Hi [[ session.user.profile.firstName ]]
Sort by:
    • Building the Digital Government of the Future in a Secure Cloud
      Building the Digital Government of the Future in a Secure Cloud eSignLive | Nintex | Drawloop Upcoming: Mar 2 2017 7:00 pm UTC 60 mins
    • In this webcast, our panel of experts will discuss the benefits of using a secure FedRAMP compliant cloud and how to fulfill the government’s paperless and “cloud-first” mandate securely and with confidence – while giving your employees and citizens the digital government they want.

      We will cover:
      • The top digital use cases in government for integrated workflow and e-signatures
      • How FedRAMP compliance provides a standardized security approach for cloud services and benefits of using FedRAMP compliant solutions together to offer next-generation solutions
      • Demonstration of digital HR Recruiting application using CRM, Workflow and e-signature FEDRAMP technologies
      • Best Practices/Considerations for getting started

      Read more >
    • Delivering Applications in Hybrid and Multi-Cloud Environments
      Delivering Applications in Hybrid and Multi-Cloud Environments Ashish Shah Recorded: Nov 17 2016 5:00 pm UTC 37 mins
    • Enterprises are increasingly adopting hybrid and multi-cloud computing strategies to speed up application rollouts, gain operational and cost benefits, and improve business agility. According to RightScale’s “Cloud Computing Trends: 2016 State of the Cloud” survey and report, hybrid cloud adoption increased from 58% to 77% year-over-year. 17% of enterprises now have more than 1000 VMs in the public cloud, up from 13% in 2015. This of course means that businesses need to consider application services that work across data centers and multiple cloud environments.

      Join Avi Networks for a webinar to learn how to:

      -Deliver consistent load balancing and application services across cloud environments
      -Leverage the power of hybrid clouds, elastic on-demand scaling, and cloud bursting
      -Troubleshoot application issues in mere minutes with pinpoint analytics
      -Reduce the risk of cloud vendor lock in

      In just 40 minutes, you will learn how next-gen load balancing architectures can play an expanded role in delivering and scaling your applications across clouds, providing performance insights, and automating application services.

      Read more >
    • Baking Security into Digital and Cloud Initiatives: Infor’s Journey
      Baking Security into Digital and Cloud Initiatives: Infor’s Journey Mark Bloom Director, Product Marketing Sumo Logic & Jim Hoover CISO Infor Recorded: Dec 2 2016 5:35 pm UTC 47 mins
    • Continuous innovation and speed to market are mandating dynamic paradigm shifts in how companies conceive, develop and implement IT operations and security strategies. Digital enterprises are migrating mission-critical workloads to the cloud and leveraging advanced AWS infrastructure to reap the benefits of agile development and competitive advantage. However, a lack of real-time visibility inhibits robust and consistent “cloud-first” security strategy… and keeps business executives awake at night.

      In today’s evolving market, advice from the experts is the best way to go! Infor Global Solutions has a long history of building, running and securing workloads in the AWS cloud. Listen in on this interactive discussion in which Mark Bloom of Sumo Logic will be joined by the security experts at Infor – Jim Hoover, CISO, Jim Plourde, VP Cloud Hosting and Durga Dash, Dir. Cloud Operations. We will be covering:

      Expert tips and lessons on the journey to the cloud
      How did the approach to security and operations change from DC to public cloud
      How to extract operational and security visibility from your security stack in AWS
      How the move to the cloud changed the interactions / dynamics between security and applications teams

      Read more >
    • Discover the Spin-Merge Benefits to our ITOM Software Portfolio
      Discover the Spin-Merge Benefits to our ITOM Software Portfolio Chris Hsu, EVP, GM & COO, Tony Sumpster, SVP & GM ITOM, Roy Ritthaler, VP, Product Marketing, ITOM Recorded: Nov 3 2016 5:00 pm UTC 61 mins
    • On September 7, Hewlett Packard Enterprise announced plans for a spin-off and merger of our Software business unit with Micro Focus, a global software company dedicated to delivering and supporting enterprise software solutions. The combination of HPE’s software assets with Micro Focus will create one of the world’s largest pure-play enterprise software companies. We will remain focused on helping you get the most out of the software that runs your business.

      Join the HPE IT Operations Management Executive team to hear firsthand about the recently announced HPE Software and Micro Focus spin-merge. What does it mean for us, what does it mean for you, and most importantly how it strengthens HPE’s ability to help transform traditional IT environment into a digital enterprise with automation, orchestration and ultimately, transformation solutions. Hear about the ITOM strategy and commitments to the roadmap including upcoming. These solutions help IT organizations automate tasks to drive efficiency across the virtualized data center, orchestrate processes with speed and agility to evolve to a “cloud inspired” IT service model, and transform the support & delivery of services to modernize the customer experience, leveraging the full power of the hybrid cloud
      Bring your questions and join us on this new journey to success.

      Read more >
    • Malware Attack "Fan-out" Effect in the Cloud
      Malware Attack "Fan-out" Effect in the Cloud Krishna Narayanaswamy, Founder and Chief Scientist, Netskope Recorded: Jun 21 2016 5:00 pm UTC 60 mins
    • The rapid rise in cloud adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

      Join Krishna Narayanaswamy, Founder and Chief Scientist of cloud security company Netskope, as he takes an in-depth look at data breaches involving cloud services and how they come about. Krishna will take a fun, CSI-like presentation approach and draw upon unique, anonymized data seen in the cloud to illustrate:

      - The multiplier effect that that the cloud can have on the probability of a data breach
      - Three real-world examples in which the cloud can play a role in data breaches, including a step-by-step review of a recent exploit found in a cloud storage app
      - How to identify data breaches in an enterprise cloud environment using advanced anomaly detection techniques
      - A forensic walk-through in the reconstruction of a complex audit following a data breach
      - Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud

      Read more >
    • Risky Business: Key Cloud Security Metrics your Board Needs to See
      Risky Business: Key Cloud Security Metrics your Board Needs to See Srini Gurrapu, Skyhigh Networks Recorded: May 10 2016 5:00 pm UTC 55 mins
    • A recent study by Ponemon showed that the likelihood of an enterprise data breach of involving more than 10,000 records is approximately 22%. This risk, with an average associated cost of $3.79 million, has catapulted cloud security into an executive and board level.

      What key metrics should you track and share with your board? How should you structure your cloud security strategy to best protect your organization?

      Join Skyhigh Networks and CSA for a discussion of best practices that leading enterprises have embraced for managing and communicating cloud risk with the board.

      In this session, you’ll learn how to: 

      • Develop a comprehensive cloud security and governance framework 
      • Map your organization’s maturity based on current practices
      • Identify key business outcomes across the 4 pillars of cloud security 
      • Implement best practices for presenting cloud security metrics to the board

      Registrants will also receive a “Cloud Security and Governance Report for Executives and the Board” template to jump start the discussion. We look forward to seeing you at the webinar!

      Read more >
    • Safely Enabling the Cloud in a World of Malware and Data Breaches
      Safely Enabling the Cloud in a World of Malware and Data Breaches Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope Recorded: Apr 12 2016 5:00 pm UTC 61 mins
    • Cloud adoption is quickly becoming a must-have for enterprises, as organizations clamor to exploit the cost savings and increase in collaboration and productivity that are now established benefits of many cloud apps But at the same time, this rise in adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

      Attend this webinar with Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope for a spirited discussion that will explore the following:

      - Trends in the market related to cloud adoption and the steps being taken to address security concerns;
      - How to securely enable the use of cloud services for enterprise employees;
      - A “how to” for identifying data breaches in an enterprise cloud environment using advanced anomaly detection techniques;
      - Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud.

      Read more >