Hi [[ session.user.profile.firstName ]]

Virtualization

  • Staying Ahead of the Curve: Microservice & MDM Strategies for Agile Architecture
    Staying Ahead of the Curve: Microservice & MDM Strategies for Agile Architecture Primitive Logic President Kevin Moos, Chief Architect Eric Greenfeder, Technical Director Steve Ernst Recorded: Sep 20 2018 40 mins
    In the race towards digital transformation, fueled by growing competitive pressures, enterprises need an architecture that responds quickly to escalating customer expectations — while also maintaining security and reliability.

    Join Primitive Logic to discover why your EA roadmap must begin with your business priorities … and how microservice architectures and master data management (MDM) strategies can help you achieve your objectives.

    You’ll learn:
    - How to build a secure EA roadmap grounded in your business priorities
    - How microservices let you move quickly in keeping up with customer expectations
    - How MDM helps you deliver the insights businesses need to make data-driven decisions
  • Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond
    Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond Dinah Davis, VP Research & Development - Arctic Wolf Networks Recorded: Sep 20 2018 38 mins
    Last year was all about large Ransomware hacks like WannaCry, Petya/NotPetya, and CRYPSHED to name a few. These various strains of Ransomware can bypass your perimeter controls and infect your critical systems, bringing your business to a grinding halt.

    However, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. So, what are your options?

    In this webinar Dinah Davis, VP of Research & Development, at Arctic Wolf Networks, will share her key insights on a ransomware cyber kill chain from delivery, infection to command and control activity, and walk you through the following:

    - What happens when a ransomware is exploded in a computer, with a demo
    - How do you detect and respond to a ransomware attack?
    - What is coming next in the world of ransomware?

    To discover how to fortify your network with 24/7 monitoring with managed detection and response, register for our upcoming webinar.
  • IT Ops SIG Talk Ep. 10: Building a Hybrid IT Blueprint
    IT Ops SIG Talk Ep. 10: Building a Hybrid IT Blueprint Bobby Allen Recorded: Sep 20 2018 29 mins
    Building a Hybrid IT Blueprint – Discover the right mix of public vs. private providers and services for your application portfolio

    Many decision makers will say they need more information. The reality is that most leaders are actually drowning in information. What they really need is to move from information to clarity to insight. Attend our talk on building a hybrid it blueprint to see how CloudGenera can quickly take large amounts of data about your applications and provide data-driven analysis on best execution venue. We believe these sorts of insights should happen in minutes not months.

    Attendees will learn the following:

    •Elements that must be part of Total cost of ownership (TCO) analysis
    •How to analyze public vs. private execution venues
    •How to quickly revisit decisions when inputs or market factors change
  • A Zero Trust Approach to Decoupling Intent from Implementation
    A Zero Trust Approach to Decoupling Intent from Implementation Chase Cunningham, Principal Analyst, Risk & Security, Forrester and Matt Dean, Vice President, Product Strategy, FireMon Recorded: Sep 20 2018 60 mins
    Adopting a Zero Trust model means taking the first steps to redesigning your network in order to strengthen data security, detection, and response.

    In such an ecosystem, it can no longer be about just writing security rules. Instead, enterprises must adopt a method of security intent and separate that desired goal of security from the specific implementation.

    This hierarchy allows you to set a single global policy that’s applied to any network resource with all its defining attributes – regardless of mutations in the network.

    At the same time, you can reduce the number of access requests that need to be managed manually and automatically ensure real-time compliance. And even more, business intent can be fully in line with security policy controlled at speed and scale.

    At most hybrid enterprises right now, these aren't realities -- but they can be, and that's where network security is headed.

    Join our guest, Forrester's Chase Cunningham, with FireMon's Vice President, Product Strategy at FireMon, Matt Dean for a look at the future of network security, which will ultimately enable each business team to fully own their security policies.
  • Enterprise-Wide Kubernetes - Episode 1
    Enterprise-Wide Kubernetes - Episode 1 Paulo Renato, Principal Cloud Architect at Microsoft and Jim Bugwadia , CEO at Nirmata Recorded: Sep 20 2018 49 mins
    In this our first episode of the Enterprise-wide Kubernetes series, we will introduce what an enterprise-wide Kubernetes stack consists of, and will look at the compute, networking, and storage infrastructure requirements. Our featured guest will be Paulo Renato, a Principal Cloud Architect with the Microsoft Azure team. Some of the questions we will cover are:

    1. What are the enterprise options for selecting Kubernetes distributions?
    2. When should an enterprise choose a managed Kubernetes service?
    3. How should enterprises evaluate managed Kubernetes services from the top cloud providers?
    4. What else matters for Kubernetes infrastructure?
  • OpenDemo: Network Automation with Ansible
    OpenDemo: Network Automation with Ansible Eric McLeroy, Senior Solution Architect, Red Hat Recorded: Sep 20 2018 56 mins
    Ansible's simple automation framework means that previously isolated network administrators can finally speak the same language of automation as the rest of the IT organization, extending the capabilities of Ansible to include native support for both legacy and open network infrastructure devices. Network devices and systems can now be included in an organization's overall automation strategy for a holistic approach to application workload management.
    The original airdate of this demo was Sept. 18.
  • The Next Question: How to Backup Office 365
    The Next Question: How to Backup Office 365 Storage Switzerland, KeepItSafe, Veeam Recorded: Sep 20 2018 63 mins
    The first Office 365 question is, do organizations need to protect their data stored there? The answer is yes, Office 365 data needs protection. Almost every industry expert recommends that organizations take Office 365 protection into their own hands and even Microsoft makes it clear that data is the organization’s responsibility. The problem is those industry experts and Microsoft don’t answer the next question of HOW to backup Office 365 data.

    Register now and learn not only why organizations should back it up but also how they should do it.

    In response to the need for Office 365 protection, vendors have flooded the market with solutions but protecting Office 365 is more than just a “checkbox”. Data in Office 365 has value to the organization, is subject to a variety of compliance regulations, and is the target of cyber-attacks.

    In our webinar Storage Switzerland, Veeam and KeepItSafe compare the various methods for protecting Office 365.
  • How to Build an EA Roadmap for the Future
    How to Build an EA Roadmap for the Future Jeanne Morain, iSpeak Cloud, Bala Kalavala, Wyndham Hotels & Resorts, Anthony Nguyen, HP Recorded: Sep 20 2018 62 mins
    Tune into this live panel discussion and start building your enterprise architecture roadmap for 2020 and beyond.

    Topics in this panel discussion will include:

    - How to drive business value through technology
    - Enterprise architecture from a UX perspective
    - Cloud transformation and automation, including Robotic Process Automation
    - Services and API strategy
    - How technologies like Blockchain are changing the enterprise

    And much more!

    Moderator: Jeanne Morain, Digital Strategist, Author & Speaker, iSpeak Cloud
    Panelists: Bala Kalavala, Director of Enterprise Architecture, Wyndham Hotels & Resorts and Anthony Nguyen, UX/Enterprise Architect at HP
  • IT Ops SIG Talk Ep. 9:  Work with OpsBridge API’s
    IT Ops SIG Talk Ep. 9: Work with OpsBridge API’s Amr Fahmy Recorded: Sep 20 2018 29 mins
    Work with OpsBridge API’s

    In this session, Amr will give a small introduction of OpsBridge and then will start with a basic introduction about OpsBridge API. Next, he will give a simple example on how we can call the OpsBridge API’s and start creating custom Attributes in the events. Finally, Amr will do some modifications on Events Custom Scripts.

    What you can expect to take away from this session:

    •Basic information on how API’s works and the difference between them
    •How to integrate third party applications with OpsBridge using API
    •Basic Bash Scripts or Python Script depending on the Operation system we will use
  • IT Ops SIG Talk Series - OpsBridge API’s & Hybrid IT Blueprint for App Portfolio
    IT Ops SIG Talk Series - OpsBridge API’s & Hybrid IT Blueprint for App Portfolio Amr Fahmy, Bobby Allen Recorded: Sep 20 2018 55 mins
    SIG Talk: IT Operations - Operations Bridge API’s and Hybrid IT Blueprint for Application Portfolio (Complete Edition)

    Join us for the next IT Operations SIG Talk to hear from Vivit member experts about working with OpsBridge API's and building a Hybrid IT Blueprint for your application portfolio. These two presentations will give in depth insight and takeaways.

    Speaker: Amr Fahmy
    Work with OpsBridge API’s: In this session, Amr will give a small introduction of OpsBridge and then will start with a basic introduction about OpsBridge API. Next, he will give a simple example on how we can call the OpsBridge API’s and start creating custom Attributes in the events. Finally, Amr will do some modifications on Events Custom Scripts.

    What you can expect to take away from this session:

    •Basic information on how API’s works and the difference between them
    •How to integrate third party applications with OpsBridge using API
    •Basic Bash Scripts or Python Script depending on the Operation system we will use

    Speaker: Bobby Allen
    Building a Hybrid IT Blueprint – Discover the right mix of public vs. private providers and services for your application portfolio: Many decision makers will say they need more information. The reality is that most leaders are actually drowning in information. What they really need is to move from information to clarity to insight. Attend our talk on building a hybrid it blueprint to see how CloudGenera can quickly take large amounts of data about your applications and provide data-driven analysis on best execution venue. We believe these sorts of insights should happen in minutes not months.

    Attendees will learn the following:

    •Elements that must be part of Total cost of ownership (TCO) analysis
    •How to analyze public vs. private execution venues
    •How to quickly revisit decisions when inputs or market factors change
  • Securing Your Digital Transformation: Considerations for Enterprise Architecture
    Securing Your Digital Transformation: Considerations for Enterprise Architecture Todd Jobson, Co-founder & CTO, TechThought.org Recorded: Sep 20 2018 63 mins
    This webinar will outline how successful Digital Transformation requires an evolution of traditional Enterprise Architecture and Security practices.

    This will include a brief history of today's rapid paradigm shifts, drivers, benefits and challenges.

    Key considerations among several related areas:
    - FOSS, mobile
    - Cloud architecture & deployment models
    - Agile DevOps vs. traditional governance
    - Traditional app architecture vs. CloudNative Microservices & FaaS/Serverless
    - The rapidly changing data landscape (OLTP/OLAP -- BigData & Streaming Analytics)

    Todd Jobson will explore the impact in several of these areas related to successful Digital Transformation, Enterprise Cloud Architecture, as well as considerations related to security. While not intended to be a comprehensive nor prescriptive webinar, it will include several strategic recommendations along with inter-related tactical considerations that most enterprises will encounter along the complex path of Digital Transformation.

    About the Speaker:
    Todd Jobson is the CTO & Co-Founder of TechThought.org and has 25 years of experience as both a strategic & tactical thought leader across some of the most demanding business & technically complex mission critical environments. His background has included SW Engineer/Manager developing Nuclear Reactor Control & RealTime access control systems for NYPA, directing application architecture & global Integration (as far as Moscow, Russia) as Chief Technologist for SAI, leading a decade of Enterprise (Fortune 50) client architecture & delivery engagements for Sun Microsystems Professional Services, to conducting Enterprise-wide Digital Transformation Workshops/ Assessments & Future State Cloud Architecture enablement for dozens of Oracle's largest customers.
  • The great escape: Migrating to a modern virtualized environment
    The great escape: Migrating to a modern virtualized environment Bill Helgeson, senior principal domain architect, Red Hat; Matt Nolan, senior cloud architect, Red Hat Recorded: Sep 20 2018 39 mins
    As organizations face pressure to reduce operational costs and become more agile, it's critical that IT support a diverse environment, where traditional applications can coexist with dynamic and cloud-native applications. However, transitioning from legacy, proprietary infrastructure to a managed cloud infrastructure that consists of both traditional and modern components can be daunting.
    In this webinar, we'll discuss an approach to radically simplify the process of migrating workloads from legacy platforms. Specifically, we’ll cover:
    > Methods for building a robust, flexible computing infrastructure to lower total cost of ownership (TCO), improve provisioning time, deliver services faster, and streamline processes.
    > Best practices for organizing workloads into manageable groups and automating migration in a policy-driven manner using Red Hat® Virtualization, Red Hat CloudForms® , and Red Hat Ansible® Automation.
    > How several customers have successfully solved this problem, reduced transition costs, and increased control of their environment.
  • TLS Decryption: Critical to Detecting Threats
    TLS Decryption: Critical to Detecting Threats Lindsay Drabwell, Head of Membership, (ISC)² EMEA, Ollie Sheridan, Principal Engineer, Gigamon Recorded: Sep 20 2018 59 mins
    As the volume of encrypted traffic continues to grow, organisations become even more vulnerable to encrypted attacks, threats and exploits that go undetected. Learn how to create a centralised “decryption zone” to decrypt traffic once and give security tools newfound visibility into encrypted traffic.
    Join Ollie Sheridan (CISSP), Principal Engineer at Gigamon to learn:
    •How the TLS 1.3 draft 28 proposal removes visibility which was widely deployed for threat identification in TLS 1.2.
    •How to acknowledge and address critical management, troubleshooting, legal, regulatory, ethical and technical concerns.
    •Why deploying TLS decryption in the core of networks is critical to detecting threats.
    •How to deploy innovative architectures for TLS decryption while maintaining availability and reliability.
    •How to manage growing SSL/TLS traffic volumes by creating a centralized “decryption zone” to decrypt traffic once and give security tools newfound visibility into formerly encrypted traffic and threats.
  • Your Data: Safe, Accessible, and Optimized - All the Time
    Your Data: Safe, Accessible, and Optimized - All the Time Jaap Van Kleef, EMEA Technical Manager Recorded: Sep 20 2018 56 mins
    Growing data volume, rising cost of downtime and data loss, cyber attacks, limited storage capacity, business continuity, and inadequate backup and recovery performance are among the myriad of challenges that IT teams face today.

    Join this webcast with Jaap Van Kleef, EMEA Technical Manager at StorageCraft and learn about best practices for data protection and disaster recovery.
  • (Replay) IT Convergence: A Perspective on CI & HCI
    (Replay) IT Convergence: A Perspective on CI & HCI Howard Marks, Chief Scientist, DeepStorage.Net; Vaughn Stewart, VP of Technology, Pure Storage Recorded: Sep 20 2018 20 mins
    Join us for an informative look at the Converged Infrastructure and Hyper-Converged marketspace. Vaughn Stewart, VP of Technology from Pure Storage, will moderate this session and also share perspective on why you don’t need to compromise.

    Third party analyst and Chief Scientist, Howard Marks of DeepStorage.Net, will also provide his eye-opening findings on the true costs of each of these solution stacks so you can make a more informed decision on what is best for your organization.
  • [Webcam Panel] Perspectives on the Digital Transformation
    [Webcam Panel] Perspectives on the Digital Transformation Patrick Vardeman, CEO; Rick Snyder, Sr. VP; Anoj Willy, CEO; Vid Sista, Director of Technology Solutions Recorded: Sep 19 2018 47 mins
    Join moderator Patrick Vardeman, CEO of Accudata Systems, for a dynamic digital-first webcam panel discussion with Rick Snyder, Senior Vice President of Cisco’s Partner America’s Organization; Anoj Willy, CEO of Xentaurs, a leading Digital Transformation Systems Integrator; and Vid Sista, Director of Technology Solutions at Accudata Systems.

    They’ll cover it all—from what to consider in your DevOps strategy to hybrid cloud solutions and industry-leading technologies to build an effective data intelligence program. The digital business is far more complex than ever imagined, and we’ll do our part to help you understand where your investment can have the greatest payoff.
  • OpenDemo: Ansible Tower
    OpenDemo: Ansible Tower Michael Ford, Senior Specialist Solution Architect, Red Hat Recorded: Sep 19 2018 59 mins
    Ansible Tower by Red Hat helps you scale IT automation, manage complex deployments and speed productivity.
    Centralize and control your IT infrastructure with a visual dashboard, role-based access control, job scheduling, integrated notifications and graphical inventory management. And Tower's REST API and CLI make it easy to embed Tower into existing tools and processes.
  • Transforming Business with Strategic IT
    Transforming Business with Strategic IT Seth Robinson, Senior Director, Technology Analysis, CompTIA Recorded: Sep 19 2018 55 mins
    Enterprise technology has gone through a major shift, and understanding that shift is a prerequisite for a winning game plan. To fully appreciate the new approach, companies must ask some basic questions.

    - How is today’s IT different from an organizational perspective?
    - Which driving factors are contributing to the flood of new technology trends?
    - What are the behaviors that stem from this fundamental IT change?
    - What steps should a company take to move forward?

    This webinar relies on research across a variety of topics and conversations with IT professionals to provide a description of the way technology is integrated into modern business.

    Seth Robinson is the senior director of technology analysis for CompTIA, the leading trade association for the IT industry. In this role, he analyzes technology trends in the IT industry and provides insight into trend drivers and future direction.
  • Cloud Workload Security for Azure and Office 365
    Cloud Workload Security for Azure and Office 365 Gururaj Pandurangi, CEO & Andy Zhulenev, CRO at Cloudneeti Recorded: Sep 19 2018 58 mins
    Organizations going through a Digital Transformation journey using cloud computing technologies are concerned about cloud security and compliance. Traditional approaches to Network and Host level security frameworks don’t scale for cloud native workloads.

    Moreover, for security validations, they have relied on manual data aggregation and testing. Because of these perceived risks and costs to manage security posture, many enterprise may be hesitant about moving from on-premises and/or hosted environments to Microsoft Azure and Office 365.

    In such a rapidly changing environment, how does an organization ensure that their cloud workloads remains secure and compliant at all times?
  • 3 Steps to Gain Control of Cloud Security
    3 Steps to Gain Control of Cloud Security Tim Woods - Vice President, Technology Alliances, FireMon Recorded: Sep 19 2018 61 mins
    The cloud is a notable business advantage, but it does bring numerous security concerns. Among them:

    - Lack of visibility across cloud or between on-premises and cloud environments
    - Monitoring security controls and changes within cloud and multi-cloud environments
    - Maintaining compliance by monitoring cloud traffic for suspicious and non-compliant behavior

    It becomes increasingly complex in hybrid environments because now you’re managing security for on-premise, cloud, virtual, container environments, and more. The time commitment can feel staggering.

    It doesn’t have to, however.

    In this webinar we will show you the path to more effective cloud security in hybrid enterprises through a mix of:

    1. Vulnerability management: See how an attacker could exploit and prioritize your patches
    2. Continuous compliance: Define your own cloud security controls and reduce the time spent on audit prep by making your cloud continuously audit-ready
    3. Automation and orchestration: Ingest behavior details from your cloud, then command security controls to cloud systems from a single console. The idea is instant, worry-reducing cloud control.
  • Verizon Threat Research Advisory Center - 2018 Payment Security Report
    Verizon Threat Research Advisory Center - 2018 Payment Security Report John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Sep 19 2018 76 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Ron Tosto, Senior Manager, Global Payment Security Practice
    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •Josh Costa, Senior Consultant, Investigative Response – Americas
    •Max Shubin, Senior Analyst, Threat Intelligence

    For this month’s theme: ‘Payment Security Report,’ we'll feature Ron Tosto who'll cover the latest thought leadership from Verizon, the 2018 Payment Security Report (PSR). The PSR offers industry research on the global payment security landscape. The report highlights the need for effective data protection and provides details on improving security control effectiveness.

    John Grim and Josh Costa will then cover two (2) 2018 Data Breach Digest scenarios: one involving an ecommerce breach and the other a Point of Sale (PoS) intrusion. Max Shubin will provide insight to our recent caseload. Finally, Dave Kennedy will complete this month's briefing with:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to payment card related data breaches that you'd like us to cover on the call, please send them to the following email address prior to September 14, 2018:

    Intel.Briefing@verizon.com

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Targeted Attacks: A Review of Current Trends and Future Developments
    Targeted Attacks: A Review of Current Trends and Future Developments David Emm, Principal Security Researcher, Kaspersky Lab (Global Research & Analysis Team) Recorded: Sep 19 2018 46 mins
    Targeted attacks are now an established part of the threat landscape and in 2017 the headlines were full of news about sophisticated attacks of all kinds. Some were highly-targeted, others affected many businesses and quickly reached epidemic proportions. Often the motive was clear - to gather data, to make money, to cause damage and disruption. But sometimes the lines between these became blurred.

    It's clear that organisations of all kinds need to understand and prepare for cyber-threats affecting their sector. And this must start with an understanding of the current threat landscape and how it's likely to develop.

    This presentation will outline the trends we're seeing and offer some predictions for 2018 and beyond - based on our analysis of attacks in 2017.

    About the presenter:
    David joined Kaspersky Lab in 2004. He is a member of the company's Global Research and Analysis Team and has worked in the anti-malware industry since 1990 in a variety of roles, including that of Senior Technology Consultant at Dr Solomon's Software, and Systems Engineer and Product Manager at McAfee.

    In his current role, David regularly delivers presentations on malware and other IT security threats at industry events, highlighting what organisations and consumers can do to stay safe online. He also provides comment to broadcast and print media on the ever-changing cyber-security and threat landscape. David has a strong interest in malware, ID theft and the human aspects of security, and is a knowledgeable advisor on all aspects of online security.

    David is regularly mentioned in national print press as a cyber-security expert and has a wealth of experience in being filmed for such programmes as Good Morning Britain and BBC News.
  • Recovering a Failing Outsource IT Service
    Recovering a Failing Outsource IT Service Brendan Mulreany, Director, Finsbury and William Hooper, Director, Finsbury Recorded: Sep 19 2018 44 mins
    Join this live conversation between two senior IT staff of a fictitious company charged with the successful execution of an outsourced arrangement that has just passed its two-year anniversary. Gain insight into the difficulties they are experiencing, their search for the root causes and their development of a plan to deliver targeted improvement.

    The conversation includes how they hope to convince the business that they are fully committed to service its needs. How will they tackle the business perception that IT is defending poor support at high prices? How can they motivate the supplier to provide the services needed whilst making a fair return?

    About the presenters:
    Finsbury Sourcing provides specialist IT and Telecommunications outsourcing project management and consultancy services with a focus on practical implementation. Many of our assignments involve fixing problems in under-performing outsource agreements and the interaction between the parties.

    Brendan Mulreany is a director of Finsbury. He has been involved in delivering services for more than 30 years, during which he has worked on some of the largest and most challenging multi-national services in UK, Europe, US and Australia. He has degrees in law and science.

    William Hooper is a director of Finsbury. He too has worked on some of the world’s largest IT services, recovering and restoring performance. He is a practitioner and acts as an Expert Witness in legal disputes. He holds an MBA and a bachelor’s degree in engineering.

    Both have many years’ experience delivering services as supplier and working client-side.
  • Accelerate Self-service Analytics with Universal Semantic Model (APAC)
    Accelerate Self-service Analytics with Universal Semantic Model (APAC) Paul Moxon, VP Data Architecture and Chief Evangelist, Denodo Recorded: Sep 19 2018 60 mins
    Self-service initiatives are successful when business users’ views of the data are holistic and consistent across distinct business functions as enabled by Universal Semantic Model across multiple analytical/BI tools.

    Attend this session to learn how data virtualization:
    - Is the best fit technology to enable the Universal Semantic Model
    Accelerates Self-service BI initiatives
    - Provides a holistic view of the data

    Agenda:
    - Data Virtualization for Self-service Analytics
    - Product Demonstration
    - Summary & Next Steps
    - Q&A
  • Why Cloud Migrations Fail - Learn the Keys to Cloud Success
    Why Cloud Migrations Fail - Learn the Keys to Cloud Success Storage Switzerland and SoftNAS Recorded: Sep 18 2018 59 mins
    Many cloud migration and cloud first strategies fail to live up to expectations. The problem is organizations spend too much time on micro issues like product selection and not enough time on big picture items like the cloud strategy's foundation. In our live webinar, Storage Switzerland and SoftNAS will discuss the problems these different cloud projects create, and how to create a foundation for your cloud strategy that guarantees success. All registrants receive a copy of Storage Switzerland's latest eBook "Developing a Holistic Cloud Strategy".
  • The Cyberattack Horizon
    The Cyberattack Horizon Kelvin Murray, Sr. Threat Research Analyst, Webroot Sep 25 2018 9:00 am UTC 60 mins
    Get an in-depth look at the newest threats.

    More and more, cybercriminals are targeting small- and medium-sized businesses with increasingly sophisticated attacks. And with more regulations and costly fines for non-compliance, a single data breach could spell the end for an SMB.

    To stay safe, businesses and MSPs who serve them need to know the lay of the land. Join our 30 minute informative webinar to get details about the latest trends in cyber threats.


    Topics in this webinar include:

    • Current threat trends hitting SMBs
    • Ransomware, phishing, Trojans, cryptomining , cryptojacking
    • How to stay ahead of the latest cyberattacks
  • Neuer OneXafe: nächste Generation für konvergierten Speicher und Datensicherung
    Neuer OneXafe: nächste Generation für konvergierten Speicher und Datensicherung Ivonne Ehle, DACH Sales Engineer - SCME, Certified Trainer Sep 25 2018 9:00 am UTC 60 mins
    Das Wachstum virtualisierter Anwendungen, immer kleinere Backup-Fenster und ein explosionsartiges Datenwachstum haben die Anforderungen an die Datensicherheit und die Speicherinfrastruktur enorm belastet. Backup- und sekundäre Speicherinfrastrukturen kommen oft von mehreren Anbietern, was die Kosten erheblich steigert, betriebliche Ineffizienzen erhöht und zu Datensilos führt, wodurch die zentrale Verwaltung immer komplexer wird.

    Registrieren Sie sich für unseren Webcast und erfahren Sie, wie Sie mit der neuen konvergenten Datenplattform StorageCraft OneXafe Ihre Daten in heterogenen Umgebungen besser schützen und verwalten
  • NVMe™ over Fabrics: Updates for 2018
    NVMe™ over Fabrics: Updates for 2018 Brandon Hoff, Distinguished Software Architect at Broadcom, NVM Express,Inc. Marketing Workgroup Member Sep 25 2018 4:00 pm UTC 60 mins
    NVMe™ over Fabrics (NVMe-oF™) is the defacto standard for extending the NVMe™ architecture in a scalable manner over mainstream interconnects. In this NVM Express, Inc. hosted webinar, Brandon Hoff, Distinguished Software Architect at Broadcom and NVMe Marketing Group Member, will provide an update on how NVMe-oF technology has evolved in 2018 and what the future holds in 2019 and beyond. The webcast will cover the transports for NVMe-oF, NVMe-of Enterprise Arrays, NVMe-oF Appliances, and NVMe-oF JBOFs as well as interoperability testing. Viewers will also learn about different NVMe-oF solutions and how NVMe-oF is disrupting the storage landscape and improving the performance of external storage solutions.

    Brandon Hoff is Distinguished Software Architect at Broadcom, where he focuses on new product strategy, including product development interlock, business planning, and sales strategy development for growth initiatives. He has also worked on innovation initiatives, end user strategies, technology and solutions for WNVeb giants, and product portfolio leadership. He has been an active participant in NVM Express, is a board member of Understanding Disruption, Inc. and has been IBTA Marketing Work Group Co-Chair. He is a frequent participant at industry events, including NVM Express meetings, SNIA conferences, and Ethernet Alliance events. He has over 25 years of industry experience, including a stint as Chief Strategy Officer/Chief Marketing Officer at CipherOptics. He holds an MBA from the University of Colorado (Boulder) and a BSEE from Colorado State University. Brandon holds patents in networking and security as well as contributing to books that address technology innovation: “Driverless Car Revolution: Buy Mobility, not Metal” and “Our Driverless Future: Heaven or Hell?”
  • Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For
    Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Sep 25 2018 6:00 pm UTC 45 mins
    With the major cyber-attacks headlining the news, many of these cyber threats fall into five different attack vectors. Whether it's user credentials, personally identifiable information (PII), payment card information, health care information, intellectual property, or another form of data, nothing is safe from these bad actors. So, how do you protect you and your business from these debilitating attacks?

    In our upcoming webinar, we arm you with the essential components needed to defend your business against the top five attack vectors we see in a Cyber Security Operations Center (SOC).

    After attending you will:

    - Recognize what are the top 5 attack vectors and the counter-measures you can take
    - Understand the importance of detection and response in the kill-chain for each attack vector
    - Discover how Arctic Wolf Networks (AWN) CyberSOC works to provide the essential components to protect against each of them

    Register now to understand the different ways an attacker may cause harm to you and your business and how to defend yourself moving forward.
  • How to Avoid Disasters via Software-Defined Storage Replication & Site Recovery
    How to Avoid Disasters via Software-Defined Storage Replication & Site Recovery Augie Gonzalez, Director of Product Marketing, DataCore Software Sep 25 2018 6:00 pm UTC 60 mins
    Shifting weather patterns across the globe force us to re-evaluate data protection practices in locations we once thought immune from hurricanes, flooding and other natural disasters.

    Offsite data replication combined with advanced site recovery methods should top your list.

    In this webcast and live demo, you’ll learn about:
    • Software-defined storage services that continuously replicate data, containers and virtual machine images over long distances
    • Differences between secondary sites you own or rent vs. virtual destinations in public Clouds
    • Techniques that help you test and fine tune recovery measures without disrupting production workloads
    • Transferring responsibilities to the remote site
    • Rapid restoration of normal operations at the primary facilities when conditions permit

    Attend live for a chance to win a $200 Amazon gift card!*

    *Gift card will be sent within 10 days of the webinar date. Void where prohibited.
  • OCB - How to Minimize Costs Using Adaptive and Scalable Cluster Management
    OCB - How to Minimize Costs Using Adaptive and Scalable Cluster Management Brett Kugler, Senior Red Hat Consultant - Crossvale, Inc. Sep 25 2018 6:00 pm UTC 45 mins
    Although the cloud is a solution for many of your problems, it may result in unexpected expenses when demand grows. Lowering costs by using AWS Spot Instances can bring substantial cost savings over on-demand pricing, but how is scaling being handled for peak loads and are you concerned about reliability in a scaling solution?

    Crossvale OpenShift CloudBalancer provides the means to leverage AWS Spot Instances for Red Hat OpenShift Clusters ensuring capacity by provisioning new workload capacity automatically when needed and keeping it running for as long as it is required.

    In this webinar we will cover the following:

    - Intro to Crossvale, Inc.
    - Intro to OpenShift CloudBalancer
    - Cost Savings
    - Technology behind CloudBalancer
    - Live Demo
    - 2 Use Cases
    - Roadmap
    - Q&A

    AMAZON EC2 SPOT INSTANCES AND SPOT FLEET HELP CUSTOMERS MANAGE CAPACITY AND COSTS.
    “With Amazon EC2 Spot instances, we easily save 85–90% in costs. That, in turn, allows us to experiment with less risk and ultimately develop higher-quality products for our customers.”
    JOE GARDNER, PRINCIPAL CLOUD ARCHITECT, NATIONAL INSTRUMENTS

    “We see companies today using this facility of unused instances for development and operations closed environments for testing. However, more importantly, we now see it used in production for enterprise-ready, business-critical applications.”
    CONOR BRANKIN
  • Enabling Digital Transformation - What to Expect at IP EXPO Europe 2018
    Enabling Digital Transformation - What to Expect at IP EXPO Europe 2018 Simon Bitton, Sean McAvan Sep 26 2018 2:00 pm UTC 60 mins
    With just a few weeks to the must-attend IT event of the year for CIOs, IT Managers and Directors, Security specialists, Technical experts, we've gathered some of the elite speakers who will be taking the stage to debate the hottest solutions, trends and the biggest opportunities and challenges for businesses to successfully embrace digital change.

    Topics to be covered include:

    - Cyber Security
    - DevOPs
    - AI Analytics
    - Blockchain
    - Internet of Things

    What will they be talking about at ExCeL London, on the 3-4 of October 2018, what do they want to hear about, what are they looking forward to?

    Presenters
    Simon Bitton, Director of Marketing, Europe, Park Place Technologies
    Sean McAvan, Managing Director, Navisite Europe
  • Using the Cloud to Fix Backup's Blind Spot - Endpoint Data Protection
    Using the Cloud to Fix Backup's Blind Spot - Endpoint Data Protection Storage Switzerland and Infrascale Sep 26 2018 5:00 pm UTC 60 mins
    Many data centers unwittingly have a blind spot in their backup strategy, endpoints like laptops and other devices are left exposed. Most organizations have no formal endpoint data protection strategy even though studies indicate that over 60% of data on endpoints is unique to that device. In most cases, there is no centralized data protection strategy for endpoints.

    IT is counting on users to protect their data, but the reality is that the organization needs a centralized endpoint data protection strategy that fixes backup's blind spot.

    Join Storage Switzerland and Infrascale for a live webinar to learn how to create an endpoint data protection strategy that leverages the cloud to fix the backup blind spot. The webinar also includes a live demo of the solution, so you can see how efficiently IT can protect endpoints without disrupting end users.
  • Monetizing IoT in Smart Agriculture
    Monetizing IoT in Smart Agriculture Steve Brumer, Partner at 151 Advisors & Mark Young, CTO at Climate Corporation Sep 26 2018 5:30 pm UTC 45 mins
    Join Steve Brumer, Partner at 151 Advisors and Mark Young, CTO at Climate Corporation for a 45-minute informative discussion on monetizing IoT in Smart Agriculture.

    This webinar will focus on the Smart Ag landscape, uses cases, opportunities and how vendors & partners can monetize with IoT. Exploring all the business aspects, connectivity, sensors, big data, platforms, and system integration.

    Key takeaways will focus on where should you focus your time, energy and efforts within this space and drive revenue.

    PRESENTERS:
    -Steve Brumer, Partner at 151 Advisors
    -Mark Young, CTO & Interim Product Lead at Climate Corporation
  • Nutanix and Thales, Hyerconverged & Hypersecure
    Nutanix and Thales, Hyerconverged & Hypersecure Stephen O’Connor, Sr. Sales Engineer & Mike Wronski, Principal Product Marketing Manager, Nutanix Sep 26 2018 6:00 pm UTC 60 mins
    The rapid adoption of hyperconverged infrastructure (HCI) solutions have been due to their proven ability to deliver scalability, agility, reduced costs, storage redundancy, and reliability. While these are great benefits, perhaps one of the elements that is garnering the most attention right now is data security. Nutanix certainly knows this and is working hard with Thales eSecurity to protect the confidentiality and integrity of sensitive data through strong encryption of user and application data. When used with Vormetric Data Security Manager (DSM), the combined solution provides FIPS certified robust key management and role separation to meet the most stringent security requirements.

    In this webinar, we will examine the key elements of the joint solution as well as what may be the best options for your organization.

    • Understand the types of encryption and their characteristics
    • Understand the critical role of best-in-class key management
    • Learn how to go beyond the encryption basics
  • The Future Data Center - Live from Hitachi Next!
    The Future Data Center - Live from Hitachi Next! Storage Switzerland and Hitachi Sep 26 2018 7:00 pm UTC 60 mins
    What comes after Data Center Modernization? The future data center is smart. But what is a smart data center, how do you create a smart data center and why would you want to? We'll answer all of these questions on our live webinar roundtable discussion LIVE from Hitachi NEXT2018. Join us as we talk about solutions that can answer questions like:

    •What are the largest cost drivers in my data center?
    •How can IT accelerate my time to market?
    •How do I optimize costs like power and cooling?
    •How can I proactively identify inherent threats and issues?
  • (Replay) How End-to-End Copy Automation for SAP Systems Can Save Budget
    (Replay) How End-to-End Copy Automation for SAP Systems Can Save Budget Samer Kamal, SAP Solutions Manager, Pure Storage Sep 26 2018 11:00 pm UTC 45 mins
    Companies are facing increasingly complex IT landscapes, and testing needs to occur quickly and with consistency. Resource-intensive tasks, such as SAP system copy, clone, and refresh, can be complex and time-consuming – some customers report spending 3-5 days for one system copy. In this webinar, learn about a copy automation tool for SAP applications that incorporates more than 75% of all pre, copy and post functionality – and automates it. Whether for traditional SAP or SAP HANA, Pure Storage’s Copy Automation Tool (CAT) for SAP applications drives digital transformation with huge gains in productivity and cost savings, and is included with every Pure Storage FlashArray. In this webinar, you will learn:

    - How some companies have saved up to 80 percent of time and budget when performing SAP landscape copy, clone, and refresh tasks, freeing up time to focus on increasing innovation

    - How to simplify SAP copy functionality and gain flexibility through additional integration or customization, to speed SAP migrations, upgrades, and testing

    - How to reduce risks by automating the refresh process, and reduce complexity through the use of this embedded tool
  • Nouveauté OneXafe: nouvelle génération d'appliances de sauvegarde convergées
    Nouveauté OneXafe: nouvelle génération d'appliances de sauvegarde convergées Florian Malecki, International Sr. Product Marketing Director Sep 27 2018 8:00 am UTC 60 mins
    L'explosion des applications virtualisées, la réduction des fenêtres de sauvegarde et la croissance impressionnante du volume de données ont placé un immense fardeau sur les besoins en matière d'infrastructure de stockage et de protection des données. La situation se complique d’autant plus en raison des environnements de protection des données fragmentés actuels et des besoins de sauvegarde de données physiques et virtuelles, sur site et hors site, qui doivent tous satisfaire des niveaux de service différents (SLA). L'infrastructure de sauvegarde et de stockage secondaire est souvent fournie par plusieurs prestataires. Résultat : une augmentation des coûts d'acquisition et des inefficacités opérationnelles. L'agrégation de tous ces produits entraîne de silos de données difficiles à gérer de façon centralisée. Une vue incomplète du flux de protection des données peut conduire à une hausse des coûts d'exploitation, une perte des données et une incapacité à respecter les SLA ainsi que les réglementations et exigences de conformité propres au secteur.


    Rejoignez StorageCraft pour un webcast exclusif afin de découvrir les avantages de la nouvelle plateforme OneXafe converged storage and data.
  • New OneXafe: next generation converged storage and data protection
    New OneXafe: next generation converged storage and data protection Florian Malecki, International Sr. Product Marketing Director Sep 27 2018 9:15 am UTC 60 mins
    The growth of virtualised applications, diminishing backup windows, and explosive data growth have collectively placed an immense burden on data protection and storage infrastructure requirements. This complexity continues to be exacerbated by today’s fragmented data protection environments and the need to backup physical and virtual, on-premises and off-premises data, all with different service level agreements (SLAs). Backup and secondary storage infrastructure often comes from multiple vendors which significantly increase costs, add operational inefficiencies, and create data silos, making it difficult to manage centrally. An incomplete view of data protection workflow can lead to rising operational costs, data loss, and the inability to meet SLAs and specific industry regulations and compliance requirements.

    Join our webcast and learn how the new StorageCraft OneXafe converged data platform can help you with better protecting and managing your data in heterogeneous environments.
  • Fighting back with AI: Tapping the power of AI to elevate cybersecurity posture
    Fighting back with AI: Tapping the power of AI to elevate cybersecurity posture Lindsay Drabwell, Head of Membership Services (ISC)² EMEA, Mike Spradbery, Neil Jones, IBM Sep 27 2018 11:00 am UTC 60 mins
    How can AI help overworked, understaffed and overwhelmed security analyst teams? How can the use of an AI platform help reduce the cost of a data breach? Mike Spradbery, IBM's UK&I Security Technical Leader, will explore these and other questions as he talks live to the experts behind a new Ponemon Institute study on the use of Artificial Intelligence in Cyber Security. Mike will also share case studies of AI in action in Cyber Security and explore how AI is helping organisations elevate their cybersecurity posture and reduce response times.
  • Top 5 Office 365 Backup Concerns - Best Practices for Protecting Your Data
    Top 5 Office 365 Backup Concerns - Best Practices for Protecting Your Data Sarah Beaudoin, Product Marketing Manager, Druva Sep 27 2018 1:00 pm UTC 60 mins
    As organizations continue to migrate to Office 365 for their email, productivity and collaboration tools, they’re quickly realizing that Office 365’s native capabilities do not provide the essential data protection capabilities they need.

    Join us for a technical webinar on Tuesday, August 21st at 3PM SGT/ 5PM AEST and learn best practices for safeguarding your Office 365 data, including:
    - Gaps within OneDrive, Exchange Online and SharePoint Online that lead to increased risk of data loss
    - How a third party backup solution can automate data protection and ensure data recoverability from user error, malicious behavior or malware
    - How to build a data management strategy for the future that leverages the cloud and improves alignment with organizational policies and SLAs
  • What’s New in Data Protector: Introducing Data Protector 10.10
    What’s New in Data Protector: Introducing Data Protector 10.10 Julita Kussmaul, Senior Product Marketing Manager and Uli Wallscheid, Product Manager, Micro Focus Sep 27 2018 3:00 pm UTC 60 mins
    Join us for an exciting and informative look at the latest release of Data Protector.

    Data Protector 10.10 introduces two new editions: Data Protector Express for virtual environments and Data Protector Premium for physical, virtual, and multi-cloud workloads. With these editions we are simplifying pricing and packaging for Data Protector.

    Data Protector now offers integrated reporting capabilities making it a complete solution which includes built-in monitoring and reporting that can be managed within its web-based user interface. We’ll discuss the benefits of migrating your current Data Protector installation to these new editions.

    Data Protector 10.10 also includes installation and upgrade improvements including new prerequisite checks and automation. See a live demo of all the new features.
  • Ransomware Attacks: Do You Have a Backup Plan?
    Ransomware Attacks: Do You Have a Backup Plan? Ronn Martin, Solution Architect - Veeam and Terry Grulke, Principal Technical Advisor - Quantum Sep 27 2018 4:00 pm UTC 45 mins
    Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, NOW is the time to ensure you have a proactive backup plan.

    Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.
  • How to Solve your Top IT Security Reporting Challenges
    How to Solve your Top IT Security Reporting Challenges Sacha Dawes Principal Product Marketing Manager, AlienVault Sep 27 2018 4:00 pm UTC 56 mins
    If you needed to provide reports to management or an auditor to prove that your IT security controls are in place and working, how long would it take you to do that? And, how many different tools would you need to consult? The AlienVault Unified Security Management (USM) platform integrates many of the core security capabilities you need along with built-in reports to help you implement IT security best practice frameworks like the NIST Cybersecurity Framework (CSF), as well as demonstrate compliance with PCI DSS, HIPAA and other regulations.

    Join this webcast to see how the USM platform makes it easy to:
    - Automate log collection, analysis and event correlation in a single console
    - Continuously scan for new assets and vulnerabilities
    - Get alerted of suspicious behavior like privilege escalations, account changes, malware and ransomware threats, and more
    - Simplify compliance with pre-built and customizable reports mapped to numerous regulatory requirements
  • Citizen Data Science Webinar Series - How To Do Data Right
    Citizen Data Science Webinar Series - How To Do Data Right Kyle Dempsey, Sr. Professional Services Engineer at Periscope Data Sep 27 2018 5:00 pm UTC 60 mins
    This is the second webinar in our “Citizen Data Science” series. Our first webinar, “Getting Started with Citizen Data Scientists,” covered the importance of citizen data scientists, how to get them enabled and how to empower them.

    To some citizen data scientists, data is a new language that they’re unfamiliar with translating into insights. For others, they’re eager to dive in and curious to explore, but reluctant to communicate their findings because they don’t have experience translating data into tactical operations.

    These new business-focused analysts need to be confident that they’re utilizing data properly. To empower these new data dives, Kyle Dempsey, senior professional services engineer at Periscope Data pulled together a collection of tips to make sure first-time analysts are doing data right.

    Join Kyle on September 27th, 2018 at 10 a.m. PDT as he walks through how to:
    - Define your analysis and outcomes
    - Understand what data is available and know how to ask for more
    - Ask questions in a way that allows data to answer them
    - Use data to inform decisions
    - Enable collaboration between technical and nontechnical teams
  • From Experimentation to Insights: Building an End-to-End Deep Learning System
    From Experimentation to Insights: Building an End-to-End Deep Learning System Tony Paikeday, Dir of Product Marketing, NVIDIA Deep Learning Systems; Roy Kim, Dir of Product Solutions, PureStorage Sep 27 2018 5:00 pm UTC 61 mins
    Every organization wants to infuse the power of AI in its business. From development to production training, you need an end-to-end AI workflow that’s optimized for the rigors of deep learning, that offers predictable performance as your neural network models and datasets grow. Attend this session to get insights into use cases, best practices and architecture examples that can help you and your data science team get started now, accelerating your path from experimentation to business insights.

    About the Speakers:
    Tony Paikeday is the Director of Product Marketing for the NVIDIA Deep Learning Systems, responsible for the world's first portfolio of AI supercomputers for enterprise - NVIDIA DGX Systems. Tony was previously with VMware, managing product marketing for the Horizon 7 portfolio and focused on key enabling technologies, including GPU virtualization and software-defined data center. Prior to joining VMware, Tony was at Cisco, building its data center solutions marketing practice focused on desktop and application virtualization. Prior to Cisco, he held business development roles at Nortel working with enterprise and service provider accounts, after having started his career as a Manufacturing Engineer for Ford Motor Company. Tony holds an engineering degree from the University of Toronto.

    Roy Kim joined Pure in 2017 as Director of Product Marketing for FlashBlade. Previously, Roy led product marketing at NVIDIA for deep learning, HPC, and enterprise analytics industries. Roy has Masters of Computer Science and Electrical Engineering and Bachelors of Science in Electrical Engineering from Massachusetts Institute of Technology.
  • Overcoming the Storage Roadblock to Data Center Modernization
    Overcoming the Storage Roadblock to Data Center Modernization Storage Switzerland and Datera Sep 27 2018 5:00 pm UTC 60 mins
    Organizations have tried a variety of solutions to regain control of their data storage infrastructure. They’ve invested in monolithic storage systems, software defined storage (SDS) and hyper-converged systems. While each approach may have brought some value, each failed in its primary task: consolidating storage resources. Each of these consolidation efforts is unable to consistently guarantee performance, scale capacity and drive down storage costs.

    As a result, most organizations end up buying workload specific solutions for both legacy and modern applications. Most data centers today have a mixture of multiple all-flash storage systems, hyper-converged environments and high capacity data archives. They also have storage software for each use case. IT ends up dealing with a data management nightmare, which limits organizational efficiency and productivity.

    Don’t give up! Join Storage Switzerland and Datera to learn how monolithic, software defined and hyper-converged architectures have let IT down and why the problem gets worse as data centers modernize. Attendees will learn how storage solutions need to change in order to eliminate primary storage silos while guaranteeing specific application performance, scaling to meet capacity demands and lower storage TCO.
  • A Hyperconverged Solution for Networking and Security Applications
    A Hyperconverged Solution for Networking and Security Applications Paul Andersen, VP Sales and Marketing, Array Networks Oct 2 2018 3:00 pm UTC 45 mins
    As data center and IT managers have increasingly moved to virtual environments, they’ve quickly come up against a hard reality of virtualization: Networking and security workloads often yield sub-par performance due to resource contention and hypervisor overhead. Join Array and Intel as we present a new alternative: The Network Functions Platform, a hyperconverged solution designed for the specific needs of networking and security, leveraging Intel technologies to deliver guaranteed performance in shared environments.