Hi [[ session.user.profile.firstName ]]


  • The Journey to true Hybrid Cloud
    The Journey to true Hybrid Cloud
    Jarren Budds | Systems Engineer, Nutanix Recorded: Nov 26 2020 21 mins
    Today, many organisations are evaluating hybrid cloud architectures to supplement their private cloud deployments with public cloud adoption. However, these deployments can quickly run into silos requiring different management tools and skill sets across clouds.

    These siloed environments all require different management tools and skill sets, which creates a breeding ground for operational complexity. In order to truly benefit from a hybrid cloud, what is needed is a single platform that spans private and public clouds.

    Watch this webinar to learn how Nutanix delivers a True Hybrid Cloud that can help you:

    • Burst capacity into public cloud when demand spikes
    • Migrate applications from on-prem to hybrid cloud without retooling
    • Control cloud costs and drive accountability
    • Automate security auditing and maintain compliance baseline
  • The Secrets to Pole Position in F1 and Network Security
    The Secrets to Pole Position in F1 and Network Security
    Ollie Sheridan, Principal Security Solutions Engineer, CISSP, David Coulthard & Bob Constanduros Recorded: Nov 26 2020 64 mins
    Join F1 star David Coulthard, leading F1 sports commentator Bob Constanduros and Gigamon experts for a unique session on optimising Network Detection and Response (NDR) and other security tools with uncompromised network visibility. Provide your InfoSec and IT teams with the fuel to race towards a winning performance.

    Full visibility of internal mechanics and external surroundings is crucial for F1 drivers racing on circuits at break-neck speed. Protecting your IT infrastructure is no different. Without clear visibility of ALL relevant traffic, deploying NDRs or any other security tool is so resource-intensive and time-consuming, it can take InfoSec teams away from detecting and hunting threats.

    Learn more about network security optimisation, Gigamon solutions and hear how customers are optimising their NDR investment. The final lap will see David Coulthard taking live questions from the audience and being interviewed by Bob Constanduros who has covered over 670 Grand Prix’s and interviewed multiple F1 legends throughout his career.
  • Using SD-WAN to build a secure digital enterprise | Solve remote work challenges
    Using SD-WAN to build a secure digital enterprise | Solve remote work challenges
    Gemma Allen, Consulting Solutions Architect, Barracuda, Felix Bueltmann, Senior Consulting Engineer, Barracuda Recorded: Nov 26 2020 17 mins
    Using SD-WAN to build a secure digital enterprise: Episode 3

    Remote and mobile users increasingly require access to corporate information and applications. This can create numerous challenges that call for SD-WAN.

    Join us for to hear how the acceleration of remote work brought on by Covid-19 has changed how we should approach networking. See for yourself how you can leverage SD-WAN to solve these challenges, including:

    •How to include your remote workforce when designing your WAN
    •Why using the cloud makes this simple.

    Don’t miss this third webinar in a five-part series on SD-WAN to understand the different deployments and what might work for your organization.

    Save your spot right now.
  • How to Gain Visibility and Boost Security in Public Cloud Hosted Operations
    How to Gain Visibility and Boost Security in Public Cloud Hosted Operations
    John Gudmundson Head of Technical Product Marketing, Gigamon and Lee Carass Solution Architect, Trend Micro Recorded: Nov 26 2020 50 mins
    Public Clouds are on the ascent. To ensure comprehensive security with superior performance you need full packet and application visibility. As such environments are also very dynamic and complex, automation is critical to success.

    Today, to acquire and forward traffic to various security and monitoring tools you must laboriously install agents on each compute node for every tool or potentially utilise native traffic mirroring services. Neither of these approaches provide you the full control nor detailed insights into network flows.

    There is a better way. Learn how next-gen Network Packet Brokers collaborate with cloud orchestration tools to automatically provision virtual TAPs to obtain all traffic. Next, app flows are identified, optimally processed and distributed to security tools such as anti-malware from Trend Micro. Network efficiency rises, user security enhanced, and tool effectiveness improved.
  • Atelier virtuel de découverte de la Data Virtualization
    Atelier virtuel de découverte de la Data Virtualization
    Emily Sergent, Ingénieure avant-vente, Denodo Recorded: Nov 26 2020 87 mins
    Selon le cabinet d'analystes Gartner, "d’ici 2022, 60 % des entreprises auront intégré la virtualisation des données parmi leurs principaux mode de livraison de données dans leur architecture d’intégration." Gartner a nommé Denodo parmi les leaders dans le Magic Quadrant 2020pour les outils d'intégration de données.
    Découvrez lors de cette session d'1h30 en quoi la data virtualization révolutionne l'approche métier & IT dans l’accès, la livraison, la consommation, la gouvernance et la sécurisation de vos données, quel que soit l'âge de votre technologie, le format de la donnée ou son emplacement. Cette technologie mature comble le fossé entre l’IT et les utilisateurs métier, et permet des économies considérables en termes de coûts et de temps.

    Atelier online d'1h30.
    Vous pourrez réaliser les exercices à votre rythme grâce à l'enregistrement.

    - Responsables IT / Architectes
    - Data Scientists / Analystes
    - CDO

    Au programme : une introduction à ce qu'est la virtualisation des données, les cas d'usages, des études de cas clients réels et une démo guidée pas à pas des fonctionnalités de Denodo Platform avec notre version gratuite sur le cloud, Denodo Test Drive.
    - Intégrer et livrer vos données rapidement et facilement à l'aide de Denodo Platform
    - L'optimiseur de requêtes de Denodo fournit des données en temps réel, à la demande, même lorsqu'il s'agit de jeux de données très volumineux
    - Exposer les données en tant que «services de données» en vue d’être consommées par une variété d'utilisateurs et d'outils
    - La virtualisation des données joue un rôle essentiel dans la gouvernance et la sécurité des données au sein de votre organisation

    - Introduction à la Data Virtualization
    - Cas d'usage & études de cas clients
    - Architecture
    - Gouvernance & sécurité
    - Performance
    - Démonstration guidée pas à pas avec le Denodo Test Drive
    - Session interactive Questions/Réponses
  • Sangfor KubeManager: Making Kubernetes Work for You
    Sangfor KubeManager: Making Kubernetes Work for You
    Cheney Hu Recorded: Nov 26 2020 46 mins
    Containers and Kubernetes have shaped the future landscape of modern application development and deployment with their more powerful automation, scalability and agility. As the de facto standard for container management and orchestration, Kubernetes has now become one of the most popular open-source programs from CNCF (Cloud Native Computing Foundation). Though container management has been massively simplified using automation, making Kubernetes working for you in an effective way remains a huge challenge to organisations that are new to it. Managing Kubernetes is completely different from managing traditional virtualisation, and a fully functional PaaS requires a variety of components that go beyond Kubernetes, including monitoring and logging. Sangfor KubeManager is Sangfor’s answer to the container world, with the ultimate goal of streamlining your container operations with boosted simplicity and cost efficiency. In this webinar, join Sangfor experts in a candid talk about Kubernetes, and dive deeper into Sangfor KubeManager.
  • Technical Thursday : Power Up Your API Automation with Rubrik
    Technical Thursday : Power Up Your API Automation with Rubrik
    Kiat Hiong Soh, Sales Engineering Lead, Rubrik Asia Recorded: Nov 26 2020 28 mins
    Open application programming interfaces (APIs) unlock innovation as businesses transform and grow. IT teams can accelerate adoption of new platforms and interconnect to existing resources to provide services such as: provisioning tools, service portals, configuration management, centralized monitoring and management, test automation, and more. Open APIs have been a part of the Rubrik platform since its inception.
  • Do More with Less Day
    Do More with Less Day
    Sahil Bansal, Senior Product Marketing Manager, Nutanix Recorded: Nov 26 2020 27 mins
    No matter where you work or what you do, IT Pros all have one thing in common and that's a lack of time. There's never enough time in the day to "keep the lights on" and innovate (much less time to enhance your skill set or keep up to date.)

    Learn about new technology that can make your life, as an IT Pro, easier and more efficient

    In this session, find out how you can:
    - Leverage these solutions to solve your greatest IT challenges
    - Get all your questions answered from experts in the industry
    - See these solutions in action!
  • Something Something Cyber Podcast Unplugged
    Something Something Cyber Podcast Unplugged
    Bill Thrash https://www.linkedin.com/in/wthrash & Chase Cunningham https://www.linkedin.com/in/dr-chase-cunningham-54b26243 Recorded: Nov 25 2020 36 mins
    Welcome to Something Something Cyber! This is the first episode in our new series "Solution Spotlight" a special series that delves into new, unique, and exciting technologies in the industry and gives you a front row seat to the founders, engineers and executives bringing these new tools to market.

    This episode is sponsored by Airgap.

    Airgap is designed with total protection in mind, by providing an agentless zero trust isolation platform.

    Airgap can be deployed in minutes, not months. No agents, no APIs, no application architecture changes, Airgap platform works with a wide array of deployment models.

    Airgap empowers the enterprise through it’s unique “ransomware killswitch” technology that identifies, and isolates ransomware, protecting your environment from additional spread of infection.

    As part of this episode Airgap is offering our listeners in Higher Education and First Responders the ability to deploy and utilize Airgap for 1 year free of charge.

    We’re excited to welcome Ritesh Agrawal, founder and CEO of Airgap.
  • Rapid Agility – Lessons From the Front Line
    Rapid Agility – Lessons From the Front Line
    James Petter, VP Intl - Pure Storage | Mark Moerdyk, CTO, Beazley | Martin Veitch, Editorial Director, IDG Connect Recorded: Nov 25 2020 37 mins
    During the Coronavirus crisis, many organisations have faced a litany of challenges that have significantly disrupted their operations and necessitated new ways of working. The businesses best placed to overcome these challenges are those that have processes in place that allow them to act at speed. This webcast discusses how businesses can instil the ability to act at speed, address opportunities, and hurdle obstacles when dealing with unexpected disruptions like COVID-19.
  • Aufzeichnung: Backup & Recovery für das Cloud-Zeitalter
    Aufzeichnung: Backup & Recovery für das Cloud-Zeitalter
    Dietmar Simon, Senior Solution Architect DACH, Druva GmbH Recorded: Nov 25 2020 69 mins
    Cloud Computing hat herkömmliche Methoden der Datensicherung in Frage gestellt. So stellen Cloud-basierte und virtualisierte IT-Infrastrukturen traditionelle Tools vor Anforderungen, die sie oft nicht erfüllen können. Auch erweist sich der Kosten- und Verwaltungsaufwand einer On-Premises-Lösung häufig im Vergleich als zu hoch.

    Cloud-native Backup-Lösungen überwinden diese Probleme durch ihre Architektur und ihr flexibles Nutzungsmodell. Mit Cloud-basiertem Backup & Recovery können Unternehmen die Kosten für ihre Datensicherung senken, ihre Möglichkeiten erweitern und ihren Administrationsaufwand senken. Zugleich sorgen sie dafür, dass im K-Fall ihre Absicherung durch modernste Methoden und Cloud-Technologien erfolgen kann.
  • Compliance in the payments world leveraging HSMs
    Compliance in the payments world leveraging HSMs
    Radovan Bruncak - PreSales Consultant, Thales Recorded: Nov 25 2020 31 mins
    Any organisation involved in card payment transactions, from issuance to processing, must be compliant with standards. These are increasingly becoming more robust, detailed and payment-specific to protect customer sensitive data. To meet these standards, HSMs are a mandatory requirement to both protect and support the cryptographic keys and operations throughout the payment transaction.

    As such, HSMs are a critical part of an organisation’s infrastructure and are expected to handle transactions seamlessly, 24/7. Performance, reliability and operating costs are all factors to consider during a procurement selection stage, while the operations team must have the available tools and knowledge to be able to remotely manage the HSMs for configuration, audit and key management, following industry best practise.

    Join Radovan Bruncak Pre-Sales Consultant at Thales:
    1) Learn how international standards are driving the payments industry
    2) Explore the best practice guidance to protect payment data and transactions
    3) Discover how HSMs are helping to meet compliance
  • The Benefits Of StorageCraft OneXafe Scale-Out NAS Storage
    The Benefits Of StorageCraft OneXafe Scale-Out NAS Storage
    Karl Thomson, Sr. Sales Engineer Recorded: Nov 25 2020 28 mins
    Whilst we are going through some unusually turbulent times, businesses are increasingly embracing digital technology to stay afloat and gain competitive advantage. However, the explosive data growth we are facing, coupled with budget limitations due to the uncertainty, makes it very challenging for IT teams to upgrade their expensive primary storage solutions.

    StorageCraft has the solution for you: OneXafe scale-out object based storage!

    Tuned into this recorded webcast to learn more!
  • Sharing our secrets: Best practice for global ADC installations
    Sharing our secrets: Best practice for global ADC installations
    Justin Thorogood - Andrew Scott - Snorre Hansen -Terry Hooper - CITRIX Networking Recorded: Nov 25 2020 59 mins
    Application Delivery Management (ADM) is a central management solution that allows you to manage and monitor an entire global application infrastructure from a single unified console. It can be a real help when looking to get more information about the networking environment. Join our webinar to find out how ADM can be deployed to get better visibility of your networking environment.
  • Deep Dive into Open Transformation:How to lead & succeed with transformation
    Deep Dive into Open Transformation:How to lead & succeed with transformation
    Margaret Dawson | David Jack | Angel Valero | Rudi Peeters | Massimo Rosso | Phil Jordan | Hendrik Deckers Recorded: Nov 25 2020 117 mins
    In this virtual event we'll dive into Open Transformation and the role of each of its critical elements - Open Culture, Open Processes and Open Technology/Architecture.

    We'll also go beyond the "transformation" hype and discuss how top Digital Leaders have effectively approached this journey, the challenges they have faced and the results so far.

    Join this conversation to truly inspire, lead and accelerate your organisation's Digital Transformation!

    Meet our speakers:

    - Margaret Dawson, CP & CDO, Red Hat
    - David Jack, CTO & CPO, Dunnhumby
    - Angel Valero, Corporate CIO, Telefonica
    - Rudi Peeters, CIO, KBC Group
    - Massimo Rosso, ICT Director, RAI
    - Phil Jordan, Group CIO, Sainsbury's
    - Hendrik Deckers, Founder& MD, CIONET
  • Rapport Verizon sur la sécurité des paiements – PSR 2020
    Rapport Verizon sur la sécurité des paiements – PSR 2020
    Xavier Michaud | Abdelkrim Ahmed Bacha Recorded: Nov 25 2020 61 mins
    Les institutions financières et organisations gèrent plusieurs types de données sensibles et mettent en œuvre des efforts importants afin de sécuriser, mettre en conformité leurs périmètres soumis à des exigences réglementaires ou de l’industrie.

    Verizon publie son rapport annuel « Payment Security Report – PSR » depuis 2010 et continue d'offrir un point de vue unique sur l'impact à long terme des standards de sécurité des données de l'industrie des cartes de paiement (PCI DSS).

    Le rapport de Verizon, détaillant la sécurité des cartes de paiement et la conformité au standard PCI DSS, est devenu une lecture incontournable pour chaque entité devant protéger des données privatives dont les cartes bancaires (GDPR/PCIDSS).

    Vous y trouverez des informations sur :
    * Les principales conclusions du rapport 2020 et leurs significations.
    * Les 7 pièges à éviter pour vous aider à faire évoluer votre gestion actuelle de la conformité à un meilleur niveau de maturité.
    * Comment aider à développer la visibilité, le contrôle et la prévisibilité des performances en matière de conformité.
    * Une analyse de l’impact COVID 19 sur la sécurité des paiements et un retour sur les principales mesures à mettre en place.

    En conclusion de cette session, vous aurez la possibilité d’échanger avec nos experts sur les différents challenges et de découvrir d’autres approches à la conformité (PCIDSS/PCI Office/Compliance Office).

    Xavier MICHAUD, Managing Principal Security Consultant, Security Assurance
    Abdelkrim AHMED BACHA, Senior Security Consultant, Security Assurance
  • Industry 4.0: Radical Digitisation
    Industry 4.0: Radical Digitisation
    Toby Redshaw | Simon Parry | John Crawford Recorded: Nov 25 2020 38 mins
    The pandemic has shone a spotlight on how digital can be a truly transformative investment. Enabling companies to not only boost productivity, but also engage and communicate with their employees, customers and stakeholders in a way that they didn't think possible.

    In this session, we’ll discuss the technologies that forward-thinking business are prioritising and already investing in, such as:
    • Artificial Intelligence and Machine Learning
    • Automation and Robotics
    • Core network technologies and 5G

    Attendees to this webinar will hear about:
    • The importance of maintaining the human touch in organisations by finding the right balance when allocating tasks between automation, AI, and humans
    • Why 5G can be such a game-changer. How it can be used to create private wireless networks that provide secure, high-bandwidth, low-latency connections, enabling exciting new solutions like driverless vehicles such as robots and automated forklifts and near-real-time tracking of manufacturing lines. The range of solutions is huge from tracking to safety, predictive maintenance to digital twins.
    • How to leverage these technologies whilst ensuring that human choices shape the workplace and that we are not drawn into an algorithm-driven structure

    Toby Redshaw, Senior Vice President – 5G Solutions & Enterprise Innovation, Verizon Business
    Simon Parry, CTO, Nokia Enterprise UK, Nokia
    John Crawford, General Manager, Enterprise Innovation and 5G solutions, Verizon Business
  • Demo Day | Ransomware Kill Switch
    Demo Day | Ransomware Kill Switch
    Satish Mohan, CTO, Airgap Networks Recorded: Nov 24 2020 40 mins
    On Oct. 1, 2020, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) is issuing an advisory to alert companies that engage with victims of ransomware attacks of the potential sanctions risks for facilitating ransomware payments. The question is now back to you - How do you respond / react when you are hit by ransomware? What if you can push a “ransomware kill switch” to instantly stop the propagation of ransomware? Come and join us in this BrightTALK Demo Day and see it in person how you can easily lock down your network in tiers without unplugging any network cable or shutting down any devices.
  • Four keys to a successful transition to zero trust network access
    Four keys to a successful transition to zero trust network access
    Akhilesh Dhawan, Michael Stringer Jr. Jason Willis, Christopher Barnum Recorded: Nov 24 2020 58 mins
    Today, remote work is the most predominant version of the “new normal.” What that means is that IT organizations must deliver flexible work alternatives that are all about equipping employees anywhere -- and enabling them to seamlessly do their best work at any time, on any device over any network. This new world has made stringent security like zero trust crucial. A zero trust model relies on contextual awareness to adaptively grant access to authorized employees using patterns based on identity, time, and device posture. Zero trust helps mitigate risk and it improves the user experience. Even more compelling, it eliminates the need for traditional VPNs. The catch is that most IT teams already have a remote access solution in place. So how do you make the switch?

    Join this webinar to hear tips and best practices from security experts who can help.

    - Define your remote access strategy
    - Understand gaps with your existing VPN solution
    - Augment the existing solution with new use cases like BYO, web and SaaS apps
    - Start migration from existing VPN to cloud delivered security solution
  • Can VMware Shops Easily Adopt Multiple Public Clouds? Let’s Discuss.
    Can VMware Shops Easily Adopt Multiple Public Clouds? Let’s Discuss.
    Duan van der Westhuizen, SVP of Product & Marketing, Faction Recorded: Nov 24 2020 50 mins
    VMware Cloud on AWS was the first cloud-based offering for VMware customers looking to seamlessly adopt public clouds, but it is no longer the only option. Offers like Azure VMware Services, Google Cloud VMware Engine, and Oracle Cloud VMware Cloud Solution have expanded the reach from the on-premises datacenter to a global multi-cloud network of providers and regions. Is your organization ready to embrace this new scope in cloud environments and capabilities?

    In this webinar, we help you understand the considerations you should take note of before diving in head first:

    ● Data Gravity and its effect on your future flexibility and cloud optionality
    ● Cloud lock-in and what it means to your business
    ● VMware as the central platform that enables true private, hybrid, and multi-cloud
    ● How your business can get a competitive edge by using more than one cloud at a time
    ● Driving a 10x savings in data costs while using the best tools from your cloud of choice
    ● How does this all work? The fundamentals of multi-cloud networking
  • Begin your hybrid cloud journey with Red Hat and AWS
    Begin your hybrid cloud journey with Red Hat and AWS
    Dan Juengst, Senior Principal Technology Evangelist, Red Hat and David Duncan, Partner Solution Architect, AWS Recorded: Nov 24 2020 61 mins
    Adopting a hybrid cloud strategy is a journey, not a destination. When you consider using a public cloud environment for some or all of your applications, you’re faced with a number of choices and approaches. When considering a hybrid cloud environment, you often end up being overwhelmed and discover that vendors don’t use the same language when talking about them.

    Detailed planning with Red Hat and Amazon Web Services (AWS) can help you successfully create, scale, and migrate innovative applications to an agile hybrid cloud environment as big as you need and available whenever and wherever you need it.

    In this webinar, we’ll:
    •Share a series of questions you might consider when planning your hybrid cloud journey.
    •Discuss how the Red Hat and AWS partnership can simplify a potentially complicated journey.
  • Honeycomb Learn # 2: De-stress Debugging -Triggers, Feature Flags & Fast Query
    Honeycomb Learn # 2: De-stress Debugging -Triggers, Feature Flags & Fast Query
    Michael Wilde, Dir Sales Engineering @honeycombio & Peter Tuhtan, Product Manager Recorded: Nov 24 2020 44 mins
    Second episode in our Honeycomb Learn series looks at how to cut stress levels when debugging issues in production. Starting with a hypothesis, run fast queries and then navigate to the code where the problem lies. Be proactive and set triggers to let you know if something needs attention. When engineering is about to ship a new release, set a feature flag to watch how production behaves in real-time. Curtail performance issues and reduce customer impact with the right tools to better understand production systems, right now.

    * Quickly go from hypotheses to fast query and pinpoint exactly where the issue is
    * How to set triggers based on thresholds important to your business
    * Set feature flags to control specific parts of your environment to reduce stress levels.

    See a Honeycomb demo, ask questions and learn more.
  • Email security threats - how to protect your business, people and data
    Email security threats - how to protect your business, people and data
    Nishant Taneja & Olesia Klevchuk, Product Marketing, Barracuda, Bryan Glick, Editor in chief, Computer Weekly Recorded: Nov 24 2020 42 mins
    Traditional email security solutions aren’t enough to protect businesses anymore. Strategies and processes need to be in place to actively defend your business, people and data against sophisticated email threats.

    Join Bryan Glick, Editor in chief at Computer Weekly, Olesia Klevchuk and Nishant Taneja, Product Experts from Barracuda as they explore strategies to improve your email protection and answer questions:

    - Why is email still the #1 threat vector?
    - What types of attack strategies are cybercriminals using during the pandemic?
    - How can IT security professionals make sense of the threat landscape?
    - How does remote work change the perspective on security?
    - What threats should end users be on the lookout for?
    - With email communication and messaging becoming integral to remote work, what can employees do to stay safe?
    - Why do traditional defenses fail to detect and stop advanced attacks?
    - Should organizations deploy 2FA to prevent account takeover?
    - When threats do get through, how should incident response work?
    - Beyond technology tools, how can organizations improve their defenses?

    Save your spot now.
  • Converged vs. Hyperconverged Infrastructure - Meeting the Demands of the New Era
    Converged vs. Hyperconverged Infrastructure - Meeting the Demands of the New Era
    Steve Carter | Senior Product Marketing Manager, Nutanix Recorded: Nov 24 2020 43 mins
    Converged infrastructure is several steps up from legacy infrastructure, it loses out when it comes to the cost-saving, application-securing, VM-moving power of hyperconvergence.

    Join us for this webinar where Steve Carter, Senior Product Marketing – Nutanix, will take you through how you can simplify your IT infrastructure.

    In this webinar you will learn:
    • What are the primary benefits of HCI compared to Converged Infrastructure?
    • How WebScale IT infrastructure innovations make HCI possible
    • How HCI enables IT to be agile and cost conscious in the face of business uncertainty
  • Best Practices - Implementing Cloud-based Data Protection
    Best Practices - Implementing Cloud-based Data Protection
    Colin West - EMEA SE Director, Druva Recorded: Nov 24 2020 20 mins
    Join Druva for a 30 minute briefing and learn what to look for when evaluating cloud-based Data Protection solutions. We’ll discuss the best practices for a backup solution that protects your on premise data whilst ensuring the data protection repository is away from your network.
    Register Now

    Storage Managers, Data Protection administrators, and anyone responsible for data would be interested in this webinar on Best Practices. Register and learn
    - Why data protection works best in a cloud-native environment
    - Real-world solutions architecture will be discussed with respect to Data protection
    - Modernize your Data Protection by considering what to look for in a cloud-based solution

    We expect the session to be well subscribed, so register now!
  • MINDHUNTER #3: Storms Ahead: The Dark Side of the Rush to the Cloud
    MINDHUNTER #3: Storms Ahead: The Dark Side of the Rush to the Cloud
    John Aarsen, SE - Benelux and Nordics, SonicWall Nov 30 2020 10:00 am UTC 60 mins
    Join SonicWall Cybersecurity expert John Aarsen as he explores the biggest threats to cloud environments — and why new ways of looking at cybersecurity, such as “Shift Left,” are required for safe and productive cloud use.
  • Ransomware Survival Guide: Ransomware Kill Switch
    Ransomware Survival Guide: Ransomware Kill Switch
    Ritesh Agrawal, CEO, Airgap Networks Nov 30 2020 4:00 pm UTC 29 mins
    Ransomware attacks continue to plague K–12 schools nationwide, and they’re not slowing down anytime soon. In the pandemic, more than 1,000 educational institutions have fallen victim to ransomware, according to a report by security firm Armor. With most schools implementing some form of online instruction this school year, these attacks have only increased in volume and speed, and their impact is much more significant.

    In addition to the ransom itself, these attacks can exact a heavy cost: school district operation disruption, remediation costs, and job implication.

    In this BrightTalk session, Edu tech and IT will learn:
    How ransomware is surging in a remote/online learning environment?
    What is the fundamental mind shift in network design required?
    What to do before, during, and after a ransomware attack with Zero Trust solution?
    Why you shouldn’t and cannot pay ransoms?
    What is Ransomware Kill Switch and how it can protect you?
    How to stop ransomware propagation in seconds?
  • Ransomware Battleground: The Ryuk Ransomware
    Ransomware Battleground: The Ryuk Ransomware
    Anonymous Security Expert and Syya Yasotornrat Nov 30 2020 6:00 pm UTC 45 mins
    This unique BrightTALK session is your 1-on-1 meetup with the most recent ransomware attack - Ryuk - in UHS Universal Health Services Ryuk's operators are known to go "big game hunting" and have previously targeted large organizations, including shipping giant Pitney Bowes and the U.S. Coast Guard. UHS has 400 hospitals and healthcare facilities in the U.S. and the U.K., and serves millions of patients each year. In this session, you will get to know how Ryuk ransomware behave in your organization and how you can use Zero Trust Isolation to prevent the attack proactively.
  • Rubrik For Oracle (Bahasa Indonesia)
    Rubrik For Oracle (Bahasa Indonesia)
    Hanindya Permatasari, Enterprise Solution Architect Dec 1 2020 2:30 am UTC 45 mins
    Rubrik’s Automated Oracle Data Protection orchestrates the backup, archival, replication, and migration of your Oracle Databases. Automate database discovery and protect Oracle environments with a single SLA policy engine. Restore entire databases with near-zero RTOs or recover down to a single tablespace. Spin up database clones without storage penalty to validate backups or to accelerate test/dev.
  • Is the office dead?
    Is the office dead?
    Prof. Herman Singh, CEO - Future Advisory | Anthony Olivier, MD - Performanta | Paul Ruinaard, & Craigh Stuart - Nutanix Dec 1 2020 10:00 am UTC 119 mins
    In this Nutanix Connect session we are partnering with Professor Herman Singh to help unpack the current crisis that is redefining almost all aspects of our lives and calling into question many of the choices we have already made.

    The bottom-line. Firms with large headquarters could be left with white elephants and even the way that visitors are managed could make face to face encounters impractical. In this Nutanix Connect session, we will explore how to think about these questions and brace for impact.

    1. What does the workspace of the future look like? Are cubicles back?
    2. What is the future of headquarters? How do we handle visitors and elevators?
    3. What should be done with collaborative work?
    4. What should we be doing at our home office?

    Our panel will further share their experiences and provide advice on how you can approach restructuring your workspace in a safe, financially viable and functional way.
  • Meet the Cloud Architects Episode 1: Excelling with AWS
    Meet the Cloud Architects Episode 1: Excelling with AWS
    Girish Chanchlani Partner Solutions Architect AWS, David Gildea VP of Product Druva, Tony McGarry Senior Principal Engineer Dec 1 2020 2:00 pm UTC 25 mins
    Meet the Cloud Architects
    Episode 1: Excelling with AWS well-architected framework
    Join Druva and AWS technical experts for the launch of our new webinar series, ‘Meet the cloud architect’. Each episode the panel will be sharing their real-world experience and key learnings of building and scaling on the AWS cloud platform and how they used the AWS Well-Architected Framework.

    Our goal of episode one is to provide pro tips to help simplify your journey when building large scale global SaaS applications on AWS. It will help you bridge the gap between theory and practice, by identifying pain points before they materialize.

    Don’t miss out on these powerful tips! Register now to join Druva product experts and this episode’s special guest, Girish Chanchlani from AWS, in our inaugural Meet the Cloud Architect Series.
  • Webroot 2020 Threat Landscape Roundup
    Webroot 2020 Threat Landscape Roundup
    Tyler Moffitt, Senior Threat Research Analyst @ Webroot Dec 1 2020 4:00 pm UTC 60 mins
    SMBs were one of the major targets for cybercriminals in 2020. In 2019, two out of five SMBs have fallen victim to a ransomware attack. Register now for this 30-minute webinar on the key threats businesses faced during 2020, see what's upcoming in 2021, and get tips to help you to keep your business and clients safe.

    In the webinar, Tyler Moffit will be discussing information theft, information stealers, COVID, AI and machine learning, and all thing that made the cybercrime headlines of 2020.
  • Ep. 3 See The Trace? Discover Errors, Latency & More across Distributed Systems
    Ep. 3 See The Trace? Discover Errors, Latency & More across Distributed Systems
    Molly Stamos, Customer Success Engineer and Ben Hartshorne, Senior Engineer Dec 1 2020 4:00 pm UTC 60 mins
    Distributed systems bring complexity for developer and ops teams. When incidents occur in production, expected and unexpected, you want to pinpoint which part of the service is giving problems. Distributed tracing illuminates distributed systems, making your logs easier to navigate. Quickly identify where there are errors or latency in your code or service, even within 3rd party services you use. Instrumentation is the key to the best tracing experience possible.

    We will dive into the importance of tracing when debugging, and show how Honeycomb Beelines fast-track instrumenting code. You will learn:

    * The importance of tracing when debugging production along with other types of analysis
    * how to debug by analyzing patterns and trends in the data generated by traces
    * how to work with OpenCensus or OpenTracing (yes you can with Honeycomb).

    Join this exciting session and discover the value of tracing. Spoiler: it's easier than you may think.
  • Ransomware Survival Guide: Healthcare
    Ransomware Survival Guide: Healthcare
    Ritesh Agrawal and Jason Mafera Dec 1 2020 4:00 pm UTC 45 mins
    "All systems were quickly disconnected, and the network was shut down in order to prevent further propagation," Is this your response to a ransomware attack? If the answer is Yes or Maybe, this BrightTalk session can help you improve your ransomware response. In Oct 2020, Ransomware hit the Universal Health Services (UHS), one of the largest US health systems, and consequently, malicious actor affected all of its US care sites and hospitals, spurring clinicians into EHR downtime procedures. Healthcare facilities use common EMR and EHR solutions. When one is hit, it's inevitable for others to avoid it.

    In this BrightTalk session, Healthcare tech and IT will learn:
    How ransomware is surging in Healthcare facilities?
    Why agent-based endpoint security may not be your answer to ransomware defense
    What is the fundamental mind shift in network design required?
    What to do before, during, and after a ransomware attack with Zero Trust solution?
    Why you shouldn’t and cannot pay ransoms? What is Ransomware Kill Switch and how it can protect you?
    How to stop ransomware propagation in seconds?
  • Gaining the Edge on your Network: LAN/WAN Acceleration for Enterprise Networking
    Gaining the Edge on your Network: LAN/WAN Acceleration for Enterprise Networking
    Greg Gum, CEO and Rick Uperti, Sr. Systems Architect at GateSpeed Dec 1 2020 4:00 pm UTC 60 mins
    Working remotely or from home has become a necessity rather than privilege in today’s businesses. Even before the COVID-19 pandemic, remote workers grew by 44% over the past five years. With increasing numbers of remote enterprise and other home users frequently sharing the same broadband connections, SaaS tools and video calls are contending with other users (e.g., other tenants, co-workers, family, other Wi-Fi users).

    In this webinar, we will introduce a new virtualized AI/ML based solution from GateSpeed that can provide significant network performance improvements on congested LANs and WANs automatically, without expensive hardware or dedicated IT teams. We will outline tips and tools including dynamic TCP/UDP optimization, Access Point load balancing, and LAN-to-WAN rate shaping to demonstrate ways to improve overall throughput and network performance with Intel based platforms.
  • Bringing the DevOps lifestyle to life
    Bringing the DevOps lifestyle to life
    Michael Walker, Senior Director and Global Head of Open Innovation Labs, Red Hat Dec 1 2020 5:00 pm UTC 44 mins
    If DevOps is a better way to work, then why do so many DevOps movements fail to produce meaningful results in the enterprise?

    In this session, Michael Walker will share stories of enterprises around the world who have struggled to successfully adopt DevOps. We will examine the common barriers to change, and understand why traditional approaches have failed. We will then examine how principles of open source communities, and open organizations, can help enable effective DevOps in the enterprise. Finally, we will share techniques for building high-performing, product-oriented teams who adopt DevOps as their preferred way of working, along with examples of the results.
  • What Zero Trust Networking means for Network Visibility
    What Zero Trust Networking means for Network Visibility
    Ollie Sheridan, Principal Sales Engineer, Security, Gigamon Dec 1 2020 6:00 pm UTC 59 mins
    There is much talk in the Industry with regards to Zero Trust Networking (ZTN) - but what does it involve and what does this mean for Network Visibility? In this Webinar we will explore the reason for ZTN, some of the current ideas surrounding the implementations of ZTN and where Network Visibility plays a key role in securing such environments. With one of the key concepts of ZTN being the encryption and authentication of data in motion, we will also discuss the need for Metadata and why this can be an advantage over traditional methods of monitoring.

    Join Gigamon and (ISC)2 for an examination of:
    · Understanding the ZTN trust model at a high level
    · Which ZTN components are most critical and why
    · Why the perimeter is changing and why the need for segmentation goes beyond physical devices
    · The crucial role of metadata in understanding applications on the network
  • Remote access workflows and where do we go from here?
    Remote access workflows and where do we go from here?
    Jason Blum:GPL Technologies, Paul Austin & Jack Liu:Teradici, Karen Gondoly & Robert Ewanouski - Leostream Dec 1 2020 6:00 pm UTC 56 mins
    Panel discussion with GPL Technologies, Teradici, and Leostream on high performance remote access workflows with a focus on media and entertainment.
  • ActualTech Media Virtual Summit: Architecting the Pillars of IT in 2021
    ActualTech Media Virtual Summit: Architecting the Pillars of IT in 2021
    Ben Stiles, Technical Director of Strategic Accounts at Faction Dec 1 2020 6:00 pm UTC 30 mins
    Multi-Cloud is THE pillar of IT in 2021, and Faction is here to show that it isn’t just theory anymore. We will take you through our in-depth validation and testing, real world architectures, and lessons from the trenches that will change your point of view on how this could change your business in 2021 and beyond.

    Watch the replay of our session from this event.
  • Intent-Based Networking Assurance and Verification
    Intent-Based Networking Assurance and Verification
    Matt Just, Sr. Technical Marketing Manager at VMware. Sehjung Hah, Product Line Marketing Manager at VMware Dec 1 2020 6:00 pm UTC 60 mins
    How do you scale your network team?
    One way to scale your teams is with better tools that take a lot of the manual tasks of network verification and dynamically perform them.

    VMware vRealize Network Insight Assurance and Verification is a new capability that helps you monitor networks using intent-based networking principles.

    Assurance and Verification builds a digital twin model of the network and takes the current state of the network and verifies that the current state matches the business intent for the network.

    Join the webinar to learn more about this exciting new capability.

    Meet our presenters:
    - Matt Just is a Sr. Technical Marketing Manager at VMware. He is responsible for supporting technical marketing and product development of VMware vRealize Network Insight. Matt has over 20 years experience in data center networking & security design and expert knowledge in routing and switching technologies. Follow Matt on LinkedIn: www.linkedin.com/in/mattjust/ or on Twitter: @H1_TEK_MATT

    - Sehjung Hah is a Product Line Marketing Manager in VMware’s Cloud Management Business Unit working on vRealize Network Insight Cloud. Sehjung has worked in the networking industry for 23 years in various roles in product marketing, product management, technical marketing, engineering, technical support, sales enablement. On sunny days, he enjoys biking and hiking. Connect with Sehjung via LinkedIn https://www.linkedin.com/in/sehjunghah
  • Combating Cybercrooks - Lessons from a former Black Hat
    Combating Cybercrooks - Lessons from a former Black Hat
    Eric Haseltine, PhD Dec 1 2020 7:00 pm UTC 55 mins
    No technology system is perfect with human behavior often presenting the biggest security risk. Given these challenges, how can your organization turn the tables on cybercriminals and gain the upper hand?

    In this entertaining and informative talk, former Director of R&D at the NSA and Associate Director on National Intelligence, Eric Haseltine, shares seven ways that you’ve probably never heard of to foil cybercrooks and make the human side of your organization more secure.
  • End-to-End Visibility and Control for your Kubernetes Clusters
    End-to-End Visibility and Control for your Kubernetes Clusters
    Rod Moore, Cloud Domain Architect, Red Hat Dec 1 2020 7:00 pm UTC 48 mins
    In today's open hybrid datacenter, Applications are moving from a monolithic to a cloud-native approach that leverages Kubernetes. These modern applications may have components that span multiple clusters and multiple cloud providers. In addition, new clusters are being added for specific purposes like edge deployments and reduced latency. This "Cluster Sprawl" introduces several new management issues. For example;

    How can I manage the lifecycle of multiple clusters regardless of where they reside (on-premise or across public clouds) using a single control plane?

    How do I get a simplified understanding of my cluster health and the impact it may have on my application availability?

    In this webinar, you'll learn to address these management concerns and numerous others with Red Hat Advanced Cluster Management for Kubernetes. It offers end-to-end management visibility and control to manage your cluster and application life cycle, along with security and compliance of your entire Kubernetes domain across multiple datacenters and public clouds.

    About the speaker:
    Roderick Moore is a Cloud Domain Architect on Red Hat's North American Public Sector team. He covers the products that comprise Red Hat's management portfolio. His more than 25 years of helping customers choose and implement enterprise management software makes him a valued resource when discussing the management needs of today's open hybrid environments.
  • Citrix Virtual Apps and Desktops: Cloud Service or On-Premises Upgrades
    Citrix Virtual Apps and Desktops: Cloud Service or On-Premises Upgrades
    George Kuruvilla, Ryan McClure, Carisa Stringer Dec 1 2020 7:00 pm UTC 47 mins
    IT planning takes into consideration unpredictable events, but the 2020 calendar year presented an unprecedented challenge which put many IT initiatives on hold. While there has been a lot of excitement surrounding recent on-premises releases of Citrix Virtual Apps and Desktops solutions, in this pandemic era many businesses are weighing that effort alongside the decision to embrace new cloud technologies. In this webinar, we will walk you through key datapoints and considerations to help guide you through your decision.

    Join this webinar to learn:

    - Important considerations for evaluating an on-premises upgrade or cloud service transition

    - Updated details on Citrix packaging and licensing options in order to provide greater choice
    - How Citrix is simplifying hybrid cloud deployments for organizations of all types and sizes
    - Enhancements released through 2020 and how they shape IT planning
  • Journey to the Zero Trust by Network Visibility [TH]
    Journey to the Zero Trust by Network Visibility [TH]
    Sutisa Jitpakdee | Regional Sales Director (Thailand) , Gigamon Dec 2 2020 2:00 am UTC 54 mins
    สำหรับผู้ที่ไม่ได้เข้าฟังการบรรยาย Gigamon Webinar เรื่อง “Journey to the Zero Trust by Network Visibility” เพื่อเรียนรู้การออกแบบสถาปัตยกรรม Network Security ภายใต้แนวคิด Zero Trust พร้อมแนะนำการเริ่มต้นแบบง่ายๆ ใน 5 ขั้นตอน รวมไปถึงการประยุกต์ใช้ Network Visibility ที่เพิ่งจัดไปเมื่อสัปดาห์ที่ผ่านมา หรือต้องการรับชมการบรรยายซ้ำอีกครั้ง สามารถเข้าชมวิดีโอบันทึกย้อนหลังได้ที่บทความนี้ครับ

    ภายใน Webinar นี้ ท่านจะได้เรียนรู้เกี่ยวกับโมเดลการรักษาความมั่นคงปลอดภัยแบบ Zero Trust รวมไปถึงการออกแบบสถาปัตยกรรมและประโยชน์ที่องค์กรจะได้รับ พร้อมแนะนำวิธีเริ่มต้นสร้าง Zero Trust Network ภายใน 5 ขั้นตอน ซึ่งมีหัวข้อการบรรยาย ดังนี้

    Understanding Zero Trust Network
    Designing a Zero Trust Architecture
    Benefits of the Zero Trust Model
    5 Step to Zero Trust Network
    Journey to the Zero Trust by Network Visibility
  • A Guide to Accelerating Digital Initiatives for Digital Leaders
    A Guide to Accelerating Digital Initiatives for Digital Leaders
    Jon Lin, President, Equinix | Ryan Azus, Chief Revenue Officer, Zoom | Richard L. Villars, Group VP, Worldwide Research, IDC Dec 2 2020 2:00 am UTC 44 mins
    In this roundtable, join C-Suite executives from Zoom Video Communications and Equinix, featuring IDC, in exploring best practices for accelerating digital initiatives and how businesses can implement, connect, scale and adapt to be ready for whatever is next.

    Equinix, Zoom and IDC will be discussing:

    •Key infrastructure challenges that digital leaders encounter as they accelerate initiatives.
    •Best practices to consider when building and scaling a resilient digital business.
    •Remote work’s impact on urbanization and supporting infrastructures.


    •Jon Lin - President, Americas, Equinix
    •Ryan Azus - Chief Revenue Officer, Zoom
    •Richard L. Villars - Group Vice President: Worldwide Research, IDC
  • The Digital Workplace
    The Digital Workplace
    Dirk Schlotter Dec 2 2020 3:00 am UTC 36 mins
    68% of companies now believe that the future workforce will be remote*. A hybrid of remote working and reduced office working will be the new reality. On one hand, this could have positive outcomes such as increased productivity for some departments, but on the other hand, it may also negatively impact work/life balance and raise mental health issues.

    In this session, we will be discussing the changing concept of work, the workplace and the environment that business leaders need to create to thrive in this new world in relation to:

    • Changes to the physical workplace: Offices may need to be repurposed as drop‐in collaboration centres rather than everyday bases, and use more tech such as VR
    • Smarter working: With the proliferation of video and web conferencing, how can you enable more productive collaboration tools such as document sharing, annotation and white‐boarding
    • The importance of security: How to protect the organisation from today's evolving threat landscape especially when the employee's environment is out of your control
    • What to prioritise to enable your digital workplace: Simplicity and integration are key in this area in order to provide employees with a single, app‐like experience across the tools they use every day

    Attend this session to solidify your plans and uncover the journey to the new digital workplace.

    Presented by:
    Dirk Schlotter, Director Global Real Estate & Supply Chain for Verizon Communications.

    * 2020 The Future of Work, Reimagining business as usual, Verizon Research report
  • MINDHUNTER #3: Sturmgefahr in der Cloud: Die dunkle Seite der Cloud-Migration.
    MINDHUNTER #3: Sturmgefahr in der Cloud: Die dunkle Seite der Cloud-Migration.
    Fabian Freundt, Sr. Sales Engineer, ALPS, SonicWall Dec 2 2020 8:30 am UTC 60 mins
    SonicWall’s Cybersecurity-Experte Fabian Freundt gibt Ihnen Hintergrundinfos zu den größten Bedrohungen für Cloud-Umgebungen und zeigt auf, warum neue Überlegungen in der Cybersicherheit, wie „Shift Left“, für eine sichere und produktive Cloud-Nutzung erforderlich sind.
  • 13 Arten von E-Mail-Bedrohungen, über die man aktuell Bescheid wissen sollte
    13 Arten von E-Mail-Bedrohungen, über die man aktuell Bescheid wissen sollte
    Julian Schreier, Sales Engineer, Barracuda Networks Dec 2 2020 9:00 am UTC 51 mins
    Schützen Sie Ihr Unternehmen vor allen wichtigen E-Mail-Bedrohungen – einschließlich der raffinierten Bedrohungen, die oft an sicheren Gateways vorbeikommen.

    Verpassen Sie nicht diese eingehende Betrachtung der breitgefächerten Palette aktueller E-Mail-Bedrohungen, einschließlich von deren Risiken für und Auswirkungen auf Unternehmen. Zudem wird erläutert, wie mit maschinellem Lernen und API-basiertem Schutz des Posteingangs die Lücken im E-Mail-Gateway geschlossen werden können und zu umfassendem E-Mail-Schutz vor Angriffen beigetragen werden kann.

    Verteidigen Sie sich gegen raffinierte E-Mail-Bedrohungen, die Abwehrmaßnahmen umgehen und über Backdoor-Verfahren wie Spoofing, Social Engineering und Betrug großen Schaden anrichten können. Schützen Sie Mitarbeiter auf Posteingangsebene – mit der richtigen Kombination aus technologischen Lösungen und Schulungen für das Sicherheitsbewusstsein.

    Reduzieren Sie mit einer mehrstufigen Schutzstrategie drastisch Ihre Anfälligkeit für E-Mail-Angriffe und verbessern Sie so den Schutz Ihres Unternehmens, Ihrer Daten und Ihrer Mitarbeiter.

    Wir zeigen Ihnen in diesem Webinar einen detaillierten Blick auf die 13 Bedrohungen sowie Analysen und Lösungen zur Stärkung Ihrer E-Mail-Sicherheit in einer immer sich weiterentwickelten Bedrohungslandschaft.
  • MINDHUNTER #3: Temporali in arrivo: il lato oscuro della corsa al cloud
    MINDHUNTER #3: Temporali in arrivo: il lato oscuro della corsa al cloud
    Luca Pesce, Sales Engineer North Italy, SonicWall Dec 2 2020 10:30 am UTC 60 mins
    Seguite Luca Pesce, esperto di Cybersecurity di SonicWall, che analizza le principali minacce per gli ambienti cloud e perché per un utilizzo sicuro e produttivo del cloud è necessario un nuovo approccio alla cybersecurity, ovvero un drastico cambiamento di mentalità.
  • How GumGum saves more than $500k annually on Amazon EC2
    How GumGum saves more than $500k annually on Amazon EC2
    Vaibhav Puranik, SVP of Engineering, GumGum Dec 2 2020 11:00 am UTC 47 mins
    Computer vision company GumGum required a solution to help reduce the huge Elastisearch costs for their machine learning data. In this webinar, Vaibhav Puranik, SVP of Engineering at GumGum explains how they saved over $500k a year on their ML projects without compromising performance or availability.