Hi [[ session.user.profile.firstName ]]

Virtualization

  • Is It Time to Upgrade Your Endpoint Data Strategy?
    Is It Time to Upgrade Your Endpoint Data Strategy?
    Storage Switzerland, Carbonite Recorded: Apr 18 2019 45 mins
    As organizations and their employees become more distributed, a case can be made that endpoints (laptops, tablets and smartphones) are some of the most critical pieces of technology in the organization. The problem is most organizations haven’t revisited their endpoint data strategy in years. In fact, some still don’t have a formal strategy in place.

    In this webinar Storage Switzerland and Carbonite discuss the increased importance of endpoints and why organizations need to upgrade their strategy to make sure these devices are protected, secure and in compliance. In light of increasing legal requirements and potential penalties, organizations can no longer afford to ignore this critical issue.

    In this live webinar you learn why:
    •. Endpoint backup needs to upgrade to keep pace with new threats
    •. Laptop backup by itself is not enough
    •. Security and loss prevention are as important as protection
    •. The Endpoint Strategy must help with compliance
  • Optimization and management of AWS, Azure, Google and private cloud environments
    Optimization and management of AWS, Azure, Google and private cloud environments
    Steve Wilson, VP, Product for Cloud and IoT, Citrix and Robin Manke-Cassidy, Director, Product Marketing, Citrix Recorded: Apr 18 2019 36 mins
    While the cloud does provide businesses greater agility, migrating to the cloud and then managing the cloud is a different story. Learn how Citrix simplifies your cloud journey by easily migrating workloads, provides choice through partnerships with Microsoft, Amazon and Google and other cloud ecosystems, improves the cloud experience for your users and reduces IT management and security complexity for IT.

    Join us and learn how to:

    - Seamlessly migrate workloads to the cloud private or public including Azure, AWS, Google
    - Enhance cloud reliability, speed up load times, reduce network latency
    - Improve cloud worker experience
    - Reduce cloud based security threats with user-centric analytics
    - Simplify cloud management including apps, data, device and network through a single console
  • The Practitioner’s Guide to Security Monitoring in the Cloud
    The Practitioner’s Guide to Security Monitoring in the Cloud
    Danielle Russell Group Product Marketing Manager, Brian Bledsoe Sr. Technical Manager, Sales Enablement for North America Recorded: Apr 18 2019 58 mins
    Cloud computing continues to transform the way organizations use, store, and share data, applications, and workloads, but has also introduced a host of new security threats and challenges. With so much data going into the cloud—and into public cloud services in particular—these resources become natural targets for bad actors. And, contrary to what you may think, the primary responsibility for protecting corporate data in the cloud lies with the cloud customer, not with the service provider.

    AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. Whether you are looking to secure your AWS & Azure cloud environments, cloud applications like Office 365 and G Suite or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.

    Join this webcast to learn more about cloud security challenges and how to address them with USM Anywhere. You'll learn:

    - What the shared responsibility model means for the security of your cloud assets
    - Challenges with trying to use traditional on-prem security monitoring tools in your cloud environments
    - How USM Anywhere gives you visibility into all assets across your cloud and on-premises environments
    - Benefits of an all-in-one security solution for threat detection, incident response and compliance management
  • Model-based Testing & BDD
    Model-based Testing & BDD
    Alexander Page Recorded: Apr 18 2019 52 mins
    The Behavior-driven Development (BDD) paradigm has changed the software testing landscape by combining business language (requirements) with functional application test cases; it gives us the ability to create low-jargon, self-documenting tests that all stakeholders understand and agree on to truly enable Acceptance Test-driven Development (ATDD). How do we combine these benefits with the power of Model-based Testing (MBT) to achieve maximum testing coverage and efficiency?

    Join BDD/MBT expert Alexander Page as he dives into a fully integrated End-to-End BDD testing framework/pipeline for rapidly testing a live MVC Webapp by utilizing a powerful MBT test generation solution to go from requirements to executable Gherkin/Cucumber BDD tests to enriched ATDD-focused reporting with Serenity.

    You'll learn:
    Automate test design/creation with Model-based Testing tool Agile Requirements Designer (ARD)
    Creating Gherkin BDD tests utilizing ARD and executing with Cucumber
    How to quickly generate a Gherkin step definition layer in Eclipse
    Tying in the Selenium UI testing framework with the Gherkin step definition layer
    How to use Serenity BDD framework to generate enriched ATDD test result reports

    The presentation will be followed by a Q&A session
  • Disaster Recovery as a Service: How Much Bandwidth is Enough?
    Disaster Recovery as a Service: How Much Bandwidth is Enough?
    Jaap Van Kleef, EMEA Technical Manager & Florian Malecki, International Product Marketing Sr. Director Recorded: Apr 18 2019 43 mins
    For today’s volatile, fast-paced technology landscape, StorageCraft DRaaS Cloud Services enable organizations with the ability to recover quickly and reliably when a disaster strikes their site or internal systems.

    However, every so often, we are getting asked about how much bandwidth is required to enjoy the benefits of DRaaS.

    Join this StorageCraft webcast to get some answers and learn how to best protect your on-premises business systems and data in a cloud purpose-built for total business continuity.
  • How to Gain Visibility into Encrypted Threats
    How to Gain Visibility into Encrypted Threats
    Jay Kelley, Principal Product Marketing Manager - F5 Networks Peter Silva, Security Solutions Marketing Manager - F5 Networks Recorded: Apr 17 2019 39 mins
    Driven by built-in web browser warnings, the EU GDPR, and general security and privacy awareness, encrypting data-in-transit with SSL/TLS is now a standard practice among many organizations. This is a great win for security overall to help prevent data breaches, however cyber criminals are using these encrypted channels to propagate malware and exfiltrate data knowing they can bypass traditional security inspection solutions that don’t decrypt traffic.

    Join this webinar to learn more about:

    - Challenges with encrypted traffic and risks to your business
    - How to efficiently decrypt and orchestrate traffic to reduce latency
    - How to intelligently manage decryption and re-encryption across all of your security inspection solutions (IDS/IPS, NGFW, Malware Sandbox, etc.)
  • The SOC-as-a-Service Prescription: Healthcare Cybersecurity & Compliance
    The SOC-as-a-Service Prescription: Healthcare Cybersecurity & Compliance
    Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Recorded: Apr 17 2019 37 mins
    Monitoring and detecting threats in healthcare faces a number of challenges: sophisticated cyberthreats, HIPAA compliance requirements, budget constraints, and a cybersecurity talent shortage for staff needed to monitor and respond to events. Previous approaches to monitoring have been ineffective and expensive. Managed detection and response (MDR) services provide a way out of this cybersecurity conundrum. This webinar explains how healthcare organizations can improve cybersecurity and compliance with MDR/Security Operations Center (SOC)-as-a-service.

    Join us and discover:
    • The ways a managed detection and response (MDR) service differs from managed security services (MSS).
    • How MDR/SOC-as-a-service provides big savings compared to in-house security info and event management (SIEM) tools.
    • How MDR/SOC-as-a-service helps to fulfill HIPAA compliance requirements.
    • The ways an MDR/SOC-as-a-service improves healthcare security posture and alleviates the cybersecurity talent shortage.

    Save your seat now!
  • The State of Cyber Arms Race: Unmasking the Threats Coming in 2019
    The State of Cyber Arms Race: Unmasking the Threats Coming in 2019
    John Gordineer, Director, Product Marketing, SonicWall Recorded: Apr 17 2019 41 mins
    The cyber arms race does not discriminate or differentiate. If a network, identity, device or data are of value, cybercriminals will identify, target and ruthlessly attack. To promote global awareness and facilitate important dialogues, SonicWall remains steadfast in its commitment to research, analyze and share threat intelligence.
    Join SonicWall security experts as we share findings, intelligence, analysis and research from the 2019 SonicWall Cyber Threat Report.
    This exclusive session will help you improve your security preparations and posture going forward.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Ashish Thapar Recorded: Apr 17 2019 79 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the Mobile Security Index and the current cybersecurity threat landscape.

    This Month's Theme: Mobile Security Index

    Our Verizon Threat Research Advisory Center presenters will be:

    •Ashish Thapar, Managing Principal - VTRAC
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    - The breadth and degree of the mobile security problem
    - Steps organizations are taking and why they aren't doing more
    - Impact of regulation, public Wi-Fi networks and future 5G networks

    And then we'll turn things over to David Kennedy to cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Secure and Agile Orchestration for Docker Containers
    Secure and Agile Orchestration for Docker Containers
    Avi Miller Product Management Director, Oracle Linux and Virtualization Recorded: Apr 17 2019 38 mins
    The goal of orchestration is to streamline and optimize frequent, repeatable processes to ensure accurate, rapid deployment of software–because companies need shorter time-to-market to be successful. Watch this webinar:

    To understand how to build a secure and agile production environment by leveraging Docker containers and Kubernetes orchestration.
    Learn about Oracle Container Services for use with Kubernetes which provides a comprehensive container and orchestration environment for the delivery of microservices and next generation application development.

    Watch a demonstration of how to use Vagrant and VirtualBox to automatically deploy a Kubernetes cluster.
  • Take Control of Vulnerabilities and Threats with Intuitive Risk Analytics
    Take Control of Vulnerabilities and Threats with Intuitive Risk Analytics
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Apr 16 2019 44 mins
    Vulnerabilities, threats, and risks are commonly mixed up security terms. Several cybersecurity solutions available in the market today give you independent analytics in each of these areas. that does not give you complete understanding of your overall risk posture.

    In this webinar, Narayan Makaram, Sr. Director of Product Marketing at Arctic Wolf Networks, will cover the following topics to enable you to address cyber risk.
    • Why vulnerabilities and threats are two sides of the same coin
    • How threat intelligence can be effectively used to add context to risks
    • What types of analytics can address risks that have the largest business impact
  • Fight the good fight against the bad bots!
    Fight the good fight against the bad bots!
    Brian McHenry and Graham Alderson Recorded: Apr 16 2019 36 mins
    Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organisations developing a sustainable security strategy.

    Join us for this webinar to learn:
    - How bots infect, propagate, and attack applications
    - What types of application attacks are commonly performed by bots
    - How you can defend against bad bots without disrupting the good ones
  • Live Demo: Configure NetFlow/IPFIX.  Gain Insights. Take Action.
    Live Demo: Configure NetFlow/IPFIX. Gain Insights. Take Action.
    Andy Hutchison, Sales Engineer Gigamon Recorded: Apr 16 2019 44 mins
    Lack of visibility into network traffic, coupled with an inability to ingest large amounts of packet data, leads to network blind spots. The good news is that NetFlow IPFIX metadata generation allows for richer metadata than standard NetFlow, with more flexibility when sending to a tool such as a SIEM.

    Register for this live demo webinar to:

    - Understand NetFlow concepts, and how they apply to security and other use cases.
    - See how Gigamon helps strengthen your existing infrastructure and tools.
    - Learn factors to consider when planning to use network metadata.

    Attendees will learn how to gain insight into metadata without an extensive investment in new tools.
  • Eliminate test environment dependencies in your CI/CD pipeline
    Eliminate test environment dependencies in your CI/CD pipeline
    Koustubh Warty and Petr Vlasek Recorded: Apr 16 2019 61 mins
    Enormous savings and quality benefits are possible from shifting testing left to development, but dependencies can make that goal difficult to achieve. Often, services you need to test against are either still in development, cost money to hit (3rd party services) or are simply not available. Sure, you can write a simple mock, but the inherent limitations in types of services you can cover and responses that can be returned often leads to inadequate tests and potential escaped defects.

    Now, you can create ephemeral test environments, complete with robust virtual services. Shift unit testing left by eliminating dependencies on unavailable services, services still in development, or unavailable services right from your IDE. In this webinar we’ll discuss:

    - Best practices for creating robust virtual services for developer use cases
    - How to easily share those services throughout the organization
    - Where to get started today, for free
  • AI, Automation, & its impact on IT
    AI, Automation, & its impact on IT
    Kevin Surace, CEO & CTO of Appvance.ai Recorded: Apr 16 2019 63 mins
    Artificial Intelligence has arrived in the workplace. As an emerging software technology, IT will most likely own the AI and robotic process automation rollouts across their companies. Tune in to hear Kevin Surace, CEO & CTO of Appvance.ai, discuss the very latest insights and gossip around AI and automation including what you need to know to be successful, which fields are showing success with AI and automation, and how you can guarantee a win.

    Presenter Information
    Kevin Surace is a Silicon Valley innovator, serial entrepreneur, and CEO. Kevin has been featured by Businessweek, Time, Fortune, Forbes, CNN, ABC, MSNBC, FOX News, and has keynoted hundreds of events, from INC5000 to TED to the US Congress. He was INC Magazines’ Entrepreneur of the Year, a CNBC top Innovator of the Decade, World Economic Forum Tech Pioneer, Chair of Silicon Valley Forum, Planet Forward Innovator of the Yearnominee, featured for 5 years on TechTV’s Silicon Spin, and inducted into RIT’s Innovation Hall of Fame.

    Mr. Surace led pioneering work on the first cellular data smartphone (AirCommunicator), the first plastic multichip semiconductor packages, the first human-like AI virtual assistant (Portico), soundproof drywall, high R-value windows, AI-driven building management technology, AI-driven QA automation, and the window/energy retrofits of the Empire State Building and NY Stock Exchange. Kevin is CEO of Appvance.ai, sits on 7 boards and has been awarded 28 US patents.
  • How Will Changes to Java Licensing Impact You?
    How Will Changes to Java Licensing Impact You?
    David Woodard, Principal Architect; Jeff Klemme, Principal Architect Recorded: Apr 16 2019 42 mins
    With the recent changes to Java licensing, now is the time to learn about your options and discuss the Oracle Java footprint within your business.

    In this session we will:

    • Review what has changed regarding the licensing of Java SE
    • Discuss the potential impact of these changes to an organization’s licensing liability
    • Examine how Java SE is currently licensed (Processor, Named User Plus)
    • Share recommendations for getting a handle on the Java usage in your organization
    • Explore Oracle products that come with Java

    Please bring your questions to share during the session. Leave this webinar with a better understanding of what is changing regarding the licensing of Java SE and how it may affect your business.
  • Elevate Your Infrastructure Using Airship
    Elevate Your Infrastructure Using Airship
    Matt McEuen, Technical Architect at AT&T and Evgeny Li, Sr. Software Engineer at Mirantis Recorded: Apr 16 2019 60 mins
    As infrastructure becomes more integrated into services for companies large and small, it also becomes more complex. This is particularly true for telcos such as AT&T, which is why the company founded the Airship project to help cleanly manage infrastructure. In this webinar, Matt McEuen of AT&T and Evgeny Li of Mirantis will explain how this open source project works to streamline deployment of tools such as OpenStack and Kubernetes, demonstrating how it works in both local development and production multinode bare metal environments.

    Attendees will learn:

    •How the architecture of Airship simplifies complex deployment
    •The differences between a bare metal and virtual environment
    •How to deploy a local production environment
    •How to create and trigger a job to perform everyday tasks repeatably and reliably
  • 15 Minute Friday: Rethinking Storage Performance for Modern Applications
    15 Minute Friday: Rethinking Storage Performance for Modern Applications
    Storage Switzerland, NGD Systems Recorded: Apr 12 2019 17 mins
    Modern applications process large segments of data, often in parallel. These applications need to match patterns across a multitude of object and vectors or regularly update multiple indices as they change over time. Storage IO and network latency quickly become a hindrance in allowing these applications to reach their full potential.

    Most IT Planners assume that the only way to address storage performance problems is to buy faster storage systems and eliminate network latency. These approaches only partially address the issues while being least efficient and more expensive. Join Storage Switzerland and NGD Systems for a 15 minute live webinar to discuss an alternative approach leveraging computational storage.

    Watch to learn:
    • Modern Application IO Profiles
    • The problems with typical IO workarounds
    • How computational storage addresses these issue
    • The use cases for computational storage
  • Software-defined Storage in der Praxis - Fallbeispiele
    Software-defined Storage in der Praxis - Fallbeispiele
    Thomas Grätz, Sales Engineer, SUSE Linux GmbH Michael Hojnacki, Geschäftsführer, ProtoSoft AG Recorded: Apr 12 2019 54 mins
    Datenwachstum ist eines der herausfordernden Themen diese Tage. Nachdem wir in unserem ersten Webcast das Konzept von SUSE Enterprise Storage (SES) und einige vorkonfektionierte Konfigurationen angeschaut haben, geht es in Teil 2 um konkrete Anwendungsfälle, in denen CEPH als Storage Lösung zum Einsatz kommen kann.
    Dabei gehen wir zunächst darauf ein, wie die zu speichernden Daten entsprechend Ihrem Bedarf an Zugriffsgeschwindigkeit und Verfügbarkeit klassifiziert werden, und welche Auswirkung dies auf die Architektur hat. Zudem sind die unterschiedlichen Schnittstellen, die das System bietet, ausschlaggebend. Die Anwendungsfälle reichen von Archivierungs- und Backup Szenarien über Dokumentenmanagement Systeme bis hin zu Webapplikationen.

    Agenda:
    •Datenklassifizierung und Implikationen
    •Schnittstellen in das Storage System
    •Dokumentenmanagement am Beispiel Own- und NextCloud
    •Speicherung von Videodaten
    •SES als Lösung für HPC Umgebungen
    •SES die Umgebung für Ihr Backup
    •Wohin nur mit den virtuellen Umgebungen?

    Melden Sie sich jetzt an!

    Dem Anwendungsfall SUSE Storage als Backend System für SAP HANA haben wir den letzten Teil unserer Storage Trilogie gewidmet.
  • How to Design Self-Protecting Production Storage and Gain Backup Independence
    How to Design Self-Protecting Production Storage and Gain Backup Independence
    Storage Switzerland, ClearSky Data Recorded: Apr 11 2019 58 mins
    It is 2019, why are we still backing up production storage? The simple answer is that most production storage systems can provide some level of data protection but they can’t fully replace backup. It's time to consider what backup independence means. The technology is there for production storage to replace backup but most organizations haven’t fully leveraged it. Join Storage Switzerland and ClearSky Data for our live webinar to learn how to design a self-protecting production storage infrastructure that not only protects data but replaces backup.

    Join us to learn:
    •. The difference between data protection and backup
    •. Why most production systems can’t replace backup
    • How to architect a production system that is fully protected and achieves backup inde-pendence
  • Solving the Top 3 Challenges of Hybrid Cloud
    Solving the Top 3 Challenges of Hybrid Cloud
    Manoj Nair, Chief Executive Officer, HyperGrid Recorded: Apr 11 2019 49 mins
    In a recent survey conducted by 451 Research, the top 3 challenges enterprises face today are cloud governance and compliance, migration and integration, and cost optimization. HyperGrid—recognized in 2019 Gartner Magic Quadrant for Cloud Management Platform—invites you to attend this webinar to learn how you can maximize the benefits of hybrid and multi-cloud to support innovation while still ensuring the proper security and governance.

    In this webinar, we’ll cover best practices to show you how you can:

    • Remove the complexity of managing hybrid and multi-cloud
    • Centralize governance and security to ensure compliance
    • Lower TCO and time-to-deployment for PaaS and IaaS services
    • Enable self-service and increase team productivity

    Additionally, learn how Synopsys, the 15th largest software company in the world with $3B+ annual revenue, solved its cloud management challenges. Synopsys was able to unify and simplify management across multi-vendor hybrid cloud, while easing resource deployment for public cloud.

    As a bonus for attending the webinar, you will also receive a courtesy copy of the 2019 Gartner Magic Quadrant for Cloud Management Platforms report.
  • Let's Talk About Security IT: Discover Why 24x7 Monitoring is Critical
    Let's Talk About Security IT: Discover Why 24x7 Monitoring is Critical
    Sonu Shankar - Sr. Product Marketing Manager - Arctic Wolf Networks Recorded: Apr 11 2019 51 mins
    Data breaches are now a common global occurrence, causing real economic damage to businesses. Lost revenue, damaged reputations, disrupted operations, and significant costs to recover, attackers are adapting their techniques at a much faster pace than most businesses. These once less sophisticated cyber criminals now have easier access to exploits that were previously only available to highly skilled nation-state actors.

    Without access to the large IT budgets to fend off these bad actors, small and medium businesses continue to struggle with determining the right approach to cyber security. Lacking the resources to build or staff a Security Operations Center (SOC), companies continue to invest in endpoint and perimeter security products. However, even with several security products deployed, breaches keep occurring. So, is there a way you could detect data exfiltration attempts early, even if the attackers were able to evade your endpoint defense mechanisms?

    In this webinar, we talk about:

    - Why investing heavily in endpoint and perimeter security products may not be enough
    - The top reasons why 24x7 security monitoring is critical to defend your business from today’s attackers
    - How you can transform your cyber security strategy today with advanced threat detection and response

    To discover why 24x7 monitoring is critical, register now.
  • Aporeto Unplugged: Sales Workshop
    Aporeto Unplugged: Sales Workshop
    Amir Sharif Recorded: Apr 11 2019 25 mins
    The objective is to accelerate customers' migration to AWS. If we simplify and strengthen application security, we are half-way there.

    Aporeto's identity-powered cloud security protects workloads based on their identity independent of the underlying infrastructure. This makes Aporeto's security portable: Once customers secure their workloads on-premise, they may migrate all or part of their workloads to AWS and still preserve the same zero trust posture.

    Goodbye complex security setups. Hello easier migration to AWS. Join us on this webinar to learn more.
  • 5 reasons a people centric security strategy safeguards sensitive information an
    5 reasons a people centric security strategy safeguards sensitive information an
    Nathan Mote, Product Marketing Manager, Citrix and Hanna Conrad, Product Marketing Manager Networking, Citrix Recorded: Apr 11 2019 48 mins
    Users often ignore internal security controls in order to get work done quickly. This puts the security of confidential information at risk. Tune in to this webinar to learn why a people-centric approach to security is the best way to protect your company’s sensitive data and IP, to achieve and maintain compliance, and to encourage secure innovation and collaboration.

    For a sneak preview, here are 5 points to consider:

    - You need secure access to information to achieve regulatory compliance requirements such as HIPAA, GDPR, PCI-DSS, GLBA and SOX.
    - Sharing files and securely collaborating with coworkers and external parties increases productivity and employee engagement.
    - Access to apps and data stored in multiple storage zones is critical – and doing it through a single, common interface on any device promotes security AND user satisfaction.
    - Being able to store data securely using the device of choice is a must for users.
    Security analytics can detect potential threats before they do damage to your IT environment.
  • Best Practices for Windows Server 2019 on Intelligent Infrastructure
    Best Practices for Windows Server 2019 on Intelligent Infrastructure
    Mike Harding, Product Manager - Microsoft Storage Solutions, HPE; Chris Lionetti, Nimble Storage Technical Marketing Manager Recorded: Apr 11 2019 64 mins
    Abstract: With Microsoft releasing a new set of server products, 2019 will be a busy year for Windows Admins and IT staff responsible for managing them. Learn how the right enterprise infrastructure products and tools will help ensure smooth upgrades, and the ability to unlock the highest levels of performance, availability & new functionality. Windows solution experts share info on best practices and the latest HPE Storage Integrations, plug-ins and tools covering SCOM, SCVMM, PowerShell and more.
  • Top Tips on Combatting Today’s Active Attacker
    Top Tips on Combatting Today’s Active Attacker
    John Titmus, Director, EMEA Cyber Security Expert, CrowdStrike, Brandon Dunlap, Moderator, (ISC)² Apr 23 2019 12:00 pm UTC 60 mins
    Key Trends, Predictions and the Need for Speed.

    This year’s CrowdStrike global threat report – Adversary Tradecraft and The Importance of Speed – is one of the industry’s most comprehensive reports on today’s leading cyber threats. It combines CrowdStrike’s comprehensive global observations with real-world case studies, delivering deep insights on modern adversaries and their tactics, techniques and procedures (TTPs).

    Join us for a webcast featuring CrowdStrike’s John Titmus as he explores the global trends and observations the report reveals.

    -Learn from real-world examples of how cybercriminals combine advanced, targeted attack techniques with ransomware to cause massive financial loss
    -Gain insight into global ‘breakout time’ metrics and achieving the “1-10-60” rule to defeat adversaries and prevent a mega-breach
    -Prepare for the now: discover the favourite TTPs seen over the last 12 months to predict what you should expect to see in 2019
  • vRouter Solutions for Internet Service Providers: Border Router, BNG and CG-NAT
    vRouter Solutions for Internet Service Providers: Border Router, BNG and CG-NAT
    Kelly LeBlanc, 6WIND VP of Marketing & Yann Rapaport, 6WIND VP of Product Management Apr 23 2019 3:00 pm UTC 60 mins
    Internet Service Providers are replacing hardware routers with virtual routers (vRouters) on x86 servers for Border Router, BNG and CG-NAT use cases. 6WIND recently announced ISP customers such as Excitel Broadband, Grape, JHComp and Minorisa are now deployed with 6WIND vRouters for use cases that service up to 200,000 users on Intel servers.

    This Webinar contains information that helps Network Architects, Engineers and Managers at Internet Service Providers, Universities and educational institutions that serve as ISPs, and Integrators to increase performance while reducing costs by replacing hardware routers with vRouters on Intel servers. Customer success stories will be included.
  • Proactive Preparation: Disaster-Proofing your Data
    Proactive Preparation: Disaster-Proofing your Data
    Seyi Verma, Director of Product Marketing, Druva Apr 24 2019 12:00 pm UTC 56 mins
    Imagine that you're responsible for a massive construction project and you just lost your data due to a disaster. Blueprints? Gone. Timelines? Gone. Drinks? Might be time for one!

    Losing your data is a reality that every company faces—construction is no exception. That's why Egan Company—a leading specialty trades contractor in Minnesota, unsatisfied with their previous backup products)—turned to Druva Phoenix to ensure their critical data was backed up and fully accessible in the event of a disaster.

    Join this informative webinar with experts from Egan Company and Druva, and learn about:

    - The flexibility, security and value of data protection delivered as-a-service in the cloud
    - How Egan Company enjoys fast, reliable restores, including large-scale VM volumes
    - How Druva Phoenix offers the go-to solution for backup, archival, and disaster recovery
  • What's new in Citrix Virtual Apps and Desktops
    What's new in Citrix Virtual Apps and Desktops
    Carisa Stringer, Sr. Director, Product Marketing, Virtual Apps and Desktops, Citrix and Nitin Sharma, Product Marketing Apr 24 2019 4:00 pm UTC 44 mins
    Citrix continues to innovate our industry-leading Virtual Apps and Desktops platform. Join us to experience the latest updates to see how we are enhancing the user experience, improving environment management and making your move to the cloud easier than ever.

    In this webinar, we’ll share the latest capabilities of Citrix Virtual Apps and Desktops including:

    Key enhancements from the latest Cloud, Current and Long Term Service releases
    - How to make your journey to the cloud seamless
    - Administrative flexibility and security enhancements
    - Industry-first user experience innovations around graphics, video and more
    - Don’t miss this exciting product update! In addition to seeing the new features in action, you’ll hear what’s coming next and be able to ask questions of our product experts.
  • Fight the good fight against the bad bots!
    Fight the good fight against the bad bots!
    Brian McHenry and Graham Alderson Apr 24 2019 5:00 pm UTC 35 mins
    Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organisations developing a sustainable security strategy.

    Join us for this webinar to learn:
    - How bots infect, propagate, and attack applications
    - What types of application attacks are commonly performed by bots
    - How you can defend against bad bots without disrupting the good ones
  • Cybersecurity Mythbusters: 6 Dangerous Cybersecurity Myths Debunked
    Cybersecurity Mythbusters: 6 Dangerous Cybersecurity Myths Debunked
    Louis Evans, Product Marketing Manager & Todd Thiemann, Director of Product Marketing - Arctic Wolf Networks Apr 25 2019 6:00 pm UTC 48 mins
    At Arctic Wolf, we continually encounter IT security myths that persist among businesses of every size. Isn’t antivirus all you need for cybersecurity? Aren’t large enterprises the only ones affected by data breaches? 24x7 security monitoring is overkill, right? These myths can significantly impact strategic IT decisions and put your business operations at risk.

    These are the kinds of questions, myths, and cybersecurity urban legends we’ll explore in this webinar. Discover what’s true—and what’s simply a myth.

    The webinar covers:

    •6 common myths about cybersecurity and cyber risk
    •The threats these myths pose to your business
    •Cybersecurity facts you can use to protect yourself

    Let the Arctic Wolf Cybersecurity Mythbusters team educate and entertain you. Save your seat now!

    And click here: http://bit.ly/2B3lyFv for part one of our six-part “mythbuster” blog series.
  • Hot vs Cold Data: Its Influence On Data Placement Decision & What to Do About It
    Hot vs Cold Data: Its Influence On Data Placement Decision & What to Do About It
    Augie Gonzalez, Director of Product Marketing, DataCore Software Apr 25 2019 6:00 pm UTC 60 mins
    The short half-life of data, quickly decaying from hot to warm to cold, governs how much you should spend on it throughout its stages.

    Humans are poorly equipped to track the rapid temperature changes, much less capable of reacting to it. Consequently, largely dormant data consumes precious space on expensive storage, blowing up disk capacity and spiraling up costs.

    In this webinar you’ll become acquainted with:
    •Machine learning (ML) techniques that sense data temperature variations in real-time
    •Artificial intelligence (AI) methods used to dynamically migrate data accordingly, between primary, secondary and cloud storage from different suppliers
    •Relative distribution of storage tiers necessary for optimum savings
  • Want Better Network Visibility with Less Complexity? Here's How!
    Want Better Network Visibility with Less Complexity? Here's How!
    Bob Laliberte, Senior Analyst, ESG and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Apr 29 2019 8:00 am UTC 53 mins
    Enable IT Collaboration with a Common Distributed Data Services Layer.

    The IT environment is rapidly changing, becoming more distributed and complex as organizations transform themselves to provide better digital experiences. Because these improved experiences will be more dependent on the network, it’s imperative for organizations to properly plan and prepare now to eliminate security blind spots. The bottom line is that companies need complete visibility into their physical, virtual and cloud infrastructure to detect and contain data breaches and mitigate risk.

    To accomplish this, successful organizations resist the legacy mentality that relies on more people and more tools at every location. Instead, they are turning to a new architectural approach that disaggregates the speed of the network from the speed of the tools inspecting traffic on that network. This innovative approach allows enterprises to absorb change in network speed and technology without compromising security.

    ESG believes the foundational step in this approach is to ensure comprehensive infrastructure visibility across data centers and distributed edge and cloud environments. To do this, organizations must have a common distributed data services layer that can collect, process and distribute the right information to the right tools at the right time.

    Join us to learn how a consolidated network architecture that includes security delivers better visibility, reduces complexity and increases tool efficiency.
  • The Webroot 2019 Threat Report
    The Webroot 2019 Threat Report
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Apr 29 2019 3:00 pm UTC 60 mins
    Webroot conducted an extensive research on the Threat Landscape for 2019 and presented the findings in the recently published Webroot 2019 Threat Report.

    A few of the key findings that will be covered during this webinar:
    - 40% of malicious URLs were found on good domains
    - 36% increase in the number of phishing attacks
    - 93% of phishing domains offered an HTTPS site
    - 54% of devices that got infected once were re-infected the same year
    - 25 of the top recurring malicious IP addresses were reused 95 times

    Join Webroot's Sr. Threat Research Analyst, Tyler Moffitt to learn about our threat discoveries and analysis to arm your business to overcome modern cybercrime.
  • Enabling Self-Service Analytics with Logical Data Warehouse (APAC)
    Enabling Self-Service Analytics with Logical Data Warehouse (APAC)
    Paul Moxon, VP of Data Architectures and Chief Evangelist & Michael Dickson, Senior Sales Engineer, Denodo Apr 30 2019 1:30 am UTC 59 mins
    What makes data scientists happy? Of course data. They want it fast and flexible, and they want to do it themselves. But most classic data warehouses (DW) and data lakes are not easy to deal with for agile data access. A more practical solution is the logical data warehouse (LDW), which has shown to be a more agile foundation for delivering and transforming data and makes it easy to quickly plug in new data sources.

    Attend this webinar to learn:

    * How easily new data sources can be made available for analytics and data science
    * How your organization can successfully migrate to a flexible LDW architecture in a step-by-step fashion
    * How LDWs help integrate self-service analytics with classic forms of business intelligence
  • Are Your Containers Secure?
    Are Your Containers Secure?
    Wim Coekaerts Senior Vice President, Operating Systems & Virtualization Engineering, Oracle Apr 30 2019 9:00 am UTC 45 mins
    Cloud-native applications are on a rapid rise, which brings a proliferation of serverless environments and containers. While this can help you deliver innovations faster, is there a downside?

    Whatever your deployment model is, when it comes to securing your infrastructure, being proactive rather than reactive is a must for technology-related priorities to stay on track.
  • Power critical apps, accelerate data analytics and tackle HPC and AI workloads
    Power critical apps, accelerate data analytics and tackle HPC and AI workloads
    Diana Cortes, HPE Worldwide Marketing Manager for HPE Superdome Flex & Clyde Gillard, HPE NA Category Leader for SUSE Apr 30 2019 3:00 pm UTC 60 mins
    Discover how enterprises are modernizing mission-critical database environments, accelerating data analytics, and speeding discovery with HPE Superdome Flex Server and SUSE solutions. Understand how the platform’s unique modular architecture, extraordinary scale-up capacity, and extreme RAS – augmented by the value of SUSE software – empower business lines to maximize value from traditional and in-memory databases such as SAP HANA, Oracle and SQL Server, and help scientists and engineers tackle data-intensive HPC workloads.
  • Don’t Let Digital Transformation Wreak Havoc on Your Network!
    Don’t Let Digital Transformation Wreak Havoc on Your Network!
    Sam Kumarsamy, Sr. Product Marketing Manager Gigamon Apr 30 2019 5:00 pm UTC 60 mins
    Organizations adopting digital apps must deliver an engaging user experiences at the enterprise level to be successful. Unfortunately, the road to great digital experiences is paved with speed bumps: they can cause networks to become even more complex as they groan under the weight of accommodating more users, increased data volume and higher speeds.

    Yes, digital apps are hyper-agile, but they are also very complex: components are often outsourced, apps are usually mega-tiered and are deployed across physical, virtual and cloud networks, making it difficult to get visibility into traffic. And without that visibility, how can you truly ensure a great experience?

    Help is at hand. During this webinar, you will learn how to build an efficient network architecture to provide an engaging digital experience.

    Attendees will learn how to:
    • Utilize tools efficiently by preventing packet duplication and optimizing traffic
    • Enhance security by collecting and distributing NetFlow metadata to tools more effectively
    • Identify, categorize and visualize more than 3,000 applications automatically

    See how a next-generation network packet broker increases visibility, improves security and enables companies to maximize their investment in tools to exceed user expectations.
  • Lessons from the Trenches:  Implementing Zero Trust in Reality
    Lessons from the Trenches: Implementing Zero Trust in Reality
    Brian Talbert, Alaska Airlines and Chase Cunningham, Forrester Apr 30 2019 7:00 pm UTC 60 mins
    Zero Trust is a major initiative for many security teams globally. But how do you get started? What pitfalls should be avoided?

    Forrester has published a lot on Zero Trust. In this webinar, Forrester Zero Trust analyst Chase Cunningham interview Brian Talbert from Alaska Airlines to chronicle their lessons and best practices in implementing Zero Trust as they moved to a cloud-based architecture. We’ll discuss implementing Zero Trust in the cloud where many of your old security tools don’t work and dive deep into:
    -Architectural considerations
    -Products and technologies
    -Organizational factors
  • Considerations for SAP Data Hub On-Premise on SUSE CaaSP
    Considerations for SAP Data Hub On-Premise on SUSE CaaSP
    Frank Schuler, VP SAP Technical Architecture, BackOffice Associates May 1 2019 1:30 pm UTC 75 mins
    While SAP Data Hub on one of the hyperscale cloud providers might be a potentially quick and low maintenance option, the main question remains where the ‘to be processed’ data resides as well as the total cost of ownership. This webinar will give you insights into what SAP Data Hub is and how you can maximise and optimise its performance using SUSE’s Container-as-a-service Platform. BackOffice Associates are SAP data management experts with a formidable reputation for excellence in their field.
  • Wege zu SAP HANA 2.0
    Wege zu SAP HANA 2.0
    Dr. Ralf Czekalla, Product Manager, SAP & Lars Pinne, Systems Engineer, SUSE Linux May 2 2019 8:00 am UTC 60 mins
    Die SAP HANA 2.0 Plattform ist ideal geeignet, Unternehmen dabei zu helfen, den Wandel zur digitalen Transformation zu vollziehen. Denn auf diesem Weg bedarf es einer neuen Generation von IT-Infrastruktur, die agil, offen, sicher und absolut zuverlässig ist.

    Erfahren Sie in dem gemeinsamen Webinar von SAP und SUSE mehr über die Strategie und Neuerungen der SAP HANA 2.0 Plattform, die auf dem SUSE Linux Enterprise Server for SAP Applications 15 basiert.

    Agenda im Überblick:

    SAP HANA 2.0
    - Strategy
    - News Update

    SUSE Linux Enterprise Server for SAP Applications 15
    - High Availability und Disaster Recovery
    - Live Patching
    - Automation
    - NVRAM
  • CISO Says with Abeer Khedr, Information Security Dir. at National Bank of Egypt
    CISO Says with Abeer Khedr, Information Security Dir. at National Bank of Egypt
    Abeer Khedr, InfoSec. Dir. at National Bank of Egypt, Mary-Jo Leeuw, Director of Cybersecurity Advocacy EMEA, (ISC)² May 2 2019 12:00 pm UTC 60 mins
    In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format.

    In this session Abeer Khedr, Information Security Director at the National Bank of Egypt will provide insight into the path she took to become a Cybersecurity Leader and how she is reinventing the role in the face of accelerating industry change.
  • Is Cloud Storage on Kubernetes Really More Efficient?
    Is Cloud Storage on Kubernetes Really More Efficient?
    Shailesh Mittal, Senior Engineering Architect at Datera May 2 2019 4:00 pm UTC 60 mins
    This webinar explores the challenges customers are facing when searching to find an affordable and reliable data storage provider that offers:

    • Performance
    • Low cost
    • Autonomic provisioning
    • Auto-scaling
    • Support for all workloads
    • Security

    Discover the solution in Datera’s self-managing, software-defined storage and how it uniquely excels where other providers fall short while offering the most powerful SDS on the planet.
  • CASB Fundamentals: How leading organizations protect sensitive cloud data
    CASB Fundamentals: How leading organizations protect sensitive cloud data
    Rich Campagna, Bitglass, Steve Armstrong, Bitglass, Brandon Dunlap, Moderator, (ISC)² May 7 2019 12:00 pm UTC 60 mins
    As more organisations deploy cloud apps like Office 365, AWS, and Slack securing corporate data becomes a challenge. Cloud Access Security Brokers (CASBs) have emerged as the go-to solution for organisations that need end-to-end data security, from cloud to device. In fact, Gartner believes that by 2022, 60% of large enterprises will use a CASB to govern some cloud services.

    In this webinar, we'll explore:
    •Critical gaps in cloud applications that must be filled
    •The 4 pillars of CASB
    •What makes CASBs different from security solutions built natively into cloud apps like Office 365.
    •Case studies on how leading enterprises leverage CASB to secure their cloud footprint.

    Join us to learn how a CASB can help you meet your security and compliance requirements.
  • Why Artificial Intelligence and Machine Learning are Key for MSPs
    Why Artificial Intelligence and Machine Learning are Key for MSPs
    George Anderson, Director of Product Marketing, Webroot May 7 2019 3:00 pm UTC 60 mins
    As the volume, sophistication and complexity of attacks on SMBs grows, current IT Security solutions need to become more pro-active, automated and effective.

    This presentation looks at how SMBs and MSPs can tackle these issues now and in the near future, and equip with the IT Security expertise and technology they need to defend their Clients and benefit from the this growth market.
  • Managing Access And Launching Jobs With Red Hat Ansible Tower
    Managing Access And Launching Jobs With Red Hat Ansible Tower
    John Walter, Solutions Architect, Training and Certification, Red Hat May 7 2019 5:00 pm UTC 38 mins
    Red Hat® Ansible® Tower helps you scale IT automation, manage complex deployments, and accelerate productivity. Centralize and control your IT infrastructure with a visual dashboard, role-based access control, job scheduling, integrated notifications, and graphical inventory management. This webinar, part of a series conducted by the Red Hat Training and Certification team, will provide a demonstration of how to manage access with users and teams and launch jobs using Ansible Tower.

    In this webinar, we will discuss how to:
    • Create Ansible Tower users.
    • Manage users efficiently within teams.
    • Create Ansible Tower jobs.
    • Maximize Red Hat Training’s Ansible curriculum.

    Join us to build the skills that will help you successfully manage your Red Hat Ansible Automation deployment with Ansible Tower.
  • SAP Data Hub und Kubernetes
    SAP Data Hub und Kubernetes
    Dr. Sarah Detzler, Senior Presales Specialist/Data Scientist, SAP & Carsten Duch, Sales Engineer, SUSE May 8 2019 8:00 am UTC 60 mins
    Mit SAP Data Hub ist SAP ein Themenfeld angegangen, das in vielen Unternehmen in der einen oder anderen Art und Weise ausgemacht wird und das da heißt: „mehr aus zugänglichen Daten rausholen“. Im Kern sorgt SAP Data Hub für Integration, kanalisiert und verwaltet aber auch Daten oder Informationen aus den zahlreich vorhandenen Quellen. Damit lassen sich zudem Big-Data-Anwendungen erstellen, die auf das Heben eines möglicherweise existierenden Potenzials selbst in einer weitverzweigten Organisation abzielen.
    Aus technischer Sicht spielen die SAP HANA-Plattform sowie SAP Vora bei SAP Data Hub mit eine herausragende Rolle, neben Integrationsfeatures – und: einer Runtime-Komponente als Infrastrukturelement. Eine zentrale Rolle spielt hierbei die SUSE-Lösung Container-as-a-Service Platform, kurz: CaaSP. Sie sorgt dafür, flexible, vereinfachte und automatisierte Möglichkeiten zur Auslieferung von kleinteiligen Services (Microservices) mithilfe von Containern bereitzustellen, samt der Verwendung von Kubernetes.

    Agenda im Überblick:

    SAP Data Hub
    - Strategy
    - News Updates
    - Use Cases

    SUSE Kubernetes
    - Architecture
    - Deployment
  • 2019 Verizon Data Breach Investigations Report
    2019 Verizon Data Breach Investigations Report
    Alex Pinto May 8 2019 2:00 pm UTC 60 mins
    2019 Verizon Data Breach Investigations Report
  • Deploy an SES test environment in 30 minutes
    Deploy an SES test environment in 30 minutes
    John Tonello, SUSE Global Technical Marketing Manager May 8 2019 2:00 pm UTC 45 mins
    This webinar is an introduction to SUSE Enterprise Storage and the community-based Ceph on which it’s based. Participants will get a quick overview of Ceph, see what’s involved in deploying a fully functioning SUSE Enterprise Storage 5.5 cluster (or 6 if it’s ready!), and step through the openATTIC dashboard. This deployment is ideal for IT practitioners interested in learning about software-defined storage and want to get their hands on a cluster for learning, testing and large-scale deployment planning.
  • How to Reduce Ransomware Risk
    How to Reduce Ransomware Risk
    Curtis Preston, Chief Technical Architect, Druva May 8 2019 2:00 pm UTC 61 mins
    More than half of all enterprises report that they've experienced a ransomware attack in the past 12 months - with the majority experiencing multiple attacks.

    So what's the impact? Lost productivity, loss or exposure of sensitive data, loss of current revenue and even the risk to future profitability.
    How do you quantify the risk? And more importantly, how do you address it?

    Join Derek Brink, CISSP, VP and Research Fellow at Aberdeen Group to learn:

    - A straightforward model for quantifying your risk and exposure
    - Options for reducing the likelihood of successful attacks
    - How a cloud-based backup enables faster, scalable time to recover and reduces the impact of ransomware
    - How to help leadership make better-informed business decisions about the real risk