Hi [[ session.user.profile.firstName ]]

Virtualization

  • How Cryptocurrencies are Changing the Face of Financial Services
    How Cryptocurrencies are Changing the Face of Financial Services Eric Larchevêque, CEO at Ledger and Joe Pindar, CTO Office Director of Strategy Recorded: Dec 15 2017 61 mins
    Joint webinar with Ledger and Gemalto discussing how cyrptocurrencies have the potential to revolutionize the financial industry and what needs to be done to secure the digital assets.
  • 5 Ways to Eliminate Secondary Storage Forever
    5 Ways to Eliminate Secondary Storage Forever Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: Dec 14 2017 49 mins
    Today’s storage market is fragmented, with organizations working with multiple vendors for primary storage, backup and DR; it’s common for enterprises to manage six to eight vendors for backup alone. With pressure on IT to go hybrid, consolidate data centers and cut costs, enterprises must find significant opportunities to cut costs and improve their IT operations.

    By reducing IT footprints and eliminating redundancy, ClearSky Data customers realize greater than 50 percent total cost of ownership (TCO) savings. ClearSky Data solves the enterprise storage problem by integrating primary, backup and DR capabilities in one service, dramatically reducing data center footprints, management complexity, and costs.

    Tune in on December 14th and see how you can eliminate secondary storage, simplify your infrastructure and move to the cloud today.
  • Blockchain 101: Intel’s Role in Digital Ledgers
    Blockchain 101: Intel’s Role in Digital Ledgers Jesse Schrater, Director of Data Center Security Marketing Recorded: Dec 14 2017 44 mins
    In this webcast, Intel’s Director of Data Center Security Marketing highlights why blockchain is such a transformative technology and how Intel is working to solve the privacy, security, scalability, and trust challenges that will help drive enterprise adoption and accelerate blockchain deployments. Tune in to learn more about what products and services look like in a blockchain-enabled world moving forward.
  • Mais armazenamento por menos com Storage Definido por Software
    Mais armazenamento por menos com Storage Definido por Software Aslan Carlos, Sales Engineer - SUSE Recorded: Dec 14 2017 70 mins
    Por que uma abordagem de software para Enterprise Storage?

    A lógica dentro dos dispositivos de armazenamento corporativos sempre foi escrita em software. Mas somente nos últimos anos, o hardware avançou o suficiente de modo que o software e o hardware de storage podem agora ser separados. Está é a nova proposta de valor!

    Seguir a abordagem adequada para o storage definido por software deve fornecer a você uma solução altamente escalável que reduz drasticamente os custos de armazenamento em termos de capital e despesas operacionais.
    Conheça neste Webinar o SUSE Enterprise Storage, a solução de armazenamento inteligente definida por software, com a tecnologia Ceph, que permite transformar a infraestrutura de armazenamento de sua empresa para reduzir custos enquanto fornece escalabilidade ilimitada. Uma solução simples, robusta e flexível.
  • How to Stop a Security Breach Becoming a PR Disaster
    How to Stop a Security Breach Becoming a PR Disaster Adrian Davis, Managing Director, (ISC)² EMEA, Neil Stinchcombe, Director, Eskenzi PR Recorded: Dec 14 2017 62 mins
    Your CEO has just called your mobile because a reporter from the BBC wants to know how many customers are affected by a hack into your payment database.
    How should you respond?
    What is the one thing you should not say to avoid turning a cyber incident into an event that has to be reported under GDPR?
    Why is Crisis Comms so different from all other types of PR?
    What things do you need to demonstrate that will limit the damage?
    Do you have a tried and tested Crisis Comms plan?
    Does everyone know who is on the Crisis Comms team?
    What they have to do?
    Who they need to inform?
    What they can and cannot say, and how they should say it?
    What type of skills do you need to manage media communications and prevent a cyber incident becoming a crisis?
  • Creating a Network Automation Framework for Self-Service Data Centers
    Creating a Network Automation Framework for Self-Service Data Centers Luke Short, Cloud Consultant, Automation Practice, Red Hat Recorded: Dec 13 2017 47 mins
    As more organizations move to public cloud service providers, they expect the same level of automation and self-service from their data centers. Ranging from network configuration and provisioning virtual network resources to self-healing networks, network automation is fast becoming a top priority for efficiency and productivity for many organizations.

    In this webinar, we’ll offer a framework that shows how network automation can change the way you do business. Using TripleO to deploy an OpenStack® lab environment and Ansible to manage the cloud resources, you’ll learn how to:

    - Develop an automation strategy that includes network discovery and configuration auditing.
    - Adopt a holistic approach to configuration and workload management.
    - Automate new network device provisioning.
    - Integrate existing orchestration tools and systems with Red Hat® Ansible Tower.
    - Provide a better way for teams to deploy and manage their own workloads.
  • Managing compliance and risk with Data Center Automation
    Managing compliance and risk with Data Center Automation Megan Glick, Darren Blumenthal, Joe deBalquiere Recorded: Dec 13 2017 37 mins
    It’s no secret that IT compliance management requirements are on an upward spiral. From growing and ever-changing external regulatory policies to tightening internal requirements, getting a complete view across the infrastructure is a major challenge, let alone proving it’s in a compliant state. Micro Focus Data Center Automation addresses these obstacles, providing a single solution for internal and regulatory compliance across heterogeneous servers, database, and middleware.

    Join us to see:

    Product in action including the new simplified portal for compliance use cases
    New risk and security dashboards that give you ultimate visibility into the state of compliance across the entire data center
  • Multi-Cloud Storage: Addressing the Need for Portability and Interoperability
    Multi-Cloud Storage: Addressing the Need for Portability and Interoperability John Webster, Senior Partner, Evaluator Group, Mark Carlson, SNIA CSI Co-Chair, Alex McDonald, SNIA CSI Chair Recorded: Dec 12 2017 43 mins
    In a recent survey of enterprise hybrid cloud users, the Evaluator Group saw that nearly 60% of respondents indicated that lack of interoperability is a significant technology-related issue that they must overcome in order to move forward. In fact, lack of interoperability was chosen above public cloud security and network security as significant inhibitors. This webcast looks at enterprise hybrid cloud objectives and barriers with a focus on cloud interoperability within the storage domain and the SNIA’s Cloud Storage Initiative to promote interoperability and portability of data stored in the cloud.
  • Cybersecurity choices: SIEM, MSSP, or SOC-as-a-Service?
    Cybersecurity choices: SIEM, MSSP, or SOC-as-a-Service? Sridhar Karnam, Director of Product Strategy at Arctic Wolf; Terry R., Exec Editor at SC Media Recorded: Dec 12 2017 58 mins
    Gain insight into three cybersecurity solutions: SIEM, MSSP, and SOC-as-a-Service. Discover which solution is the best fit for your organization based on some of the following criteria:

    - company size offerings
    - detection and response capabilities
    - deployment times
    - support and expertise

    Think you're too small for a SIEM or SOC-as-a-Service? This webinar will explain why you're not. Think you're too big for an MSSP? Find out if that's truly the case.
  • Shift Left: How testing early and often is best for the business and customer
    Shift Left: How testing early and often is best for the business and customer Nancy Gohring 451 Research and Steve Feloney CA Technologies Recorded: Dec 12 2017 50 mins
    Organizations in most any industry are feeling increasing pressure to move fast. But at what cost? Some have learned the hard way that skipping crucial processes, like testing, damages performance and impacts customer sentiments on your brand. In this case, the fast time to market becomes meaningless.

    Smart businesses are adapting to a shift left strategy. These teams are learning how to incorporate testing early and often in the release cycle, supporting business requirements to move fast while ensuring high-performing products and quality. But getting there isn’t easy. In this webinar, we’ll cover:

    •Testing tools: tool choice is important. Not all tools have been designed to support this new paradigm.
    •Integrations: to be effective, testing tools must integrate easily with the tools and processes modern teams use, including CI/CD and APM products. Further, these tools must be very easy to use, specifically for developers.
    •Organizational models: shifting left requires changes to traditional organizations and culture. We’ll share insight into the successful models we’ve seen.
  • Enterprise IT Operations Management  - the rest of the story
    Enterprise IT Operations Management  - the rest of the story Greenlight Group Recorded: Dec 12 2017 64 mins
    In this last of a 3 part webinar series presented by Greenlight, Micro Focus Product Management and Greenlight group will provide an overview of the current state of IT Operations Management technologies running on enterprise grade cloud native technology stacks.  Join us, and come up to speed as the experts provide a high level overview of Network Operations, Hybrid Cloud, and Datacenter Automation suites from the Micro Focus ITOM portfolio running in a Docker & Kubernetes orchestrated environment.
  • Celebrating 10 Years of Service Virtualization – A Look at What Lies Ahead
    Celebrating 10 Years of Service Virtualization – A Look at What Lies Ahead Theresa Lanowitz, Founder of industry analyst firm voke, Nate Lee Director of Product Management for Service Virtualization Recorded: Dec 12 2017 64 mins
    Transformational. Impactful. Defining. All of these words have been used to describe service virtualization – a technology so powerful that software engineering teams across the globe rely upon it to help protect their brand and their business.

    At 10 years old, service virtualization is now an established technology that has proven its value by:

    •Giving software engineering teams unrestricted access to incomplete or unavailable services to complete their tasks in the software lifecycle
    •Reducing defect reproduction time
    •Reducing the number of defects and increasing test coverage.

    Join Theresa Lanowitz, founder of industry analyst firm voke and author of the leading research on service virtualization and its impact in the enterprise, and Nate Lee Director of Product Management for Service Virtualization at CA Technologies to learn about why service virtualization is an absolute must for any organization that wants to compete in the digital landscape and about what service virtualization can do for software engineering teams in the future.
  • Quality & Testing SIG Talk Introduction
    Quality & Testing SIG Talk Introduction Richard Bishop, Todd DeCapual, Chris Trimper Recorded: Dec 12 2017 68 mins
    Vivit launches their first ever SIG Talk event with three speakers who will give you insights into StormRunner Functional, Dynamic data handling in performance tests as well as AI and machine learning as it applies to testing.

    We will discuss:

    How StormRunner Functional is the latest functional test offering from Micro Focus. In this session, Chris Trimper, an early adopter and beta tester, will share his experiences with this new product

    How Virtual Table Server (VTS), in days of Mercury Interactive, was the often-overlooked repository for dynamically updated real-time test data. Even after a revamp and relaunch in 2014, many people still don't use it, but they should. Richard's VTS demo will help you to get value from this great add-on for LoadRunner and Performance Center

    How Big Data, Artificial Intelligence and Machine learning are rapidly impacting businesses and customers, enabling another massive shift through technology enablement. In this session, Todd DeCapua will share how these capabilities are being leveraged in Performance Engineering now, and into the future.
  • SUSE for SAP Applications - Engineered from the ground up for Ease of Install
    SUSE for SAP Applications - Engineered from the ground up for Ease of Install Craig.Liddle, SUSE Recorded: Dec 12 2017 30 mins
    SAP systems can be complex to configure and install. With SUSE Linux Enterprise Server for SAP Applications we help to make it much simpler and certainly easier to install the entire SAP software stack with HA. Please join this webinar to learn more on how SUSE can make your SAP application environment easier and simpler to setup and maintain.
  • HGST-Platforms, the Perfect Homes for Your Storage Devices
    HGST-Platforms, the Perfect Homes for Your Storage Devices Manfred Berger, HGST - Sr. Mgr. Business Development Platforms EMEA Recorded: Dec 12 2017 42 mins
    In this Webinar Manfred Berger explains why the HGST platforms, also known as JBODs or shelves are the perfect home for HGST hard disk drives and SSDs and how buying that combination as a platform, can look to reduce your integration cycle by up to 3 months. By enabling customers to focus their attention on storage applications rather than the underlying infrastructure, hardware investment turns to revenue sooner. Through proper integration of HGST hard disk drives into dedicated platforms, these hard disk drives can run more reliably and last longer, providing customers with a dependable storage installation they can rely on for their business needs.
  • 快速迁移SAP到AWS
    快速迁移SAP到AWS Eamoon Calman Recorded: Dec 11 2017 43 mins
    SUSE Linux Enterprise for SAP Applications 是适用于 SAP 解决方案(包括 SAP HANA)的领先平台,可在其上运行云端 SAP 解决方案。它为所有 SAP 任务关键型工作负载提供可靠、可管理且高度可用的平台。

    经 SAP 和 SUSE 共同验证和认证,即使在 CPU 满负载和高内存压力的情况下,SUSE Linux Enterprise Server for SAP Applications 也能始终如一地提供出色的运行时间和卓越性能。

    集成优先支持与维护和扩展服务包支持可降低运营和维护成本。内置业务连续性可消除单一故障点,从而保护业务运营。
  • SUSE CaaS Platform
    SUSE CaaS Platform Juan Herrera - Sales Engineer en SUSE Recorded: Dec 11 2017 49 mins
    Introducción a la Orquestación de Contenedores con SUSE CaaS Platform y Kubernetes
  • Artificial Intelligence and Its Role in Reducing Risk to Your Organisation
    Artificial Intelligence and Its Role in Reducing Risk to Your Organisation Adrian Davis, Managing Director, (ISC)² EMEA, Patrick Bayle, EMEA Channel Engineer, Cylance Recorded: Dec 11 2017 62 mins
    In this webinar, we will discuss how utilising artificial intelligence and machine learning addresses risk reduction when dealing with the increasing pace of unknown malware proliferation. We will also discuss how this approach differs from legacy methods and provide a compliance example of how you can remove complexity and liberate resources by leveraging advanced artificial intelligence and machine learning.
  • Unprotected Files on a Public Cloud Server: Live Panel on the NSA Data Leak
    Unprotected Files on a Public Cloud Server: Live Panel on the NSA Data Leak Chris Vickery, George Crump, David Linthicum, Charles Goldberg, Mark Carlson Recorded: Dec 8 2017 59 mins
    Public, private and hybrid cloud are nothing new, but protecting sensitive data stored on these servers is still of the utmost concern. The NSA is no exception.

    It recently became publicized that the contents of a highly sensitive hard drive belonging to the NSA (National Security Agency) were compromised. The virtual disk containing the sensitive data came from an Army Intelligence project and was left on a public AWS (Amazon Web Services) storage server, not password-protected.

    This is one of at least 5 other leaks of NSA-related data in recent years. Not to mention the significant number of breaches and hacks we’ve experienced lately, including Yahoo!, Equifax, WannaCry, Petya, and more.

    The culprit in this case? Unprotected storage buckets. They have played a part in multiple other recent exposures, and concern is on the rise. When it comes to storing data on public cloud servers like AWS, Azure, Google Cloud, Rackspace and more, what are the key responsibilities of Storage Architects and Engineers, CIOs and CTOs to avoid these types data leaks?

    Tune in with Chris Vickery, Director of Cyber Risk Research at UpGuard and the one who discovered the leak, along with George Crump, Chief Steward, Storage Switzerland, David Linthicum, Cloud Computing Visionary, Author & Speaker, Charles Goldberg, Sr. Director of Product Marketing, Thales e-Security, and Mark Carlson, Co-Chair, SNIA Technical Council & Cloud Storage Initiative, for a live panel discussion on this ever-important topics.
  • The State of Play of FirstNet
    The State of Play of FirstNet Bill Schrier, Senior Advisor, First Responder Network Authority (FirstNet) Recorded: Dec 8 2017 24 mins
    What's the status of FirstNet's state opt-in benefits and how does the network help support public safety? Also, what are the benefits of connecting first responders to IoT and Smart Cities? These are the question that Bill Schrier will answer on this LIVE PODCAST by NMG Media.
  • All Flash Storage - Für alle Daten
    All Flash Storage - Für alle Daten Björn Buch, Team Lead Systems Engineering, Pure Storage Recorded: Dec 8 2017 48 mins
    Historisch wurden All-Flash Storage Systeme nur für hohe Performance Anforderungen eingesetzt. Als Pionier im All-Flash Bereich war es für Pure Storage schon früh ein Anliegen, all Flash Storage für alle Workloads zur Verfügung zu stellen. Erfahren Sie in diesem Webcast wie es möglich ist All-Flash Speicher für alle Ihre Daten zu nutzen. Unabhängig davon ob Sie einen On-Premise Speicher für traditionelle Workloads wie Datenbanken, VDI, File oder VSI, eine Hybrid Cloud Lösung oder eine schnelle zuverlässige Lösung für Analytics oder DeepLearning suchen, Pure Storage bietet Ihnen eine moderne innovative Lösungen für all diese und weitere Anforderungen. Themen wie NVMe, eine native Cloud Spiegelung und ein synchroner Spiegel mit transparentem Failover sind ebenso Bestandteil der Lösungen, wie die Möglichkeit FileServices nativ aus dem Storage System anzubieten. Durch das Evergreen Modell profitieren Sie automatisch von Hard- und Software Innovationen und das alles ohne Downtimes oder aufwändige Migrationsszenarien.
  • Are EMEA organizations behind the curve, developing their Cloud Backup Strategy?
    Are EMEA organizations behind the curve, developing their Cloud Backup Strategy? Phil Maynard, Sr. Director, Technical Sales EMEA; Alex Hilton, CEO, Cloud Industry Forum Recorded: Dec 8 2017 45 mins
    Many organizations within EMEA are beginning to host more of their business-critical applications and data in the Cloud. However, many of these organizations are not fully aware of the risks, so are not fully protecting their Cloud-based applications or data. In addition, the majority of organizations still rely on traditional on-prem focussed Backup solutions, many of which do not enable the cloud to be used efficiently, or cost effectively.

    Join Phil Maynard, Sr. Director EMEA, Technical Sales at Barracuda and Alex Hilton, CEO at Cloud Industry Forum to discuss:

    - Findings from Barracuda research on how companies are using Backup and Cloud in EMEA
    - What’s preventing companies from moving their backups to the Cloud
    - Why moving to Office 365 could break your data protection and IT security strategy
    - Real life examples of how organisations have adopted a hybrid on-prem and Cloud Backup Strategy
  • Mindful Digital Transformation
    Mindful Digital Transformation Anisha Weber, COO, Primitive Logic Recorded: Dec 7 2017 49 mins
    In today’s world, every company is a digital business. A successful digital transformation starts with understanding what you want to achieve—and that begins with understanding your customer experience. This presentation shares examples of how you can quiet the noise of the rapidly evolving technology landscape with actionable, implementable solutions that generate lasting business results. Innovation happens at the nexus of different disciplines, and webinar attendees will learn how to solve today’s most pressing challenges by combining digital strategy, experience design, and technology.
  • All-Flash in 2018 - What You Need to Know
    All-Flash in 2018 - What You Need to Know Storage Switzerland, Tegile Systems Recorded: Dec 7 2017 57 mins
    The All-Flash era is well upon us, and most data centers consider an all-flash product storage tier both realistic and practical. But the flash industry continues to march on. New technologies like NVMe and ultra high-density flash modules promise to continue all-flashes march to data center dominance. Join us for this live webinar and we will help you design your plan for 2018.
  • The future of Customer Engagement: accelerate transformation - DEC 7, 2:00 pm ET
    The future of Customer Engagement: accelerate transformation - DEC 7, 2:00 pm ET PAUL GREENBERG, Managing Principal of The 56 Group, LLC; Co-presenter: Matt Tharp, Chief Evangelist at bpm’online Recorded: Dec 7 2017 76 mins
    Bpm'online invites you to a free webinar “The future of customer engagement: accelerate transformation” with Paul Greenberg, one of the most influential CRM industry experts, as a guest speaker.

    According to a recent study, 84% of businesses claim that Customer Engagement will overtake productivity as the primary driver of growth.

    Bpm’online has invited Paul Greenberg, one of the most influential CRM industry experts, to share his vision on the future of customer engagement and how intelligent technology will help organizations more effectively fulfill expectations of digital-savvy customers.

    REGISTER FOR THE WEBINAR AND LEARN:

    ●Best practices in building a customer-focused digital organization.
    ●How to align all business processes around your customer to drive customer loyalty.
    ●How understanding customers' needs, expectations, and behaviors helps close the gaps in performance, personalization, and trust.
    ●Future outlook on customer engagement success.
    ●Technologies to enable faster transformation across various business units.

    Featured Guest Speaker: PAUL GREENBERG, Managing Principal of The 56 Group, LLC
    Co-presenter: MATT THARP, Chief Evangelist at bpm’online

    Don't miss out on hearing Paul Greenberg sharing his expertise on how to take Customer Engagement to the next level!
  • Is DNS a Part of Your Cyber Strategy?
    Is DNS a Part of Your Cyber Strategy? Adrian Davis, Managing Director, (ISC)² EMEA, Gary Cox, Technology Director, Infoblox Dec 20 2017 12:00 pm UTC 60 mins
    Detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks, being part of a data loss prevention program – DNS can help with this and much more, but are you leveraging it as part of your security controls and processes?

    DNS is the perfect choke point to stop not just data exfiltration through it, but also detect and stop malware from spreading and executing

    In this webinar you’ll learn:
    •The value of DNS as part of your cyber strategy
    •How DNS can provide your SIEM with actionable intelligence
    •How DNS can add value to other security controls, such as vulnerability scanners and end point protection

    Join Infoblox and (ISC)² for a discussion on this often overlooked topic.
  • Prism Central: Multi Cluster management and powerful analytics
    Prism Central: Multi Cluster management and powerful analytics Grant Friend Jan 4 2018 11:00 am UTC 60 mins
    • Prism Element vs Prism Central – Why and what
    • Prism Central Pro – Capacity management and just-in-time forecasting
  • Effective Micro-Segmentation for the Multi-Cloud
    Effective Micro-Segmentation for the Multi-Cloud John Parker, VP Products, ShieldX Networks Jan 10 2018 5:00 pm UTC 30 mins
    According to MarketsandMarkets, “more than 75% of businesses are planning to implement multi-cloud architectures within the next 2 years (2018–2019).” And with the rise of multi-cloud architectures, plans and budgets to employ micro-segmentation are on the rise too, to help protect against the lateral movement of an attack, its access to high-value assets, and its subsequent exfiltration of sensitive data.

    But while ESG' research reports that already “68% of enterprise organizations use some type of software-based micro-segmentation technology” today, its implementation still presents challenges and fails to protect against today’s most pervasive assaults.

    Specifically, today’s micro-segmentation solutions offer only simple, ACL-based control, failing to secure all layers of the protocol stack in a way that is also cost-effective and practical to operationalize, especially in newer and elastic, multi-cloud environments.

    ShieldX Networks, a 2017 Gartner Cool Vendor in Cloud Security, will present a brief and instructional overview on the new criteria for effective micro-segmentation, including why micro-segmentation and security controls must work through Layer 7 to protect against advanced attacks, and how to evaluate a solution behind the hype to determine if the micro-segmentation product you plan to deploy will deliver the security you’ve been promised.

    Overview

    •Micro-segmentation state-of-the-union: What is it and how most IT organizations deploy it today

    •Security challenges: What basic micro-segmentation does, and the compromises it misses

    •Blueprint for effective micro-segmentation: Preventing the ‘confused deputy’ and its use in the spread of lateral attacks

    •Best practice takeaways

    •Q&A
  • Human vs Machine: Is Hybrid AI SOC in Your Security's Future?
    Human vs Machine: Is Hybrid AI SOC in Your Security's Future? Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine Jan 11 2018 5:00 pm UTC 30 mins
    Watch this webcast for an in-depth conversation about Hybrid AI and get clarification on the following:

    - Artificial Intelligence versus Hybrid AI
    - Hybrid AI when applied to a SOC
    - Incident response (human versus machine-driven)

    There will also be discussions around the following questions:

    - Can machines make decisions?
    - Can Hybrid AI systems operate autonomously?
    - What is missing in a SOC? How can Hybrid AI be added to a SOC?
    - Can Hybrid AI help alleviate staffing shortage?
  • Video as a Service (VaaS) for Enterprise: An APAC Perspective
    Video as a Service (VaaS) for Enterprise: An APAC Perspective Jessie Yu, Research Manager, Digital Transformation Practice, APAC, Frost & Sullivan Jan 12 2018 3:30 am UTC 60 mins
    Cloud is changing the landscape of traditional information technologies. The impact of cloud on business-grade video collaboration has been felt in the Asia Pacific region in recent years. The increasing availability of cloud solutions empowers video collaboration among the entire workforce anytime and anywhere. Early adopters also contribute to the direction of localization and integrations, which helps further improve the feature set and capabilities of the solutions. As a result, there are prospective market growth opportunities for cloud-based video collaboration solutions.

    Questions this webinar will answer:

    · What are the trends in the Asia-Pacific cloud video collaboration services market?
    · What are the growth opportunities for video communications powered by a cloud?
    · How is the technology evolving and what are the impacts on end users?
    · What are the promising partnerships emerging in the market?
    · Why are IT teams and end users facing challenges with video calls?
  • Protecting your blind spots w/ Radware’s Alteon & Intel® QuickAssist Technology
    Protecting your blind spots w/ Radware’s Alteon & Intel® QuickAssist Technology Boaz Avigad, Director of Technical Marketing Jan 16 2018 4:00 pm UTC 45 mins
    With the ever growing cyber threats organizations are facing and the rising adoption of traffic encryption - providing efficient and cost-effective protection is becoming a daunting task. Join us to learn about how you can better protect your organization’s assets throughout trending datacenter evolution.

    In this webinar we will learn about:

    i. Why SSL visibility is important
    ii. What new challenges are we facing in SSL
    iii. The importance of performance
    iv. SSL in the age of virtualization
    v. The impact of the evolving datacenter landscape on SSL requirements
  • Hybrid-AI: Boost Cybersecurity with Human Augmented Machine Learning
    Hybrid-AI: Boost Cybersecurity with Human Augmented Machine Learning Matthew Thurston, Chief Architect - Arctic Wolf Networks Jan 17 2018 7:00 pm UTC 60 mins
    Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?

    In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.

    We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.

    After attending, you will be able to:

    - Recognize how AI and Machine Learning are typically used in Cyber Security, and what are the gaps
    - Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
    - Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks

    About our guest speaker:

    Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
  • All-Flash For Databases: 5 Reasons Why Current Systems Are Off Target
    All-Flash For Databases: 5 Reasons Why Current Systems Are Off Target Storage Switzerland, Vexata Jan 18 2018 6:00 pm UTC 60 mins
    In this live webinar join Storage Switzerland’s founder and lead analyst George Crump and Vexata’s VP of Products and Solutions Rick Walsworth as they explain how all-flash systems have fallen short and how IT can realize the full potential of flash-based storage without the compromises. Learn 5 areas where all-flash arrays miss the database performance mark.
  • The Auditor's Perspective: An Insider's Guide to Regulatory Compliance
    The Auditor's Perspective: An Insider's Guide to Regulatory Compliance Divya Jeyachandran, Sr. Manager - Payments, Cloud & Technology, Coalfire Jan 18 2018 7:00 pm UTC 60 mins
    Every business that handles personally identifiable data is subject to privacy regulations and standards, such as PCI-DSS for credit card transaction data, HIPAA for medical records privacy, SOC 2 for any organization that delivers services (including SaaS-delivered solutions) and the European Union’s soon-to-be-enacted GDPR (General Data Protection Regulation). There are also privacy and breach disclosure laws that vary from country to country (even state to state in the US), making it a big challenge to keep up with them all. Failure to comply can result in daily penalties and fines, and a data breach resulting from non-compliance could cost millions in settlements, legal fees, and loss of reputation.

    Join special guest, Divya Jeyachandran of Coalfire and John McLeod, CISO of AlienVault to hear what auditors are looking for and how to best prepare for your next audit.

    Topics covered:

    Overview of common compliance requirements
    Best practices for preparing for and demonstrating compliance
    Keys to overcoming challenges in your on-premises and cloud environments
    How a unified security toolset can greatly simplify this process


    Hosted By
    Divya Jeyachandran
    Sr. Manager - Payments, Cloud & Technology, Coalfire
    Divya is a Senior Manager in the Payments practice at Coalfire focusing on data security in cloud environments. She advises and assesses client environments to meet security and compliance requirements such as the PCI DSS. With 8 years of experience in cloud technology, IT security and audit, and network and systems administration combined with understanding the applicability of regulatory security and compliance requirements towards IT solutions, Divya has been the lead QSA for some of the major cloud service providers and security service providers in the industry.
  • Nyílt forráskódú megoldások
    Nyílt forráskódú megoldások Hargitai Zsolt Jan 19 2018 9:00 am UTC 60 mins
    Az internet világában megszámlálhatatlan nyílt forráskódú projekt létezik. Januári webinárunkban áttekintjük azokat a megoldásokat, amelyeket érdemes figyelembe venni, ha adatközpontunk infrastruktúráját szeretnénk fejleszteni.
  • Breaking Down Cloud Security: Discover What it Means to You
    Breaking Down Cloud Security: Discover What it Means to You Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine Jan 23 2018 5:00 pm UTC 45 mins
    Cloud Security has recently filled everyone's network security forecast. Everyone is talking about it, but are they talking about the same thing? Today's webinar puts a framework around a term that has become ever-present in today's conversations even though its definition has not.

    Join us as we discuss:

    - How cloud security differs from a public cloud, a private cloud or a hybrid cloud
    - How cloud technologies impact a company's security options
    - How do you defend against attacks of third-party providers of IT services
    - How to develop policies and procedures to test and evaluate servers over which you have no physical control

    To better understand what cloud security means to you, register now.
  • Oracle Audits
    Oracle Audits Dave Welch, House of Brick Technologies; Pam Fulmer, Fulmer Ware Jan 25 2018 5:00 pm UTC 60 mins
    In this session, we will provide a summary of Oracle licensing by the contract, and explore Oracle audit practices referencing the Mars Incorporated lawsuit against Oracle.

    We will share recommendations to help you prepare for an Oracle audit, including VMware licensing information.
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities
    Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Nathaniel Ford, (ISC)² EMEA, Membership Services Team, (ISC)² EMEA Jan 29 2018 12:00 pm UTC 60 mins
    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • Why Native Security Features in AWS and Office365 aren't Enough
    Why Native Security Features in AWS and Office365 aren't Enough Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager Jan 30 2018 5:00 pm UTC 60 mins
    Most businesses are rapidly moving to the cloud to be fast and nimble, reduce their cost structure, and reach more customers anywhere, anytime. These new architectures have powerful new capabilities—but also expose businesses to a new universe of risk.

    When dealing with outsourced infrastructure like AWS, or a SaaS solution like Office365, it is easy for IT managers to assume that security is out of their hands, for better or worse. But, this assumption may not always be true. Businesses must develop an active cloud security strategy as they pursue their migrations, and become a proactive security partner with their cloud providers—or they will find themselves vulnerable to attack.

    In this upcoming webinar, hear from security experts at Arctic Wolf Network (AWN), on:

    - The top cybersecurity risks and best practices for securing cloud deployments
    - How AWN security monitoring compliments the native security features in AWS and Office365
    - The role of AWN cloud security in integrating observations from cloud and on-premise systems

    To see how AWN CyberSOC™ can secure your cloud, register now.

    About our speakers:

    Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with in-depthexpertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.

    Louis Evans is a new member of the Arctic Wolf team. He’s passionate about cybersecurity, defeating the next generation of threats, and Alan Turing.
  • Nutanix 101: An introduction to the nuts & bolts of Nutanix and Prism Management
    Nutanix 101: An introduction to the nuts & bolts of Nutanix and Prism Management Grant Friend Feb 1 2018 11:00 am UTC 60 mins
    • Nutanix Overview – Naming conventions and agnostic hardware and hypervisor support
    • Nutanix technical detail - where and how the software runs and handles data
    • Prism Management Demo – Detailed run through the core entities in Prism
  • Simplifying Network Functions Virtualization Infrastructure
    Simplifying Network Functions Virtualization Infrastructure Willie Nelson, Product Line Manager, Spreadcore products, Product Collaboration & Systems Division, Intel Corporation Feb 1 2018 4:00 pm UTC 60 mins
    With the global network functions virtualization (NFV) market projected to grow at a compound annual growth rate (CAGR) of 42%, reaching $15.5 billion by 2020, a massive market opportunity exists. To make it easier to design and deploy Network Functions Virtualization Infrastructure (NFVI) optimized systems, Intel has developed the new NFVI Server Block. Optimized to deliver exceptional performance for NFVI workloads, these pre-integrated, fully validated server systems reduce the complexity involved in designing and testing for the unique needs of NFVI.

    This webinar will cover the key features and benefits of the NFVI Server Block as well as several other NFVI enablement options from Intel. You’ll walk away with actionable guidance on how Intel can help you harness this growing market opportunity.
  • The One Man SOC - How Unified Security Management Simplifies Threat Detection
    The One Man SOC - How Unified Security Management Simplifies Threat Detection Sacha Dawes, Principal Product Marketing Manager, AlienVault Feb 22 2018 5:00 pm UTC 60 mins
    With the proliferation of single-point security solutions, many IT teams are struggling to efficiently monitor the security of their environments, and respond quickly to threats. It can be a real challenge to juggle multiple tools that weren’t designed to work together, which wastes time and resources that small IT security teams can’t afford to lose.

    Watch this webcast to learn how one of AlienVault's customers was able to build a security operations center (SOC) on a budget with the AlienVault toolset, and extend security capabilities via the AlienApps ecosystem.

    In this webcast, we'll cover:

    Essential security capabilities that all IT teams should have, regardless of size
    Challenges of integrating and maintaining multiple security tools
    How AlienVault customer Guy Dulberger operates his "One Man SOC" with the AlienVault toolset
    A demo of how AlienVault Unified Security Management speeds threat detection and incident response

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager

    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.