Hi [[ session.user.profile.firstName ]]
Sort by:
    • Tame the Beast: Rapidly Build, Deploy, Reuse, and Govern Microservices
      Tame the Beast: Rapidly Build, Deploy, Reuse, and Govern Microservices Kamala Dasika, Pivotal, Sandeep Singh Kohli, Mulesoft and Jesus De Oliveira, Mulesoft Recorded: Sep 19 2017 6:00 pm UTC 52 mins
    • Microservice architectures enable development teams to bring new features and updates to market faster. But enterprises adopting microservices also experience common challenges like service redundancy, duplication, and not being able to connect to existing databases and SaaS tools easily. With an increasing number of services across the organization, visibility and governance become even more critical for IT.

      In this webinar, we will cover how Pivotal and Mulesoft are addressing these challenges with a modern application development and operations environment so that application developers can remain focused on generating value for customers, and operators can deploy, monitor, and scale their apps faster.

      Topics include how you can:

      * Rapidly build and deliver scalable, resilient microservices and applications implementing distributed system patterns

      * Easily catalogue, discover, and consume your microservices

      * Quickly connect your microservices to legacy or SaaS applications

      * Analyze API metrics and manage appropriate policies to govern interaction patterns across the services/APIs landscape

      Read more >
    • Addressing The Security Challenges of the Cloud Generation
      Addressing The Security Challenges of the Cloud Generation Gerry Grealish, Head of Product Marketing, Network and Cloud Security Products Upcoming: Oct 24 2017 4:00 pm UTC 45 mins
    • Welcome to the Cloud Generation, where employees demand flexibility and access wherever they are, but can expose your most sensitive data to risk.

      Distributed environments—like mobile and distributed workforces—introduce new attack surfaces that must be protected and increased use of SaaS Cloud Apps are driving the need for new compliance and security controls. The result? Security and IT teams are being forced to rethink network designs to better answer questions like:

      - How do we effectively govern access to data, apps and systems?

      - How can we combat advanced threats targeting our business through the web, cloud and e-mail?

      - How should we secure information that is moving between our network, endpoints and the cloud?

      Join Gerry as he discusses the key Cloud Generation security challenges facing Symantec’s enterprise customers and learn how Symantec’s Cloud-delivered security solutions can be used to protect users, devices and corporate data, wherever it resides.

      Read more >
    • Solving for compliance: Mobile app security for banking and financial services
      Solving for compliance: Mobile app security for banking and financial services Brian Lawrence, NowSecure Security Solutions Engineer Recorded: Aug 22 2017 6:00 pm UTC 29 mins
    • Mobile apps fall in scope for a number of regulatory requirements that govern the banking and financial services industries, such as: guidelines from the Federal Financial Institutions Examination Council (FFIEC), the Gramm–Leach–Bliley Act (GLBA), New York State cybersecurity requirements for financial services companies, the Payment Card Industry Data Security Standard (PCI DSS), the Sarbanes-Oxley Act, and more. Luckily, a repeatable mobile app security assessment program and standardized reporting go a long way in both achieving compliance objectives and securing mobile apps and data.

      Join us for a 30-minute webinar during which NowSecure Security Solutions Engineer Brian Lawrence will explain:
      -- How and where exactly mobile apps fall in scope for various compliance regimes
      -- Mobile app security issues financial institutions must identify and fix for compliance purposes
      -- How assessment reports can be used to demonstrate due diligence

      Read more >
    • How to Optimize Cloud App Performance
      How to Optimize Cloud App Performance Rohan Naggi, Technical Marketing Manager Recorded: May 2 2017 5:00 pm UTC 49 mins
    • Cloud-Delivered SD-WAN provides enterprises with enhanced application performance by leveraging secure end-to-end SD-WAN overlay tunnels, enabling direct traffic routing to applications hosted in the cloud or a data center, tightly integrating mobile and wired access media, and monitoring network conditions in real-time to govern forwarding decisions that ensure optimal application response time.

      In this webinar you will learn:
      - How to leverage cloud-delivered gateways to enhance application performance and security
      - How cloud applications gain increased performance on mobile devices with an SD-WAN
      - How to monitor and measure the performance of cloud applications

      Read more >
    • Extending Classification to Protect Sensitive Data in the Cloud
      Extending Classification to Protect Sensitive Data in the Cloud 451 Research and TITUS Recorded: Jul 7 2017 6:10 pm UTC 58 mins
    • As organizations look to embrace the benefits of cloud collaboration, defining the sensitivity of information is critical. The combination of TITUS Classification and Netskope’s cloud access security broker (CASB) solutions enables enterprises to embrace the cloud while ensuring sensitive information is protected.

      Listen to 451 Research, Netskope and TITUS and discover how to:

      1) Increase security awareness and accountability
      2) Control and govern cloud usage
      3) Distinguish between personal and enterprise app instances
      4) Protect sensitive data in the cloud
      5) Improve insider threat detection and response
      6) Protect against cloud-borne malware, including ransomware

      Read more >
    • The Next Frontier for Cloud Security
      The Next Frontier for Cloud Security Mr Rehan Jalil, SVP & GM, Cloud Security, Symantec Recorded: Aug 29 2017 5:00 am UTC 60 mins
    • Welcome to the Cloud Generation – where critical data, applications and infrastructure are shifting to the cloud for increased operational efficiency.

      Employees today are accessing everything from everywhere, sensitive data is constantly on the move, and critical workloads are running on a cloud server, somewhere in the world. How do you manage and contain the huge increase in vulnerabilities caused by moving beyond traditional IT controls?

      In our upcoming ‘The Next Frontier for Cloud Security’ webinar, we discuss how to:

      • Govern access to data, apps, and systems that may reside in the cloud
      • Secure information no matter where it sits or goes
      • Protect against advanced threats in this new environment
      • Minimise risk and ensure compliance as workloads move to the cloud

      Join our webinar and discover how Symantec’s Integrated Cyber Defense Platform protects your users, information, and workloads in the Cloud Generation.

      Read more >
    • MDM Reimagined: Compliance and Intelligent Disruption Despite Complexity
      MDM Reimagined: Compliance and Intelligent Disruption Despite Complexity Mark Hankins, Director, Enterprise Architecture Archer Daniels Midland Company; Andy Joss, Informatica Recorded: Sep 28 2017 4:00 pm UTC 52 mins
    • Are your data governance efforts delivering real business outcomes? Are you prepared for new regulations, such as GDPR?

      Data-driven disruptors understand that unleashing data assets to power any business outcome is tied to Data Governance. Data governance and intelligent disruption go hand-in-hand. That’s because disruptive change mandates that data is accessible, trusted, and secure. Ad-hoc and tactical approaches only add complexity and cost with minimal business value.

      Join this track to learn from data experts who will help you to prepare for your own data-driven digital transformation. You’ll hear:

      • Why you need a foundation to ensure collaborative, trusted and scalable data governance that meets changing regulatory requirements, including how to support your GDPR journey.
      • How to operationalize core data governance processes that enable an effective holistic data governance competency that drives tangible business value for your organization.
      • About the tools to manage and govern your data effectively and enable people, policies, and processes that truly makes it possible for your data to become a strategic business asset.

      Read more >
    • 5 Best Practices for Governing Your Content in the Cloud
      5 Best Practices for Governing Your Content in the Cloud Paul Falor, CIO & VP of Strategic Alliances, North Highland Company & Josh Rosenberg, Sr. PMM, Information Governance, Box Recorded: Jul 19 2017 6:00 pm UTC 46 mins
    • The way we work as an organization is no longer changing.  It has already changed.  People access content from all kinds of devices, across different locations.  Business content is being created and viewed both inside and outside of your organization.  But how do you effectively protect the way it's shared and managed while meeting your compliance needs?  Especially as every business is under increasing scrutiny in the face of new regulations, like GDPR, and constantly evolving security threats. 
       
      Join Paul Falor, Chief Information Officer & Head of Strategic Alliances, North Highland and Josh Rosenberg, Sr. PMM Information Governance, Box to see how your organization can effectively govern content while keeping its people productive.  
       
      Learn about:
      ·  Key considerations for a cloud-first data governance strategy
      ·  Leveraging the big 3 of Information Governance (Retention, Defensible Discovery, and Security Classification) to reduce business risk
      ·  How to use SaaS technology to empower your users while effectively governing their content

      Read more >