinar Series, which will take a deeper dive into various challenges solved by data virtualization in big data analytics, cloud migration and various other scenarios

    Agenda:
    -Introduction & benefits of DV
    -Summary & Next Steps
    -Q&A
  • Cloud Bursting with One-Click Simplicity
    Cloud Bursting with One-Click Simplicity Karthik Balachandran, Technical Solutions Leader, Aviatrix; Chris Brown, Solutions Marketing Manager, Nutanix Recorded: May 17 2018 39 mins
    Using the public cloud for temporary or elastic workloads enables flexibility and agility to address today’s enterprise compute needs. Implemented correctly, a hybrid architecture assures cloud-like responsiveness that pleases end users while maintaining the procedures that any well-run organization needs. However, implemented poorly or left to individuals, it becomes a budgetary and security exposure, frustrating the user and putting the company at risk.

    Join Nutanix and Aviatrix and learn how Calm and Aviatrix’ Cloud Networking solution will simplify and automate the placement of applications and temporary workloads in to the Public Cloud (Amazon Web Services, Google Cloud Platform, and Azure). With Aviatrix and Nutanix the cloud becomes a seamless extension of your datacenter allowing you to use the cloud when it is needed and bring workloads back on premises where it makes sense. Learn how Nutanix and Aviatrix are making the cloud, and networking to it, as invisible as Nutanix has made virtualization and storage in your data center.
  • Hybrid Defense: How to Defeat 2018's Biggest Threats
    Hybrid Defense: How to Defeat 2018's Biggest Threats Louis Evans, Product Marketing Manager - Arctic Wolf Networks Recorded: May 17 2018 32 mins
    There’s one certainty in cybersecurity: 2018's attacks are going to be even worse than the ones we've faced. So, how are cybersecurity experts and vendors gearing up to meet these new threats?

    In this webinar, we’ll touch on major industry trends like User Behavior Analytics and automated incident response, and take a deep dive into how three key innovations—hybrid AI, hybrid cloud security, and hybrid IT teams—are enabling even cash-strapped organizations to deploy world-class defenses.

    We’ll discuss how:

    - Human-AI hybrid solutions deliver security that’s more than the sum of its parts
    - SIEM solutions are rising to the challenge of new hybrid-cloud architectures for business
    - Expert-as-a-service solutions are transcending the challenges posed by both in-house and traditional consulting staffing strategies

    To see how you can beat the big threats of 2018, register now!
  • Valuable Metrics & Monitoring for Business Critical Systems
    Valuable Metrics & Monitoring for Business Critical Systems Jonas Mason, Principal Architect; Jim Hannan, Principal Architect Recorded: May 17 2018 44 mins
    The process of establishing performance benchmarks and baselines is invaluable when it comes to understanding the health of your environment, and becomes even more crucial when dealing with business critical systems. In this session we will provide further insights regarding the importance of effective monitoring and metrics and how they can help you respond proactively to performance issues. We will also discuss best practices for monitoring and metrics as related to physical and virtual servers, storage, and databases.

    You’ll leave with a better understanding of key considerations for determining performance baselines and benchmarks; the various categories of metrics and monitoring tools; a list of recommended reports, tools, and software; and best practices for gaining insights into the performance of your business critical systems.
  • Accudata's White-Hat Files | May 2018 Edition
    Accudata's White-Hat Files | May 2018 Edition Josh Berry, CISSP & OSCP, Principal Consultant for Risk & Compliance Recorded: May 17 2018 16 mins
    Welcome to the White Hat Files – a monthly series where the best white hat hackers give you what you need to know about the threat landscape.

    Our first White Hat File comes from Josh Berry, who holds OSCP, CISSP, and GIAC certifications.
    In this 15-minute webinar, he’ll give you the rundown on Accudata’s most-seen vulnerabilities, as well as best practices you can use to defeat attackers looking to dissect and destroy your business.

    Join us for our next edition in June! Register here: https://www.brighttalk.com/webcast/16347/322209?utm_source=Accudata+Systems&utm_medium=brighttalk&utm_campaign=322209
  • GDPR: Have Questions? Ask the Experts!
    GDPR: Have Questions? Ask the Experts! Sacha Dawes Principal Product Marketing Manager, AlienVault Recorded: May 17 2018 63 mins
    The GDPR, or General Data Protection Regulation, will come into force on 25 May 2018 and has spurred many questions for IT teams trying to get up to speed on what the new regulation will require and how to achieve compliance in the most efficient way.

    Join this webcast with John McLeod, AlienVault's CISO, and Dan Stocker, Coalfire's Practice Director of Cloud & Tech, to walk through frequently asked questions and best practices for GDPR compliance. John and Dan have been immersed in GDPR compliance efforts over the last several months and can share what they have learned, and answer your burning questions. The presenters will cover:

    - What is GDPR and who is affected?
    - How will GDPR impact organizations outside the EU?
    - What is meant by personal data in the context of GDPR?
    - What are some of the steps and effective tools you need to comply?
    - What should your incident response plan look like in the event of a breach?
    - What happens to companies that fail to comply?

    We'll wrap up with a brief demo of the AlienVault Unified Security Management (USM) platform to illustrate how AlienVault can help accelerate and simplify your path to compliance.

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager, AlienVault

    Sacha has over 15 years of experience in technology and information security across product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he delivered solutions to address the IT security, identity and management space. Before joining AlienVault, he worked in the office of the EVP for Cloud and Enterprise business at Microsoft. Originally from the UK, Sacha is based in Austin TX and holds a Masters in Computer Science from Vanderbilt University.
  • Verizon Risk Report - Streamline Security with Actionable Insights
    Verizon Risk Report - Streamline Security with Actionable Insights Katie Crammer, Director, Verizon Global Security Solutions Recorded: May 17 2018 39 mins
    Please join Katie Crammer, Director of Global Security Solutions as she provides an in-depth conversation about a new powerful tool to help enterprises quantify cyber risk and ROI.

    Enterprises routinely struggle to correlate security-related costs with cyber risks and have difficulty determining their security ROI and measuring their security posture. The Verizon Risk Report provides a comprehensive, automated, 360-degree security risk posture assessment, updated daily. The report provides a security score by measuring outside security posture against peers, evaluates control effectiveness, exposes gaps, weaknesses and associated risks, yielding actionable recommendations for mitigating real and likely risks.
  • Introducing Zerto Virtual Replication 6.0 - Solve for Multi-Cloud
    Introducing Zerto Virtual Replication 6.0 - Solve for Multi-Cloud Robert Strechay - Senior VP Product, Zerto Recorded: May 17 2018 47 mins
    With the introduction of Zerto Virtual Replication 6.0, enterprises can now fully experience the true benefits that cloud technology has long promised.

    Listen in as Senior Vice President of Product, Rob Strechay reveals Zerto’s Game-changing technology so you can be ready to solve for cloud with a single solution.
  • DevOps : du code à la production
    DevOps : du code à la production Brice DEKANY, Ingénieur avant-ventes, SUSE Recorded: May 17 2018 51 mins
    Lors d’une rencontre avec les équipes développement de chez Experis-IT, SUSE présente les outils devops pour créer un pipeline d’intégration et déploiement continu (CI/CD).
    Git, Jenkins, Portus et Kubernetes : démonstration en live d’une modification de code et suivi de la chaine des outils pour construire une image Docker et le déployer sur un cluster de containers.
  • Overcoming the Five Distributed Data Protection Challenges
    Overcoming the Five Distributed Data Protection Challenges Storage Switzerland, Druva Recorded: May 16 2018 60 mins
    One of the biggest challenges facing IT today is how to effectively protect data distributed between offices and across clouds. Companies with remote and branch locations, and newly merged organizations are all at risk of losing their critical data or ending up with multiple disparate solutions, that are not integrated. This can leave them with data silos, lack of visibility and control over data, and creating risks and compliance issues.
  • Verizon Threat Research Advisory Center - Monthly Intel Briefing
    Verizon Threat Research Advisory Center - Monthly Intel Briefing John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: May 16 2018 73 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Mobile Security Index 2018 Highlights

    Our Verizon Threat Research Advisory Center presenters will be:

    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •John Pernini, Security Consultant, Investigative Response – Americas
    •Roy Porter, Senior Analyst, Threat Intelligence

    This month we'll be covering mobile device security threats by featuring the Verizon Mobile Security Index (MSI) 2018. Mobile devices are an appealing target—there are more of them, they have access to more data, and they are critical to business operations. The MSI includes recommendations that can help strengthen your organization's mobile device security, to include security measures for your network, devices, applications, and people.

    For this month's MIB, we'll highlight findings within the MSI and provide insight and recommendations from our investigations and threat intelligence to help you improve your mobile device security and response posture.

    Following the MSI highlights, we'll cover the following topics:

    •Current Intelligence
    •Latest Malware Trends
    •Attacks and Threat Indicators
    •Significant Vulnerabilities

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • SUSE OpenStack Cloud 8 – driving the software-defined infrastructure of tomorrow
    SUSE OpenStack Cloud 8 – driving the software-defined infrastructure of tomorrow Matthew Johns, Product Marketing, SUSE & T.R. Bosworth, Senior Product Manager, SUSE Recorded: May 16 2018 56 mins
    Private clouds and software-defined infrastructure aren’t new concepts, but deployments can be costly and stressful. As one of the first vendors to release an enterprise-ready distribution of OpenStack, the open source cloud operating system, SUSE are well-known for making OpenStack easier to deploy than doing it yourself.

    Join the SUSE team at this webinar to hear about why software-defined infrastructure is important to all businesses today, and how the latest version of the SUSE OpenStack Cloud, can help businesses during the digital revolution of today. With a new deployment engine, enhanced support for software-defined networking, full support for bare metal provisioning and more, learn how SUSE OpenStack Cloud 8 delivers expanded interoperability, scalability and flexibility, enabling businesses to transform their IT to conquer.
  • Embracing the Journey to Digital Executive Leadership [Live Panel]
    Embracing the Journey to Digital Executive Leadership [Live Panel] Margaret Dawson, VP Product Marketing, Red Hat Recorded: May 16 2018 74 mins
    Digital transformation is the journey all organizations must go through to compete and win in today’s economy. It includes fundamental changes across the business and information technology. The hallmark of digital transformation is that software differentiates in ways it never has before, and technology is no longer about running the business-instead it creates competitive advantage.

    To attain digital leadership requires embracing a new generation of technology that encompasses real-time decision platforms, cognitive systems, and the Internet of Things, as well as new processes and cultural perspectives. Digital leaders move fast and embrace disruption both internally and externally. No wonder 90% of CEOs are changing the way they use technology to be successful, according to IDC Research.

    Join this spotlight overview and hosted panel discussion to hear insights from top executives.
  • Everything You Wanted To Know...But Were Too Proud To Ask - Storage Controllers
    Everything You Wanted To Know...But Were Too Proud To Ask - Storage Controllers Peter Onufryk, Microsemi, Craig Carlson, Cavium, Chad Hintz, Cisco, John Kim, Mellanox, J Metz, Cisco Recorded: May 15 2018 48 mins
    Are you a control freak? Have you ever wondered what was the difference between a storage controller, a RAID controller, a PCIe Controller, or a metadata controller? What about an NVMe controller? Aren’t they all the same thing?

    In part Aqua of the “Everything You Wanted To Know About Storage But Were Too Proud To Ask” webcast series, we’re going to be taking an unusual step of focusing on a term that is used constantly, but often has different meanings. When you have a controller that manages hardware, there are very different requirements than a controller that manages an entire system-wide control plane. From the outside looking in, it may be easy to get confused. You can even have controllers managing other controllers!
    Here we’ll be revisiting some of the pieces we talked about in Part Chartreuse [https://www.brighttalk.com/webcast/663/215131], but with a bit more focus on the variety we have to play with:
    •What do we mean when we say “controller?”
    •How are the systems being managed different?
    •How are controllers used in various storage entities: drives, SSDs, storage networks, software-defined
    •How do controller systems work, and what are the trade-offs?
    •How do storage controllers protect against Spectre and Meltdown?
    Join us to learn more about the workhorse behind your favorite storage systems.
  • Three Reasons Why Object Storage is the Best Defense against Ransomware Attacks
    Three Reasons Why Object Storage is the Best Defense against Ransomware Attacks Storage Switzerland, Cloudian Recorded: May 15 2018 63 mins
    In this live webinar, Storage Switzerland and Cloudian will discuss the three key reasons why object storage is a perfect defense against ransomware:
    * Immutability is built in - Data can’t be encrypted
    * Replication is built in - Data can be automatically sent off-site
    * Data Management is built in - Data can be archived from primary storage, limiting exposure
  • How strategic VCs are priming healthcare startups for success
    How strategic VCs are priming healthcare startups for success Daniel Galles, Partner, Providence Ventures Recorded: May 15 2018 61 mins
    The healthcare system feels as though it’s years behind, compared to other consumer-dominated industries, and for good reason. Fluctuating payment models, care structures, patient journeys, and shifting relationships between patients and their physicians have complex, ever-shifting barriers to implementing innovative solutions – and do it at scale.

    But the potential to disrupt healthcare with innovative solutions and technology at scale is huge. It just takes an astute venture capital partner who can help you navigate the complexities, paired with your own healthcare expertise. Join this webinar to learn how VC partnerships can help you navigate through the regulations and complicated nature of healthcare, and get your startup thriving.

    By attending this webinar, you’ll:

    * Learn what it takes for a startup to be successful in the highly complex and regulated healthcare industry
    * Gain perspective from established health tech CEOs
    * Understand the importance of having a strategic VC in an industry like healthcare
    * See what VCs are looking for in the healthcare and health tech categories

    Speakers:

    * Mike McSherry, CEO of Xealth
    * Daniel Galles, Partner, Providence Ventures
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Providence Ventures
  • Join the White-box Revolution
    Join the White-box Revolution Paul Stevens Marketing Director, Advantech and Yann Rapaport VP of Product Management, 6WIND Recorded: May 15 2018 56 mins
    This webinar will discuss how high performance networking software combined with commercial-off-the-shelf (COTS) edge servers and open management can offer real alternatives to expensive networking equipment.

    The webinar will cover:

    • How white box server solutions based on Intel Architecture scale from Customer Edge to Provider Edge
    • Physical constraints at the Edge and why location is so important
    vRouter use-cases
    • How to successfully replace Brocade Vyatta vRouters with 6WIND Turbo Router software appliances
  • How to protect VMs or Datastores
    How to protect VMs or Datastores Reduxio Systems Recorded: May 15 2018 2 mins
    A quick guide on how to protect virtual machines or a datastore using Quiescence policy in the Reduxio StorApp for VMWare vSphere v2.0.
  • 451 Research and Gemalto present "MSPs - Maximizing ROI with Security"
    451 Research and Gemalto present "MSPs - Maximizing ROI with Security" Gary Marsden, Senior Director of Data Protection Solutions at Gemalto and William Fellows, Research VP 451 Research Recorded: May 15 2018 60 mins
    Digital transformation is a critical part of an enterprise business strategy. However, for many organizations, having more digital assets introduces major headaches due to the complexity of technologies, the lack of available and affordable skills and the ever-changing security threat landscape. The ability to use cloud based solutions to service digital strategies is helping reduce costs but is also increasing risks, isolating data and reducing controls.

    Many MSPs have recognized this as an opportunity and are building business plans and service strategies to help their customers. Being the one-stop shop for applications, cloud services and related security aspects is a path that is actively being trodden by MSP’s, MSSP’s and traditional resellers alike. According to 451 Research, it is about a “sell with” approach by addressing business requirements with security “built-in”. In this joint webinar, our guest William Fellows, 451 Research analyst will provide new research results this related data points and discuss how the cloud is creating opportunities as well as challenges. The interactive Q&A style webinar will cover:

    • A current view of the cloud’s impact on digital transformation
    • Opportunities for MSPs to expand service portfolios and generate new revenue streams
    • What a true “sell with” partnership looks like
    • Technology enabling this new sales and marketing strategy for MSPs

    Presenters:
    William Fellows is a co-founder of The 451 Group. As VP of Research, he is responsible for the Cloud Transformation Channel at 451 Research.

    Gary Marsden: Senior Director of Partnerships at Gemalto
  • Security as a Service: Bringing Security Into the DevOps Age
    Security as a Service: Bringing Security Into the DevOps Age Lindsay Drabwell, Head of Membership Services, (ISC)² EMEA, Josh Kirkwood, DevOps Security Lead, CyberArk Recorded: May 15 2018 45 mins
    DevSecOps seems to be the magic word, but for many people it may lack definition and clarity. During this presentation, Josh Kirkwood from the CyberArk DevOps team explains how normal security folk can become part of this revolution and start seeing how they can contribute to the velocity.
  • New Data Breach Findings: The Year of Internal Threats & Misplaced Data
    New Data Breach Findings: The Year of Internal Threats & Misplaced Data Jason Hart, CTO of Data Protection at Gemalto Recorded: May 14 2018 52 mins
    2018 has started off as an eventful year with data breaches at Saks Fifth Avenue, Lord & Taylor and Under Armour’s MyFitnessPal app. And it will continue to be a catalyst year for data security with the 25th of May deadline for the European Unions’ General Data Protection Regulation, which regards “privacy as a fundamental human right and to protect it as such.” Data exposed or breached is not only a headache for security teams, but also impacts brand reputation, customer confidence and stock prices.

    Gemalto’s 2017 Breach Level Index found 2.6 billion records where compromised in 2017, a 88% increase from 2016. In this webinar our expert, Jason Hart, will walk attendees through the most shocking 2017 stats, new data breach tactics and how companies can manage risk by mapping out where your data resides. Join us to learn more about:
    -Internal threats and misconfigured cloud databases
    -Growing security threats like data integrity attacks
    -Innovative technology that is solving some of these issues
    -What we have in store for 2018
  • An Introduction to MEF's SDN/NFV Professional Certification
    An Introduction to MEF's SDN/NFV Professional Certification Rick Bauer - Director of Certification, MEF Recorded: May 10 2018 72 mins
    In April 2018, MEF introduced its new MEF SDN/NFV professional certification. MEF-SDN/NFV is the first ISO-standard certification exam that validates professionals’ knowledge, skills, and abilities in the domains of software defined networking and network functions virtualization. This vendor-neutral certification empowers individuals with the know-how to plan, build, and operate complex SDN and NFV solutions.

    The webinar will cover:
    -Benefits of developing SDN/NFV networking skills
    -Industry involvement in developing the SDN/NFV certification curriculum
    -How this certification fits into MEF’s Professional Certification Framework and how to achieve the MEF Network Expert certification
    -Review of the current SDN/NFV blueprint
    -How to register for the certification beta exam
    -Options for preparing for the exam
    -Q&A

    This webinar is ideally suited for:
    -IT professionals
    -Telecom and Network Operators
    -System Administrators
    -Technical Support Professionals
    -Technical Marketing and Technical Sales Professionals
    -IT pros who need vendor-neutral, technology expensive skills to complement their vendor-specific network certifications
  • The Fastest path to SD-WAN Success for Service Providers
    The Fastest path to SD-WAN Success for Service Providers Misbah Mahmoodi [VMware] Kangwarn Chinthammit [VeloCloud] Chris Lewis [Dell EMC] Recorded: May 10 2018 60 mins
    The software-defined wide area network (SD-WAN) market is booming and Service Providers are well positioned to take advantage of the robust demand. While SD-WAN can be a potential disruptor to a Service Providers’ current business model, it can be also be transformative, differentiating, and significantly expand revenue streams. But it poses a series of questions: What impact will SD-WAN have on the network and the highly successful Multi-Protocol Label Switching (MPLS) services operators are offering today? How is Network Functions Virtualization (NFV) laying the ground work to offer these new services, by taking advantage of automation in the network. This webinar is for Service Providers who want to differentiate their offerings to remain competitive in this new market landscape.
    Learn how operators can increase revenue, deliver advanced services and improve network agility with an Integrated SD-WAN solution.
    Together VMware, VeloCloud and Dell EMC will come together to discuss SD-WAN advancements and how Service Providers can monetize this emerging technology.

    What will we cover:
    •Market environment, emerging trends, and what is driving this shift.
    •The impacts of Network Functions Virtualization.
    •The intersect points with SD-WAN.
    •Adaptations that need to be made by Service Providers.
    •How Service Providers can grow revenue.

    Presenter information:
    - Misbah Mahmoodi, Director Product Marketing, Telco NFV, VMware
    - Kangwarn Chinthammit, Director Solution Architecture, VeloCloud
    - Chris Lewis, Senior Consultant, Product Management, Dell EMC
  • 7 Reasons to Choose SUSE for your Transition to SAP S/4HANA
    7 Reasons to Choose SUSE for your Transition to SAP S/4HANA Michael Tabron, Product Marketing Manager, SUSE May 22 2018 2:00 pm UTC 60 mins
    When you’re considering a move to SAP S/4HANA, you have decisions to make not only about your business processes but also in transitioning your infrastructure whether on-premise, in the cloud or a hybrid implementation.

    In this webinar Michael Tabron, SUSE Product Marketing Manager for SAP Solutions, will start with a brief overview of the reasons Digital Transformation has become a business imperative, and how SAP helps its customers address this challenge. Then he will give you 7 reasons why SUSE gives you the most complete and flexible platform regardless of how you choose to implement SAP S/4HANA.
  • HPE-Veeam advanced integration: Design for the Enterprise!
    HPE-Veeam advanced integration: Design for the Enterprise! Federico Venier - Technical Marketing Engineer May 22 2018 3:00 pm UTC 75 mins
    Learn how to take advantage of the new HPE + Veeam enterprise-class integration features. We will make a complete technical overview with a special focus on hardware snapshot orchestration with 3PAR and Nimble, ransomware protection, and cost reduction with StoreOnce deduplication.
  • Delivering Virtual Services to Enterprises from the Service Provider Cloud
    Delivering Virtual Services to Enterprises from the Service Provider Cloud Daniel Teichman,Sr Solutions Marketing Manager and Walter Kenrich, Director, Solutions Marketing [Ribbon Communications] May 22 2018 3:00 pm UTC 60 mins
    As the service provider adoption of network functions virtualization (NFV) continues, new business opportunities expand for Service Providers.

    This webinar will explore the rationale, value, and implementation options of using NFV and uCPE/vCPE models to deliver session border control (SBC) as a service.
  • Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
    Analyst Insights: Trends Driving the Need for a SOC-as-a-Service Mark Bouchard, Co-Founder and COO - CyberEdge Group & Narayan Makaram, Sr. Director, Product Marketing - Arctic Wolf Networks May 22 2018 6:00 pm UTC 60 mins
    Every company, regardless of size or industry, needs the advanced security capabilities provided by a security operations center (SOC). Until recently, only large enterprises had the means and resources to implement these essential technologies. So, where does that leave small to midsize enterprises (SMEs)?

    In this upcoming webinar, Tuesday, May 22, at 11am PT/2 pm ET, Co-founder and COO of CyberEdge Group, Mark Bouchard, will share insights on the cybersecurity challenges facing small to midsize enterprises (SMEs), drawing on data from the recently published 2018 Cyberthreat Defense Report. We will also hear from Sr. Director of Product Marketing of Arctic Wolf Networks, Narayan Makaram, on the SOC options available to SMEs and will help to identify the top 10 capabilities to look for in a SOC-as-a-service.

    By attending this webinar you will learn about:

    • Cybersecurity challenges facing the IT organization in small to midsize enterprises (SMEs)
    • Insights into what is driving the need for managed threat detection and response
    • The top 10 essential elements of a SOC-as-a-Service

    To discover how SMEs can get access to a SOC in the form of a SOC-as-a-service, register today!

    About our key speaker:

    Mark Bouchard, CISSP, is the Chief Operating Officer at CyberEdge Group, an award-winning research, marketing and publishing firm serving the needs of high-tech organizations worldwide. Before CyberEdge, Mark founded AimPoint Group, an independent IT research and consulting company specializing in information security. Prior to AimPoint Group, Mark was a Vice President at META Group (acquired by Gartner) where he helped hundreds of organizations worldwide address their IT challenges. A veteran of the U.S. Navy, Mark is passionate about ensuring the success of his clients.
  • SUSE Linux Enterprise 15 Beta – How to Migrate to SLE 15. (Technical Briefing)
    SUSE Linux Enterprise 15 Beta – How to Migrate to SLE 15. (Technical Briefing) Thorsten Kukuk, Senior Architect, SUSE May 23 2018 2:00 pm UTC 60 mins
    As a Beta participant you have enjoyed the experience of SUSE Linux Enterprise (SLE) 15. Now you must be exploring how to move from SLE 11 or SLE 12 to SLE 15. During this session, Senior Architect, Thorsten Kukuk, will do a technical deep dive and educate you about installation details and various options for upgrading to SLE 15. Bring your questions, learn from other Beta participants questions and participate in a lively Q&A session.
  • Accudata + Forcepoint Security Series | Risk-Adaptive Protection
    Accudata + Forcepoint Security Series | Risk-Adaptive Protection Bharath Vasudevan, Senior Director May 23 2018 4:00 pm UTC 30 mins
    What comes to mind when you hear “decision making based on calculated behavioral analytics”? It’s a pretty exciting concept–one that’s new to cyber security and one that Forcepoint does very well. Join our webinar to learn how risk-adaptive protection is helping organizations:

    - Continually improve security effectiveness through machine learning and AI
    - Better understand risky behavior
    - Automate policies
    - Dramatically reduce the quantity of alerts
    - Streamline and accelerate investigation of those alerts

    Tune in May 23!
  • Overcoming The 4 Data Protection Challenges of Hybrid IT
    Overcoming The 4 Data Protection Challenges of Hybrid IT Storage Switzerland, Micro Focus May 23 2018 5:00 pm UTC 60 mins
    Data protection is critical to data-driven organizations that are fully dependent on data for operations. The hybrid nature of the environment though makes protecting that much more challenging. Join us as we discuss exactly what Hybrid IT is, what it looks like and why data driven organizations are embracing it. Then we will discuss the data protection challenges that IT must overcome as they create a hybrid infrastructure.
  • Public Cloud is Here - Use it Wisely! Hybrid Cloud Strategy Lessons Learned
    Public Cloud is Here - Use it Wisely! Hybrid Cloud Strategy Lessons Learned Gordon Haff, Red Hat and Lauren Nelson, principal analyst serving infrastructure & operations professionals, Forrester May 24 2018 9:00 am UTC 75 mins
    For many firms, the migration to public cloud is well underway. Understanding what motivates these migrators and the challenges they face along the way can help you in your own journey.

    Join this webinar for a rare look into an emerging group and a glimpse into the future of public cloud. You'll hear about the results of a Forrester Consulting study, commissioned by Red Hat, that looks at these aspects of firms migrating to the cloud:

    > Their motivations and challenges.
    > The strategies they're adopting for migration.
    > What cloud migration in practice looks like.
  • Veeam & Quantum help you prepare for GDPR - Backup Best Practices
    Veeam & Quantum help you prepare for GDPR - Backup Best Practices Stephane Estevez, Quantum; Kevin Riding, Veeam May 24 2018 1:00 pm UTC 60 mins
    GDPR becomes enforceable on May 25 2018, and affects all companies with customers in the EU. Learn about the new legislation from Stephane Estevez, product manager at Quantum & Kevin Riding, alliances systems engineer at Veeam. They will explain considerations for GDPR and data backup including retention, security and protection. GDPR will become enforceable in 2018 - Quantum and Veeam's solution for data backups will help ensure you are ready for successful compliance.
  • Managing Massive Data Growth
    Managing Massive Data Growth Tyna Callahan - Scality, Yannick Guillerm - Scality, and Charles Tierney - HPE Storage May 24 2018 3:00 pm UTC 75 mins
    Managing Massive Data Growth. It’s true – it is all about you–your data that is. Several different trends have converged to accelerate the creation of valuable data, presenting new challenges to enterprise storage management teams. Many customers along with some analysts suggest object-based storage as a key element in managing the growth of data. What is it that they see in object storage? Join us as we discuss: Recent Trends leading data growth, the benefits of software-defined object storage features to consider, and real-world examples where object solutions are managing data growth issues.
  • Transforme la manera en la que despliega y entrega servicios en el Data Center
    Transforme la manera en la que despliega y entrega servicios en el Data Center Marco Bañuelos - SUSE Systems Engineer May 24 2018 3:00 pm UTC 75 mins
    ¿Pensando en Devops? Piense en SUSE.
    Para que las organizaciones se den cuenta del valor de una infraestructura definida por software, necesitan adoptar nuevas metodologías, como DevOps.

    SUSE no solo proporciona las tecnologías de infraestructura open source que necesita, sino que también compartimos las herramientas y el IP que estamos desarrollando y utilizando para DevOps (Open Build Service & openQA).

    Las soluciones de SUSE ayudan a respaldar su adopción de un modelo DevOps al proporcionar y respaldar las herramientas que necesita para transformar su infraestructura para administración del ciclo de vida de la aplicación, reduciendo el tiempo de comercialización, mejorando la eficiencia y satisfaciendo las cambiantes demandas comerciales.
  • Four Advanced Troubleshooting Tasks for Linux Experts and Beginners
    Four Advanced Troubleshooting Tasks for Linux Experts and Beginners Jennifer LuPiba, Principal Product Marketing Manager, Red Hat May 24 2018 6:00 pm UTC 60 mins
    In this webinar, we’ll walk you through 4 advanced troubleshooting use cases that simplify management for both the Linux® expert and the beginner.

    The Red Hat® Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more.

    No matter what stage you're in as a Linux user, join this webcast for an overview of how to take your troubleshooting to the next level.
  • Modern Vulnerability Management : Knowledge, Automation, Analytics 
    Modern Vulnerability Management : Knowledge, Automation, Analytics  Syed Abdur, Brinqa, Director of Product May 24 2018 6:00 pm UTC 60 mins
    With growing numbers of new vulnerabilities disclosed every year, increasing attacker sophistication, and a myriad of tools and teams that have to be synchronized for effective response, most organizations struggle with designing and implementing an effective vulnerability management program. In this webinar we discuss 3 key components that all modern vulnerability programs must address :

    - Knowledge: How to create actionable intelligence from business context, threat intelligence, and any other relevant data source
    - Automation: How to implement automation to streamline significant parts of the VM process
    - Analytics: How to effectively engage and inform all stakeholders
  • Multi-Cloud, Multi-Problems
    Multi-Cloud, Multi-Problems Mike Dahlgren, Senior Cloud Solution Architect, Red Hat May 29 2018 9:00 am UTC 75 mins
    Simplifying complex IT operations with automation & management

    IT operations is more complex than ever before. Automation and management are critical to keep pace and deliver business results.

    Join this webinar to learn how management, automation, and innovation address your hardest IT challenges:

    > Improving processes, migrating apps for optimization, and providing a single language for DevOps practices using agentless IT automation
    > Managing multicloud environments efficiently, securely, and with compliance to various standards
    > Easily and quickly building, developing, and deploying in nearly any infrastructure—on premise, in a public cloud, or hosted
  • Crypto Crime:  Hunting for Cryptocurrency Mining in Your Enterprise
    Crypto Crime: Hunting for Cryptocurrency Mining in Your Enterprise Lindsay Drabwell, Head of Membership Services, (ISC)² EMEA, Tom Kellermann, CISO, Rick McElroy, Sec. Strategist, Carbon Black May 29 2018 1:00 pm UTC 60 mins
    2018 is shaping up to be an important year for not just Bitcoin, but the many new cryptocurrencies that seem to be popping up by the day. Attackers have discovered that mining cryptocurrency can prove to be a very profitable endeavor if they can leverage someone else's computing resources.
    To ensure that organisations have full visibility into all activity in their environments, Tom Kellermann – Chief Security Officer and Rick McElroy – Security Strategist from Carbon Black will walk you through the key pointers you need to know about how to hunt for malicious mining malware in your enterprise and ensure your critical business resources aren't generating profit for the adversary on your dime.
    In this webinar you will hear all you need to know for a Cryptocurrency Mining 101, as well as learning about:
    •Monero - What is it, and why use it?
    •Indicators of cryptominers
    •Using Carbon Cb Response to hunt for miners
  • SUSE Container Ecosystem Survey
    SUSE Container Ecosystem Survey Frank Rego - Director of ISV Program | Ruben Crazzolara - ISV Research Analyst May 29 2018 5:00 pm UTC 60 mins
    In 2017, SUSE released the SUSE CaaS (Container as a Service) Platform and the Container Application Platform (CAP). These new container management solution enables IT and DevOps professionals to more easily manage applications and services. Preceding the launch of the SUSE container partnership program, the ISV partner team has send out a survey to find out how the SUSE partner ecosystem plans to adopt containers. We found out that the benefits for DevOps and market demand are driving the release of container deployment options and certifying those options is important.

    SUSE CaaS Platform enables IT and DevOps professionals to more easily deploy, manage, and scale container-based applications. Container technology plays a key role in facilitating digital transformation by speeding application delivery, facilitating application portability, and enabling a new class of high performance cloud native applications. SUSE surveyed our ISV partner ecosystem to find out how commercial software companies are adopting container technologies, and in this webinar, we’ll present the results of that survey. We’ll also introduce our new Ready certification for SUSE CaaS Platform for ISVs who are building containers, and showcase some of our SUSE CaaS Platform partners and their solutions.
  • Embrace Central Office 2.0 with QCT NFV Platform
    Embrace Central Office 2.0 with QCT NFV Platform Marco Huang [QCT] Amy Chang [QCT] Wei Yeang Toh [Intel] May 29 2018 11:00 pm UTC 45 mins
    Telco operators are looking for open source solutions to reduce vendor lock-in and to meet growing customer demand in transformation. In this session, we provide a glimpse of common NFVI inquiries from telco customers, and propose a modularized NFVI OpenStack Platform with flexible, reliable, and high-performance infrastructure:

    ○ OpenStack architecture design and network planning for NFVI. We will present how to plan a NFVI OpenStack environment from scratch.

    ○ Enhanced Platform Awareness (EPA) adoption and performance evaluation. We will introduce the network stack and provide detailed performance evaluation results.

    ○ Ansible based auto-deployment tool to accelerate the overall deployment process. We will present you how our streamlined auto-deployment tool saves your effort to build a well-integrated OpenStack


    More about our presenters:

    Marco Huang – Open Infrastructure Engineering Team Leader. QCT
    Amy Chang - Open Infrastructure Business Development Team Leader, QCT
    Wei Yeang Toh - Marketing Development Director, Network Platform Datacenter Group, Intel Corporation
  • Are you killing the benefits of your data lake? (EMEA)
    Are you killing the benefits of your data lake? (EMEA) Rick van der Lans, Independent Business Intelligence Analyst and Lakshmi Randall, Director of Product Marketing, Denodo May 30 2018 8:30 am UTC 45 mins
    Data lakes are centralized data repositories. Data needed by data scientists is physically
    copied to a data lake which serves as a one storage environment. This way, data scientists can access all the data from only one entry point – a one-stop shop to get the right data. However, such an approach is not always feasible for all the data and limits it’s use to solely data scientists, making it a single-purpose system.
    So, what’s the solution?
    A multi-purpose data lake allows a broader and deeper use of the data lake without minimizing the potential value for data science and without making it an inflexible environment.

    Attend this session to learn:

    • Disadvantages and limitations that are weakening or even killing the potential benefits of a data lake.
    • Why a multi-purpose data lake is essential in building a universal data delivery system.
    • How to build a logical multi-purpose data lake using data virtualization.

    Do not miss this opportunity to make your data lake project successful and beneficial.
  • O completo portolio SUSE para Infraestrutura Definida por Software OpenSource
    O completo portolio SUSE para Infraestrutura Definida por Software OpenSource Aslan Carlos e Vinicius Neuhauss - SUSE System Engineers May 30 2018 1:00 pm UTC 75 mins
    A SUSE, pioneira em software open source, fornece soluções confiáveis e interoperáveis de Linux, infraestrutura de nuvem e armazenamento que dão às empresas maior controle e flexibilidade. Com mais de 25 anos de excelência em engenharia, um serviço excepcional e um ecossistema de parceiros sem igual, a SUSE fornece produtos e suporte que ajudam os clientes a gerenciar a complexidade, reduzir custos e fornecer serviços essenciais com confiança. Os relacionamentos duradouros que a companhia construiu permitem adaptar e entregar a inovação mais inteligente que os clientes precisam para ter sucesso hoje e amanhã. Conheça o portfolio da SUSE neste Webinar!
  • The Automated Enterprise: Transforming IT Ops to Support Modern Business
    The Automated Enterprise: Transforming IT Ops to Support Modern Business Justin Nemmers, General Manager, Ansible, Red Hat May 30 2018 3:00 pm UTC 60 mins
    IT operations teams are increasingly challenged to deliver scalable, on-demand infrastructure and services to support developers, lines of business, and C-level initiatives - all while still ensuring security, compliance, reliability / and at timeframes once unimaginable.
    Faced with this, successful IT operations teams recognize that they need to adopt a new approach and modern, unified management and automation tools to remain relevant and effectively support business outcomes.
    Join Justin Nemmers, General Manager of Ansible, Red Hat, to learn how automation is at the center of IT operations transformation for your organization.

    Justin Nemmers, Red Hat® Ansible Automation General Manager, has spent a career helping organizations transform their IT environments by adopting new technologies and making better use of existing ones. Before joining Red Hat and leading a large services team, he held technical, sales, marketing, and product leadership roles at a number of organizations.
  • Multi-Cloud, Multi-Problems
    Multi-Cloud, Multi-Problems Michael Dahlgren, Senior Cloud Solution Architect, Red Hat May 30 2018 4:15 pm UTC 60 mins
    IT operations is more complex than ever before. Automation and management are critical to keep pace and deliver business results.
    Join this session to learn how management, automation, and innovation address your hardest IT challenges:
    > Improving processes, migrating apps for optimization, and providing a single language for DevOps practices using agentless IT automation
    > Managing multi-cloud environments efficiently, securely, and with compliance to various standards
    > Easily and quickly building, developing, and deploying in nearly any infrastructure—on premise, in a public cloud, or hosted
  • From Disaster to Recovery: Preparing Your IT for the Unexpected
    From Disaster to Recovery: Preparing Your IT for the Unexpected Alfons Michels, Sr. Product Marketing Manager - DataCore Software May 30 2018 5:00 pm UTC 45 mins
    Did you know that 22% of data center outages are caused by human error? Or that 10% are caused by weather incidents?

    The impact of an unexpected outage for just a few hours or even days could be catastrophic to your business.

    How would you like to minimize or even eliminate these business interruptions, and more?

    Join us to discover:

    • Useful and simple measures to use that can help you keep the lights on
    • How to quickly recover when the worst-case scenario occurs
    • How to achieve zero downtime and high availability
  • Can AI and chatbots really transform customer support?
    Can AI and chatbots really transform customer support? Stanley Yung, Chief Customer Experience Officer, Western Union May 30 2018 5:00 pm UTC 60 mins
    The most accessible way to leverage the explosion in artificial intelligence is chatbots. Big brands like Western Union and Procter and Gamble have implemented them to streamline customer service and increase positive engagement. The Booking.com chatbot resolves half of the company's thousands of daily customer support questions in five minutes or less.

    Chatbots are changing the way companies and customers interact, as consumers grow more and more comfortable with messaging -- look at the two billion-plus conversations consumers have with companies via Facebook messenger every month.

    Find out how to create a powerful, engaging human-to-AI agent experience that customers expect -- as well as implement the seamless handoff to a human customer service agent when the issue turns out to be complex, with this VB Live event. You’ll dive right into the chatbot phenomenon, and leave with actionable ideas on implementing AI-powered customer support.

    Attend this webinar to learn:
    * The real truth about AI and customer service
    * How big brands are using AI and chatbots to resolve customer issues more quickly and effectively
    * How bots and humans can work together to optimize customer support
    * How to assess whether your organization is bot-ready

    Speakers:
    * Stanley Yung, Chief Customer Experience Officer, Western Union
    * Frankie McKeown, Senior Innovation Manager, Procter and Gamble
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Chatkit
  • Best Practices for Integrating DevOps & Container based applications
    Best Practices for Integrating DevOps & Container based applications Mary Johnston Turner, Director, Management Software Evangelism, Red Hat May 30 2018 5:30 pm UTC 45 mins
    Increasing adoption of DevOps strategies and container based micro-services architectures enabled by containers and microservices is wreaking havoc with traditional IT infrastructure operations management processes and best practices.
    As the rate and pace of change accelerates and workloads are deployed across a dynamic mix of public clouds and on-prem infrastructure, IT operations teams are turning to automation to help maintain SLAs, hold down costs and empower mission critical digital business initiatives.

    Join this session discuss best practices for integrating DevOps and container based applications with modern Day 2 operations management and automation best practices. Mary Johnston Turner, Red Hat’s Director of Management Software Evangelism, will discuss how open source automation and management technologies can transform IT operations best practices for the era of containers, DevOps and cloud.
  • Revolutionize Networking with Ansible Automation
    Revolutionize Networking with Ansible Automation Andrius Benokraitis, Principal Product Manager, Red Hat® Ansible Automation focusing on networking automation. May 30 2018 6:30 pm UTC 55 mins
    You need to manage your network infrastructure - including both legacy and open network infrastructure devices - using simple, powerful and agentless automation throughout the entire production life cycle.
    Gone are the days of hand typing commands into network devices one by one. With automation, previously isolated network admins can finally “speak the same (automation) language” as the rest of the IT organization, breaking down silos that have existed for decades.
    In this session, we'll discuss how network devices and systems can now be included in an organization's overall automation strategy for a holistic approach to application workload management.
    We'll cover Ansible automation throughout the entire production life cycle, including:
    > Automating configuration of the network stack from system to access to core services
    > Testing and validating existing network states
    > Continuously checking for network configuration drift to maintain compliance.