Hi [[ session.user.profile.firstName ]]

Virtualization

  • Deliver a Better Digital Workspace Experience featuring Forrester
    Deliver a Better Digital Workspace Experience featuring Forrester
    Calvin Hsu, VP of Product Marketing at Citrix, Andrew Hewitt, Analyst Serving Infrastructure & Ops Professionals at Forrester Recorded: Aug 15 2019 65 mins
    As your enterprise looks for better ways to drive employee productivity through a better technology experience, the infusion of intelligence, automation, and personalization into the digital workspace offers exciting potential. In this webinar, digital workspace thought leaders Andrew Hewitt (Forrester Analyst/Guest speaker) and Calvin Hsu (Citrix VP of Product Marketing) will explore the impact of digital workspaces powered by intelligence and automation.

    Attendees of the webinar will learn:
    -The top challenges organizations face in creating a technology experience that enables productivity
    -The evolution of digital workspace technology, and particularly the impact of intelligence and automation within the workspace
    -A day-in-the-life scenario of a digital workspace end user that shows specific processes and advantages
  • X by Orange: How to Build a Telco Operator from Scratch in Less Than 1 Year
    X by Orange: How to Build a Telco Operator from Scratch in Less Than 1 Year
    Ignacio Verona and David Sastre Medina, Red Hat Recorded: Aug 15 2019 44 mins
    X by Orange committed to launch a new, fully software-defined telco operator in Spain - from scratch. They wanted to “Uberize” the telco business by being completely cloud based and not owning a single piece of hardware. The goal was clear, but not easy: Streamline how a communications service provider works to launch new services in less than 90 days, provide an extremely simple user experience, and redefine the telco market. Also, the whole project, including hiring more than 120 people, developing the IT backend, and creating a sales, marketing, and go-to-market strategy, needed to be accomplished in 1 year. And they made it.

    In this session recorded at Red Hat Summit, Ignacio Verona and David Sastre Medina, Red Hat, discuss how X by Orange created its infrastructure using Red Hat OpenShift with an “everything is automated” deployment policy. Also, they show how Red Hat Consulting helped the company's goals become reality through extensive involvement - during the initial phases and on site.
  • Modernize Cybersecurity Threat Detection
    Modernize Cybersecurity Threat Detection
    Nathan Necaise - VP of Data Sciences Emerging Services - Optiv Recorded: Aug 15 2019 55 mins
    The convergence of streaming data platforms with cyber security solutions presents real opportunity for combating and predicting future threats. Join StreamSets and Optiv as we discuss common use cases and architectural patterns used by leading Fortune 500 organizations to modernize their cyber architecture.

    During this webinar, we will discuss:

    -Common challenges facing today’s SIEM’s and how to effectively augment them with streaming data platforms
    -Show customer examples and demonstrate how they are leading to transformative effects
    -How to optimize security architectures that use technologies like Splunk using StreamSets
  • Meet The CEO: HYCU, Inc’s Simon Taylor
    Meet The CEO: HYCU, Inc’s Simon Taylor
    Storage Switzerland, HYCU Recorded: Aug 15 2019 30 mins
    Backup and Recovery is as old as the data center itself, but organizations still struggle with the process. IT professionals have tried many solutions to solve their data protection solutions, and the market is full of options, but none seem to address the core issues. Launched only two years ago, HYCU, Inc took a different approach by building backup solutions custom-built for each environment they protect.

    Join HYCU, Inc’s CEO, Simon Taylor as he sits down with Storage Switzerland Lead Analyst, George Crump to discuss HYCU’s unique approach to the fiercely competitive backup market.
  • Is Data Still the New Currency?
    Is Data Still the New Currency?
    Primitive Logic CEO Jill Reber & President Kevin Moos Recorded: Aug 15 2019 36 mins
    Getting your company ready for GDPR, CCPA, and other data privacy laws isn’t about putting a few new processes in place — it’s about rethinking your entire approach to personal data, including how to get value from it. For decades, companies have collected and stored all kinds of personal information “just in case” they ever needed it.

    Today's data privacy regulations require a different approach. You need to be proactive in thinking about how to get value from your data, and you need to understand exactly what your company is doing with personal data and why.

    Join Jill Reber and Kevin Moos of Primitive Logic to learn:
    - How to work with third parties who process personal data on your behalf
    - How preparing for data privacy laws helps you understand your data on a whole new level (and why that’s a good thing)
  • Learn How to Replace EqualLogic with Datrium's State-of-the-Art Solutions
    Learn How to Replace EqualLogic with Datrium's State-of-the-Art Solutions
    Cameron Joyce, Principal Solutions Architect at Datrium Recorded: Aug 15 2019 56 mins
    Many enterprises have chosen Datrium’s next-generation disaggregated HCI solutions. Do your systems need a refresh? Fortunately, EqualLogic customers can take advantage of Datrium Automatrix and get primary storage, backup, disaster recovery, mobility, and encryption in a single data management platform. Join us for our upcoming webinar where you will learn how to:

    - Get zero storage management overhead with a simple VM-centric approach and no LUNs or volumes
    - Independently scale performance and capacity for maximum flexibility and no disruption to production systems
    - Protect your data with built-in backup, blanket encryption, and erasure coding
    - Take advantage of optional disaster recovery orchestration, including runbook automation, and recover from ransomware instantly with low RTO data mitigation plans
    - Use industry-leading snapshot and replication capabilities
  • Navigating the Minefield of Data Protection Complexity with Ease
    Navigating the Minefield of Data Protection Complexity with Ease
    Theresa Miller, Principal Technologist, Cohesity Recorded: Aug 14 2019 44 mins
    For years, we have all been dealing with backup and restore policies that really haven't really changed with the times. While these concepts of recovery are not new, the game has changed how we do it. Today there are some better ways to manage this always traditionally cumbersome process in vSphere environments. This session will cover some of the common horror stories that make data protection seem over-complicated and difficult. Gone are the days when restoring data should take hours and be a hassle. We will also discuss backup and recovery features that you must have to ensure your enterprise is ready for any data protection situation related to vSphere. We will show you that there is a better way to avoid stepping on the landmines that plague backup administrators and keep them up at night.
  • Protect SQL Server Workloads at Scale: A Modern and Performance-Based Approach
    Protect SQL Server Workloads at Scale: A Modern and Performance-Based Approach
    Freddy Grahn, Senior Technical Field Enablement Engineer, Cohesity Jon Hildebrand, Principal Technologist, Cohesity Recorded: Aug 14 2019 28 mins
    Backup, recovery, and management for Microsoft SQL Server is a critical part of many enterprises' IT organizations. Legacy multi-point backup and recovery products are unable to go beyond serving as a mere insurance policy. Enterprises need a radically different approach that provides efficient operations with large deployments, adheres to organizational SLAs, and makes backed up data productive.

    Cohesity offers a modern approach to tackle SQL Server protection challenges, which puts the admin in control of infrastructure with a single, hyperconverged scale-out solution.

    In this on-demand webinar, we will show you how Cohesity:

    -Backs up large-scale SQL deployments, easily
    -Can help you achieve rapid RTOs and low RPOs
    -Can enable test and development with rapid database clones
  • Cloud Burst your Application Performance Testing Needs
    Cloud Burst your Application Performance Testing Needs
    Robert Linton, Russ Inman Recorded: Aug 14 2019 60 mins
    This webinar is brought to you by the Vivit US Government Solutions Special Interest Group.

    Objective: Learn how to leverage the Cloud for realistic Performance Testing.

    Cloud Burst, a Micro Focus performance testing solution, is the only product on the market today that can automatically support your scalable performance testing needs in the Government FedRAMP Cloud environments.

    See how your testing can be hosted in a Private Secure Gov Cloud environment to automatically execute performance or stress test completely within the Gov Cloud environments, or from various cloud regions around the world, simulating real user’s experience during the performance test.

    Watch the live demo running in the FedRAMP Gov Cloud regions to see how easy, quickly and affordably you can plan, design and execute your application performance testing requirements.

    This offering with flexible pricing, allows clients to leverage their investment in the Micro Focus ADM software solutions, increasing their ROI, while reducing risk and adding value to their organization’s internal and external users.
  • Operationalize Data Movement to Supercharge Your Architecture
    Operationalize Data Movement to Supercharge Your Architecture
    Julian Ereth - Research Analyst - Eckerson Group | Arvind Prabhakar - Co-Founder & CTO - StreamSets Recorded: Aug 13 2019 59 mins
    DataOps borrows concepts from agile development to streamline the process of building, deploying and operating dataflow pipelines at scale. Putting DataOps into action requires not only the right technology, but more broadly a thoughtful approach to align the people and the process behind such an initiative.

    Eckerson Group research analyst Julian Ereth join StreamSets' Co-Founder and CTO, Arvind Prabhakar to explore the emerging trend of DataOps.

    During this webinar, we will discuss:

    -Principles and benefits of DataOps
    -Common DataOps use cases
    -Practical guidelines for putting DataOps into action
    -How StreamSets can help on a DataOps journey
  • The Evolution of Open Network Switch Designs by Edgecore Networks
    The Evolution of Open Network Switch Designs by Edgecore Networks
    Matt Roman, VP of Marketing and Product Management, Edgecore Networks Recorded: Aug 13 2019 36 mins
    New innovations are occurring in Open Networking switch design to support next generation cloud first architectures and the coming rollout of 5G mobile networks. The status quo of closed proprietary vendor designs is quickly being replaced with open devices that include high performance packet processors as well as powerful multicore CPU systems that not only support the switch Network Operating System but also support containerized value-added functions such as application analytics, network telemetry and packet shaping. This webinar will provide insights into the evolution of data center switches, core routers, mobile backhaul and FTTX network devices.
  • Evolving Data Protection to a Hybrid Cloud Model
    Evolving Data Protection to a Hybrid Cloud Model
    Jason Walker, Technology Evangelist, Pure Storage Recorded: Aug 13 2019 35 mins
    Modernise your current legacy protection for rapid recovery and data reuse, seamlessly between private and public clouds for your customers.

    Learn how to benefit from the economies of cloud by leveraging AWS as the destination archive tier, all while maintaining that single namespace and global deduplication pool.

    Key technical lessons:

    - Modernise your legacy protection without the pain of a forklift solution.

    - Meet the emerging expectations of data availability and reusability by taking advantage of the cloud as an archive tier.

    - Move away from the cold, static tape tier to the more reliable, durable cloud tier.
  • CISO Says with Bruce Beam, CIO, (ISC)²
    CISO Says with Bruce Beam, CIO, (ISC)²
    Bruce Beam, CIO, (ISC)², Brandon Dunlap, Moderator, (ISC)² Recorded: Aug 13 2019 60 mins
    In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format.

    In this session Bruce Beam, Chief Information Officer at (ISC)² will provide insight into the path he took to become a Cybersecurity Leader and how he is reinventing the role in the face of accelerating industry change
  • Previewing the Storage Developer Conference EMEA in 2020
    Previewing the Storage Developer Conference EMEA in 2020
    Alex McDonald, Vice-Chair SNIA EMEA, and Office of the CTO, NetApp; Paul Talbut, General Manager, SNIA EMEA Recorded: Aug 13 2019 29 mins
    The SNIA EMEA Storage Developer Conference (SDC) will return to Tel Aviv in early February 2020.

    SDC EMEA is organised by SNIA, the non-profit industry association responsible for data storage standards and education, and the conference is designed to provide an open and independent platform for technical education and knowledge sharing amongst the local storage development community.

    SDC is built by developers – for developers.

    This session will offer a preview of what is planned for the 2020 agenda ahead of the call for presentations and will also give potential sponsors the information they need to be able to budget for their participation in the event. If you have attended previously as a delegate, this is a great opportunity to learn more about how you can raise your profile as a speaker or get your company involved as a sponsor. There will be time allocated during the webcast to ask questions about the options available. Companies who have significant storage development teams will learn why this conference is valuable to the local technical community and why they should be directly engaged.
  • Meet The CEO: MemVerge’s Charles Fan
    Meet The CEO: MemVerge’s Charles Fan
    Storage Switzerland, MemVerge Recorded: Aug 12 2019 30 mins
    Workloads like artificial intelligence (AI), machine learning (ML), big data analytics, the Internet of Things (IoT) and data warehousing need storage memory-levels of performance. Charles Fan, CEO of MemVerge, has a vision for making this possible without disrupting the application programming model or the storage software. Join us as Fan discusses his company’s invention of “Memory-Converged Infrastructure (MCI).”

    Attend for additional discussion, including learning:

    The problems inherent in using dedicated clusters to serve these specific applications.

    Why it is so challenging for enterprises to enable modern workloads to run at memory speed with technologies like Intel’s Optane App Direct Mode.

    How to unlock the raw performance potential of Intel 3D XPoint Persistent Memory with the efficiencies of pooled storage – and without changing any code.
  • If Cloud is the Problem DataOps is the Solution
    If Cloud is the Problem DataOps is the Solution
    Kirit Basu - VP of Product - StreamSets Recorded: Aug 8 2019 44 mins
    According to research firm Gartner, at least 75% of large and global organizations will implement a multicloud-capable hybrid integration platform by 2021. Join StreamSets Head of Product Management, Kirit Basu, and Head of Product Marketing, Clarke Patterson as they discuss how StreamSets customers are taking a DataOps approach to hybrid-cloud integration.

    We explore how Fortune 500 customers are using StreamSets to streamline Apache Kafka and Data Lake projects using principles adopted from DevOps.

    During this webinar, we will discuss:
    -Pitfalls to avoid for any hybrid-cloud project
    -Key requirements to ensure continuous movement of data across any cloud
    -How StreamSets customers are using the platform to drive real value from DataOps
  • Enabling Digital Transformation: API Ecosystems and Data Virtualization (EMEA)
    Enabling Digital Transformation: API Ecosystems and Data Virtualization (EMEA)
    Paul Moxon, VP Data Architectures & Chief Evangelist, Denodo Recorded: Aug 8 2019 61 mins
    Digital transformation, as cliché as it sounds, is on top of every decision maker’s strategic initiative list. And at the heart of any digital transformation, no matter the industry or the size of the company, there is an application programming interface (API) strategy. While API platforms enable companies to manage large numbers of APIs working in tandem, monitor their usage, and establish security between them, they are not optimized for data integration, so they cannot easily or quickly integrate large volumes of data between different systems. Data virtualization, however, can greatly enhance the capabilities of an API platform, increasing the benefits of an API-based architecture. With data virtualization as part of an API strategy, companies can streamline digital transformations of any size and scope.

    Join us for this webinar to see these technologies in action in a demo and to get the answers to the following questions:

    - How can data virtualization enhance the deployment and exposure of APIs?

    - How does data virtualization work as a service container, as a source for microservices and as an API gateway?

    - How can data virtualization create managed data services ecosystems in a thriving API economy?

    - How are GetSmarter and others are leveraging data virtualization to facilitate API-based initiatives?
  • データ仮想化とは ~ データ統合のための最先端ソリューションのご紹介(更新版)
    データ仮想化とは ~ データ統合のための最先端ソリューションのご紹介(更新版)
    赤羽 善浩 パートナービジネス戦略部長 Denodo Technologies 株式会社 Recorded: Aug 8 2019 39 mins
    データ仮想化とは、どのようなソリューションなのか。昨今データ活用に注目が集まる中、データ統合や連携は重要な位置づけになりつつあります。データ仮想化は、データの物理的な複製なしでリアルタイムにデータ統合を実現できる、これまでとは全く異なる手法を採用するデータ統合戦略です。本ウェビナーでは、データ仮想化について、事例を交えてご紹介します。(本編は30分程度を予定しています。Q&Aのお時間も含めて1時間程度になります)
  • Understanding and Managing Compliance in Cloud Storage
    Understanding and Managing Compliance in Cloud Storage
    Devon Helms, Nutanix Product Marketing Manager & Ed Keiper, Nutanix Sr. Systems Engineer Recorded: Aug 8 2019 41 mins
    Are you seeing your unstructured data grow rapidly and unpredictably?

    Do you have compliance requirements that you need to follow with regards to your unstructured data?

    Would like to be immediately alerted when bad actors try and access your unstructured data?

    If you answered yes to any of these questions, please join us to learn how Nutanix Files uses simplicity, flexibility, and intelligence to provide a powerful NAS solution for your environment.
  • Embracing Cloud First: from Strategy to Execution
    Embracing Cloud First: from Strategy to Execution
    Jonas Irwin, Pure Storage Recorded: Aug 7 2019 59 mins
    This webinar will cover a broad set of practical capabilities needed to be successful implementing or optimizing a cloud 1st strategy. We will not only tell, but also demonstrate Pure's robust data mobility framework, infra-as-code and our new cloud scale data protection technology combing both flash and cloud (F2F2C).

    The session will address VMware but also several CNCF - https://www.cncf.io/ - technologies that will help organizations build applications that can be written once and run anywhere.
  • Move Toward Simpler Automation with Ansible and F5
    Move Toward Simpler Automation with Ansible and F5
    Ansible Team Recorded: Aug 7 2019 48 mins
    "Automation is valuable, but how to we stay focused on adding features rather than maintaining code and tools? In this session, we will cover how to promote value focused automation using Ansible Roles and F5 Automation Toolchain including Application Services 3 (AS3), Declarative Onboarding (DO), and more. Leveraging a single Role or Task, we will demonstrate how to achieve lengthy use-cases such as deploying an application or GSLB configuration.
    "
  • Recover Faster from Your Next Ransomware Attack
    Recover Faster from Your Next Ransomware Attack
    Andre Leibovici, Field CTO at Datrium Recorded: Aug 7 2019 29 mins
    Ransomware is quickly becoming IT’s worst nightmare. With 300% year-over-year growth in ransomware incidents in 2018, equalling more than $8B in damage costs globally, organizations need to prepare for the increasing threats and attacks.

    How long will it take to recover from a ransomware attack?

    Join us to learn how you can speed up recovery from ransomware acts. Learn how you can leverage best practices in disaster recovery and data management to achieve:

    - Instant RTO, low RPO, consistency across hosts, using Blanket Encryption
    - Immutable, isolated, regularly verified and cataloged VM-granularity snapshots
    - Massive retention on multiple replicated sites
    - Whole data center recovery workflow automation
  • How to Create a Data Strategy for Virtualization
    How to Create a Data Strategy for Virtualization
    Erik Ottem, Sr. Director, Data Center Systems at Western Digital Corporation Recorded: Aug 7 2019 28 mins
    Virtualization has been around for quite a while. Now might be a good time to review what you’re doing from a data perspective. Classic hardware virtualization has been the key to consolidation efficiencies and savings. Now data virtualization can provide similar benefits in a different way. A modern data strategy should consider the benefits and costs of data virtualization. Some people are surprised to find out that hardware virtualization is not the end of the story, that there is data virtualization as well. In this webinar we’ll take a look at how having the right data strategy can improve the way you provide value to business operations by making data more available by reducing siloes and reducing the amount of management required.

    Join Erik Ottem, Senior Director, Data Center Systems at Western Digital Corporation, as he shares tips on how to get the most from a virtualized environment from a data perspective.

    In this webinar you’ll learn:

    - Data Strategy: Why organizations must start with a data strategy; the business value of building a
    data strategy and aligning infrastructure planning with that strategy

    - Shifting from Hardware Virtualization to Data Virtualization: Why viewing your virtualization strategy
    from a different lens is imperative to driving a competitive business advantage

    - Cost Savings: How implementing a data strategy can help you spend less on both building and
    managing data infrastructure

    - Virtualization-Worthy Data: How to identify what data is better housed in a virtual environment;
    including identifying the single source of truth (Golden Copy) and managing data quality

    - Case Study: we’ll take a look at how data virtualization can work in the real world and the benefits that
    have been realized.
  • Red Hat OpenShift Deployment Considerations: On-Premise or Cloud Deployment
    Red Hat OpenShift Deployment Considerations: On-Premise or Cloud Deployment
    Eric Noriega and Vickie Shen, Booz Allen Hamilton Recorded: Aug 7 2019 42 mins
    In this session recorded at Red Hat Summit, Eric Noriega and Vickie Shen, Booz Allen Hamilton, review the differences between deploying Red Hat OpenShift on-premise versus in a hosted cloud provider. The Booz Allen Hamilton team has significant experience deploying Red Hat OpenShift, both on-premise as well in public cloud providers. They've determined a number of technical and organizational factors that are critical to speeding up deployment and adoption.

    The session will cover:

    • Technologies that are critical for each environment, and the order in which to handle them.
    • The benefit gained from running Red Hat OpenShift in either environment.
    • Tips for controlling cost and effort in both environments.
  • A new security nightmare: How drives, messaging, etc. are a risk we can’t ignore
    A new security nightmare: How drives, messaging, etc. are a risk we can’t ignore
    Yoram Salinger: CEO - Perception Point, Michael Aminov: Founder & Chief Architect - Perception Point Recorded: Aug 7 2019 48 mins
    Wide adoption of new cloud collaboration apps (e.g. OneDrive, Slack, etc.) is creating many new security blindspots that are ripe for hackers to leverage. As more and more companies use these tools to communicate with customers, suppliers, and partners, and insider threats remain a challenge, IT decision makers should adapt and plan how to protect their organization from these new attack vectors.

    Join our CEO and Chief Architect to learn more about:

    1. How these tools are being adopted across the enterprise

    2. What are the specific security risks they pose

    3. How you can effectively manage this new level of complexity, and close the gaps
  • Reaching new customers by optimizing your product data
    Reaching new customers by optimizing your product data
    Hamaad Chippa, Director of Industry Consulting and Roland O Ehigiamusoe, Senior Manager, Consumer, Analytics and Cognitive Aug 20 2019 4:30 am UTC 32 mins
    Retailers are looking to reach customers in as many channels as possible – stores, e-commerce, mobile applications, and partner marketplaces. As one can imagine, managing these various touchpoints and relationships can be complex, especially ensuring information about products are properly defined. As online shopping grew in popularity, retail organizations stood-up dedicated support teams to manage sales and marketing, separate from the rest of the business. Customers now expect retailer companies to interact with them in a seamless manner, regardless of channel.To guarantee brand continuity, a uniform customer experience, and high customer satisfaction, retailers must diligently manage product data, making sure that products are represented properly across all channels. With better product information and insight, retailers will be to engage with customers in a more personal and meaningful way, driving additional revenue.
  • Best Practices for Implementing VM Microsegmentation in the Hybrid Cloud World
    Best Practices for Implementing VM Microsegmentation in the Hybrid Cloud World
    Scott Tye (AE), Jenny Ngo (SE), Sridhar Devarapalli (PM) Aug 20 2019 4:30 am UTC 49 mins
    Security threats have become more sophisticated and in combination with new application and cloud deployment models adding to existing complexity have caused more than 3/4 of organizations to be victims of successful cyber attack - don't become the next victim!

    Join this session to learn common use cases and best practices for implementing VM microsegmentation in the hybrid cloud world. Nutanix engineers cover design considerations, segmentation models, and demonstrate the ease of adding strong network security to your data center with Nutanix Flow.
  • Jak zbudować infrastrukturę do obsługi aplikacji w kontenerach?
    Jak zbudować infrastrukturę do obsługi aplikacji w kontenerach?
    Jarosław Biniek, SUSE, Przemysław Celiński, ncNETcom Aug 20 2019 8:00 am UTC 90 mins
    Zapraszamy na warsztaty on-line przygotowane w ramach Letniej Akademii SUSE - edycja 2019. Temat drugiego spotkania to "DevOps jest prostsze niż myślisz - jak zbudować infrastrukturę do obsługi aplikacji w kontenerach?"

    Plan warsztatów:
    - Co jest nam potrzebne (software / hardware, minimalne zasoby do testowego klastra)
    - Rekomendacje odnośnie konfiguracji produkcyjnej i skalowania; jak dobrać storage pod kontenery
    - Jak się zabrać do instalacji (konto na SUSE.com, jak pobrać software, po co nam dokumentacja, co trzeba przeczytać), na co zwrócić uwagę przy instalacji i konfiguracji (konfiguracja klastra, tworzenie własnego repozytorium dla kontenerów)
    - Propozycje zastosowań (od uruchomienia sklepu internetowego w architekturze mikrousługowej po SAP HANA i SAP Data Hub w kontenerach)
    - Pokaz jak zrealizować praktycznie DevOps stosując SUSE CaaS Platform w połączeniu z darmową wersją GitLab
    - Silne strony SUSE CaaS Platform (kwestie automatyzacji, łatwości użycia, bezpieczeństwa).


    Część pokazowa przygotowywana jest we współpracy z partnerem SUSE, firmą ncNETcom.
  • HTTPS: SSL Certificates and Phishing (EMEA)
    HTTPS: SSL Certificates and Phishing (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Aug 20 2019 10:00 am UTC 60 mins
    ** This is an EMEA focused webinar **

    When we see HTTPS at the beginning of a URL, or the accompanying lock icon in our browser’s address bar, we tend to think it means we’re safe from harm. But HTTPS isn’t really about security. It’s about privacy. That lock icon simply means any information we transmit on that site is encrypted. It makes no guarantees the destination itself is safe.

    Cybercriminals know users are trained to look for the lock icon in the address bar, and have been working hard to take advantage of that trust.

    Join our 30-minute webinar to learn more about the tradeoffs between privacy and security, and discover why HTTPS may not really be as secure as we think.
  • Shift Left, Shift Right, or Run Security Right Through The Middle?
    Shift Left, Shift Right, or Run Security Right Through The Middle?
    Meera Rao, Senior Principal Consultant, Synopsys, Brandon Dunlap, Moderator, (ISC)² Aug 20 2019 12:00 pm UTC 60 mins
    Demands for more secure software and more rapid application development have led to the emergence of DevSecOps. DevSecOps maturity requires a risk-based approach to adding security activities, increasing depth, and improving testing governance. The best strategy is to shift from a reactive to a proactive security approach that injects security at the right time and place with automated continuous testing. This presentation covers these aspects of automated continuous testing:

    1. Practices to avoid
    2. Drawbacks
    3. Prerequisites
    4. When and where to use automated testing
    5. Best practices for implementing and improving continuous testing throughout the development life cycle
  • Micro Detail.  Macro Intelligence.
    Micro Detail. Macro Intelligence.
    Tom Foottit, Senior Director, Product Management, Accedian Aug 20 2019 3:00 pm UTC 60 mins
    Why granular, high quality data is critical for optimal end-user experience in the 5G era.
  • Increase Network Resilience and Optimize Uptime with Inline Bypass
    Increase Network Resilience and Optimize Uptime with Inline Bypass
    John Lehane Senior Product Marketing Manager, Gigamon, Haider Jarral Technical Marketing Engineer, Gigamon Aug 20 2019 5:00 pm UTC 37 mins
    IT teams are adding newer and more Digital Transformation capable tools. Deployment agility and network resiliency are primary concerns. Inline appliances present potential points of failure in the network. Whether due to a power outage, software malfunction, or processing bottlenecks, failing inline tools can disrupt the very applications and services they are meant to protect.

    With bypass protection, traffic continuity can be maintained as new tools are deployed and tools outages occur.

    Join us to learn how the Gigamon Visibility Fabric with Inline Bypass can enhance the day-to-day operations for Network Operations teams. Topics covered include;

    • Enhancing Infrastructure resiliency and availability
    • Reducing operating and monitoring Costs
    • Improved operation efficiencies and cooperation between IT teams
    • Step by step GUI configuration examples
  • Kubernetes in the Cloud (Part 3): Stateful Workloads
    Kubernetes in the Cloud (Part 3): Stateful Workloads
    Ingo Fuchs, NetApp; Paul Burt, NetApp, Mike Jochimsen, Kaminario Aug 20 2019 5:00 pm UTC 75 mins
    Kubernetes is great for running stateless workloads, like web servers. It’ll run health checks, restart containers when they crash, and do all sorts of other wonderful things. So, what about stateful workloads?

    This webcast will take a look at when it’s appropriate to run a stateful workload in cluster, or out. We’ll discuss the best options for running a workload like a database on the cloud, or in the cluster, and what’s needed to set that up.

    We’ll cover:
    •Secrets management
    •Running a database on a VM and connecting it to Kubernetes as a service
    •Running a database in Kubernetes using a `stateful set`
    •Running a database in Kubernetes using an Operator
    •Running a database on a cloud managed service

    Register today to learn (almost) everything you need to know about stateful workloads on Kubernetes
  • Modern Streaming Data Stack with Kinetica & StreamSets
    Modern Streaming Data Stack with Kinetica & StreamSets
    Matt Hawkins - Principal Solutions Architect - Kinetica | Mark Brooks - Solutions Architect - StreamSets Aug 20 2019 5:00 pm UTC 60 mins
    Enterprises are now faced with wrangling massive volumes of complex, streaming data from a variety of different sources, a new paradigm known as extreme data. However, the traditional data integration model that’s based on structured batch data and stable data movement patterns makes it difficult to analyze extreme data in real-time.

    Join Matt Hawkins, Principal Solutions Architect at Kinetica and Mark Brooks, Solution Engineer at StreamSets as they share how innovative organizations are modernizing their data stacks with StreamSets and Kinetica to enable faster data movement and analysis.

    During this webinar, we will discuss:

    -The modern data architecture required for dealing with extreme data
    -How StreamSets enables continuous data movement and transformation across the enterprise
    -How Kinetica harnesses the power of GPUs to accelerate analytics on streaming data
    -A live demo of StreamSets and Kinetica connector to enable high speed data ingestion, queries and data visualization
  • Achieving Business Continuity in the Age of Ransomware
    Achieving Business Continuity in the Age of Ransomware
    David Shaw, Chief Science Officer at Nasuni | Anne Blanchard, Senior Director of Product Marketing at Nasuni Aug 20 2019 5:00 pm UTC 13 mins
    On May 7, 2019, the city of Baltimore was hit by a ransomware attack - code named “RobinHood.” Hackers used remote encryption to lock down the city’s file servers and demanded payment of 13 bitcoin in exchange for keys to release them. The city immediately notified the FBI and took systems offline to keep the attack from spreading, but not before it impacted over 10,000 computers and multiple city departments. The cost? An estimated $4.6M in data recovery costs alone. All told, the cost to restore data, the cost of new systems that would prevent an immediate new attack, and the lost revenue totaled over $18M.

    Scenarios like this are causing many companies to reexamine their plans for disaster recovery in order to ensure business continuity, not just in the face of equipment, software, or network failures, but also in the event of a ransomware attack.

    Anne Blanchard, Senior Director of Product Marketing sat down with David Shaw, Chief Science Officer at Nasuni, to discuss the Baltimore incident, tips on how to avoid a ransomware attack, and how to dramatically decrease business downtime and cost following an attack.
  • The Role of Data Virtualization in an API Economy (APAC)
    The Role of Data Virtualization in an API Economy (APAC)
    Pablo Alvarez-Yanez, Director of Product Management, Denodo Aug 21 2019 1:30 am UTC 47 mins
    Digital Transformation, even though a cliche, is definitely on top of every CEO's strategic initiative list. At the heart of any digital transformation, no matter the industry or the size of the company, there is an API strategy. Application programming interfaces (APIs) are the connection points between one application and another, and as such, they enable applications to build on each other, extend each other, and work with each other. Taken together, APIs represent a thriving ecosystem of developers that is showing no sign of slowing down.

    Attend this webinar to learn:

    - How data virtualization greatly enhances the capabilities of an API
    - How data virtualization works as a service container, as a source for microservices and as an API gateway
    - How data virtualization can create managed data services ecosystems in a thriving API economy
  • Creating the Future of Work - Empowering a cloud-enabled workforce
    Creating the Future of Work - Empowering a cloud-enabled workforce
    Tony Muraki-Hart, Enterprise Architect, CANCOM & Toby Brown, Lead EMEA Domain Specialist, Citrix Aug 21 2019 9:00 am UTC 42 mins
    In collaboration with Microsoft & Citrix, CANCOM have developed this Webinar to help you pursue your cloud with confidence.

    Business is transforming, and IT is leading the charge into the digital age. Cloud computing is a critical enabler of this digital transformation. Now, the hub of worker productivity — the desktop — is transitioning to the cloud, thanks to innovations from Citrix and Microsoft.

    What's driving cloud investments today?
    Improving the speed of IT service delivery
    Greater flexibility to react to changing market conditions
    Enabling business continuity
    Improving customer support or services

    Watch this webinar to find out how you can:
    Deliver easy, secure access across devices
    Connect people and places, securely
    Reduce time to market for new products

    Start your transformation today. https://info.cancom.co.uk/move_to_cloud_with_citrix_microsoft
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    John Grim, Senior Manager, PS Advisory Services Aug 21 2019 2:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Erika Gifford, Senior Manager, GSS | Security Operations Advisory
    •Hayden Williams, Senior Manager, VTRAC | Investigative Response
    •John Grim, Managing Principal, VTRAC | Innovations and Development
    •David Kennedy, Managing Principal, VTRAC | Open Source Intelligence

    Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes knowledge of your environment and its unique threats, effective teamwork, and just as importantly, a rigorous Incident Response (IR) Plan. We'll introduce our monthly listeners to the VIPR Report – the Verizon Incident Preparedness and Response Report. We'll provide a high-level overview of our findings across three years of IR Plan assessments and data breach simulations. Insight will include:

    •Observations and recommendations across the six phases of incident response
    •Top takeaways for building a solid IR Plan and capability
    •Breach Simulations Kits and using these resources to run data breach tabletop exercises

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • How to Integrate Virtualized Server Environments with NVMe AFAs
    How to Integrate Virtualized Server Environments with NVMe AFAs
    Matt Hebb, Product Marketing, Data Center Systems, Western Digital Aug 21 2019 5:00 pm UTC 18 mins
    As you likely know, the reason companies deployed virtualization in the beginning was to get more out of their hardware – and make their lives a little easier – it is the very same reason they are deploying it today. As a result, virtualized servers are the defacto standard in today’s data centers. While, it’s true that virtualization lowers IT infrastructure costs and allows enterprises to respond to new business needs quickly, it also creates an additional layer of infrastructure complexity. Complexity that the IT team has to manage across both the ESX and storage array layer.

    We get it – it’s a double-edged sword. Virtualization is meant to lower costs and allow quicker response time, but when the infrastructure becomes complex, the resources required to manage it could increase and offset the savings you were hoping to achieve. Join us for this webinar where we’ll address how IT can more easily manage their virtual environment.

    In this webinar, we’ll introduce you to the IntelliFlash vCenter Plug-in and share how the product offers visibility into storage datastore, offers the ability to self-provision VMs, and provides a consistent snapshot of VM-level performance metrics. In addition to better understanding the IntelliFlash vCenter Plug-in, you will learn:
    >How to simplify your VMware administrative tasks
    >How to take full advantage of All-Flash Arrays to create and deploy denser, faster VMs
  • Modernize Your SAP Environment with Red Hat and AWS
    Modernize Your SAP Environment with Red Hat and AWS
    Sherry Yu, Principal Partner Success Architect, SAP, Red Hat and Sabari Radhakrishnan, Principal Solution Architect, AWS Aug 21 2019 6:00 pm UTC 55 mins
    Organizations can no longer delay serious consideration of modernizing their data centers. Among those are many SAP customers who will be required to migrate to SAP HANAⓇ by 2025.

    In this webinar, learn about the benefits of modernizing your data center with the premier partners for SAP HANA, Red Hat and Amazon Web Services (AWS).

    We’ll examine:

    • How AWS and Red Hat can accelerate your journey to SAP S4/HANA.
    • Technical considerations and best practices for SAP HANA and cloud migration.
    • Benefits of scalable, on-demand, elastic infrastructure with enterprise support.
  • The Dangers of Siloed Security
    The Dangers of Siloed Security
    Ken Dang, Senior Product Marketing Manager, SonicWall Aug 21 2019 6:00 pm UTC 60 mins
    Complete security. One viewpoint.

    A splintered security platform opens threat gaps and adds overhead costs and complexity.. See how you can unify, monitor and manage all your security ecosystem with the Capture Security Center.
  • Upgrading & Migrating to WS 2019 and Intel Select Solutions with Azure Stack HCI
    Upgrading & Migrating to WS 2019 and Intel Select Solutions with Azure Stack HCI
    DataON, Microsoft, Intel, Florida Polytech Aug 21 2019 7:00 pm UTC 60 mins
    With the release of Windows Server 2019 in October 2018 many customers are looking to take advantage of new features in hybrid cloud, security, storage, failover clustering, and the application platform. Upgrading and migrating to Windows Server 2019 can be a relatively easy process but there are things you need to do to ensure that you don’t run into any problems or lose any data.

    Intel developed Intel® Select Solutions to simplify and accelerate the process of evaluating, selecting, and deploying hardware with today’s workloads. They are vigorously benchmark-tested to ensure smooth deployments and optimal performance. Intel® Select Solutions for Azure Stack HCI are designed to help customers quickly realize on-premises Microsoft HCI and utilize cloud services powered by Microsoft Azure.

    Florida Polytechnic University is a public university that deployed a Microsoft & DataON HCI for its disaster recovery site, then expanded its cluster and upgraded from Windows Server 2016 to 2019.


    The webcast will explore the following topics:

    • How to successfully plan for an upgrade and migration to Windows Server 2019

    • What are Intel Select Solutions and how it simplifies deploying solutions for Azure Stack HCI

    • How Florida Polytech successfully added a third node to its cluster and upgraded from Windows Server 2016 to 2019.


    Presented by:

    DataON – Howard Lo, Vice President of Sales & Marketing

    Microsoft – Rob Hindman, Senior Program Director of Windows Server

    Intel Corporation – Balaji Iyer, Solutions Strategist

    Florida Polytechnic University – Bill Webster, Assistant Director of Administrative Computing
  • Application Awareness with the Power to Take Action
    Application Awareness with the Power to Take Action
    David Davis, Partner & Vexpert, ActualTech Media and Bassam Khan, VP, Product & Technical Marketing Engineering, Gigamon Aug 22 2019 1:00 am UTC 54 mins
    Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.

    What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.

    Join Gigamon and ActualTech Media in this webinar and learn how to:
    - Unleash visibility to secure and optimize your network
    - Discover applications that you didn’t even know were running on your network
    - Increase overall performance of your network and shared components
    - Spot potential security vulnerabilities before they become a problem

    Join Gigamon and ActualTech Media in this webinar to learn how to discover applications that you didn’t even know were running on your network.

    Watch as we share insight and demonstrate live how to increase overall performance as well as spot potential security vulnerabilities before they become a problem.
  • Reimagine Data Governance: Data Governance. Meet Data Security.
    Reimagine Data Governance: Data Governance. Meet Data Security.
    Andy Joss, Head of Solutions & Data Governance, Steve Holyer, Solutions Specialist, Informatica Aug 22 2019 4:30 am UTC 58 mins
    With organizations collecting an ever-increasing volume of data, the risk of a data breach or falling foul of a regulator is also increasing. Data security, privacy and protection is fast becoming a “must have” requirement within many data programs.

    Organizations are starting to realize that there are potentially great synergies in having a much closer understanding of their data from both a governance and security viewpoint. Add in Artificial Intelligence and automation for remediation, together these capabilities are proving to be significant allies in the continuous battle of cyber-security and enabling Data Governance programs.

    This webinar explores how these two worlds can now better understand the role that each has to play, in supporting and protecting their organization.

    As part of the Reimagine Data Governance series of webinars, Informatica will demonstrate how having a closer relationship between the worlds of governance and security can enhance existing data use and data security capabilities. And how you, in taking that holistic approach, can provide governed and protected data to achieve key business outcomes.
  • Security Symposium - Morning Sessions
    Security Symposium - Morning Sessions
    Red Hat Aug 22 2019 1:00 pm UTC 210 mins
    Join Red Hat senior principal security global technical evangelist and strategist, Lucy Kerner, talking about automating security and compliance for hybrid environments. Followed by Dan Walsh, senior consulting software engineer, sharing container security and container technologies like kubernetes, buildah, and podman. Followed by a short Q&A, join live to submit your questions on August 22.
  • How to Prepare for the Inevitable Security Incident with Digital Forensics Essen
    How to Prepare for the Inevitable Security Incident with Digital Forensics Essen
    Danielle Russell, Group Product Marketing Manager & Aaron Genereaux, Sales Engineer Aug 22 2019 4:00 pm UTC 58 mins
    As soon as you detect a security incident or breach in your environment, things move fast. You need to be able to quickly ascertain what happened and how as well as which assets were involved, so that you can decide how to respond, mitigate impact, and report the incident to the business and any affected parties. In this critical time between detection and remediation, your digital forensics and incident response (DFIR) readiness is key to success.

    What does it take to be forensics-ready? Join AT&T Cybersecurity for a special session webcast on DFIR readiness.

    We’ll address the following questions:

    - What does DFIR readiness include? What frameworks exist?
    - What security tools and technologies are essential for DFIR?
    - How does an effective DFIR program utilize security orchestration and automation reduce time to response (TTR)?
    - How can AT&T Cybersecurity solutions help you accelerate and simplify your DFIR?

    Meet Your Hosts:
    Danielle Russell, Group Product Marketing Manager
    Aaron Genereaux, Sales Engineer
  • Security Symposium - Afternoon Sessions
    Security Symposium - Afternoon Sessions
    Red Hat Aug 22 2019 5:00 pm UTC 210 mins
    The afternoon session is back with presentations and demos on using automation to enforce security guidelines, security capabilities in the latest release of Red Hat Enterprise Linux, and understanding security & mitigating risk.
  • Ultralight Data Movement for IoT with SDC Edge
    Ultralight Data Movement for IoT with SDC Edge
    Guglielmo Iozzia - Big Data Lead - Optum | Pat Patterson - Technical Director - StreamSets Aug 22 2019 5:00 pm UTC 34 mins
    Edge computing and the Internet of Things bring great promise, but often just getting data from the edge requires moving mountains.

    During this webinar, we will discuss:

    -How to make edge data ingestion and analytics easier using StreamSets Data Collector edge, an ultralight, platform independent and small-footprint Open Source solution for streaming data from resource-constrained sensors and personal devices (like medical equipment or smartphones) to Apache Kafka, Amazon Kinesis and many others.

    -We'll provide an overview of the SDC Edge main features, supported protocols and available processors for data transformation, insights on how it solves some challenges of traditional approaches to data ingestion, pipeline design basics, a walk-through some practical applications (Android devices and Raspberry Pi) and its integration with other technologies such as StreamSets Data Collector, Apache Kafka, and more.
  • Why IoT Security is More Important Than Ever
    Why IoT Security is More Important Than Ever
    Sharon Mirsky, Co-Founder, Firedome & Craig Payne, Security & Privacy Officer, DPO, and ISMS Manager at Ayla Networks Aug 22 2019 6:00 pm UTC 60 mins
    Security and privacy are becoming paramount priorities for IoT, especially in the context of smart home consumer devices. According to the 451 Group, a leading research firm, Security ranks #1 in the selection criteria for IoT platforms in their 2018-19 IoT Platform Outlook report. Having a robust security-first approach enables device manufacturers to:
    1. Defend against Cyberattacks
    2. Ensure Privacy Safeguards
    4. Minimize Reputational Risk
    5. Earn the Trust of your Customers

    Join us for an insightful presentation on the evolution of IoT security, best practices and recommendations on IoT product development, and a discussion with Firedome, a leading Ayla partner, on how it delivers real-time endpoint protection for IoT devices.