Eileen Kelly, Dig Your Garden Landscape Design, will discuss a variety of landscape design alternatives to replace or minimize the traditional lawn such as no-mow grasses, hardscape materials (gravel, decomposed granite, natural stone, boulders, mulch, and sculpture), and eco-friendly strategies such as “sheet mulching” to quickly eradicate the lawn.
For over ten years, East Bay Municipal Utility District has offered rebates for converting ornamental lawn to sustainable landscaping. Hear Michael Hazinski provide a water utility perspective on the trends in consumer acceptance of sustainable landscaping and a comprehensive approach to implementing landscape water conservation incentives.
Jodie Sheffield, Sod Development Expert from Delta Bluegrass Company will introduce you to their water saving California Native Sod products. The presentation and discussion will focus on: how to choose the right native sod for your project, water wise irrigation management, and how to maintain native sod.
Learn how the new features of Landscape, Ubuntu's premier systems management tool, can help your enterprise manage Ubuntu deployments at scale.
This new version of Landscape introduces key features such as Role Based Access Control, Bare Metal Provisioning, a complete API along with other tools and reporting capabilities aimed at giving you total operational awareness.
This channelcast will provide comprehensive insight into how Landscape's enterprise systems management and regulatory compliance functionality can help an organization tame complexity. Our special guest is Dave Russell, who heads Global Pre-sales at Canonical, joined by Federico Lucifredi, Landscape and Ubuntu Advantage product manager.
The ever-changing cyber threat landscape requires better security practices to assess, detect and block threats to applications and other workloads. Many regulations, such as PCI, HIPAA and the upcoming European GDPR also require accurate and timely detection of threats and compromise. So how can you keep pace with a threat target that is constantly moving?
In this session, Misha Govshteyn, SVP of Product Management and Founder at Alert Logic provides insight on the latest web application security threats, the role of threat intelligence, security technologies, machine learning and security experts.
Tis the season of predictions looking ahead to 2017 and paying lip service to the threat landscape. Not a fan of either of those? You’re not alone. Join FireEye in this BrightTalk webinar where we’ll discuss more than just the threats that may or may not be awaiting us in 2017. We’ll discuss real attacker tactics and techniques, along with how you can actually counter the risk they present.Read more >
When working with state and governmental agencies, it can be tough to navigate the communications divide. With ever-changing requirements and fast-paced IT landscapes, how do you keep up with your organization's demands and streamline your communications? Join this webinar to hear how MHM Services, a mental health expert, tackles the ever-changing requirements and IT landscape to deliver the highest level customer service. See how 8x8’s unified communications help alleviate headaches and enable MHM to connect with over 6,000 clinical, managerial and administrative professionals nationwide.Read more >
The security paradigm for nearly two decades has been to increasingly invest in technology. These solutions have not only failed to solve the problem but have made the challenge more complex. Even if true threats are detected, they are lost in a sea of alerts and lack the context to prioritize and build response. This security posture is only exacerbated by the skills deficit currently facing the industry.
In this webinar, we look at the emergence of a new security-as-a-service paradigm and the capabilities required to help organizations reduce risk and time to protection. The discussion will cover how the cost, specialization and complexity of cyber defense have positioned security to follow other markets in adopting an “as-a-service” paradigm.
We will also address the capabilities that define an ideal security-as-a-service partner such as:
•the availability of security expertise
•a broad intelligence capability and
•flexible deployment options
Not only does this approach improve a security posture and reduce risk but it does so with a lower total cost of ownership (TCO). Register today to learn more about this emerging security-as-a-service model.
The FireEye Team
Adding a practical and in-depth view on individual channels to a holistic view on pharma’s communication landscape.
Key topics include:
•reach, frequency, impact
•do’s and don’ts
•preferred content, preferred format
•company performance in key channels
Enterprise storage is alive and well, however there are many changes occurring both in technology along with usage and applications scenarios. There are many different application and workload usage scenarios with various performance, availability, capacity and economic considerations, likewise there are various technology options. These options range from local on-site traditional enterprise-class storage systems to mid-range along with software defined across commodity and vendor proprietary hardware.
Some of these solutions are evolution, some may even be revolutionary, however they all fit into supporting technolutionary enterprise storage needs. This webinar will look at the current landscape options for enterprise storage along with what to use when or where for different applications requirements.
- Hardware and software defined storage and software defined storage management
- Cloud, Virtual and Physical storage for various applications and workloads
- Performance, Availability, Capacity and Economics along with management
- Metrics that matter including relevant benchmarks and marketecture
- Flash SSD, SSHD and HDD as part of a tiered storage environment
- Networking with your servers and storage
- Various industry trends and directions
The underground cybercrime marketplace is now a well-organised machine that follows the level of business processes you would expect from a legitimate industry. Cybercrime has evolved into a nexus of highly-organised actors, each with a dedicated function to perform, with each individual fulfilling a specific role to propel the mission of cybercrime forward.
In this short 30-minute on-demand webcast, the final instalment of the four-part SecureWorks Threat Intelligence Spotlight Series, Pallav Khandar, Senior Researcher with the SecureWorks Counter Threat Unit (CTU), looks at how the cybercrime landscape has evolved over the past 12 months.
Key topics include:
- Botnet prevalence
- Industry and geo targeting
- Distribution vectors
- New attack vectors
- The rise of ransomware
We're seeing a massive shift in cyber security activity from internal threats to organised gangs and targeted state sponsored activities. Recent news items suggest there is an overwhelming need for organisations to understand their "Situational Awareness".
In this webinar, (ISC)² and IBM will explore what to expect in 2016, focusing on the following key questions:
- How do organisations understand what threats are real?
- How much risk appetite do boards have in this complex, mobile, interconnected near real-time world?
- As more and more devices are connecting to an ever-increasing number of communication channels, how do you ensure you can protect, prevent and respond to cyber security issues, yet provide a transparent easy to use multi-channel experience?
Adrian Davis, Managing Director (ISC)² EMEA
Peter Jopling, Executive Security Advisor, Deputy WW Tiger Team Leader, IBM
Simon Moores, Information Security Futurist
The process of buying life insurance and receiving post-issue service is becoming increasingly digitized – driven by customer expectations for convenience and ease. Electronic signatures are enabling this digital transformation.
In response to the accelerated adoption, Celent recently published the report, “Putting a Lock On Straight-Through Processing – Life Insurance E-Signature Vendors 2017”. The research aimed to answer the questions: “how is e-signature technology transforming the life insurance customer experience”; “who are the main vendors?”; and “what are the common components of a solution?”.
The answers to these questions are shared in this on-demand webcast, hosted by LOMA. Watch it to learn what to look for in a solution, hear an update on how the vendor landscape has changed and takeaway these highlights:
Top e-signature solution requirements
How to evaluate and differentiate vendors
Perceived and real obstacles to continued adoption
E-Signature Case Studies in Life Insurance
- Colleen Risk, Senior Analyst - Celent
- Andrea Masterton, Director Corporate Marketing - eSignLive by VASCO
As the most recent outbreak of ransomware has proven once again, a debilitating attack can come from anywhere, with any sort of malware, and have a global impact. While headlines and marketing statements constantly shout “Zero Day”, even old malware can be used effectively to wreak havoc in a network if it’s not properly configured and up to date.
The threat landscape never stops evolving and neither should an enterprise’s cyber security strategy. New products, new features and efficient source of threat intelligence are just some of the tools that an enterprise should look for from their security vendors.
This session will look at the evolution of Advanced Threat Protection and how continuous development across the full range of technologies is crucial to maintaining security efficacy.
In this webcast, Derek Manky, Global Security Strategist, highlights the main findings from the FortiGuard Threat Landscape Report and discusses their implication for Enterprise Security Leaders.
This report identifies the threats and trends IT security professionals, from CISO to Security Operations, should be most prepared to address. It draws from the FortiGuard Labs’ vast array of network devices and sensors within production devices, comprising billions of events and incidents observed in live production environments around the world between January 1 and March 31, 2017.
Every year Secunia releases a review of the vulnerability landscape, based on its vulnerability research and data from its Personal Software Inspector (PSI) user base.
The data in this research helps security professionals around the globe make sense of the evolution of the threat landscape and the trends throughout the year.
In this webinar, Secunia’s CTO, Morten Stengaard and Head of Research, Kasper Lindgaard, will interpret the data presented in the Secunia Vulnerability Review 2014 and answer questions. The review will be released on 26th February at 20:00 CET.
Before 26th February, you can pre-register to receive a copy of the review as soon as it is released, at:
-The number of vulnerabilities and zero-days detected in 2013
-The security state of browsers and PDF readers
-How quick vendors are to respond to vulnerabilities
-Which programs are more vulnerable
The education landscape is shifting - digital transformation is not just confined to technology firms or IT teams any longer. Microsoft’s cloud platform enables on-demand and live streaming video solutions for your educational institution’s needs.
From student video portals to live streaming of lectures to keyword searches within a large university video library, Azure Media Services (AMS) and our ecosystem of technology partners can help transform learning.
Join this webcast to:
- Discover how global education institutions are leveraging media services today
- See how AMS is being used for distance/online learning, streaming lectures/live courses, campus safety, and school video portals, among other uses
- Explore how AMS can be deployed at your institution
In today's rapidly changing landscape of Virtual Reality, it can be difficult to stay on top of the plethora of technologies and use-cases for this emerging market. Joseph Radak, Course Developer at Udacity and Co-Founder of Eerie Bear Games, will share his insights on how to stay relevant in the world of VR and keep up with consumer demand - not just in gaming, but in other industries like mobile, technology, media, healthcare and more. Joseph will share trends on VR consumption, up-skilling your existing workforce for VR, and finding the right talent that will help your company excel in the rapidly changing landscape of VR.Read more >
The CRISPR IP landscape in Europe is very murky. Listeners will gain an understanding of the current situation, which will aid them to make licensing decisions if and when they intend to commercialise. This 45-minute webinar will provide an up to date analysis of the current state of play in Europe with comparison to the state of play in the US.Read more >