Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
Jarren Budds | Systems Engineer, NutanixRecorded: Nov 26 202021 mins
Today, many organisations are evaluating hybrid cloud architectures to supplement their private cloud deployments with public cloud adoption. However, these deployments can quickly run into silos requiring different management tools and skill sets across clouds.
These siloed environments all require different management tools and skill sets, which creates a breeding ground for operational complexity. In order to truly benefit from a hybrid cloud, what is needed is a single platform that spans private and public clouds.
Watch this webinar to learn how Nutanix delivers a True Hybrid Cloud that can help you:
• Burst capacity into public cloud when demand spikes
• Migrate applications from on-prem to hybrid cloud without retooling
• Control cloud costs and drive accountability
• Automate security auditing and maintain compliance baseline
Ollie Sheridan, Principal Security Solutions Engineer, CISSP, David Coulthard & Bob ConstandurosRecorded: Nov 26 202064 mins
Join F1 star David Coulthard, leading F1 sports commentator Bob Constanduros and Gigamon experts for a unique session on optimising Network Detection and Response (NDR) and other security tools with uncompromised network visibility. Provide your InfoSec and IT teams with the fuel to race towards a winning performance.
Full visibility of internal mechanics and external surroundings is crucial for F1 drivers racing on circuits at break-neck speed. Protecting your IT infrastructure is no different. Without clear visibility of ALL relevant traffic, deploying NDRs or any other security tool is so resource-intensive and time-consuming, it can take InfoSec teams away from detecting and hunting threats.
Learn more about network security optimisation, Gigamon solutions and hear how customers are optimising their NDR investment. The final lap will see David Coulthard taking live questions from the audience and being interviewed by Bob Constanduros who has covered over 670 Grand Prix’s and interviewed multiple F1 legends throughout his career.
Gemma Allen, Consulting Solutions Architect, Barracuda, Felix Bueltmann, Senior Consulting Engineer, BarracudaRecorded: Nov 26 202017 mins
Using SD-WAN to build a secure digital enterprise: Episode 3
Remote and mobile users increasingly require access to corporate information and applications. This can create numerous challenges that call for SD-WAN.
Join us for to hear how the acceleration of remote work brought on by Covid-19 has changed how we should approach networking. See for yourself how you can leverage SD-WAN to solve these challenges, including:
•How to include your remote workforce when designing your WAN
•Why using the cloud makes this simple.
Don’t miss this third webinar in a five-part series on SD-WAN to understand the different deployments and what might work for your organization.
John Gudmundson Head of Technical Product Marketing, Gigamon and Lee Carass Solution Architect, Trend MicroRecorded: Nov 26 202050 mins
Public Clouds are on the ascent. To ensure comprehensive security with superior performance you need full packet and application visibility. As such environments are also very dynamic and complex, automation is critical to success.
Today, to acquire and forward traffic to various security and monitoring tools you must laboriously install agents on each compute node for every tool or potentially utilise native traffic mirroring services. Neither of these approaches provide you the full control nor detailed insights into network flows.
There is a better way. Learn how next-gen Network Packet Brokers collaborate with cloud orchestration tools to automatically provision virtual TAPs to obtain all traffic. Next, app flows are identified, optimally processed and distributed to security tools such as anti-malware from Trend Micro. Network efficiency rises, user security enhanced, and tool effectiveness improved.
Emily Sergent, Ingénieure avant-vente, DenodoRecorded: Nov 26 202087 mins
Selon le cabinet d'analystes Gartner, "d’ici 2022, 60 % des entreprises auront intégré la virtualisation des données parmi leurs principaux mode de livraison de données dans leur architecture d’intégration." Gartner a nommé Denodo parmi les leaders dans le Magic Quadrant 2020pour les outils d'intégration de données.
Découvrez lors de cette session d'1h30 en quoi la data virtualization révolutionne l'approche métier & IT dans l’accès, la livraison, la consommation, la gouvernance et la sécurisation de vos données, quel que soit l'âge de votre technologie, le format de la donnée ou son emplacement. Cette technologie mature comble le fossé entre l’IT et les utilisateurs métier, et permet des économies considérables en termes de coûts et de temps.
Atelier online d'1h30.
Vous pourrez réaliser les exercices à votre rythme grâce à l'enregistrement.
**POUR QUI EST CET ATELIER ?
- Responsables IT / Architectes
- Data Scientists / Analystes
Au programme : une introduction à ce qu'est la virtualisation des données, les cas d'usages, des études de cas clients réels et une démo guidée pas à pas des fonctionnalités de Denodo Platform avec notre version gratuite sur le cloud, Denodo Test Drive.
- Intégrer et livrer vos données rapidement et facilement à l'aide de Denodo Platform
- L'optimiseur de requêtes de Denodo fournit des données en temps réel, à la demande, même lorsqu'il s'agit de jeux de données très volumineux
- Exposer les données en tant que «services de données» en vue d’être consommées par une variété d'utilisateurs et d'outils
- La virtualisation des données joue un rôle essentiel dans la gouvernance et la sécurité des données au sein de votre organisation
- Introduction à la Data Virtualization
- Cas d'usage & études de cas clients
- Gouvernance & sécurité
- Démonstration guidée pas à pas avec le Denodo Test Drive
- Session interactive Questions/Réponses
Containers and Kubernetes have shaped the future landscape of modern application development and deployment with their more powerful automation, scalability and agility. As the de facto standard for container management and orchestration, Kubernetes has now become one of the most popular open-source programs from CNCF (Cloud Native Computing Foundation). Though container management has been massively simplified using automation, making Kubernetes working for you in an effective way remains a huge challenge to organisations that are new to it. Managing Kubernetes is completely different from managing traditional virtualisation, and a fully functional PaaS requires a variety of components that go beyond Kubernetes, including monitoring and logging. Sangfor KubeManager is Sangfor’s answer to the container world, with the ultimate goal of streamlining your container operations with boosted simplicity and cost efficiency. In this webinar, join Sangfor experts in a candid talk about Kubernetes, and dive deeper into Sangfor KubeManager.
Kiat Hiong Soh, Sales Engineering Lead, Rubrik AsiaRecorded: Nov 26 202028 mins
Open application programming interfaces (APIs) unlock innovation as businesses transform and grow. IT teams can accelerate adoption of new platforms and interconnect to existing resources to provide services such as: provisioning tools, service portals, configuration management, centralized monitoring and management, test automation, and more. Open APIs have been a part of the Rubrik platform since its inception.
Sahil Bansal, Senior Product Marketing Manager, NutanixRecorded: Nov 26 202027 mins
No matter where you work or what you do, IT Pros all have one thing in common and that's a lack of time. There's never enough time in the day to "keep the lights on" and innovate (much less time to enhance your skill set or keep up to date.)
Learn about new technology that can make your life, as an IT Pro, easier and more efficient
In this session, find out how you can:
- Leverage these solutions to solve your greatest IT challenges
- Get all your questions answered from experts in the industry
- See these solutions in action!
Bill Thrash https://www.linkedin.com/in/wthrash & Chase Cunningham https://www.linkedin.com/in/dr-chase-cunningham-54b26243Recorded: Nov 25 202036 mins
Welcome to Something Something Cyber! This is the first episode in our new series "Solution Spotlight" a special series that delves into new, unique, and exciting technologies in the industry and gives you a front row seat to the founders, engineers and executives bringing these new tools to market.
This episode is sponsored by Airgap.
Airgap is designed with total protection in mind, by providing an agentless zero trust isolation platform.
Airgap can be deployed in minutes, not months. No agents, no APIs, no application architecture changes, Airgap platform works with a wide array of deployment models.
Airgap empowers the enterprise through it’s unique “ransomware killswitch” technology that identifies, and isolates ransomware, protecting your environment from additional spread of infection.
As part of this episode Airgap is offering our listeners in Higher Education and First Responders the ability to deploy and utilize Airgap for 1 year free of charge.
We’re excited to welcome Ritesh Agrawal, founder and CEO of Airgap.
James Petter, VP Intl - Pure Storage | Mark Moerdyk, CTO, Beazley | Martin Veitch, Editorial Director, IDG ConnectRecorded: Nov 25 202037 mins
During the Coronavirus crisis, many organisations have faced a litany of challenges that have significantly disrupted their operations and necessitated new ways of working. The businesses best placed to overcome these challenges are those that have processes in place that allow them to act at speed. This webcast discusses how businesses can instil the ability to act at speed, address opportunities, and hurdle obstacles when dealing with unexpected disruptions like COVID-19.
Dietmar Simon, Senior Solution Architect DACH, Druva GmbHRecorded: Nov 25 202069 mins
Cloud Computing hat herkömmliche Methoden der Datensicherung in Frage gestellt. So stellen Cloud-basierte und virtualisierte IT-Infrastrukturen traditionelle Tools vor Anforderungen, die sie oft nicht erfüllen können. Auch erweist sich der Kosten- und Verwaltungsaufwand einer On-Premises-Lösung häufig im Vergleich als zu hoch.
Cloud-native Backup-Lösungen überwinden diese Probleme durch ihre Architektur und ihr flexibles Nutzungsmodell. Mit Cloud-basiertem Backup & Recovery können Unternehmen die Kosten für ihre Datensicherung senken, ihre Möglichkeiten erweitern und ihren Administrationsaufwand senken. Zugleich sorgen sie dafür, dass im K-Fall ihre Absicherung durch modernste Methoden und Cloud-Technologien erfolgen kann.
Radovan Bruncak - PreSales Consultant, ThalesRecorded: Nov 25 202031 mins
Any organisation involved in card payment transactions, from issuance to processing, must be compliant with standards. These are increasingly becoming more robust, detailed and payment-specific to protect customer sensitive data. To meet these standards, HSMs are a mandatory requirement to both protect and support the cryptographic keys and operations throughout the payment transaction.
As such, HSMs are a critical part of an organisation’s infrastructure and are expected to handle transactions seamlessly, 24/7. Performance, reliability and operating costs are all factors to consider during a procurement selection stage, while the operations team must have the available tools and knowledge to be able to remotely manage the HSMs for configuration, audit and key management, following industry best practise.
Join Radovan Bruncak Pre-Sales Consultant at Thales:
1) Learn how international standards are driving the payments industry
2) Explore the best practice guidance to protect payment data and transactions
3) Discover how HSMs are helping to meet compliance
Karl Thomson, Sr. Sales EngineerRecorded: Nov 25 202028 mins
Whilst we are going through some unusually turbulent times, businesses are increasingly embracing digital technology to stay afloat and gain competitive advantage. However, the explosive data growth we are facing, coupled with budget limitations due to the uncertainty, makes it very challenging for IT teams to upgrade their expensive primary storage solutions.
StorageCraft has the solution for you: OneXafe scale-out object based storage!
Justin Thorogood - Andrew Scott - Snorre Hansen -Terry Hooper - CITRIX NetworkingRecorded: Nov 25 202059 mins
Application Delivery Management (ADM) is a central management solution that allows you to manage and monitor an entire global application infrastructure from a single unified console. It can be a real help when looking to get more information about the networking environment. Join our webinar to find out how ADM can be deployed to get better visibility of your networking environment.
Margaret Dawson | David Jack | Angel Valero | Rudi Peeters | Massimo Rosso | Phil Jordan | Hendrik DeckersRecorded: Nov 25 2020117 mins
In this virtual event we'll dive into Open Transformation and the role of each of its critical elements - Open Culture, Open Processes and Open Technology/Architecture.
We'll also go beyond the "transformation" hype and discuss how top Digital Leaders have effectively approached this journey, the challenges they have faced and the results so far.
Join this conversation to truly inspire, lead and accelerate your organisation's Digital Transformation!
Meet our speakers:
- Margaret Dawson, CP & CDO, Red Hat
- David Jack, CTO & CPO, Dunnhumby
- Angel Valero, Corporate CIO, Telefonica
- Rudi Peeters, CIO, KBC Group
- Massimo Rosso, ICT Director, RAI
- Phil Jordan, Group CIO, Sainsbury's
- Hendrik Deckers, Founder& MD, CIONET
Xavier Michaud | Abdelkrim Ahmed BachaRecorded: Nov 25 202061 mins
Les institutions financières et organisations gèrent plusieurs types de données sensibles et mettent en œuvre des efforts importants afin de sécuriser, mettre en conformité leurs périmètres soumis à des exigences réglementaires ou de l’industrie.
Verizon publie son rapport annuel « Payment Security Report – PSR » depuis 2010 et continue d'offrir un point de vue unique sur l'impact à long terme des standards de sécurité des données de l'industrie des cartes de paiement (PCI DSS).
Le rapport de Verizon, détaillant la sécurité des cartes de paiement et la conformité au standard PCI DSS, est devenu une lecture incontournable pour chaque entité devant protéger des données privatives dont les cartes bancaires (GDPR/PCIDSS).
Vous y trouverez des informations sur :
* Les principales conclusions du rapport 2020 et leurs significations.
* Les 7 pièges à éviter pour vous aider à faire évoluer votre gestion actuelle de la conformité à un meilleur niveau de maturité.
* Comment aider à développer la visibilité, le contrôle et la prévisibilité des performances en matière de conformité.
* Une analyse de l’impact COVID 19 sur la sécurité des paiements et un retour sur les principales mesures à mettre en place.
En conclusion de cette session, vous aurez la possibilité d’échanger avec nos experts sur les différents challenges et de découvrir d’autres approches à la conformité (PCIDSS/PCI Office/Compliance Office).
Xavier MICHAUD, Managing Principal Security Consultant, Security Assurance
Abdelkrim AHMED BACHA, Senior Security Consultant, Security Assurance
Toby Redshaw | Simon Parry | John CrawfordRecorded: Nov 25 202038 mins
The pandemic has shone a spotlight on how digital can be a truly transformative investment. Enabling companies to not only boost productivity, but also engage and communicate with their employees, customers and stakeholders in a way that they didn't think possible.
In this session, we’ll discuss the technologies that forward-thinking business are prioritising and already investing in, such as:
• Artificial Intelligence and Machine Learning
• Automation and Robotics
• Core network technologies and 5G
Attendees to this webinar will hear about:
• The importance of maintaining the human touch in organisations by finding the right balance when allocating tasks between automation, AI, and humans
• Why 5G can be such a game-changer. How it can be used to create private wireless networks that provide secure, high-bandwidth, low-latency connections, enabling exciting new solutions like driverless vehicles such as robots and automated forklifts and near-real-time tracking of manufacturing lines. The range of solutions is huge from tracking to safety, predictive maintenance to digital twins.
• How to leverage these technologies whilst ensuring that human choices shape the workplace and that we are not drawn into an algorithm-driven structure
Toby Redshaw, Senior Vice President – 5G Solutions & Enterprise Innovation, Verizon Business
Simon Parry, CTO, Nokia Enterprise UK, Nokia
John Crawford, General Manager, Enterprise Innovation and 5G solutions, Verizon Business
Satish Mohan, CTO, Airgap NetworksRecorded: Nov 24 202040 mins
On Oct. 1, 2020, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) is issuing an advisory to alert companies that engage with victims of ransomware attacks of the potential sanctions risks for facilitating ransomware payments. The question is now back to you - How do you respond / react when you are hit by ransomware? What if you can push a “ransomware kill switch” to instantly stop the propagation of ransomware? Come and join us in this BrightTALK Demo Day and see it in person how you can easily lock down your network in tiers without unplugging any network cable or shutting down any devices.
Akhilesh Dhawan, Michael Stringer Jr. Jason Willis, Christopher BarnumRecorded: Nov 24 202058 mins
Today, remote work is the most predominant version of the “new normal.” What that means is that IT organizations must deliver flexible work alternatives that are all about equipping employees anywhere -- and enabling them to seamlessly do their best work at any time, on any device over any network. This new world has made stringent security like zero trust crucial. A zero trust model relies on contextual awareness to adaptively grant access to authorized employees using patterns based on identity, time, and device posture. Zero trust helps mitigate risk and it improves the user experience. Even more compelling, it eliminates the need for traditional VPNs. The catch is that most IT teams already have a remote access solution in place. So how do you make the switch?
Join this webinar to hear tips and best practices from security experts who can help.
- Define your remote access strategy
- Understand gaps with your existing VPN solution
- Augment the existing solution with new use cases like BYO, web and SaaS apps
- Start migration from existing VPN to cloud delivered security solution
Duan van der Westhuizen, SVP of Product & Marketing, FactionRecorded: Nov 24 202050 mins
VMware Cloud on AWS was the first cloud-based offering for VMware customers looking to seamlessly adopt public clouds, but it is no longer the only option. Offers like Azure VMware Services, Google Cloud VMware Engine, and Oracle Cloud VMware Cloud Solution have expanded the reach from the on-premises datacenter to a global multi-cloud network of providers and regions. Is your organization ready to embrace this new scope in cloud environments and capabilities?
In this webinar, we help you understand the considerations you should take note of before diving in head first:
● Data Gravity and its effect on your future flexibility and cloud optionality
● Cloud lock-in and what it means to your business
● VMware as the central platform that enables true private, hybrid, and multi-cloud
● How your business can get a competitive edge by using more than one cloud at a time
● Driving a 10x savings in data costs while using the best tools from your cloud of choice
● How does this all work? The fundamentals of multi-cloud networking
Dan Juengst, Senior Principal Technology Evangelist, Red Hat and David Duncan, Partner Solution Architect, AWSRecorded: Nov 24 202061 mins
Adopting a hybrid cloud strategy is a journey, not a destination. When you consider using a public cloud environment for some or all of your applications, you’re faced with a number of choices and approaches. When considering a hybrid cloud environment, you often end up being overwhelmed and discover that vendors don’t use the same language when talking about them.
Detailed planning with Red Hat and Amazon Web Services (AWS) can help you successfully create, scale, and migrate innovative applications to an agile hybrid cloud environment as big as you need and available whenever and wherever you need it.
In this webinar, we’ll:
•Share a series of questions you might consider when planning your hybrid cloud journey.
•Discuss how the Red Hat and AWS partnership can simplify a potentially complicated journey.
Michael Wilde, Dir Sales Engineering @honeycombio & Peter Tuhtan, Product ManagerRecorded: Nov 24 202044 mins
Second episode in our Honeycomb Learn series looks at how to cut stress levels when debugging issues in production. Starting with a hypothesis, run fast queries and then navigate to the code where the problem lies. Be proactive and set triggers to let you know if something needs attention. When engineering is about to ship a new release, set a feature flag to watch how production behaves in real-time. Curtail performance issues and reduce customer impact with the right tools to better understand production systems, right now.
* Quickly go from hypotheses to fast query and pinpoint exactly where the issue is
* How to set triggers based on thresholds important to your business
* Set feature flags to control specific parts of your environment to reduce stress levels.
See a Honeycomb demo, ask questions and learn more.
Nishant Taneja & Olesia Klevchuk, Product Marketing, Barracuda, Bryan Glick, Editor in chief, Computer WeeklyRecorded: Nov 24 202042 mins
Traditional email security solutions aren’t enough to protect businesses anymore. Strategies and processes need to be in place to actively defend your business, people and data against sophisticated email threats.
Join Bryan Glick, Editor in chief at Computer Weekly, Olesia Klevchuk and Nishant Taneja, Product Experts from Barracuda as they explore strategies to improve your email protection and answer questions:
- Why is email still the #1 threat vector?
- What types of attack strategies are cybercriminals using during the pandemic?
- How can IT security professionals make sense of the threat landscape?
- How does remote work change the perspective on security?
- What threats should end users be on the lookout for?
- With email communication and messaging becoming integral to remote work, what can employees do to stay safe?
- Why do traditional defenses fail to detect and stop advanced attacks?
- Should organizations deploy 2FA to prevent account takeover?
- When threats do get through, how should incident response work?
- Beyond technology tools, how can organizations improve their defenses?
Steve Carter | Senior Product Marketing Manager, NutanixRecorded: Nov 24 202043 mins
Converged infrastructure is several steps up from legacy infrastructure, it loses out when it comes to the cost-saving, application-securing, VM-moving power of hyperconvergence.
Join us for this webinar where Steve Carter, Senior Product Marketing – Nutanix, will take you through how you can simplify your IT infrastructure.
In this webinar you will learn:
• What are the primary benefits of HCI compared to Converged Infrastructure?
• How WebScale IT infrastructure innovations make HCI possible
• How HCI enables IT to be agile and cost conscious in the face of business uncertainty
Colin West - EMEA SE Director, DruvaRecorded: Nov 24 202020 mins
Join Druva for a 30 minute briefing and learn what to look for when evaluating cloud-based Data Protection solutions. We’ll discuss the best practices for a backup solution that protects your on premise data whilst ensuring the data protection repository is away from your network.
Storage Managers, Data Protection administrators, and anyone responsible for data would be interested in this webinar on Best Practices. Register and learn
- Why data protection works best in a cloud-native environment
- Real-world solutions architecture will be discussed with respect to Data protection
- Modernize your Data Protection by considering what to look for in a cloud-based solution
We expect the session to be well subscribed, so register now!
John Aarsen, SE - Benelux and Nordics, SonicWallNov 30 202010:00 amUTC60 mins
Join SonicWall Cybersecurity expert John Aarsen as he explores the biggest threats to cloud environments — and why new ways of looking at cybersecurity, such as “Shift Left,” are required for safe and productive cloud use.
Ritesh Agrawal, CEO, Airgap NetworksNov 30 20204:00 pmUTC29 mins
Ransomware attacks continue to plague K–12 schools nationwide, and they’re not slowing down anytime soon. In the pandemic, more than 1,000 educational institutions have fallen victim to ransomware, according to a report by security firm Armor. With most schools implementing some form of online instruction this school year, these attacks have only increased in volume and speed, and their impact is much more significant.
In addition to the ransom itself, these attacks can exact a heavy cost: school district operation disruption, remediation costs, and job implication.
In this BrightTalk session, Edu tech and IT will learn:
How ransomware is surging in a remote/online learning environment?
What is the fundamental mind shift in network design required?
What to do before, during, and after a ransomware attack with Zero Trust solution?
Why you shouldn’t and cannot pay ransoms?
What is Ransomware Kill Switch and how it can protect you?
How to stop ransomware propagation in seconds?
Anonymous Security Expert and Syya YasotornratNov 30 20206:00 pmUTC45 mins
This unique BrightTALK session is your 1-on-1 meetup with the most recent ransomware attack - Ryuk - in UHS Universal Health Services Ryuk's operators are known to go "big game hunting" and have previously targeted large organizations, including shipping giant Pitney Bowes and the U.S. Coast Guard. UHS has 400 hospitals and healthcare facilities in the U.S. and the U.K., and serves millions of patients each year. In this session, you will get to know how Ryuk ransomware behave in your organization and how you can use Zero Trust Isolation to prevent the attack proactively.
Hanindya Permatasari, Enterprise Solution ArchitectDec 1 20202:30 amUTC45 mins
Rubrik’s Automated Oracle Data Protection orchestrates the backup, archival, replication, and migration of your Oracle Databases. Automate database discovery and protect Oracle environments with a single SLA policy engine. Restore entire databases with near-zero RTOs or recover down to a single tablespace. Spin up database clones without storage penalty to validate backups or to accelerate test/dev.
Prof. Herman Singh, CEO - Future Advisory | Anthony Olivier, MD - Performanta | Paul Ruinaard, & Craigh Stuart - NutanixDec 1 202010:00 amUTC119 mins
In this Nutanix Connect session we are partnering with Professor Herman Singh to help unpack the current crisis that is redefining almost all aspects of our lives and calling into question many of the choices we have already made.
The bottom-line. Firms with large headquarters could be left with white elephants and even the way that visitors are managed could make face to face encounters impractical. In this Nutanix Connect session, we will explore how to think about these questions and brace for impact.
1. What does the workspace of the future look like? Are cubicles back?
2. What is the future of headquarters? How do we handle visitors and elevators?
3. What should be done with collaborative work?
4. What should we be doing at our home office?
Our panel will further share their experiences and provide advice on how you can approach restructuring your workspace in a safe, financially viable and functional way.
Girish Chanchlani Partner Solutions Architect AWS, David Gildea VP of Product Druva, Tony McGarry Senior Principal EngineerDec 1 20202:00 pmUTC25 mins
Meet the Cloud Architects
Episode 1: Excelling with AWS well-architected framework
Join Druva and AWS technical experts for the launch of our new webinar series, ‘Meet the cloud architect’. Each episode the panel will be sharing their real-world experience and key learnings of building and scaling on the AWS cloud platform and how they used the AWS Well-Architected Framework.
Our goal of episode one is to provide pro tips to help simplify your journey when building large scale global SaaS applications on AWS. It will help you bridge the gap between theory and practice, by identifying pain points before they materialize.
Don’t miss out on these powerful tips! Register now to join Druva product experts and this episode’s special guest, Girish Chanchlani from AWS, in our inaugural Meet the Cloud Architect Series.
Tyler Moffitt, Senior Threat Research Analyst @ WebrootDec 1 20204:00 pmUTC60 mins
SMBs were one of the major targets for cybercriminals in 2020. In 2019, two out of five SMBs have fallen victim to a ransomware attack. Register now for this 30-minute webinar on the key threats businesses faced during 2020, see what's upcoming in 2021, and get tips to help you to keep your business and clients safe.
In the webinar, Tyler Moffit will be discussing information theft, information stealers, COVID, AI and machine learning, and all thing that made the cybercrime headlines of 2020.
Molly Stamos, Customer Success Engineer and Ben Hartshorne, Senior EngineerDec 1 20204:00 pmUTC60 mins
Distributed systems bring complexity for developer and ops teams. When incidents occur in production, expected and unexpected, you want to pinpoint which part of the service is giving problems. Distributed tracing illuminates distributed systems, making your logs easier to navigate. Quickly identify where there are errors or latency in your code or service, even within 3rd party services you use. Instrumentation is the key to the best tracing experience possible.
We will dive into the importance of tracing when debugging, and show how Honeycomb Beelines fast-track instrumenting code. You will learn:
* The importance of tracing when debugging production along with other types of analysis
* how to debug by analyzing patterns and trends in the data generated by traces
* how to work with OpenCensus or OpenTracing (yes you can with Honeycomb).
Join this exciting session and discover the value of tracing. Spoiler: it's easier than you may think.
Ritesh Agrawal and Jason MaferaDec 1 20204:00 pmUTC45 mins
"All systems were quickly disconnected, and the network was shut down in order to prevent further propagation," Is this your response to a ransomware attack? If the answer is Yes or Maybe, this BrightTalk session can help you improve your ransomware response. In Oct 2020, Ransomware hit the Universal Health Services (UHS), one of the largest US health systems, and consequently, malicious actor affected all of its US care sites and hospitals, spurring clinicians into EHR downtime procedures. Healthcare facilities use common EMR and EHR solutions. When one is hit, it's inevitable for others to avoid it.
In this BrightTalk session, Healthcare tech and IT will learn:
How ransomware is surging in Healthcare facilities?
Why agent-based endpoint security may not be your answer to ransomware defense
What is the fundamental mind shift in network design required?
What to do before, during, and after a ransomware attack with Zero Trust solution?
Why you shouldn’t and cannot pay ransoms? What is Ransomware Kill Switch and how it can protect you?
How to stop ransomware propagation in seconds?
Greg Gum, CEO and Rick Uperti, Sr. Systems Architect at GateSpeedDec 1 20204:00 pmUTC60 mins
Working remotely or from home has become a necessity rather than privilege in today’s businesses. Even before the COVID-19 pandemic, remote workers grew by 44% over the past five years. With increasing numbers of remote enterprise and other home users frequently sharing the same broadband connections, SaaS tools and video calls are contending with other users (e.g., other tenants, co-workers, family, other Wi-Fi users).
In this webinar, we will introduce a new virtualized AI/ML based solution from GateSpeed that can provide significant network performance improvements on congested LANs and WANs automatically, without expensive hardware or dedicated IT teams. We will outline tips and tools including dynamic TCP/UDP optimization, Access Point load balancing, and LAN-to-WAN rate shaping to demonstrate ways to improve overall throughput and network performance with Intel based platforms.
Michael Walker, Senior Director and Global Head of Open Innovation Labs, Red HatDec 1 20205:00 pmUTC44 mins
If DevOps is a better way to work, then why do so many DevOps movements fail to produce meaningful results in the enterprise?
In this session, Michael Walker will share stories of enterprises around the world who have struggled to successfully adopt DevOps. We will examine the common barriers to change, and understand why traditional approaches have failed. We will then examine how principles of open source communities, and open organizations, can help enable effective DevOps in the enterprise. Finally, we will share techniques for building high-performing, product-oriented teams who adopt DevOps as their preferred way of working, along with examples of the results.
Ollie Sheridan, Principal Sales Engineer, Security, GigamonDec 1 20206:00 pmUTC59 mins
There is much talk in the Industry with regards to Zero Trust Networking (ZTN) - but what does it involve and what does this mean for Network Visibility? In this Webinar we will explore the reason for ZTN, some of the current ideas surrounding the implementations of ZTN and where Network Visibility plays a key role in securing such environments. With one of the key concepts of ZTN being the encryption and authentication of data in motion, we will also discuss the need for Metadata and why this can be an advantage over traditional methods of monitoring.
Join Gigamon and (ISC)2 for an examination of:
· Understanding the ZTN trust model at a high level
· Which ZTN components are most critical and why
· Why the perimeter is changing and why the need for segmentation goes beyond physical devices
· The crucial role of metadata in understanding applications on the network
Ben Stiles, Technical Director of Strategic Accounts at FactionDec 1 20206:00 pmUTC30 mins
Multi-Cloud is THE pillar of IT in 2021, and Faction is here to show that it isn’t just theory anymore. We will take you through our in-depth validation and testing, real world architectures, and lessons from the trenches that will change your point of view on how this could change your business in 2021 and beyond.
Matt Just, Sr. Technical Marketing Manager at VMware. Sehjung Hah, Product Line Marketing Manager at VMwareDec 1 20206:00 pmUTC60 mins
How do you scale your network team?
One way to scale your teams is with better tools that take a lot of the manual tasks of network verification and dynamically perform them.
VMware vRealize Network Insight Assurance and Verification is a new capability that helps you monitor networks using intent-based networking principles.
Assurance and Verification builds a digital twin model of the network and takes the current state of the network and verifies that the current state matches the business intent for the network.
Join the webinar to learn more about this exciting new capability.
Meet our presenters:
- Matt Just is a Sr. Technical Marketing Manager at VMware. He is responsible for supporting technical marketing and product development of VMware vRealize Network Insight. Matt has over 20 years experience in data center networking & security design and expert knowledge in routing and switching technologies. Follow Matt on LinkedIn: www.linkedin.com/in/mattjust/ or on Twitter: @H1_TEK_MATT
- Sehjung Hah is a Product Line Marketing Manager in VMware’s Cloud Management Business Unit working on vRealize Network Insight Cloud. Sehjung has worked in the networking industry for 23 years in various roles in product marketing, product management, technical marketing, engineering, technical support, sales enablement. On sunny days, he enjoys biking and hiking. Connect with Sehjung via LinkedIn https://www.linkedin.com/in/sehjunghah
No technology system is perfect with human behavior often presenting the biggest security risk. Given these challenges, how can your organization turn the tables on cybercriminals and gain the upper hand?
In this entertaining and informative talk, former Director of R&D at the NSA and Associate Director on National Intelligence, Eric Haseltine, shares seven ways that you’ve probably never heard of to foil cybercrooks and make the human side of your organization more secure.
Rod Moore, Cloud Domain Architect, Red HatDec 1 20207:00 pmUTC48 mins
In today's open hybrid datacenter, Applications are moving from a monolithic to a cloud-native approach that leverages Kubernetes. These modern applications may have components that span multiple clusters and multiple cloud providers. In addition, new clusters are being added for specific purposes like edge deployments and reduced latency. This "Cluster Sprawl" introduces several new management issues. For example;
How can I manage the lifecycle of multiple clusters regardless of where they reside (on-premise or across public clouds) using a single control plane?
How do I get a simplified understanding of my cluster health and the impact it may have on my application availability?
In this webinar, you'll learn to address these management concerns and numerous others with Red Hat Advanced Cluster Management for Kubernetes. It offers end-to-end management visibility and control to manage your cluster and application life cycle, along with security and compliance of your entire Kubernetes domain across multiple datacenters and public clouds.
About the speaker:
Roderick Moore is a Cloud Domain Architect on Red Hat's North American Public Sector team. He covers the products that comprise Red Hat's management portfolio. His more than 25 years of helping customers choose and implement enterprise management software makes him a valued resource when discussing the management needs of today's open hybrid environments.
George Kuruvilla, Ryan McClure, Carisa StringerDec 1 20207:00 pmUTC47 mins
IT planning takes into consideration unpredictable events, but the 2020 calendar year presented an unprecedented challenge which put many IT initiatives on hold. While there has been a lot of excitement surrounding recent on-premises releases of Citrix Virtual Apps and Desktops solutions, in this pandemic era many businesses are weighing that effort alongside the decision to embrace new cloud technologies. In this webinar, we will walk you through key datapoints and considerations to help guide you through your decision.
Join this webinar to learn:
- Important considerations for evaluating an on-premises upgrade or cloud service transition
- Updated details on Citrix packaging and licensing options in order to provide greater choice
- How Citrix is simplifying hybrid cloud deployments for organizations of all types and sizes
- Enhancements released through 2020 and how they shape IT planning
Jon Lin, President, Equinix | Ryan Azus, Chief Revenue Officer, Zoom | Richard L. Villars, Group VP, Worldwide Research, IDCDec 2 20202:00 amUTC44 mins
In this roundtable, join C-Suite executives from Zoom Video Communications and Equinix, featuring IDC, in exploring best practices for accelerating digital initiatives and how businesses can implement, connect, scale and adapt to be ready for whatever is next.
Equinix, Zoom and IDC will be discussing:
•Key infrastructure challenges that digital leaders encounter as they accelerate initiatives.
•Best practices to consider when building and scaling a resilient digital business.
•Remote work’s impact on urbanization and supporting infrastructures.
•Jon Lin - President, Americas, Equinix
•Ryan Azus - Chief Revenue Officer, Zoom
•Richard L. Villars - Group Vice President: Worldwide Research, IDC
68% of companies now believe that the future workforce will be remote*. A hybrid of remote working and reduced office working will be the new reality. On one hand, this could have positive outcomes such as increased productivity for some departments, but on the other hand, it may also negatively impact work/life balance and raise mental health issues.
In this session, we will be discussing the changing concept of work, the workplace and the environment that business leaders need to create to thrive in this new world in relation to:
• Changes to the physical workplace: Offices may need to be repurposed as drop‐in collaboration centres rather than everyday bases, and use more tech such as VR
• Smarter working: With the proliferation of video and web conferencing, how can you enable more productive collaboration tools such as document sharing, annotation and white‐boarding
• The importance of security: How to protect the organisation from today's evolving threat landscape especially when the employee's environment is out of your control
• What to prioritise to enable your digital workplace: Simplicity and integration are key in this area in order to provide employees with a single, app‐like experience across the tools they use every day
Attend this session to solidify your plans and uncover the journey to the new digital workplace.
Dirk Schlotter, Director Global Real Estate & Supply Chain for Verizon Communications.
* 2020 The Future of Work, Reimagining business as usual, Verizon Research report
SonicWall’s Cybersecurity-Experte Fabian Freundt gibt Ihnen Hintergrundinfos zu den größten Bedrohungen für Cloud-Umgebungen und zeigt auf, warum neue Überlegungen in der Cybersicherheit, wie „Shift Left“, für eine sichere und produktive Cloud-Nutzung erforderlich sind.
Julian Schreier, Sales Engineer, Barracuda NetworksDec 2 20209:00 amUTC51 mins
Schützen Sie Ihr Unternehmen vor allen wichtigen E-Mail-Bedrohungen – einschließlich der raffinierten Bedrohungen, die oft an sicheren Gateways vorbeikommen.
Verpassen Sie nicht diese eingehende Betrachtung der breitgefächerten Palette aktueller E-Mail-Bedrohungen, einschließlich von deren Risiken für und Auswirkungen auf Unternehmen. Zudem wird erläutert, wie mit maschinellem Lernen und API-basiertem Schutz des Posteingangs die Lücken im E-Mail-Gateway geschlossen werden können und zu umfassendem E-Mail-Schutz vor Angriffen beigetragen werden kann.
Verteidigen Sie sich gegen raffinierte E-Mail-Bedrohungen, die Abwehrmaßnahmen umgehen und über Backdoor-Verfahren wie Spoofing, Social Engineering und Betrug großen Schaden anrichten können. Schützen Sie Mitarbeiter auf Posteingangsebene – mit der richtigen Kombination aus technologischen Lösungen und Schulungen für das Sicherheitsbewusstsein.
Reduzieren Sie mit einer mehrstufigen Schutzstrategie drastisch Ihre Anfälligkeit für E-Mail-Angriffe und verbessern Sie so den Schutz Ihres Unternehmens, Ihrer Daten und Ihrer Mitarbeiter.
Wir zeigen Ihnen in diesem Webinar einen detaillierten Blick auf die 13 Bedrohungen sowie Analysen und Lösungen zur Stärkung Ihrer E-Mail-Sicherheit in einer immer sich weiterentwickelten Bedrohungslandschaft.
Luca Pesce, Sales Engineer North Italy, SonicWallDec 2 202010:30 amUTC60 mins
Seguite Luca Pesce, esperto di Cybersecurity di SonicWall, che analizza le principali minacce per gli ambienti cloud e perché per un utilizzo sicuro e produttivo del cloud è necessario un nuovo approccio alla cybersecurity, ovvero un drastico cambiamento di mentalità.
Vaibhav Puranik, SVP of Engineering, GumGumDec 2 202011:00 amUTC47 mins
Computer vision company GumGum required a solution to help reduce the huge Elastisearch costs for their machine learning data. In this webinar, Vaibhav Puranik, SVP of Engineering at GumGum explains how they saved over $500k a year on their ML projects without compromising performance or availability.