Hi [[ session.user.profile.firstName ]]


  • 15 Minute Friday: How to Move From Legacy DR to DRaaS
    15 Minute Friday: How to Move From Legacy DR to DRaaS
    Storage Switzerland, KeepItSafe, Veeam Recorded: Feb 15 2019 17 mins
    Most data centers still use a legacy DR strategy of replicating or even physically transporting backups to a dedicated disaster recovery (DR) site, or a secondary site owned by the organization. Disaster Recovery as a Service (DRaaS) delivers a compelling alternative to traditional DR, return on investment (ROI). It eliminates the costs associated with a dedicated disaster recovery site like paying for and equipping the site. Organizations though are hesitant to transition to DRaaS following the “if it ain’t broke, don't fix it” philosophy.

    In this live 15 minute webinar join Storage Switzerland, Veeam and KeepItSafe to learn how to transition from a legacy DR strategy to DRaaS without risking data protection downtime.

    In 15 minutes, we cover the areas critical to success:

    1. DRaaS Software selection
    2. Cloud Provider selection
    3. Creating and executing a transition plan
  • Datera High-Performance Software Defined Storage on Fujitsu PRIMERGY Servers
    Datera High-Performance Software Defined Storage on Fujitsu PRIMERGY Servers
    Richard McCormack, Head of Product Solutions at Fujitsu, joins Bill Borsari, Systems Architect Director at Datera Recorded: Feb 14 2019 56 mins
    Discover the architecture behind high-performance storage with Datera data automation on Fujitsu PRIMERGY servers.

    Datera is the only true, software-driven data services platform that:

    •Powers modern application environments at global scale
    •Provides game-changing data orchestration and automation with enterprise-class performance
    •Joint solution takes full advantage of the performance, security and reliability of Fujitsu PRIMERGY servers
    •Delivers up to 70% lower total cost of ownership and operation compared to traditional solutions

    Richard McCormack, Head of Product Solutions at Fujitsu, joins Bill Borsari, Systems Architect Director at Datera, to share how Datera and Fujitsu PRIMERGY systems are leading the software-defined revolution by providing the most powerful and flexible data center innovations across a vast ecosystem of solutions to turn your IT into a business advantage.
  • How to Detect Fileless Attacks with Host-Based IDS in USM Anywhere
    How to Detect Fileless Attacks with Host-Based IDS in USM Anywhere
    Danielle Russell, Group Product Marketing Manager; Aaron Genereaux, Sr. Sales Engineer Recorded: Feb 14 2019 56 mins
    Attackers have figured out how to bypass traditional antivirus software with fileless attacks designed to hide within sanctioned applications and even within the OS itself. Host-based intrusion detection systems (HIDS), which work by monitoring activity that is occurring internally on a host, are an effective way to detect these advanced attacks before they spread.

    Join this webcast to learn:

    - How fileless attacks work and how they evade detection by most traditional antivirus software
    - The types of endpoint activity that can be detected and logged by HIDS to catch threats like fileless attacks
    - Why HIDS is an essential security control for threat detection and compliance
    - How correlation of HIDS data with IP reputation data, vulnerability scans, and more can boost threat detection and response

    Danielle Russell
    Group Product Marketing Manager
    Aaron Genereaux
    Sr. Sales Engineer
  • All in the Cloud - Data Protection Up, Costs Down
    All in the Cloud - Data Protection Up, Costs Down
    George Crump, Storage Switzerland and W. Curtis Preston, Druva Recorded: Feb 13 2019 60 mins
    Managing and protecting critical data across servers and applications in multiple locations around the globe is challenging. And the more decentralized and complex your infrastructure, the more difficult it is to manage your data. The potential bad news? Data loss, site outages, revenue loss, and potential non-compliance with regulations.

    But here’s the good news: centralizing data protection in the cloud can make all the difference. That’s why you should join our webinar and hear from storage expert, George Crump, from Storage Switzerland and Druva’s W. Curtis Preston, Chief Technologist, as they discuss:

    • Why protecting a distributed data center is challenging with traditional methods
    • How a cloud-centralized backup strategy can be a game changer for your organization
    • How Druva can help you drastically improve data protection quality, reduce costs, and simplify global management and configuration?
  • Best Practices for Reducing Your Attack Surface with Vulnerability Management
    Best Practices for Reducing Your Attack Surface with Vulnerability Management
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Feb 13 2019 37 mins
    Attack surfaces are rapidly changing by the minute, as IT organizations are provisioning new types of endpoints, IoT devices, servers, web-applications and cloud-based services to increase business efficiencies. Due to this dynamically changing asset landscape, it has become increasingly difficult for IT security teams to maintain visibility to which ones need to be patched to reduce the risk from being exploited by hackers.

    Narayan Makaram, Sr. Director of Product Marketing, Arctic Wolf Networks, will explore the following, to emphasize the need for regularly running external vulnerability scans to boost your visibility and reduce business risks.

    - Trends affecting your attack surface
    - Need for vulnerability management program
    - What should you look for in an external vulnerability scan report

    Register today to hear from this expert!
  • Optimize Your IT With an Open Hyperconverged Infrastructure
    Optimize Your IT With an Open Hyperconverged Infrastructure
    Daniel Gilfix, Marketing Manager, Storage and Hyperconverged Infrastructure, Red Hat and Sean Murphy, Product Manager, Red Ha Recorded: Feb 13 2019 44 mins
    In the public sector and industries like energy, retail, banking, and telecommunications, organizations increasingly rely on business-critical applications that must be deployed with limited space, budgetary constraints, and scarcity of skilled IT staff. They must extend the reach of these applications from datacenter core to edge of the network with reduced complexity on the infrastructure that best meets their IT requirements.

    Red Hat’s innovative approach to addressing these issues includes Red Hat® Hyperconverged Infrastructure for Virtualization, which provides flexibility and choice for customers seeking low-density, infrastructure consolidation based on our leading virtualization platform. Red Hat Hyperconverged Infrastructure for Virtualization is streamlined with Red Hat Ansible® Automation and is based entirely on code from the open source community.

    During the webinar, we’ll discuss:
    > Market dynamics and challenges customers are facing with too much required by too few resources in too short a period.
    > The emergence of hyperconverged infrastructure as an alternative to inefficient segregated infrastructure.
    > Why hyperconverged infrastructure operational processes are more effective.
    > How an open source subscription model can facilitate maximum benefits of infrastructure consolidation.
  • Teradici PCoIP Management Console Release 3.2.1
    Teradici PCoIP Management Console Release 3.2.1
    Edna Menon – Sr Product Mgr. & Paul Barrett – Systems Specialist - Teradici Recorded: Feb 13 2019 35 mins
    PCoIP Management Console Release 3.2.1 delivers powerful endpoint management capabilities with support for Active Directory and User Roles.
    Learn more about these much requested capabilities, and participate in our live Q&A with Teradici experts Paul Barrett, Systems Specialist, Global Support Services and Edna Menon, Senior Product Manager. This brief webinar will cover everything you need to learn about this important release through a live demonstration, including:
    •Support for Active Directory, including support for sub-domains
    •User Roles: System Administrator and Administrator roles
    •Web Interface performance improvements
    •…and more!

    Register now.
  • Consolidating IT Infrastructure in an M&A World
    Consolidating IT Infrastructure in an M&A World
    Adam Sharp, CIO, International, TBWA | Andy Hardy, VP, EMEA, Nasuni Recorded: Feb 13 2019 36 mins
    Learn from the International CIO of one of the top 10 ad agencies in the world how consolidating infrastructure has become key to streamlining costs, enhancing productivity, and increasing cash flow.

    With operations spanning 295 offices and 11,000 employees, TBWA’s IT staff faced increasing demands to bring storage and data protection costs under control without reducing flexibility or security. Join Adam Sharp, CIO International for TBWA, The Disruption® Company, and Adweek’s 2018 Global Agency of the Year, as he discusses why his team opted for a “disruptive” cloud strategy of its own and what the results to date have been:

    - How the business strategy drove TBWA to the cloud
    - What key decisions enabled them to reduce costs and meet capacity requirements at the same time
    - How they went about a worldwide roll-out of their cloud storage strategy
    - Why multi-cloud capability is important
  • Deliver Applications Faster - Here's How
    Deliver Applications Faster - Here's How
    Jennifer Kotzen, Product Marketing Lead, SUSE Application Delivery Solutions Recorded: Feb 13 2019 50 mins
    To thrive today, businesses must act on opportunities, solve problems, and respond to the needs of customers, partners, and employees more quickly than ever before. Increasingly, applications are the vehicles through which these critical needs are addressed, and in this digital economy the key to increasing business agility is no secret: enterprises must deliver applications faster. But how is it done?

    Join us in this webinar for an executive level overview of the path your business can take to reduce application delivery cycle times and increase business agility.  We’ll discuss emerging container technologies, cloud-native application architectures, DevOps processes, and ways you can use them together to effect the change you need.  Application delivery transformation is as exciting as it is important – start your journey with us now!
  • Linux em conformidade, correções em dia , atualizações de Kernel sem downtime e
    Linux em conformidade, correções em dia , atualizações de Kernel sem downtime e
    Aslam Ramos, SUSE Sales Engineer Recorded: Feb 13 2019 55 mins
    Segurança na gestão de sistemas com Live patching e SUSE Manager

    Participe deste webinar e descubra como é possível aumentar a segurança do seu ambiente Linux e SUSE Linux com as ferramentas da SUSE, sistema operacional Linux líder para aplicações SAP e SAP HANA. Como estas ferramentas podem ajudar você na continuidade dos negócios e na redução de custos, diminuindo o tempo de espera, aumentando a disponibilidade dos serviços, aprimorando a segurança e a conformidade, utilizando os recursos de gestão de outros sabores de Linux e o SUSE, utilizando o SUSE Manager e do módulo SUSE Live Patching para correção do Kernel, sem necessidade de reboot.
  • IoT Series [Ep.3]: IoT Essentials -- Selecting a Vendor
    IoT Series [Ep.3]: IoT Essentials -- Selecting a Vendor
    Johna Till Johnson, CEO & Founder, Nemertes Research Recorded: Feb 12 2019 49 mins
    Selecting a vendor partner (or partners) is one of the most critical decisions enterprises will make on their IoT journeys. The right partner makes all the difference: enterprises with top-ranked partners report greater success in generating revenue, cutting costs, and optimizing business processes via IoT.
    • Who are the right providers?
    • What are the critical factors to consider in selecting one?

    This webinar reviews the provider landscape and highlights critical selection factors for companies of all sizes and industries.
  • Autonomous Threat Hunting
    Autonomous Threat Hunting
    Alexandre Pinto, Product Manager and Distringuished Engineer Security Services Global Products and Solutions Recorded: Feb 12 2019 57 mins
    Attendees will learn how Verizon's Autonomous Threat Hunting...

    •Improves automation and efficiency on monitoring and incident response processes by mimicking and applying security analyst experience and intuition at unprecedented scale.

    •Automatically builds context and relationship between indicators of compromise (IOCs), their inferred Tactics, Techniques and Procedures (TTPs), and log or event data generated by their organization.

    •Transforms hundreds of millions of raw data events into tens of high confidence alerts, so analysts can focus on investigating qualified leads.
  • Containerized Workloads on Industry-Standard Hardware and Software for Telco
    Containerized Workloads on Industry-Standard Hardware and Software for Telco
    Nathan Rader, Director of NFV Strategy, Canonical Recorded: Feb 12 2019 30 mins
    The growth path for operators lies beyond legacy VNF models into cloud-native, container-based microservices architectures to meet requirements for 5G and beyond. In this webinar, we will walk you through:
    • Infrastructure implications: Understanding VNF, virtual machines, Openstack and containers
    • Redevelopment path of VNF for containers
    • Laying the groundwork for container technology: proactive planning and prep
    • The impact of containers on strategy for 5G, edge computing, AI, and blockchain
    • Components for core certifications, portability and kubernetes distributions
    • Use cases and deployments
  • Deep Dive Demo: Cloud Backup for Enterprise Workloads
    Deep Dive Demo: Cloud Backup for Enterprise Workloads
    Parker Sinclair Sales Engineer, Druva Inc. Recorded: Feb 12 2019 20 mins
    Did you know that you can simplify data protection for enterprise workloads with a single cloud solution for backup, archival, and disaster recovery?

    Attend a 30-minute live demo of Druva Phoenix and our product expert will answer all of your questions!

    During this demo you'll learn how to:

    - Provide global protection for enterprise server and virtual workloads
    - Reduce total cost of ownership (TCO) by up to 60%
    - Isolate and quickly restore data during infrastructure attacks
    - Get started within minutes — Druva Phoenix is offered as-a-service and can be provisioned on-demand
  • 20 SIEM Use Cases in 40 Minutes: Which Ones Have You Mastered?
    20 SIEM Use Cases in 40 Minutes: Which Ones Have You Mastered?
    Brandon Dunlop, Moderator, (ISC)², Matthias Maier, EMEA, Director of Product, Splunk Recorded: Feb 12 2019 62 mins
    Every organisation can, and at some point will be breached. Gone are the days where investing only in preventive security technologies such as firewalls, endpoint protection and proxy servers were considered ‘state-of-the-art’. Instead, security best practices have evolved to build capabilities that detect attacks early, and to respond if all detection and prevention measures have failed. Today’s modernised approach is essential in helping the business recover quickly after a major attack - and helping the CISO keep their job.

    So, your technologies have evolved, but has your approach to data collection? Do you have the right data for detection and response - or do you need to adapt for the future?

    Join this webinar with Splunker, Matthias Maier to walk through 20 security use cases already used by leading organisations. You’ll hear the most relevant questions for each use case, and discover which device or application within your infrastructure can be used to find the answers. Forty minutes later, you’ll be set to take away your learnings, validate them in your own environment, and identify the most relevant gaps that need to be addressed for your business.
  • Erhalten Sie verlässlichen Datenzugriff für Ihre Security-Tools
    Erhalten Sie verlässlichen Datenzugriff für Ihre Security-Tools
    Daniela Fusaro, Senior Solutions Architect Recorded: Feb 8 2019 20 mins
    Die meisten Security Unternehmen haben viele Applikationen in ihrem Netzwerk laufen. Viele Firmen wissen jedoch nicht, welche Applikationen die meisten Ressourcen benötigen, da ihnen die volle Visibilität in ihre Netzwerkdaten fehlt.

    Security Budgets werden oft gekürzt, so dass viele Unternehmen eine Herausforderung damit haben, den erhöhten Bedarf diesbezüglich zu decken.

    Diese Ineffizienz resultiert oft darin, dass der gesamte Netzwerkverkehr von allen Netzwerk- Security-Tools analysiert wird, auch wenn das gar nicht notwendig wäre.

    Während viele Firmen den Fokus auf ihre Security Tools legen, wird häufig aus den Augen verloren, ob alle relevanten Daten oder zuviele Daten dort ankommen, die diese Tools vielleicht gar nicht analysieren können oder müssen.

    Die Security Operation Center sind jedoch abhängig davon, Netzwerk-Events zu sammeln, zu korrelieren und auswerten zu können, so dass sie potentielle Security Bedrohungen schnell identifizieren und beantworten können.

    An die richtigen Daten aus dem gesamten Netzwerk heranzukommen, und gleichzeitig die Systeme nicht zu überlasten, kann eine große Herausforderung sein.

    Application Intelligence bietet Ihnen spezifische Informationen über alle Applikationen, die durch Ihr Netzwerk fließen. Im Security Kontext ist dies besonders nützlich, weil die Security Appliances sprichwörtlich nach der Nadel im Heuhaufen suchen, um in den steigenden Datenmassen von Netzwerkflows Bedrohungsmuster zu finden.

    Sehen Sie sich unser Webinar an, um zu verstehen, wie Sie Ihre Netzwerk- und Security-Tools effizienter nutzen können, um Ihre Netzwerk Infrastruktur zu schützen.
  • Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond
    Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond
    Dinah Davis, VP Research & Development - Arctic Wolf Networks Recorded: Feb 7 2019 37 mins
    Last year was all about large Ransomware hacks like WannaCry, Petya/NotPetya, and CRYPSHED to name a few. These various strains of Ransomware can bypass your perimeter controls and infect your critical systems, bringing your business to a grinding halt.

    However, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. So, what are your options?

    In this webinar Dinah Davis, VP of Research & Development, at Arctic Wolf Networks, will share her key insights on a ransomware cyber kill chain from delivery, infection to command and control activity, and walk you through the following:

    - What happens when a ransomware is exploded in a computer, with a demo
    - How do you detect and respond to a ransomware attack?
    - What is coming next in the world of ransomware?

    To discover how to fortify your network with 24/7 monitoring with managed detection and response, register for our upcoming webinar.

    About our key speaker:

    Dinah Davis is the VP of R&D at Arctic Wolf Networks, responsible for the development of the AWN CyberSOCTM product. Dinah holds an M. Math in cryptography from the University of Waterloo. She has over 16 years of experience in the tech industry with time spent as a Security Software Developer at the Communications Security Establishment Canada and BlackBerry, and as a manager at TrustWave and D2l. Dinah is also the founder of Code Like a Girl, a publication whose goal it is to change society’s perceptions of how women are viewed in technology, which has over 36,000 subscribers and a vibrant online community.
  • UCaaS WAN Realities
    UCaaS WAN Realities
    Oracle + Talari Networks Recorded: Feb 7 2019 61 mins
    What are the realities of easily implementing reliable and secure UCaaS services? Featuring Riverside Transport, RingCentral and Analyst Lee Doyle share a first-hand customer, partner and analyst point of view.

    •Riverside Transport details UCaaS synergy from failsafe SD-WAN technology and high-value Cloud Communications applications.
    •Analyst Lee Doyle’s view on why the Cloud Communication services market is important and how it can be a money-saving option for enterprises.
    •Deploying reliable UCaaS applications including Voice over IP (VoIP), SIP trunking, and online collaborative workspaces.
  • Achieve Enterprise Scale with Microsoft Exchange on HPE Apollo Storage
    Achieve Enterprise Scale with Microsoft Exchange on HPE Apollo Storage
    Mike Harding, Product Manager - Microsoft Storage Solutions, HPE Recorded: Feb 7 2019 52 mins
    Abstract: Learn how HPE hardware brings out the best in Microsoft Exchange Server 2019. This newest version of the leading email product relies on specific hardware features as never before. This session highlights the key features and benefits of Microsoft Exchange on HPE Apollo Gen 10 storage, and what you can expect for improved performance, security, and administration for your email system.
  • Premier pas avec la visibilité : fournir des données fiables aux outils
    Premier pas avec la visibilité : fournir des données fiables aux outils
    Pascal Beurel, Solutions Architect Recorded: Feb 7 2019 31 mins
    La plupart des équipes opérationnelles de sécurité ont une compréhension globale de ce qui transite sur les réseaux. Cependant, la majorité n’ont pas une visibilité précise des applications qui consomme les ressources. Alors que les budgets de sécurité sont réduits au maximum, les entreprises doivent lutter pour supporter une demande accrue. Les inefficiences font souvent que tout le trafic est analysé et inspecté par tous les outils de sécurité du réseau, que le traffic soit pertinent ou non.

    Tandis que de nombreux administrateurs concentrent leurs efforts sur les outils de sécurité et leurs outils SIEM, l’acquisition du trafic pertinent est souvent négligée. Aujourd'hui, le centre d'opérations de sécurité (SOC) dépend énormément de sa capacité à collecter, corréler et analyser les événements réseau afin d'identifier et de réagir rapidement aux menaces à la sécurité. Mais l'accès aux trafic approprié et pertinent sur l'ensemble du réseau et sans surcharger les outils peut s'avérer être un réel défi.

    L’approche Gigamon avec la fonctionnalité « Application Intelligence » permet de découvrir l’ensemble des applications transportées dans un réseau et de sélectionner uniquement les applications sensibles et utiles pour les outils de sécurité. Dans un contexte critique de sécurité, cela est particulièrement efficace car les dispositifs de sécurité recherchent souvent « l'aiguille dans la botte de foin»; c’est-à-dire : identifier la séquence unique de paquets ou de flux provenant de l’ensemble tu trafic et qui contient les menaces

    Rejoignez-nous pour comprendre comment tirer meilleur parti de votre réseau pour améliorer votre efficacité de vos outils de sécurité.
  • How virtualization Eases the Process of Modernizing Your Datacenter
    How virtualization Eases the Process of Modernizing Your Datacenter
    Andrew Sullivan, Technical Marketing Manager, Red Hat Recorded: Feb 6 2019 45 mins
    Given the current focus on digital transformation, companies are experiencing mounting pressure to modernize datacenters and cloud-based infrastructure, and to implement more agile processes. Moving to a modern datacenter can help your organization remain competitive and relevant, but it isn't easy. Manual processes, a lack of control, separate infrastructure, and inefficient deployment can make it difficult.

    Red Hat® Virtualization can help. It’s an open software-defined, easy-to-use, efficient infrastructure and centralized management platform for virtualized workloads. Built on Red Hat Enterprise Linux® and Kernel-based Virtual Machine (KVM) technologies, Red Hat Virtualization offers a high-performing, highly-available platform that helps businesses have a stable infrastructure that easily scales.

    Join this webinar, where we’ll cover these topics:
    > Red Hat Virtualization features, use cases, integrations, and partners, which allow you to build a streamlined, reliable environment with mixed workloads.
    > Virtual-to-virtual (V2V) conversion tooling, helping you more easily migrate workloads from other hypervisors.
  • Addressing the SDN/NFV Skills Gap for Network & Service Transformation
    Addressing the SDN/NFV Skills Gap for Network & Service Transformation
    Stan Hubbard, MEF; Pascal Menezes, CTO, MEF; Craig Easley, President, CEA; Sam Hurrell, CEO, Perpetual Solutions Recorded: Feb 6 2019 40 mins
    SDN and NFV technologies are critical to the success of network and service transformation for communications service providers and enterprises. But the skills necessary to achieve transformation results are scarce. A recent MEF and Vertical Systems Group survey ranked engineering expertise and technical resources as the No. 1 business challenge for migrating to cloud-centric, dynamic network services. Research by SDxCentral, Cartesian, and others have identified SDN and NFV skills shortages as the major barriers to success. MEF's vendor-neutral SDN/NFV professional certification is the only industry accreditation recognizing the technical depth that is required in these technologies to address organizational skills gaps, accelerate transformation initiatives, and ensure competitiveness now and in the future.

    Attend this webinar to learn about:

    * Transformation: The importance of SDN and NFV to network transformation strategies
    * MEF 3.0: The need for SDN and NFV expertise for those companies planning and implementing the MEF 3.0 global services framework
    * SDN Federation: Why MEF SDN/NFV certified professionals will play an instrumental role in enabling successful inter-carrier SDN federation
    * The MEF-SDN/NFV Exam: The target audience, what we cover, and how we compare against other industry certifications
    * MEF-SDN/NFV and MEF-CECP: Why existing MEF-CECPs should consider MEF-SDN/NFV
  • First step to visibility: Get reliable data access for tools
    First step to visibility: Get reliable data access for tools
    Ollie Sheridan, Principal Security Solutions Engineer, CISSP Recorded: Feb 6 2019 32 mins
    Whilst many users will focus their efforts on the Tools and their SIEM tools, the acquisition of this traffic is often neglected. Today’s Security Operations Centre (SOC) depends heavily on the ability to collect, correlate and analyse network events to quickly identify and respond to security threats – but getting access to the right traffic data from across the network, and without overloading the system, can be a challenge.

    Most Security Operations organizations have a broad understanding of what applications are running on their network. However, many have no visibility into which specific applications are consuming resources. While Security budgets are stretched thin, organizations have to struggle to support increased demand. Inefficiencies often result in all traffic being analysed by all network security tools, whether it is relevant or not.

    Application Intelligence provides specific information about all the applications streaming through a network. In a security context, this is especially useful because security appliances are looking for the “needle in the haystack”; that is, to identify the one single sequence of threat packets or flows from the entire mass of network flows.

    Join us to understand how you can better utilise your network and security tools to protect your network infrastructure and ensure your end-users receive the best service.
  • [Ep.25] Ask the Expert: Supply Chain Digital Transformation
    [Ep.25] Ask the Expert: Supply Chain Digital Transformation
    Ashish Sonkusare, Leader, SAP Digital Transformation at HCL Technologies & Kelly Harris, Sr. Content Manager, BrightTALK Recorded: Feb 5 2019 47 mins
    This webinar is part of BrightTALK's Ask the Expert Series.

    After the hype created by Internet of Things (IOT), digitization of everything has become a norm. Digitization would become a competitive advantage in every aspect of running a successful organization. Be it Manufacturing, Sales and Marketing, Customer Experience, Supply Chain, Finance & Operations, Human Capital, Strategic sourcing; every single function in an organization is going to undergo this massive change and transformation. Most of us are still trying and struggling to understand how profound this change would be and what will it mean in terms of providing additional business capabilities to companies. The impact of this change on the organizations can be both positive as well as negative.

    Join this live Q&A with Ashish Sonkusare, Leader, SAP Digital Transformation at HCL Technologies, and Kelly Harris, Sr. Content Manager at BrightTALK, for an in-depth look at enterprise architecture and infrastructure, and digitizing your supply chain.
  • Networking Requirements for Hyperconvergence
    Networking Requirements for Hyperconvergence
    Christine McMonigal, Intel; J Metz, Cisco; Alex McDonald, NetApp Recorded: Feb 5 2019 61 mins
    “Why can’t I add a 33rd node?”

    One of the great advantages of Hyperconvergence infrastructures (also known as “HCI”) is that, relatively speaking, they are extremely easy to set up and manage. In many ways, they’re the “Happy Meals” of infrastructure, because you have compute and storage in the same box. All you need to do is add networking.

    In practice, though, many consumers of HCI have found that the “add networking” part isn’t quite as much of a no-brainer as they thought it would be. Because HCI hides a great deal of the “back end” communication, it’s possible to severely underestimate the requirements necessary to run a seamless environment. At some point, “just add more nodes” becomes a more difficult proposition.

    In this webinar, we’re going to take a look behind the scenes, peek behind the GUI, so to speak. We’ll be talking about what goes on back there, and shine the light behind the bezels to see:

    •The impact of metadata on the network
    •What happens as we add additional nodes
    •How to right-size the network for growth
    •Tricks of the trade from the networking perspective to make your HCI work better
    •And more…

    Now, not all HCI environments are created equal, so we’ll say in advance that your mileage will necessarily vary. However, understanding some basic concepts of how storage networking impacts HCI performance may be particularly useful when planning your HCI environment, or contemplating whether or not it is appropriate for your situation in the first place.
  • New Year, New Phishing Threats: 10 Resolutions To Keep You Safe & Secure
    New Year, New Phishing Threats: 10 Resolutions To Keep You Safe & Secure
    Brandon Dunlap, Moderator, (ISC)², David Mount, Cofense, Mollie MacDougall, Cofense Feb 19 2019 1:00 pm UTC 60 mins
    New year. New resolutions. Every year we make the pledge to eat healthier and exercise more. What is good for the waistline is also good for your phishing defense posture. With more than 90% of breaches attributed to successful phishing campaigns – now is the time to think about how to prepare and prevent attacks. In this session you’ll hear about 10 resolutions for your phishing defense programs that will make your organisation more secure.
    Some of the topics covered include:
    - How to empower humans to be part of the solution
    - Best practices to balance automation with human intuition
    - How the latest features and technologies can make your life easier
  • 5 Questions to Ask When Considering Cloud Backup for Enterprise Workloads
    5 Questions to Ask When Considering Cloud Backup for Enterprise Workloads
    Sarah Beaudoin, Product Marketing Manager, Druva Feb 19 2019 4:00 pm UTC 44 mins
    As organizations continue to migrate to Office 365 for their email, productivity and collaboration tools, they’re quickly realizing that Office 365’s native capabilities do not provide the essential data protection capabilities they need.

    Join us for a technical webinar on Tuesday, August 21st at 3PM SGT/ 5PM AEST and learn best practices for safeguarding your Office 365 data, including:
    - Gaps within OneDrive, Exchange Online and SharePoint Online that lead to increased risk of data loss
    - How a third party backup solution can automate data protection and ensure data recoverability from user error, malicious behavior or malware
    - How to build a data management strategy for the future that leverages the cloud and improves alignment with organizational policies and SLAs
  • Accelerating Virtual Infrastructure Deployment
    Accelerating Virtual Infrastructure Deployment
    Paul Stevens / Advantech, Eric vanVliet / Advantech, Purvi Thakkar / Intel Feb 19 2019 4:00 pm UTC 60 mins
    Workloads are shifting across platforms that span from entry-level to extreme performance.
    Finding the right balance of compute, acceleration, networking and storage to cost effectively run an application at any location in the network can be challenging.
    More agile solutions are required that meet the challenges of next generation networks with greater elasticity across a scalable range of white box servers.

    This webinar will provide you with deeper insights into Intel® Select Solutions for NFVI and uCPE and how they help:

    •Simplify Network Evolution using platforms verified as Intel® Select Solutions
    •Get on faster, more efficient deployments using tested white box servers
    •Build Reliable Infrastructure with verified configurations that take full advantage of virtual network enhancements
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Clarence Hill, David Kennedy Feb 20 2019 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Clarence Hill, Senior Manager, PS Advisory Services
    •David Kennedy, Managing Principal, Open Source Intelligence

    This month's theme: Device Overlays

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • FICON 201
    FICON 201
    Patty Driever, IBM; Howard Johnson, Broadcom; Joe Kimpler, ATTO Technologies Feb 20 2019 6:00 pm UTC 75 mins
    FICON (Fibre Channel Connection) is an upper-level protocol supported by mainframe servers and attached enterprise-class storage controllers that utilizes Fibre Channel as the underlying transport.

    The FCIA FICON 101 webcast (on-demand at http://bit.ly/FICON101) described some of the key characteristics of the mainframe and how FICON satisfies the demands placed on mainframes for reliable and efficient access to data. FCIA experts gave a brief introduction into the layers of architecture (system/device and link) that the FICON protocol bridges. Using the FICON 101 session as a springboard, our experts return for FICON 201 where they will delve deeper into the architectural flow of FICON and how it leverages Fibre Channel to be an optimal mainframe transport.

    Join this live FCIA webcast where you’ll learn:

    - How FICON (FC-SB-x) maps onto the Fibre Channel FC-2 layer
    - The evolution of the FICON protocol optimizations
    - How FICON adapts to new technologies
  • Architecting High-Performance Storage with Datera Data Automation on HPE Servers
    Architecting High-Performance Storage with Datera Data Automation on HPE Servers
    Chris Tinker, Chief Technologist, HPE and Hal Woods, CTO, Datera Feb 21 2019 5:00 pm UTC 105 mins
    Chris Tinker, Chief Technologist at Hewlett Packard Enterprise joins Hal Woods, CTO at Datera to discuss some of the leading technologies in the Software Defined Revolution, and how HPE and Datera help cultivate the vast ecosystem of solutions.

    Data is at the center of the Software Defined Data Center, where Datera reimagined enterprise storage and partnered with HPE to deliver a complete solution.

    What you will learn from this webinar:

    • Architecting your data center for high-performance
    • Ease of deployment and management
    • Advanced automation and future-ready choice to orchestrate data for VMs
  • Modernizing VMware with Kubernetes
    Modernizing VMware with Kubernetes
    Kamesh Pemmaraju, Head of Product Marketing at Platform9 Feb 21 2019 6:00 pm UTC 75 mins
    Kubernetes has become the de facto standard today for building and running container workloads. Many organizations would like to leverage their existing investments in VMware to take advantage of the Kubernetes revolution.

    Unfortunately, VMware was never designed to run containerized workloads. Furthermore, Kubernetes is complex and notoriously difficult to deploy and operate at scale for production workloads. The lack of Kubernetes skills adds to the challenge.

    Join us in this Webinar to learn how you can get a production ready, easy to use Kubernetes solution with a 24x7x365 SLA on your very own VMware infrastructure with the following benefits:

    1.Get up and running with Kubernetes in an hour
    2.Eliminate the management overhead
    3.Enable self-service for your developers to deploy Kubernetes applications with a single click
    4.Improve collaboration between your developers and VMware admins
    5.And much more!

    Join us at 1 PM EST/10 AM PST on February 21, 2019 to learn more.
  • Enterprise-Wide Kubernetes, Ep 6: Ingress and Load Balancing
    Enterprise-Wide Kubernetes, Ep 6: Ingress and Load Balancing
    Komal Bhardwaj & Ritesh Patel Feb 21 2019 6:00 pm UTC 60 mins
    When applications that are deployed in Kubernetes need to be accessed from outside the cluster, an Ingress needs to be created. In Kubernetes, Services can also be exposed via a Load Balancer. There are several options available to make your application accessible and the right choice may depend on your requirements.

    In this webinar, we will discuss how Ingress and Load Balancing works in Kubernetes. We will also show a demo of how Citrix ADC serves as an Ingress device on a Nirmata managed Kubernetes distribution.

    Ritesh Patel - VP Products at Nirmata
    Komal Bhardwaj - Principal Product Manager at Citrix
  • Overcoming The Cybersecurity Skills Shortage in Law Firms
    Overcoming The Cybersecurity Skills Shortage in Law Firms
    Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Feb 21 2019 7:00 pm UTC 39 mins
    The evidence is clear: law firms of all sizes need to securely handle sensitive information associated with their clients, investigators, and witnesses. According to the American Bar Association’s 2017 Legal Technology Survey Report, 22 percent of respondents suffered a security breach at their law firms.*

    Compromised client information can destroy reputations and lead to decreased billables and lost business. While the need for improved security is evident, IT and security teams struggle to locate, retain and train talent needed to maintain and improve their security posture. So, what are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure?

    In this Arctic Wolf webinar, you will:

    - Discover why cybersecurity is top of mind in the legal community
    - Recognize the IT and Cybersecurity skills shortage and its impact on security
    - Understand how SOC-as-a-Service approaches enable law firms to rapidly improve their security posture and provide evidence to satisfy technology audits

    Save your seat today to learn more!

  • Cloud Success Series: Control Cost and Mitigate Risk in the Cloud, Session 1
    Cloud Success Series: Control Cost and Mitigate Risk in the Cloud, Session 1
    John Masci, Principal Technologist - Cloud Solutions Feb 21 2019 7:00 pm UTC 60 mins
    Today, 77 percent of enterprises have at least one application on the cloud (IDG State of the Enterprise Cloud, 2018). If you are part of that 77 percent, then cloud is now a critical element of your competitiveness. Heading into 2019, the growing pains of cloud will be cost and security: you’ll face the difficult balance between empowering your teams with the newest cloud technologies and ensuring those teams stay within budgets and comply with organization-wide policies.

    As you take on this challenge, you need a cloud management platform that provides proactive ways to control and minimize costs, while enforcing governance and security.

    In partnership with LiftOff IT, HyperGrid invites you to attend this webinar and demo, highlighting the capabilities we offer to help you optimally manage and benefit from your cloud strategy.

    This webinar focuses on the following critical topics:

    • How your cost, security & governance challenges will change at different stages of cloud adoption
    • Key methods to manage costs including instance optimization, budget tracking, bill analysis and chargebacks
    • Mitigating security risks using risk-based policies, and automated threat detection
    • Maintaining compliance against internal and external standards corporate when operating in the public cloud
    • How the HyperCloud™ platform can simplify all the above

    Receive a complimentary copy of Gartner’s 2019 Magic Quadrant for Cloud Management Platform Report
    As a webinar participant, you’ll receive a courtesy copy of Gartner’s new landmark overview of the CMP marketplace. Learn why Gartner singled out HyperGrid as the only “visionary” in this category in its Magic Quadrant for Cloud Management Platforms.
  • 15 Minute Webinar: Do You Need to Protect Laptops, Office 365, & Salesforce.com?
    15 Minute Webinar: Do You Need to Protect Laptops, Office 365, & Salesforce.com?
    George Crump, Storage Switzerland and W. Curtis Preston, Druva Feb 22 2019 6:00 pm UTC 15 mins
    If you think the cloud provides enough protection for your critical data, you’re putting that data at risk. You can’t assume data is protected because it’s “in the cloud” -- you need to ensure all of the data in your critical applications, including Office 365 and Salesforce.com, get the protection they deserve.

    Join George Crump, Founder, and Lead Analyst at Storage Switzerland, and W. Curtis Preston (a.k.a. Mr. Backup), Chief Technologist at Druva, where they will discuss:

    - What level of protection do cloud services provide?
    - Is the provided level of protection enough for the enterprise?
    - What does the enterprise need to add to achieve complete protection?

    Register Now and get Storage Switzerland’s latest eBook “Protecting the Organization From Its Endpoints.”
  • Secure Your Journey to the Hybrid Cloud
    Secure Your Journey to the Hybrid Cloud
    Tim Woods, Vice President of Technology Alliances | Elisa Lippincott, Director of Product Marketing Feb 22 2019 7:00 pm UTC 60 mins
    Many enterprises are adopting a cloud-first strategy in efforts to drive business innovation and growth. As cloud deployments grow, security requirements grow with them – leading to a trend of security responsibilities becoming dispersed as traditional security implementations impede the speed to delivery. Distributed responsibilities lead to fragmented security implementations - add to the problem the lack of skilled personnel, misconfiguration errors, overly permissive access, shadowed IT, and a lack of consistency between on-premise and cloud security controls, and you can end up with a recipe for disaster.

    Join Tim Woods, VP of Technology Alliances at FireMon and Elisa Lippincott, Director of Product Marketing at FireMon, in this webinar where they will discuss:

    • Steps you need to take to gain full visibility and control to secure your hybrid environment
    • How to ensure consistency of your security controls within hybrid cloud and multi-cloud environments
    • How to manage risk and complexity in your hybrid cloud with a cloud security posture management strategy
  • Where are you on the Digital Transformation Journey? Further than you think
    Where are you on the Digital Transformation Journey? Further than you think
    Vishal Ganeriwala, Senior Director, Product Marketing, Citrix Workspace Feb 26 2019 12:00 pm UTC 37 mins
    Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?

    Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.

    You’ll learn how to:

    • Simplify your systems and ongoing management with a cloud-based approach
    • Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
    • Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
  • How to Gain Visibility into Encrypted Threats
    How to Gain Visibility into Encrypted Threats
    Brandon Dunlop, Moderator, (ISC)², David Warburton, Senior Threat Research Evangelist, F5 Labs Feb 26 2019 1:00 pm UTC 60 mins
    Encrypting data-in-transit with SSL/TLS is standard practice among organisations today. Important security initiatives, such as built-in web browser warnings and stronger legislative GDPR changes, have significantly improved privacy awareness and helped to prevent data breaches. However, cybercriminals commonly hide threats within encrypted payloads and use encrypted channels to propagate malware and exfiltrate data, knowing they can bypass traditional security inspection solutions.

    Join us for this webinar to learn more about:

    • Challenges with encrypted traffic and risks to your business
    • How to efficiently decrypt and orchestrate traffic to reduce latency
    • How to intelligently manage decryption and re-encryption across your entire security inspection solutions (IPS, NGFW, DLP, WAF, Anti-Malware, etc.)
  • Contain the Data Explosion in Universities
    Contain the Data Explosion in Universities
    Darren Soothill Feb 26 2019 2:00 pm UTC 60 mins
    The demand for additional data storage is growing too fast for traditional storage options to continue to be an affordable solution. Continuing down this path means you'll be forced to increase your budget dramatically in order to keep up with your data needs. However, SUSE’s intelligent software-defined storage solution, powered by Ceph technology, enables academic facilities to transform their storage infrastructure and reduce costs while providing unlimited scalability.
  • Ask a Cloud Access Software Expert…
    Ask a Cloud Access Software Expert…
    Jonathan Culver, Solutions Architect & Andrew Waite Brown, Regional Director - EMEA- Teradici Feb 26 2019 2:15 pm UTC 30 mins
    Join our monthly webinar for a quick review on Cloud Access Software followed by a Question and Answer session with our Cloud Access Software expert and Solutions Architect Jonathan Culver.

    1.What graphics adapters does Cloud Access Software support?
    2.What Windows versions does Cloud Access Software support?
    3.Can USB devices be used with Cloud Access Software?
    4.What are the supported hypervisors and cloud platforms for Cloud Access Software?
    5.Can I connect to my Cloud Access Software workstation on a tablet device?

    Submit a question when registering or during the webinar. Our goal is to ensure your deployment is a success!
    Register today.
  • Distributed Cloud and Edge Compute: Deployment Lessons from the Field
    Distributed Cloud and Edge Compute: Deployment Lessons from the Field
    Alessandro Barbieri, VP Product Management at Pluribus Networks Feb 26 2019 4:00 pm UTC 60 mins
    In this webinar we will review a novel network fabric architecture that leverages open source software, distributed SDN intelligence and open networking principals and has been designed for multi-site data center deployments as well as emerging distributed cloud and edge compute environments. We will discuss the technical attributes of the architecture and the rationale behind its design and then we will review three separate deployment examples. The first will be how this architecture has been deployed at regional cloud service provider Econocom Italia for their new Naboo Cloud offering. Econocom is the Digital Transformation Designer that designs, integrates and supports innovation, accelerating the digital transformation of companies. We will review the status of the implementation, learnings to date and next steps in the deployment. Second we will review a common scenario whereby the fabric provides a programmable network fabric to support the deployment of network function virtualization infrastructure (NFVi) in the mobile cores of Tier 1 mobile network operators. The third example will review a hypothetical deployment in a distributed cloud environment to paint a picture of how the network fabric might be deployed in emerging edge compute architectures.
  • 4 Things to Consider with Multi-Cloud and Hybrid Cloud Application Delivery
    4 Things to Consider with Multi-Cloud and Hybrid Cloud Application Delivery
    Sean Leach, Fastly and Sophia Vargas, Forrester Feb 26 2019 5:00 pm UTC 18 mins
    Organizations today are facing 4 main challenges when adopting cloud infrastructure and delivering apps in a multi cloud environment.

    Join this webinar with experts from Fastly and Forrester to learn how to:

    - Maximize availability by ensuring sufficient redundancy and failover options
    - Maintain visibility and control to guarantee app performance
    - Optimize performance across a diverse set of resources, locations and workload types
    - Address interoperability and leverage hybrid app components as one dynamic system

    Tune in with Sophia Vargas from Forrester and Sean Leach from Fastly as they discuss the state of cloud adoption, what to consider when delivering apps in a hybrid/multi cloud and the new approaches to cloud app delivery at the edge.
  • How Cox Automotive Democratized Data with a Self-Service Data Exchange
    How Cox Automotive Democratized Data with a Self-Service Data Exchange
    Nathan Swetye - Sr. Manager of Platform Engineering - Cox Automotive Feb 26 2019 6:00 pm UTC 62 mins
    Cox Automotive comprises more than 25 companies dealing with different aspects of the car ownership lifecycle, with data as the common language they all share. The challenge for Cox Automotive was to create an efficient engine for the timely and trustworthy ingest of data capability for an unknown but large number of data assets from practically any source. Working with StreamSets, they are populating a data lake to democratize data, allowing analysts easy access to data from other companies and producing new data assets unique to the industry.

    In this webinar, Nathan Swetye from Cox Automotive will discuss how they:

    -Took on the challenge of ingesting data at enterprise scale and the initial efficiency and data consistency struggles they faced.
    -Created a self-service data exchange for their companies based on an architecture that decoupled data acquisition from ingestion.
    -Reduced data availability from weeks to hours and developer time by 90%.
  • A Successful Journey to the Cloud (APAC)
    A Successful Journey to the Cloud (APAC)
    Paul Moxon, VP Data Architecture and Chief Evangelist, Denodo Feb 27 2019 1:30 am UTC 57 mins
    By 2020, a corporate "no-cloud" policy will be as rare as a "no-internet" policy is today, according to Gartner, Inc. While cloud makes enterprises more flexible and agile, various cloud adoption scenarios such as hybrid cloud, infrastructure modernization and cloud based analytics present a few challenges of their own.

    Attend this session to learn:

    • Challenges involved with various cloud adoption scenarios
    • How data virtualization solves cloud adoption challenges while centralizing data governance and security mechanism
    • How companies are using data virtualization to tackle complex modern customer segmentation problems such as “customer genomics”


    • Challenges of cloud adoption
    • Data virtualization to the rescue
    • Product demonstration
    • Q&A
  • How to Optimize Network Performance During Infrastructure Transformation
    How to Optimize Network Performance During Infrastructure Transformation
    Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Feb 27 2019 6:00 pm UTC 60 mins
    How do you reduce complexity of your transforming infrastructure, gain greater IT tool efficiency and maximize visibility into your network? The right solution should empower you to produce better outcomes with less effort at lower cost. That is where a next-generation packet broker comes into play.

    Join Gigamon to get the latest best practices to:
    • Acquire and aggregate all network traffic for better visibility
    • Stop duplicate packets from overloading your tools
    • Filter traffic to provide the right data to the right tools
    • Optimize compliance and reduce risk across your entire IT environment

    If you need to optimize your tools, improve network performance and availability, get better insights into threats and enable your Network Operations and Security Operations teams to collaborate, you won’t want to miss this technical webinar.
  • Does Your Data Center Need NVMe?
    Does Your Data Center Need NVMe?
    Storage Switzerland, Virtual Instruments, SANBlaze Feb 27 2019 6:00 pm UTC 60 mins
    NVMe storage systems and NVMe networks promise to reduce latency further and increase performance beyond what SAS based flash systems and current networking technology can deliver. To take advantage of that performance gain however, the data center must have workloads that can take advantage of all the latency reduction and performance improvements that NVMe offers. Vendors emphatically state that NVMe is the next must-have technology, yet many still continue to provide SAS based arrays using traditional networks.

    How do IT planners know then, that investing in NVMe will truly provide their organizations the benefits of NVMe for their demanding applications and see a measurable return on investment? Just creating a test environment to perform an NVMe evaluation can break the IT budget!

    Register now to join Storage Switzerland, Virtual Instruments, and SANBlaze as we look at the state of the data center and provide IT planners with the information they need to decide if NVMe is an investment they should make now or if they should wait a year or more. The key is determining which applications can benefit from NVMe-based approaches.

    In this live event, IT professionals will learn
    - About NVMe, NVMe Storage Systems and NVMe over Fabric Networking
    - The Performance Potential of NVMe Storage and Networks
    - What attributes are needed for a workload to take advantage of NVMe
    - Why NVMe creates problems for current IT testing strategies
    - Why a Workload Simulation approach is the only practical way to test NVMe
    - How to build a storage performance validation practice
  • 451 Research & Citrix: Accelerating Productivity without Compromise
    451 Research & Citrix: Accelerating Productivity without Compromise
    Chris Marsh of 451 Research & Matt Crawford of Citrix Feb 28 2019 12:00 pm UTC 54 mins
    The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.

    Topics discussed will include:
    * Current sources of friction that hamper productivity
    * Barriers to collaboration and execution
    * The importance of context and automation in enabling workers
    * Tips for selecting technologies that map to the new workforce
  • Edge Computing in Industrial IoT
    Edge Computing in Industrial IoT
    Amir Barnea Feb 28 2019 3:00 pm UTC 60 mins
    Edge Computing has been brought in as an approach to solve some of the main challenges of IIoT, but it is capable of much more than handling secure networking. In this webinar, we’ll share new developments in Edge computing and explain how it can be used to perform IIoT-specific, non-networking functions, such as OpenPLC and SCADA firewall.
  • Contenedores a prueba de balas
    Contenedores a prueba de balas
    Jordi Bruguera, CTO en ITechGrup y Roberto Isidoro, Sales Engineer en SUSE Feb 28 2019 3:00 pm UTC 60 mins
    En el mundo de los contenedores, la Seguridad es fundamental y muchas veces se infravalora. Con SUSE Manager, la potenciamos y...

    ¡...queremos enseñaros cómo!

    Jordi Bruguera, CTO de ITechGrup, nos mostrará un ejemplo práctico de cómo auditar y parchear una imagen de Docker con SUSE Manager.