Hi [[ session.user.profile.firstName ]]


  • Proving the Business Value of Network Transformation Proving the Business Value of Network Transformation DCD, Juniper Recorded: Mar 23 2017 1 min
    A short video from DCD, that covers the key findings from an IDC paper, whereby 9 companies were interviewed to provide their insight and analysis on how Juniper Networks have helped them.
  • Storage Refresh? 3 Capabilities Primary Storage Must Have (but probably doesn't) Storage Refresh? 3 Capabilities Primary Storage Must Have (but probably doesn't) Charlie Hodges, Storage Switzerland Recorded: Mar 23 2017 59 mins
    If your organization is embarking on a refresh of your primary storage system this year, this is the one webinar that you will want to attend. IT evaluators that haven't looked at storage in a few years, will be impressed the use of flash to improve performance, while many claim to integrate file (NFS, SMB) and block (iSCSI, Fibre) protocols. These features though are now table stakes for the modern storage solution.

    While all of these features are important (and not created equal), IT professionals should demand capabilities that solve today's organizational challenges like eliminating shadow IT, improving multi-site productivity and long term data retention as well as meeting increasingly strict compliance standards. IT professionals should look for not only high performance and universal protocol support but also enterprise file sync and share, inter-data center sync and secure archive with compliance.
  • Top Reasons Why Your Antivirus Isn’t Working Anymore Top Reasons Why Your Antivirus Isn’t Working Anymore Ed Metcalf, Director of Product Marketing and Brian Robison, Senior Director of Field Technical Marketing at Cylance Recorded: Mar 23 2017 68 mins
    Are you weary from fighting malware, ransomware, and other threats that your ineffective and tired antivirus software can’t stop?

    If so, join us for our webinar, “Top Reasons Why Your Antivirus Isn’t Working Anymore” to hear why it’s time to rise up and overthrow traditional, reactive antivirus solutions in favor of proactive endpoint protection powered by artificial intelligence (AI).

    During this webinar, you will see a live demo of AI in action with CylancePROTECT®, and cover the key reasons why your current antivirus solution probably isn’t working anymore:

    - It’s Reactive: Legacy, signature-based antivirus products cannot prevent malware from executing. Cylance AI technology protects before the machine is infected.
    - It’s Ineffective: Legacy security tools perform at a 70 – 90% success rate. Cylance routinely performs with near perfect efficacy, at 99%+.
    - It’s Burdensome: On average, traditional endpoint security products use 50% to over 70% of CPU cycles during intensive scans. CylancePROTECT is outstandingly lightweight at just 1% – 3% CPU utilization.
    - It’s Costly: Signature-based antivirus solutions impact the bottom line with more layers of unproductive technology. Cylance protects with a single agent and a single cloud-based management tool, and that translates into big cost savings.
  • Applink: Automate the process flow between HPE OpsBridge & 3rd party BSM vendors Applink: Automate the process flow between HPE OpsBridge & 3rd party BSM vendors Stefan Goeritz, Applink and Ian Bromehead, HPE Recorded: Mar 23 2017 53 mins
    In this session we will demonstrate AppLink’s CLIP solution to implement a combined workflow of HPE OMi’s event management capabilities integrated into the incident management process of ServiceNow and BMC Remedy. In addition to CLIP’s out-of-the-box workflow, this session shows real life non-intrusive customer customizations of CLIP to address auto-assignment of incidents, context sensitive auto-resolution of incidents based on CLIP variables and direct vs. indirect integration options.
  • Getting started with GDPR, Privacy and Applying Appropriate Security Controls Getting started with GDPR, Privacy and Applying Appropriate Security Controls Jason Hart, Gemalto, Christine Andrews, DQM GRC, Adrian Davis, (ISC)² EMEA Recorded: Mar 23 2017 56 mins
    In this webinar, presented by compliance experts Christine Andrews (DQM GRC) and Jason Hart (Gemalto) you will learn:

    a. The background to the new General Data Protection Regulation
    b. An overview of the key areas of change from the existing Data Protection Act – and the penalties for getting it wrong
    c. A focus on the information security implications and considerations for meeting compliance
    d. An approach for understand the “Gaps” in your current compliance and, importantly, how best to move forwards
  • Detect and Block Apache Struts Bug Across Your Enterprise Detect and Block Apache Struts Bug Across Your Enterprise Vikas Phonsa Director Product Management Web App Firewall and Frank Catucci Director Product Management Web App Scanning Recorded: Mar 22 2017 57 mins
    A critical vulnerability has been found in Apache Struts 2, and it is being actively attacked in the wild, as hackers jump at the chance to hit high-profile targets by exploiting this critical bug.

    Apache has issued an emergency security alert, classifying this as a high-risk vulnerability. If left unaddressed, organizations are at risk of remote code execution attacks, which could lead to complete system compromise.

    During this webcast, Qualys Product Management Directors Vikas Phonsa (Web Application Firewall) and Frank Catucci (Web Application Scanning) will show you how Qualys' complete, end-to-end security solutions can detect and patch the vulnerability so that you can keep your business-critical information safe from attackers.

    With Qualys Vulnerability Management, Web Application Scanning, and Web Application Firewall, you can find Struts in your environment quickly, comprehensively, and at scale, as well as shield your organization from Struts attacks while you identify and patch vulnerable systems.

    This webcast will include a live demo and Q&A session.
  • OPNFV Overview: Navigating Its Many Projects OPNFV Overview: Navigating Its Many Projects Amar Kapadia, NFV Specialist, John Jainschigg, Technical Solutions Marketing at Mirantis Recorded: Mar 22 2017 59 mins
    NFV continues to gain prominence in both the telecom industry and enterprises. OPNFV is an open source systems integration project to create and test open source to help create a complete NFV stack as defined by the ETSI reference architecture. However, the unique nature of the project makes it difficult to understand than "traditional" open source software development projects. In this webinar, we will look at the OPNFV project as a whole and through a high-level review of its roughly 60 projects. Suitable for both practitioners and decision makers, you will learn:
    * An overview of the OPNFV project
    * An introduction to create-integrate-test categories
    * Upstream and OPNFV projects that belong to the above categories
    Join us on March 22 as Amar Kapadia and Nick Chase help you navigate through the various OPNFV projects.
  • Change is Everywhere! How Can SUSE OpenStack Cloud Help You Deal With It? Change is Everywhere! How Can SUSE OpenStack Cloud Help You Deal With It? Mark Smith Recorded: Mar 22 2017 52 mins
    The adoption of cloud computing continues to accelerate, driven by customer demand for new services and fast-changing technology trends including DevOps, containers and cloud-native apps.
    The impact of rapid change on business is profound. As always, there will be winners and losers.
    Join us to learn how SUSE OpenStack Cloud 7 can help you adapt and innovate to meet the challenges ahead.
  • Migrating Existing Applications with Containers Migrating Existing Applications with Containers Scott McCarty Recorded: Mar 21 2017 26 mins
    Many organizations have dabbled with Linux® containers. After a small, successful project, an epiphany happens and you ask: What else can we containerize? Can we put everything in containers? How do we get traditional applications into containers? Learn about technical and architectural considerations when moving existing applications to containers. From systemd, to storage to backups, to debugging applications in production, there are a lot of things to think about when migrating existing applications to containers and running them in production.

    Join this session to:
    Gain operational confidence if you’re on the fence about, or just dabbling in, containers.
    Have a shared experience with a bigger community this is running containers with actual workloads in their organizations.
    Learn how to optimally containerize new applications and migrate existing ones.
    Start collecting and discussing best practices to widen container adoption.
  • The 5 Disaster Recovery Questions You’re Not Asking The 5 Disaster Recovery Questions You’re Not Asking Curtis Preston, Storage Switzerland Recorded: Mar 21 2017 62 mins
    Disaster Recovery as a Service (DRaaS) is changing the way data center administrators think about disaster recovery. A DR site and equipment no longer need to be bought in advance. DRaaS instead enables DR to be on-demand. The concept is so appealing that vendors are racing into the market claiming to offer DRaaS capabilities. But DRaaS is more than a simple check mark for a DR requirement. Organizations need to realize that how well the service performs is critical to successfully surviving a disaster.
  • Securing Cisco with Splunk - Lessons from One of the World’s Most Mature CSIRTs Securing Cisco with Splunk - Lessons from One of the World’s Most Mature CSIRTs Imran Islam, CISCO, Matthias Maier, Splunk, Adrian Davis, (ISC)² EMEA Recorded: Mar 20 2017 59 mins
    The Cisco Computer Security Incident Response Team (CSIRT) is a global team of information security professionals responsible for the 24/7 monitoring, investigation and incident response at one of the world’s largest and leading technology companies.
    Learn how Imran Islam, leader of Cisco’s EMEA/APAC CSIRT team relies on Splunk to help his team drive best practices in threat assessment, mitigation planning, incident detection and response, incident trend analysis, and the development of future security architecture.
    Join this webinar to hear Imran Islam discuss how Cisco drives CSIRT best practices:
    - CSIRT playbooks and automation methods
    - The importance of timely CSIRT data access, correlation & visualisation
    - CSIRT staffing approaches
    - CSIRT threat intelligence management
    - Driving CSIRT operational efficiency
    - The importance of CSIRT collaboration across the business during investigations
    - How CSIRT functions can increase business relevance
    - Learn about the importance of understanding your environment
    - Learn about the importance of having the right data
    - Learn the critical success factors for building a CSIRT Team and capabilities
    - Learn how to enable your security team to scale its ability to handle incidents and quickly find, validate, and resolve issues
    - Learn how to justify adding more resources to an incident response team
    - Learn how to introduce consistency into your security team for approaching and solving security problems.
  • Why Facebook and the NSA love the graph database Why Facebook and the NSA love the graph database Senior Analyst & Consultant Mike Matchett Recorded: Mar 17 2017 6 mins
    Senior Analyst & Consultant Mike Matchett dives into graph databases, and Why Facebook and the NSA love them.
  • CTO PoV: Enterprise Networks (Part 2) CTO PoV: Enterprise Networks (Part 2) Khalid Raza, CTO & Co-Founder, Viptela & Danny Johnson, Director, Product Marketing: Network Services, Verizon Recorded: Mar 16 2017 45 mins
    In Part 2, the CTO PoV will focus on Security for IoT and Cloud in Enterprise Networks.

    IoT, Cloud and Mobile devices are stretching the traditional limits of IT security. As enterprise applications change and technology advances, the fundamental network infrastructure needs to support a robust security framework.

    Khalid Raza (CTO, Viptela) & Danny Johnson (Director, Verizon) share their Point of View on why current WAN infrastructures are not designed to support new enterprise traffic patterns, and how emerging security approaches designed around segmentation and policy can help organizations adapt to these changes. Enterprises can protect their Cloud and enterprise against attacks and data leaks while migrating to a cost-effective Hybrid architecture.

    In this webinar, we will cover:

    - The security threats around Cloud and IoT
    - Applications that are stressing enterprise network security requirements

    View Part 1 On-Demand: https://www.brighttalk.com/webcast/14779/247749
  • Say good-bye to choppy videos & slow PDF scrolling: Hardware Accelerator Say good-bye to choppy videos & slow PDF scrolling: Hardware Accelerator Tim Konopelky, Systems Analyst & Patrick Mauro,Senior Product Manager Recorded: Mar 16 2017 29 mins
    Watch a short demonstration on how Teradici PCoIP® Hardware Accelerator smooths CPU peaks to deliver a consistent user experience. Say good-bye to choppy videos or lags using everyday applications thanks to the card’s powerful dynamic workload allocation capabilities.

    Enjoy full screen HD video playback and immediate performance improvements that can be achieved with PCoIP Hardware Accelerator.

    Get a glimpse of how you can enhance your VMware® Horizon View environment with the card including reduced CPU overhead. Plus, we’ll share five VDI lessons from our customers.

    Those who attend and view the webinar will receive a copy of the slide deck and FAQs.
    Q&A will follow at the end of the session.
  • Collective Security – Prairie Dogs vs Humans Collective Security – Prairie Dogs vs Humans Jim Hansen, Chief Operating Officer, PhishMe, Adrian Davis, Managing Director, (ISC)² EMEA Recorded: Mar 16 2017 61 mins
    As the security industry has continued to under invest in the human element of security, phishing has become the top attack vector for cyber criminals. Breaches continue to occur in record numbers, identification takes an exorbitantly long time, and the most preferred target is an organization’s human assets. Empowering human assets to provide vetted intelligence into your incident response teams is often overlooked. Every organization has these human sensors, and there’s a natural desire for these employees to want to help.

    In this presentation, Jim Hansen will discuss:
    •Why the cyber security industry is broken
    •How to reduce susceptibility to human-targeted attacks
    •How to empower users to become human sensors to recognize and report suspected attacks
  • All Things Containers: Innovation, Adoption and Security All Things Containers: Innovation, Adoption and Security Peter Christy, Research Director of 451 Research; Marc Woolward, CTO at vARMOUR Recorded: Mar 15 2017 61 mins
    Enterprise IT is transforming rapidly and the evolution to container-structured applications is an important element of this transformation. From the container’s humble origins as a method to virtualize UNIX operating systems to provide process separation with high levels of efficiency, it has become the preferred method for building and deploying modern software into cloud environments.

    Containers are foundational to propelling agility in the enterprise - they are dynamic in nature, support increasing computing densities, have data residency and data provenance for governance and present challenges and opportunities for security in this new world with DevSecOps.

    Please join Peter Christy, Research Director of 451 Research and Marc Woolward, CTO at vArmour as they discuss all things containers along with a look at vArmour’s container strategy, solution and latest patent on container security.
  • Outsmarting Ransomware with Arcserve Outsmarting Ransomware with Arcserve Kervin Myrtil and Gary Sussman Recorded: Mar 15 2017 47 mins
    Ransomware is a growing threat to your business, and the consequences of an attack could be devastating — from critical data loss and business downtime to lost revenue and damage to your reputation.

    Relentlessly protect your data from ransomware!
  • Eliminating Storage Bottlenecks for Advanced Apps & High Performance Computing Eliminating Storage Bottlenecks for Advanced Apps & High Performance Computing Brian Schwarz, Director, Product Management, Pure Storage Recorded: Mar 15 2017 30 mins
    In the age of applications where design, simulation, visualization and interpretation can all be performed digitally on high-powered servers and networks, eliminating the big data storage bottleneck has become imperative for high performance computing users.

    What’s needed is a new, innovative storage architecture to support advanced applications while providing best-of-breed performance in all dimensions of concurrency – including IOPS, throughput, latency, and capacity – while offering breakthrough levels of density. A flash storage solution with an elastic scale-out system can deliver all-flash performance to petabyte-scale data sets, ideal for big data analytics.

    Join this webcast for a technical deep-dive into why storage is becoming increasingly important in the age of applications, big data, and HPC.
  • SPAR V8 New Bumpers SPAR V8 New Bumpers Andreas Kranabitl – CIO, SPAR-AG Recorded: Mar 14 2017 5 mins
    SPAR, one of Austria’s major grocery retailers, runs their own IT operations, SPAR ICS. This allows SPAR to forecast future prospects of trade with data processed in real time and failure of systems would create gridlock for the company. With Hitachi Converged Solutions, powered by Intel, SPAR is able to manage their real time data analytics in massive volume.

    Learn how SPAR, in partnership with Hitachi Data Systems, has transformed their business model to deliver maximum performance, scalability and availability on a new and improved integrated hardware platform utilizing Hitachi UCP for SAPHANA.
  • How to Keep Linux Safe From Dirty COW Vulnerabilities How to Keep Linux Safe From Dirty COW Vulnerabilities Scott McCarty & Hugo Rivero Recorded: Mar 14 2017 28 mins
    Containers help you build and package applications with all of their dependencies, which allows you to deploy at scale very quickly. But, what happens when you deploy at scale and one of the dependencies has an exploit embedded in it? Since exploits can also be deployed at scale, you need to build with trusted images. The Red Hat® Container Catalog provides the perfect place to get these trusted images from Red Hat.

    Join this session to learn:
    -How the new Red Hat Container Catalog can help you build your container images.
    -How architectural and security information provided by Red Hat sets us apart.
    -Why ISVs consider Red Hat a trusted partner in the journey to containerized applications.
    -How to protect your organization from security exploits and deploy safe containers.safely

    Don't let the Dirty COW (copy-on-write) contaminate your milk!
  • Tech Talk: Improving App Performance Across All WAN Transports Tech Talk: Improving App Performance Across All WAN Transports Derek Granath and Chris Rogers Recorded: Mar 14 2017 48 mins
    Increase the performance of your wide area network and worker productivity with key features that allow you to condition your connectivity, bond different links together to improve application performance, and define QoS profiles based on business policies to ensure that receive the priority, performance and availability they require.
  • Get Powerful Threat Detection for the Cloud Get Powerful Threat Detection for the Cloud Danielle Russell, Sr. Product Marketing Manager Recorded: Mar 14 2017 48 mins
    Cloud computing promises advantages such as lower IT cost, increased agility and better support of business functions. However, cloud security concerns continue to top the list of barriers to cloud adoption.

    AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. USM Anywhere extends our award-winning approach to threat detection, Unified Security Management (USM), to the cloud. Whether you are looking to secure your AWS & Azure cloud environments, hybrid cloud or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.

    Viewers will learn how easy is to:
    - Discover all assets across your AWS, Azure and on-premises environments
    - Scan for vulnerabilities across cloud-based and physical assets
    - Detect emerging threats with real-time, integrated threat intelligence
    - Monitor asset logs including Azure Insights, AWS CloudTrail, S3 and ELB
    - Respond quickly to incidents & conduct thorough investigations

    About the Presenter:

    Danielle is a Senior Product Marketing Manager at AlienVault, responsible for product messaging and positioning, go-to-market strategy, and sales enablement. Prior to AlienVault, Danielle held a marketing leadership position with an IT software company in the telecommunications industry. Danielle earned a B.S. Life Sciences Communication from the University of Wisconsin.
  • "The Wire Can’t Lie" - Empowered by Solarflare’s New SolarCapture Product Range "The Wire Can’t Lie" - Empowered by Solarflare’s New SolarCapture Product Range Ramzi Zabaneh Recorded: Mar 14 2017 43 mins
    “The Wire Can’t Lie”: From packet data to network management wisdom, empowered by Solarflare’s new SolarCapture product range

    This webinar will cover:
    - Consolidated network monitoring can be used to rapidly identify, isolate and solve application and business problems in finance, service provider and government networks, with typical use cases

    - Both ROI and flexibility can be optimized through the powerful feature set of the new SolarCapture turnkey solution, with 40 GbE lossless-to-disk packet capture provided in an open platform

    - SolarCapture is special, key products, functionality and options in the SolarCapture family, as well as details on upcoming product features