Hi [[ session.user.profile.firstName ]]

Virtualization

  • Public Cloud is Here - Use it Wisely! Hybrid Cloud Strategy Lessons Learned
    Public Cloud is Here - Use it Wisely! Hybrid Cloud Strategy Lessons Learned Gordon Haff, Red Hat and Lauren Nelson, principal analyst serving infrastructure & operations professionals, Forrester Recorded: May 24 2018 56 mins
    For many firms, the migration to public cloud is well underway. Understanding what motivates these migrators and the challenges they face along the way can help you in your own journey.

    Join this webinar for a rare look into an emerging group and a glimpse into the future of public cloud. You'll hear about the results of a Forrester Consulting study, commissioned by Red Hat, that looks at these aspects of firms migrating to the cloud:

    > Their motivations and challenges.
    > The strategies they're adopting for migration.
    > What cloud migration in practice looks like.
  • Overcoming The 4 Data Protection Challenges of Hybrid IT
    Overcoming The 4 Data Protection Challenges of Hybrid IT Storage Switzerland, Micro Focus Recorded: May 23 2018 63 mins
    Data protection is critical to data-driven organizations that are fully dependent on data for operations. The hybrid nature of the environment though makes protecting that much more challenging. Join us as we discuss exactly what Hybrid IT is, what it looks like and why data driven organizations are embracing it. Then we will discuss the data protection challenges that IT must overcome as they create a hybrid infrastructure.
  • Accudata + Forcepoint Security Series | Risk-Adaptive Protection
    Accudata + Forcepoint Security Series | Risk-Adaptive Protection Bharath Vasudevan, Senior Director Recorded: May 23 2018 30 mins
    What comes to mind when you hear “decision making based on calculated behavioral analytics”? It’s a pretty exciting concept–one that’s new to cyber security and one that Forcepoint does very well. Join our webinar to learn how risk-adaptive protection is helping organizations:

    - Continually improve security effectiveness through machine learning and AI
    - Better understand risky behavior
    - Automate policies
    - Dramatically reduce the quantity of alerts
    - Streamline and accelerate investigation of those alerts

    Tune in May 23!
  • SUSE Linux Enterprise 15 Beta – How to Migrate to SLE 15. (Technical Briefing)
    SUSE Linux Enterprise 15 Beta – How to Migrate to SLE 15. (Technical Briefing) Thorsten Kukuk, Senior Architect, SUSE Recorded: May 23 2018 55 mins
    As a Beta participant you have enjoyed the experience of SUSE Linux Enterprise (SLE) 15. Now you must be exploring how to move from SLE 11 or SLE 12 to SLE 15. During this session, Senior Architect, Thorsten Kukuk, will do a technical deep dive and educate you about installation details and various options for upgrading to SLE 15. Bring your questions, learn from other Beta participants questions and participate in a lively Q&A session.
  • Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
    Analyst Insights: Trends Driving the Need for a SOC-as-a-Service Mark Bouchard, Co-Founder and COO - CyberEdge Group & Narayan Makaram, Sr. Director, Product Marketing - Arctic Wolf Networks Recorded: May 22 2018 57 mins
    Every company, regardless of size or industry, needs the advanced security capabilities provided by a security operations center (SOC). Until recently, only large enterprises had the means and resources to implement these essential technologies. So, where does that leave small to midsize enterprises (SMEs)?

    In this upcoming webinar, Tuesday, May 22, at 11am PT/2 pm ET, Co-founder and COO of CyberEdge Group, Mark Bouchard, will share insights on the cybersecurity challenges facing small to midsize enterprises (SMEs), drawing on data from the recently published 2018 Cyberthreat Defense Report. We will also hear from Sr. Director of Product Marketing of Arctic Wolf Networks, Narayan Makaram, on the SOC options available to SMEs and will help to identify the top 10 capabilities to look for in a SOC-as-a-service.

    By attending this webinar you will learn about:

    • Cybersecurity challenges facing the IT organization in small to midsize enterprises (SMEs)
    • Insights into what is driving the need for managed threat detection and response
    • The top 10 essential elements of a SOC-as-a-Service

    To discover how SMEs can get access to a SOC in the form of a SOC-as-a-service, register today!

    About our key speaker:

    Mark Bouchard, CISSP, is the Chief Operating Officer at CyberEdge Group, an award-winning research, marketing and publishing firm serving the needs of high-tech organizations worldwide. Before CyberEdge, Mark founded AimPoint Group, an independent IT research and consulting company specializing in information security. Prior to AimPoint Group, Mark was a Vice President at META Group (acquired by Gartner) where he helped hundreds of organizations worldwide address their IT challenges. A veteran of the U.S. Navy, Mark is passionate about ensuring the success of his clients.
  • Quality and Testing SIG Talk Series - Tips & Tricks (Complete Edition)
    Quality and Testing SIG Talk Series - Tips & Tricks (Complete Edition) Ramesh Subramaniam, Ricardo Garza Recorded: May 22 2018 54 mins
    Speaker: Ramesh Subramaniam
    Micro-focus Project and Portfolio Management (PPM) Logging Tips and Tricks: Learn how to get the most out of your logging.conf, discuss logger names per the Micro Focus PPM functional domain and see how creating separate nodes will increase performance.

    Speaker: Ricardo Garza
    AI FIRST Project Management: How we Augment Project and Portfolio Managers with Micro Focus PPM and Artificial Intelligence: Right now, there is a lot of hype around Artificial Intelligence and Machine Learning; these technologies are going to profoundly disrupt every industry and make most applications SMART in the next 5 years. We have built AI aides around our PPM implementation in order to augment our Project and Portfolio Managers as well as Project Team Members. These tools help them to be more productive and have consistent results. We will Demo some of these features live, and discuss implementation challenges and future work.
  • Delivering Virtual Services to Enterprises from the Service Provider Cloud
    Delivering Virtual Services to Enterprises from the Service Provider Cloud Daniel Teichman,Sr Solutions Marketing Manager and Walter Kenrich, Director, Solutions Marketing [Ribbon Communications] Recorded: May 22 2018 53 mins
    As the service provider adoption of network functions virtualization (NFV) continues, new business opportunities expand for Service Providers.

    This webinar will explore the rationale, value, and implementation options of using NFV and uCPE/vCPE models to deliver session border control (SBC) as a service.
  • HPE-Veeam advanced integration: Design for the Enterprise!
    HPE-Veeam advanced integration: Design for the Enterprise! Federico Venier - Technical Marketing Engineer Recorded: May 22 2018 72 mins
    Learn how to take advantage of the new HPE + Veeam enterprise-class integration features. We will make a complete technical overview with a special focus on hardware snapshot orchestration with 3PAR and Nimble, ransomware protection, and cost reduction with StoreOnce deduplication.
  • 7 Reasons to Choose SUSE for your Transition to SAP S/4HANA
    7 Reasons to Choose SUSE for your Transition to SAP S/4HANA Michael Tabron, Product Marketing Manager, SUSE Recorded: May 22 2018 35 mins
    When you’re considering a move to SAP S/4HANA, you have decisions to make not only about your business processes but also in transitioning your infrastructure whether on-premise, in the cloud or a hybrid implementation.

    In this webinar Michael Tabron, SUSE Product Marketing Manager for SAP Solutions, will start with a brief overview of the reasons Digital Transformation has become a business imperative, and how SAP helps its customers address this challenge. Then he will give you 7 reasons why SUSE gives you the most complete and flexible platform regardless of how you choose to implement SAP S/4HANA.
  • The SIEM That Gives SIEM a Good Name
    The SIEM That Gives SIEM a Good Name Lindsay Drabwell, Head of Membership Services EMEA, (ISC)², Avi Chesla, CTO and Founder, empow Recorded: May 22 2018 59 mins
    In their attempt to defend against the increasing volume of advanced attack campaigns, organisations are buying more and more security solutions, unwittingly creating a complex and cumbersome cybersecurity architecture.
    SIEM systems were supposed to be the industry’s solution to this problem, but they have failed miserably. Today’s SIEM systems create more problems than they solve, are very expensive, and ultimately ineffective.

    This webcast led by Avi Chesla, empow founder and CTO, will review the evolution of SIEM technology over the years, the fundamental flaws in its design, and why it has failed. He will then dive into the technology behind next-generation SIEM, and the major role played by AI in it, so that InfoSec teams can cut through the noise in the cybersecurity arena and effectively evaluate the next wave of solutions: SIEM that finally works for you, instead of the other way around.
  • An Introduction to Data Virtualization
    An Introduction to Data Virtualization Ravi Shankar, Chief Marketing Officer, Denodo and Danny Thien, Senior Data Architect, Denodo Recorded: May 22 2018 59 mins
    According to Gartner "Through 2020, 50% of enterprises will implement some form of data virtualization as one enterprise production option for data integration". That defines how data virtualization has become an undeniable driving force for companies to implement an agile, real-time and flexible enterprise data architecture.

    Attend this session to learn:

    -Fundamentals of data virtualization and how it differs from traditional data integration approaches
    -The key patterns and use cases of Data Virtualization
    -What to expect in subsequent sessions in the Packed Lunch Webinar Series, which will take a deeper dive into various challenges solved by data virtualization in big data analytics, cloud migration and various other scenarios

    Agenda:
    -Introduction & benefits of DV
    -Summary & Next Steps
    -Q&A
  • Cloud Bursting with One-Click Simplicity
    Cloud Bursting with One-Click Simplicity Karthik Balachandran, Technical Solutions Leader, Aviatrix; Chris Brown, Solutions Marketing Manager, Nutanix Recorded: May 17 2018 39 mins
    Using the public cloud for temporary or elastic workloads enables flexibility and agility to address today’s enterprise compute needs. Implemented correctly, a hybrid architecture assures cloud-like responsiveness that pleases end users while maintaining the procedures that any well-run organization needs. However, implemented poorly or left to individuals, it becomes a budgetary and security exposure, frustrating the user and putting the company at risk.

    Join Nutanix and Aviatrix and learn how Calm and Aviatrix’ Cloud Networking solution will simplify and automate the placement of applications and temporary workloads in to the Public Cloud (Amazon Web Services, Google Cloud Platform, and Azure). With Aviatrix and Nutanix the cloud becomes a seamless extension of your datacenter allowing you to use the cloud when it is needed and bring workloads back on premises where it makes sense. Learn how Nutanix and Aviatrix are making the cloud, and networking to it, as invisible as Nutanix has made virtualization and storage in your data center.
  • Hybrid Defense: How to Defeat 2018's Biggest Threats
    Hybrid Defense: How to Defeat 2018's Biggest Threats Louis Evans, Product Marketing Manager - Arctic Wolf Networks Recorded: May 17 2018 32 mins
    There’s one certainty in cybersecurity: 2018's attacks are going to be even worse than the ones we've faced. So, how are cybersecurity experts and vendors gearing up to meet these new threats?

    In this webinar, we’ll touch on major industry trends like User Behavior Analytics and automated incident response, and take a deep dive into how three key innovations—hybrid AI, hybrid cloud security, and hybrid IT teams—are enabling even cash-strapped organizations to deploy world-class defenses.

    We’ll discuss how:

    - Human-AI hybrid solutions deliver security that’s more than the sum of its parts
    - SIEM solutions are rising to the challenge of new hybrid-cloud architectures for business
    - Expert-as-a-service solutions are transcending the challenges posed by both in-house and traditional consulting staffing strategies

    To see how you can beat the big threats of 2018, register now!
  • Valuable Metrics & Monitoring for Business Critical Systems
    Valuable Metrics & Monitoring for Business Critical Systems Jonas Mason, Principal Architect; Jim Hannan, Principal Architect Recorded: May 17 2018 44 mins
    The process of establishing performance benchmarks and baselines is invaluable when it comes to understanding the health of your environment, and becomes even more crucial when dealing with business critical systems. In this session we will provide further insights regarding the importance of effective monitoring and metrics and how they can help you respond proactively to performance issues. We will also discuss best practices for monitoring and metrics as related to physical and virtual servers, storage, and databases.

    You’ll leave with a better understanding of key considerations for determining performance baselines and benchmarks; the various categories of metrics and monitoring tools; a list of recommended reports, tools, and software; and best practices for gaining insights into the performance of your business critical systems.
  • IT Ops SIG Talk Ep. 5: SiteScope the WebScript Monitor Tool
    IT Ops SIG Talk Ep. 5: SiteScope the WebScript Monitor Tool Nels Hoenig Recorded: May 17 2018 19 mins
    Web Site Monitoring using SiteScope the WebScript Monitor Tool and a LoadRunner Script

    Web Site Monitoring using SiteScope the WebScript Monitor Tool and a LoadRunner Script: Join us for this presentation of the power of a SiteScope Webscript to monitor your websites in a production environment to provide real time checking on a website including interactions ( login, screen validation, etc). Learn how this will also generate alerts to the OPS team when something is wrong.
  • Accudata's White-Hat Files | May 2018 Edition
    Accudata's White-Hat Files | May 2018 Edition Josh Berry, CISSP & OSCP, Principal Consultant for Risk & Compliance Recorded: May 17 2018 16 mins
    Welcome to the White Hat Files – a monthly series where the best white hat hackers give you what you need to know about the threat landscape.

    Our first White Hat File comes from Josh Berry, who holds OSCP, CISSP, and GIAC certifications.
    In this 15-minute webinar, he’ll give you the rundown on Accudata’s most-seen vulnerabilities, as well as best practices you can use to defeat attackers looking to dissect and destroy your business.

    Join us for our next edition in June! Register here: https://www.brighttalk.com/webcast/16347/322209?utm_source=Accudata+Systems&utm_medium=brighttalk&utm_campaign=322209
  • GDPR: Have Questions? Ask the Experts!
    GDPR: Have Questions? Ask the Experts! Sacha Dawes Principal Product Marketing Manager, AlienVault Recorded: May 17 2018 63 mins
    The GDPR, or General Data Protection Regulation, will come into force on 25 May 2018 and has spurred many questions for IT teams trying to get up to speed on what the new regulation will require and how to achieve compliance in the most efficient way.

    Join this webcast with John McLeod, AlienVault's CISO, and Dan Stocker, Coalfire's Practice Director of Cloud & Tech, to walk through frequently asked questions and best practices for GDPR compliance. John and Dan have been immersed in GDPR compliance efforts over the last several months and can share what they have learned, and answer your burning questions. The presenters will cover:

    - What is GDPR and who is affected?
    - How will GDPR impact organizations outside the EU?
    - What is meant by personal data in the context of GDPR?
    - What are some of the steps and effective tools you need to comply?
    - What should your incident response plan look like in the event of a breach?
    - What happens to companies that fail to comply?

    We'll wrap up with a brief demo of the AlienVault Unified Security Management (USM) platform to illustrate how AlienVault can help accelerate and simplify your path to compliance.

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager, AlienVault

    Sacha has over 15 years of experience in technology and information security across product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he delivered solutions to address the IT security, identity and management space. Before joining AlienVault, he worked in the office of the EVP for Cloud and Enterprise business at Microsoft. Originally from the UK, Sacha is based in Austin TX and holds a Masters in Computer Science from Vanderbilt University.
  • IT Ops SIG Talk Ep. 6: Surviving OMW to OMi Migration
    IT Ops SIG Talk Ep. 6: Surviving OMW to OMi Migration Bogdan Vosnjak Recorded: May 17 2018 36 mins
    Surviving OMW to OMi Migration

    Surviving OMW to OMi Migration: The customer with a well-developed OMW-based monitoring solution was faced with a challenge to migrate to OMi10 due to OMW obsolescence. Their old monitoring system was deeply integrated, highly customized and exposed to the outside world (their partners and customers) on a 24/7 basis. Migration challenges included:

    Migration of event sources (OM agents, SNMP Trap sources, NNMi, SiteScope)
    Migration of Service models with complex propagation/calculation rules
    Migration of customized Incident ticketing integration (Service Manager)
    Migration of custom applications (event archive, Service availability web portal, downtime management)
    Minimum downtime during migration

    In this presentation, attendees will learn how these challenges were addressed and ultimately overcome.
  • Verizon Risk Report - Streamline Security with Actionable Insights
    Verizon Risk Report - Streamline Security with Actionable Insights Katie Crammer, Director, Verizon Global Security Solutions Recorded: May 17 2018 39 mins
    Please join Katie Crammer, Director of Global Security Solutions as she provides an in-depth conversation about a new powerful tool to help enterprises quantify cyber risk and ROI.

    Enterprises routinely struggle to correlate security-related costs with cyber risks and have difficulty determining their security ROI and measuring their security posture. The Verizon Risk Report provides a comprehensive, automated, 360-degree security risk posture assessment, updated daily. The report provides a security score by measuring outside security posture against peers, evaluates control effectiveness, exposes gaps, weaknesses and associated risks, yielding actionable recommendations for mitigating real and likely risks.
  • Introducing Zerto Virtual Replication 6.0 - Solve for Multi-Cloud
    Introducing Zerto Virtual Replication 6.0 - Solve for Multi-Cloud Robert Strechay - Senior VP Product, Zerto Recorded: May 17 2018 47 mins
    With the introduction of Zerto Virtual Replication 6.0, enterprises can now fully experience the true benefits that cloud technology has long promised.

    Listen in as Senior Vice President of Product, Rob Strechay reveals Zerto’s Game-changing technology so you can be ready to solve for cloud with a single solution.
  • DevOps : du code à la production
    DevOps : du code à la production Brice DEKANY, Ingénieur avant-ventes, SUSE Recorded: May 17 2018 51 mins
    Lors d’une rencontre avec les équipes développement de chez Experis-IT, SUSE présente les outils devops pour créer un pipeline d’intégration et déploiement continu (CI/CD).
    Git, Jenkins, Portus et Kubernetes : démonstration en live d’une modification de code et suivi de la chaine des outils pour construire une image Docker et le déployer sur un cluster de containers.
  • Overcoming the Five Distributed Data Protection Challenges
    Overcoming the Five Distributed Data Protection Challenges Storage Switzerland, Druva Recorded: May 16 2018 60 mins
    One of the biggest challenges facing IT today is how to effectively protect data distributed between offices and across clouds. Companies with remote and branch locations, and newly merged organizations are all at risk of losing their critical data or ending up with multiple disparate solutions, that are not integrated. This can leave them with data silos, lack of visibility and control over data, and creating risks and compliance issues.
  • Verizon Threat Research Advisory Center - Monthly Intel Briefing
    Verizon Threat Research Advisory Center - Monthly Intel Briefing John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: May 16 2018 73 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Mobile Security Index 2018 Highlights

    Our Verizon Threat Research Advisory Center presenters will be:

    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •John Pernini, Security Consultant, Investigative Response – Americas
    •Roy Porter, Senior Analyst, Threat Intelligence

    This month we'll be covering mobile device security threats by featuring the Verizon Mobile Security Index (MSI) 2018. Mobile devices are an appealing target—there are more of them, they have access to more data, and they are critical to business operations. The MSI includes recommendations that can help strengthen your organization's mobile device security, to include security measures for your network, devices, applications, and people.

    For this month's MIB, we'll highlight findings within the MSI and provide insight and recommendations from our investigations and threat intelligence to help you improve your mobile device security and response posture.

    Following the MSI highlights, we'll cover the following topics:

    •Current Intelligence
    •Latest Malware Trends
    •Attacks and Threat Indicators
    •Significant Vulnerabilities

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • SUSE OpenStack Cloud 8 – driving the software-defined infrastructure of tomorrow
    SUSE OpenStack Cloud 8 – driving the software-defined infrastructure of tomorrow Matthew Johns, Product Marketing, SUSE & T.R. Bosworth, Senior Product Manager, SUSE Recorded: May 16 2018 56 mins
    Private clouds and software-defined infrastructure aren’t new concepts, but deployments can be costly and stressful. As one of the first vendors to release an enterprise-ready distribution of OpenStack, the open source cloud operating system, SUSE are well-known for making OpenStack easier to deploy than doing it yourself.

    Join the SUSE team at this webinar to hear about why software-defined infrastructure is important to all businesses today, and how the latest version of the SUSE OpenStack Cloud, can help businesses during the digital revolution of today. With a new deployment engine, enhanced support for software-defined networking, full support for bare metal provisioning and more, learn how SUSE OpenStack Cloud 8 delivers expanded interoperability, scalability and flexibility, enabling businesses to transform their IT to conquer.
  • Embracing the Journey to Digital Executive Leadership [Live Panel]
    Embracing the Journey to Digital Executive Leadership [Live Panel] Margaret Dawson, VP Product Marketing, Red Hat Recorded: May 16 2018 74 mins
    Digital transformation is the journey all organizations must go through to compete and win in today’s economy. It includes fundamental changes across the business and information technology. The hallmark of digital transformation is that software differentiates in ways it never has before, and technology is no longer about running the business-instead it creates competitive advantage.

    To attain digital leadership requires embracing a new generation of technology that encompasses real-time decision platforms, cognitive systems, and the Internet of Things, as well as new processes and cultural perspectives. Digital leaders move fast and embrace disruption both internally and externally. No wonder 90% of CEOs are changing the way they use technology to be successful, according to IDC Research.

    Join this spotlight overview and hosted panel discussion to hear insights from top executives.
  • Veeam & Quantum help you prepare for GDPR - Backup Best Practices
    Veeam & Quantum help you prepare for GDPR - Backup Best Practices Stephane Estevez, Quantum; Kevin Ridings, Veeam May 24 2018 1:00 pm UTC 75 mins
    GDPR becomes enforceable on May 25 2018, and affects all companies with customers in the EU. Learn about the new legislation from Stephane Estevez, product manager at Quantum & Kevin Ridings, alliances systems engineer at Veeam. They will explain considerations for GDPR and data backup including retention, security and protection. GDPR will become enforceable in 2018 - Quantum and Veeam's solution for data backups will help ensure you are ready for successful compliance.
  • Managing Massive Data Growth
    Managing Massive Data Growth Tyna Callahan - Scality, Yannick Guillerm - Scality, and Charles Tierney - HPE Storage May 24 2018 3:00 pm UTC 75 mins
    Managing Massive Data Growth. It’s true – it is all about you–your data that is. Several different trends have converged to accelerate the creation of valuable data, presenting new challenges to enterprise storage management teams. Many customers along with some analysts suggest object-based storage as a key element in managing the growth of data. What is it that they see in object storage? Join us as we discuss: Recent Trends leading data growth, the benefits of software-defined object storage features to consider, and real-world examples where object solutions are managing data growth issues.
  • Transforme la manera en la que despliega y entrega servicios en el Data Center
    Transforme la manera en la que despliega y entrega servicios en el Data Center Marco Bañuelos - SUSE Systems Engineer May 24 2018 3:00 pm UTC 75 mins
    ¿Pensando en Devops? Piense en SUSE.
    Para que las organizaciones se den cuenta del valor de una infraestructura definida por software, necesitan adoptar nuevas metodologías, como DevOps.

    SUSE no solo proporciona las tecnologías de infraestructura open source que necesita, sino que también compartimos las herramientas y el IP que estamos desarrollando y utilizando para DevOps (Open Build Service & openQA).

    Las soluciones de SUSE ayudan a respaldar su adopción de un modelo DevOps al proporcionar y respaldar las herramientas que necesita para transformar su infraestructura para administración del ciclo de vida de la aplicación, reduciendo el tiempo de comercialización, mejorando la eficiencia y satisfaciendo las cambiantes demandas comerciales.
  • Four Advanced Troubleshooting Tasks for Linux Experts and Beginners
    Four Advanced Troubleshooting Tasks for Linux Experts and Beginners Jennifer LuPiba, Principal Product Marketing Manager, Red Hat May 24 2018 6:00 pm UTC 60 mins
    In this webinar, we’ll walk you through 4 advanced troubleshooting use cases that simplify management for both the Linux® expert and the beginner.

    The Red Hat® Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more.

    No matter what stage you're in as a Linux user, join this webcast for an overview of how to take your troubleshooting to the next level.
  • Modern Vulnerability Management : Knowledge, Automation, Analytics 
    Modern Vulnerability Management : Knowledge, Automation, Analytics  Syed Abdur, Brinqa, Director of Product May 24 2018 6:00 pm UTC 60 mins
    With growing numbers of new vulnerabilities disclosed every year, increasing attacker sophistication, and a myriad of tools and teams that have to be synchronized for effective response, most organizations struggle with designing and implementing an effective vulnerability management program. In this webinar we discuss 3 key components that all modern vulnerability programs must address :

    - Knowledge: How to create actionable intelligence from business context, threat intelligence, and any other relevant data source
    - Automation: How to implement automation to streamline significant parts of the VM process
    - Analytics: How to effectively engage and inform all stakeholders
  • Multi-Cloud, Multi-Problems
    Multi-Cloud, Multi-Problems Mike Dahlgren, Senior Cloud Solution Architect, Red Hat May 29 2018 9:00 am UTC 75 mins
    Simplifying complex IT operations with automation & management

    IT operations is more complex than ever before. Automation and management are critical to keep pace and deliver business results.

    Join this webinar to learn how management, automation, and innovation address your hardest IT challenges:

    > Improving processes, migrating apps for optimization, and providing a single language for DevOps practices using agentless IT automation
    > Managing multicloud environments efficiently, securely, and with compliance to various standards
    > Easily and quickly building, developing, and deploying in nearly any infrastructure—on premise, in a public cloud, or hosted
  • Crypto Crime:  Hunting for Cryptocurrency Mining in Your Enterprise
    Crypto Crime: Hunting for Cryptocurrency Mining in Your Enterprise Lindsay Drabwell, Head of Membership Services, (ISC)² EMEA, Tom Kellermann, CISO, Rick McElroy, Sec. Strategist, Carbon Black May 29 2018 1:00 pm UTC 60 mins
    2018 is shaping up to be an important year for not just Bitcoin, but the many new cryptocurrencies that seem to be popping up by the day. Attackers have discovered that mining cryptocurrency can prove to be a very profitable endeavor if they can leverage someone else's computing resources.
    To ensure that organisations have full visibility into all activity in their environments, Tom Kellermann – Chief Security Officer and Rick McElroy – Security Strategist from Carbon Black will walk you through the key pointers you need to know about how to hunt for malicious mining malware in your enterprise and ensure your critical business resources aren't generating profit for the adversary on your dime.
    In this webinar you will hear all you need to know for a Cryptocurrency Mining 101, as well as learning about:
    •Monero - What is it, and why use it?
    •Indicators of cryptominers
    •Using Carbon Cb Response to hunt for miners
  • SUSE Container Ecosystem Survey
    SUSE Container Ecosystem Survey Frank Rego - Director of ISV Program | Ruben Crazzolara - ISV Research Analyst May 29 2018 5:00 pm UTC 60 mins
    In 2017, SUSE released the SUSE CaaS (Container as a Service) Platform and the Container Application Platform (CAP). These new container management solution enables IT and DevOps professionals to more easily manage applications and services. Preceding the launch of the SUSE container partnership program, the ISV partner team has send out a survey to find out how the SUSE partner ecosystem plans to adopt containers. We found out that the benefits for DevOps and market demand are driving the release of container deployment options and certifying those options is important.

    SUSE CaaS Platform enables IT and DevOps professionals to more easily deploy, manage, and scale container-based applications. Container technology plays a key role in facilitating digital transformation by speeding application delivery, facilitating application portability, and enabling a new class of high performance cloud native applications. SUSE surveyed our ISV partner ecosystem to find out how commercial software companies are adopting container technologies, and in this webinar, we’ll present the results of that survey. We’ll also introduce our new Ready certification for SUSE CaaS Platform for ISVs who are building containers, and showcase some of our SUSE CaaS Platform partners and their solutions.
  • Embrace Central Office 2.0 with QCT NFV Platform
    Embrace Central Office 2.0 with QCT NFV Platform Marco Huang [QCT] Amy Chang [QCT] Wei Yeang Toh [Intel] May 29 2018 11:00 pm UTC 45 mins
    Telco operators are looking for open source solutions to reduce vendor lock-in and to meet growing customer demand in transformation. In this session, we provide a glimpse of common NFVI inquiries from telco customers, and propose a modularized NFVI OpenStack Platform with flexible, reliable, and high-performance infrastructure:

    ○ OpenStack architecture design and network planning for NFVI. We will present how to plan a NFVI OpenStack environment from scratch.

    ○ Enhanced Platform Awareness (EPA) adoption and performance evaluation. We will introduce the network stack and provide detailed performance evaluation results.

    ○ Ansible based auto-deployment tool to accelerate the overall deployment process. We will present you how our streamlined auto-deployment tool saves your effort to build a well-integrated OpenStack


    More about our presenters:

    Marco Huang – Open Infrastructure Engineering Team Leader. QCT
    Amy Chang - Open Infrastructure Business Development Team Leader, QCT
    Wei Yeang Toh - Marketing Development Director, Network Platform Datacenter Group, Intel Corporation
  • Are you killing the benefits of your data lake? (EMEA)
    Are you killing the benefits of your data lake? (EMEA) Rick van der Lans, Independent Business Intelligence Analyst and Lakshmi Randall, Director of Product Marketing, Denodo May 30 2018 8:30 am UTC 45 mins
    Data lakes are centralized data repositories. Data needed by data scientists is physically
    copied to a data lake which serves as a one storage environment. This way, data scientists can access all the data from only one entry point – a one-stop shop to get the right data. However, such an approach is not always feasible for all the data and limits it’s use to solely data scientists, making it a single-purpose system.
    So, what’s the solution?
    A multi-purpose data lake allows a broader and deeper use of the data lake without minimizing the potential value for data science and without making it an inflexible environment.

    Attend this session to learn:

    • Disadvantages and limitations that are weakening or even killing the potential benefits of a data lake.
    • Why a multi-purpose data lake is essential in building a universal data delivery system.
    • How to build a logical multi-purpose data lake using data virtualization.

    Do not miss this opportunity to make your data lake project successful and beneficial.
  • The Automated Enterprise: Transforming IT Ops to Support Modern Business
    The Automated Enterprise: Transforming IT Ops to Support Modern Business Justin Nemmers, General Manager, Ansible, Red Hat May 30 2018 3:00 pm UTC 60 mins
    IT operations teams are increasingly challenged to deliver scalable, on-demand infrastructure and services to support developers, lines of business, and C-level initiatives - all while still ensuring security, compliance, reliability / and at timeframes once unimaginable.
    Faced with this, successful IT operations teams recognize that they need to adopt a new approach and modern, unified management and automation tools to remain relevant and effectively support business outcomes.
    Join Justin Nemmers, General Manager of Ansible, Red Hat, to learn how automation is at the center of IT operations transformation for your organization.

    Justin Nemmers, Red Hat® Ansible Automation General Manager, has spent a career helping organizations transform their IT environments by adopting new technologies and making better use of existing ones. Before joining Red Hat and leading a large services team, he held technical, sales, marketing, and product leadership roles at a number of organizations.
  • Multi-Cloud, Multi-Problems
    Multi-Cloud, Multi-Problems Michael Dahlgren, Senior Cloud Solution Architect, Red Hat May 30 2018 4:15 pm UTC 60 mins
    IT operations is more complex than ever before. Automation and management are critical to keep pace and deliver business results.
    Join this session to learn how management, automation, and innovation address your hardest IT challenges:
    > Improving processes, migrating apps for optimization, and providing a single language for DevOps practices using agentless IT automation
    > Managing multi-cloud environments efficiently, securely, and with compliance to various standards
    > Easily and quickly building, developing, and deploying in nearly any infrastructure—on premise, in a public cloud, or hosted
  • Can AI and chatbots really transform customer support?
    Can AI and chatbots really transform customer support? Stanley Yung, Chief Customer Experience Officer, Western Union May 30 2018 5:00 pm UTC 60 mins
    The most accessible way to leverage the explosion in artificial intelligence is chatbots. Big brands like Western Union have implemented them to streamline customer service and increase positive engagement. The Booking.com chatbot resolves half of the company's thousands of daily customer support questions in five minutes or less.

    Chatbots are changing the way companies and customers interact, as consumers grow more and more comfortable with messaging -- look at the two billion-plus conversations consumers have with companies via Facebook messenger every month.

    Find out how to create a powerful, engaging human-to-AI agent experience that customers expect -- as well as implement the seamless handoff to a human customer service agent when the issue turns out to be complex, with this VB Live event. You’ll dive right into the chatbot phenomenon, and leave with actionable ideas on implementing AI-powered customer support.

    Attend this webinar to learn:
    * The real truth about AI and customer service
    * How big brands are using AI and chatbots to resolve customer issues more quickly and effectively
    * How bots and humans can work together to optimize customer support
    * How to assess whether your organization is bot-ready

    Speakers:
    * Stanley Yung, Chief Customer Experience Officer, Western Union
    * Jaime Gilliam-Swartz, Senior Director, Voice of the Customer and Shared Services, Lyft
    * Jessica Groopman, Industry Analyst & Founding Partner, Kaleido Insights
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Chatkit
  • From Disaster to Recovery: Preparing Your IT for the Unexpected
    From Disaster to Recovery: Preparing Your IT for the Unexpected Alfons Michels, Sr. Product Marketing Manager - DataCore Software May 30 2018 5:00 pm UTC 45 mins
    Did you know that 22% of data center outages are caused by human error? Or that 10% are caused by weather incidents?

    The impact of an unexpected outage for just a few hours or even days could be catastrophic to your business.

    How would you like to minimize or even eliminate these business interruptions, and more?

    Join us to discover:

    • Useful and simple measures to use that can help you keep the lights on
    • How to quickly recover when the worst-case scenario occurs
    • How to achieve zero downtime and high availability
  • Best Practices for Integrating DevOps & Container based applications
    Best Practices for Integrating DevOps & Container based applications Mary Johnston Turner, Director, Management Software Evangelism, Red Hat May 30 2018 5:30 pm UTC 45 mins
    Increasing adoption of DevOps strategies and container based micro-services architectures enabled by containers and microservices is wreaking havoc with traditional IT infrastructure operations management processes and best practices.
    As the rate and pace of change accelerates and workloads are deployed across a dynamic mix of public clouds and on-prem infrastructure, IT operations teams are turning to automation to help maintain SLAs, hold down costs and empower mission critical digital business initiatives.

    Join this session discuss best practices for integrating DevOps and container based applications with modern Day 2 operations management and automation best practices. Mary Johnston Turner, Red Hat’s Director of Management Software Evangelism, will discuss how open source automation and management technologies can transform IT operations best practices for the era of containers, DevOps and cloud.
  • Revolutionize Networking with Ansible Automation
    Revolutionize Networking with Ansible Automation Andrius Benokraitis, Principal Product Manager, Red Hat® Ansible Automation focusing on networking automation. May 30 2018 6:30 pm UTC 55 mins
    You need to manage your network infrastructure - including both legacy and open network infrastructure devices - using simple, powerful and agentless automation throughout the entire production life cycle.
    Gone are the days of hand typing commands into network devices one by one. With automation, previously isolated network admins can finally “speak the same (automation) language” as the rest of the IT organization, breaking down silos that have existed for decades.
    In this session, we'll discuss how network devices and systems can now be included in an organization's overall automation strategy for a holistic approach to application workload management.
    We'll cover Ansible automation throughout the entire production life cycle, including:
    > Automating configuration of the network stack from system to access to core services
    > Testing and validating existing network states
    > Continuously checking for network configuration drift to maintain compliance.
  • Security Risks & Opportunities in Cloud Automation
    Security Risks & Opportunities in Cloud Automation Alessandro Perilli, General Manager,Management Strategy, Red Hat May 30 2018 7:30 pm UTC 60 mins
    If your organization is building a private cloud or using a public one, and the initiative is successful, your IT environment will soon reach a scale and complexity that requires automation.

    In this session, Alessandro Perilli, General Manager of Management Strategy at Red Hat, will explore the security implications of cloud automation.

    As a powerful software layer, automation implies a number of security risks that must be evaluated and mitigated. At the same time, if properly used, automation can become a powerful ally for CISOs. Not only can automation support tactical and strategic security initiatives; it can also become the enabling foundation for the most elusive milestone in IT security: self-defending networks.
  • The War Against Ransomware: Can You Afford the Downtime?
    The War Against Ransomware: Can You Afford the Downtime? Lindsay Drabwell, Head of Membership Services, (ISC)² EMEA, Björn Leenen, Engineer, Datto May 31 2018 11:00 am UTC 60 mins
    This session will review the history of Ransomware and the need to know strategies to protect business against it, particularly how business continuity and disaster recovery can save your company when disaster strikes. Delivered by Björn Leenen, CISSP, solution provider and sales engineer by day and night with 20 years of IT and security experience, participants will also be treated to an inside view of the a real ransomware infection with all the statistics and facts to go with it.
  • Automate Storage Provisioning with VMware vRealize Orchestrator, Ansible, & Chef
    Automate Storage Provisioning with VMware vRealize Orchestrator, Ansible, & Chef Chris Snell - HPE Storage Technical Marketing & Srik Venkata - HPE Storage Product Management May 31 2018 3:00 pm UTC 75 mins
    Learn how to use the new HPE 3PAR plugin for vRealize Orchestrator (vRO), Ansible, and Chef. Learn the benefits of automating HPE Storage within your companies Private Cloud and DevOps initiatives. This session will be covering Use Cases, and Demos, for the plugins for HPE 3PAR.
  • Vous migrez votre SAP vers Azure? Témoignages de migrations réussies
    Vous migrez votre SAP vers Azure? Témoignages de migrations réussies Christian Wissman, VP of Global Alliances, Protera and Julien Niedergang, Ingénieur avant-ventes, SUSE Jun 1 2018 9:00 am UTC 45 mins
    SUSE, Microsoft Azure et Protera vous invitent à une série de webinars sur le thème : SAP sur Azure.
    Vous découvrirez comment automatiser votre projet de migration de SAP vers Azure de façon rapide, facile et sûre afin de réduire les interruptions de services, les risques et les coûts.
    Ce webinar vous présentera en détail plusieurs exemples de migrations réussies.
    Vous découvrirez comment le choix de la plateforme de migration Flexbrige de Protera vous assurera les meilleurs résultats en terme d’interruption de service et de réduction de coûts.

    -Les facteurs d’adoption d’Azure pour SAP
    -Cas client typique
    -Business Case : Elevance Renewable Sciences, Tate and Lyle, ChromaFlo Technologies
    -Les templates Azure pour SAP
    -SUSE Linux Enterprise Serveur for SAP
    -Vos questions
  • Using AI-Powered IoT, Blockchain and Data for Sustainable Energy
    Using AI-Powered IoT, Blockchain and Data for Sustainable Energy Maria McKavanagh, Chief Operating Officer, Verv Jun 5 2018 9:00 am UTC 60 mins
    Learn how Verv started with an IoT device to give consumers greater insight into their energy usage and developed it into a blockchain-based data and peer-to-peer energy trading platform.

    Discussion topics include:

    - Non-intrusive load monitoring and how it turns your home into a smart home with just one sensor
    - What is the blockchain and why should it be used for peer to peer energy trading
    - GDPR and how it will pave the way for ethical selling of data

    About the presenter:

    Maria holds an MEng degree in Electronic Systems Engineering from The University of Manchester. She is currently the Chief Operating Officer at Verv where they have developed a blockchain-based peer-to-peer energy trading platform and have launched a initial token offering. Previously she worked in Field Sales Engineering at NASDAQ data acquisition specialist National Instruments where she was responsible for a multi-million pound sales territory across a wide range of industries from Aerospace and Defence to Consumer Electronics. Earlier in her career she worked in telecommunications consulting, advising (among others) the European Railway Agency on future operational communications systems having spent time in postgraduate research studying RF and wireless sensor networks.
  • Nokia AirFrame Open Edge Server - Edge Cloud Data Center Solution for the 5G Era
    Nokia AirFrame Open Edge Server - Edge Cloud Data Center Solution for the 5G Era Antti Romppanen, Head of Product Management, Datacenter Infrastructure [ NOKIA ] Jun 5 2018 4:00 pm UTC 60 mins
    Technologies such as Cloud RAN will be key to deliver on the 5G promise of ultra-low latency and massive data throughput, and will need to be supported by a highly efficient cloud infrastructure solution.
    Nokia AirFrame data center solution portfolio makes these edge deployments a reality. Designed in an ultra-compact size for deployment even at base station sites, the Nokia AirFrame open edge server will meet the most stringent end-customer data demands. Nokia's comprehensive portfolio of AirFrame data center solutions enables operators to optimize network resources and intelligently distribute workload across the network, based on the type of data traffic as well as latency and throughput needs.
  • How Blockchain in Tandem with IoT is a Game-Changer
    How Blockchain in Tandem with IoT is a Game-Changer Tariq Ali Asghar, CEO, Emerging Star Investment Group Jun 5 2018 5:00 pm UTC 60 mins
    Blockchain technology is revolutionizing the way IoT devices are connected. The decentralized and distributed system emboldens security, enables third party verification and avoids multiple inputs of the same information, thereby increasing efficiency, speed and execution of IoT devices.

    This webinar explains how Blockchain and IoT are coherently related and support each other. Blockchain enables organized functioning of IoT devices and their regulation, immutability and security.

    About the speaker:

    Tariq is a Fintech expert, writer and thinker based in Toronto, Canada. He is currently working on an initiative to disrupt the conventional insurance industry with Blockchain and IoT applications to the insurance industry for his startup.
  • Hybrid Defense: Discover How Hybrid AI Protects City of Sparks
    Hybrid Defense: Discover How Hybrid AI Protects City of Sparks Steve Davidek, IT Manager, City of Sparks; Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Jun 5 2018 6:30 pm UTC 45 mins
    In today's landscape, it seems businesses of every size and stripe are at risk of becoming targets of cyberattacks. From government agencies to hospitals, these businesses are increasingly victimized by ransomware attacks and data breaches. So, how do you defend yourself? What do you do when your IT staff lacks the expertise to investigate growing security threats and respond to them in a timely manner? How do you get help from security experts to prevent suffering a future breach?
  • Complete data protection for the SAP HANA environment
    Complete data protection for the SAP HANA environment Alan Clarke - SUSE, Tom Elkhuizen & Ralf Bogner - SEP and David Frost ST-FOUR Jun 6 2018 2:00 pm UTC 60 mins
    Discussion on how to use industry-leading IT infrastructure and application technologies to provide a complete data protection for the SAP HANA environment.