When a hardware platform is certified, the hardware and the Linux OS are validated for compatibility in key areas where the hardware and OS interact or “touch” one another. Some of these touch area’s include: system firmware, boot, storage, network, crash capture, power management and new processor features. In this presentation we will dive into some of these areas, discuss why certification is crucial today and is actually becoming more critical every year.Read more >
- BrightTALK at CRESTCON & IISP Congress -
BrightTALK caught up with Titania's Ian Whiting for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- How to run a comprehensive pentest to protect your business
- How to get the most from your cyber security budget
- AI & Machine learning and the influence it'll have on the security industry
- The explosion of connected devices on the IoT and where networks are especially vulnerable
Bank Marketing Research Findings. 2017 Most Powerful Banking Brand in Wholesale BankingRead more >
Gartner lists security as one of its top wide area networking concerns—and for good reason: with security breaches on the rise, enterprises must work progressively harder to adequately protect customer data and intellectual property. Most organizations are already engaged with best-of-breed security technologies, but concerns persist about how seamlessly all these solutions work within a WAN to provide reliable, secure, and agile branch connectivity.
This webinar discusses how a Cloud-Delivered SD-WAN—together with its comprehensive security technology ecosystem, including solutions from Fortinet, Palo Alto Networks, Zscaler, IBM, and others—helps enterprises across all industries protect critical corporate assets with best-of-breed branch, data center, and cloud security.
Join this webinar to learn:
* Enterprise network security trends
* Advantages of a scalable SD-WAN architecture for securing your WAN
* How to meet and exceed cloud application user requirements without compromising security
* See a live demo showing Cloud-Delivered SD-WAN interoperability with leading WAN security solutions
The Internet of Things (IoT) has steamrolled its way into businesses around the world, presenting itself as a golden opportunity for creating value and generating new revenue streams.
Of all the new types of data that have been unleashed onto organisations by the IoT, time series data – data created with a timestamp – is the most significant.
Time series data makes it possible to identify patterns and forecast trends in ways that create significant competitive advantages for businesses. Both speed and scale are integral, which is a unique challenge for enterprise databases.
In a webinar hosted by Information Age and Basho, learn how to get the most out of the Internet of Things. The webinar will discuss:
• What is time series data and the market dynamics driving changes in data – time series data is fast becoming the largest-growing data type in the IoT universe.
• How to deliver the high performance required for time series data and its huge number of data sources
• Best practices and real IoT practical examples on how to structure and leverage data for success
• Annard Brouwer, Senior Software Architect at Intellicore Services, will discuss how they are using Time Series data to drive customer and fan engagement through their Sports Data Platform for the likes of the National Rugby League (NRL), FIA Formula E Championship and Wembley Stadium.
Our security experts will take you through WAF setup for policy and exceptions, profile review, and plugin rules to get the most of your WAF investment. They will cover 3 core topics of tuning a WAF:
-Alert exception for false positive reduction
-Profile maintenance for accuracy and efficiency (UBA)
-Plugins for Dynamic Applications and Profile Tuning
Privileged accounts can be some of the most serious threats your company can face. As more and more processes are digitalized and activities externalized, the number of accounts accessing critical and strategic information escalates, extending the cyber threat across continents. Meanwhile, companies and individuals are becoming increasingly aware that any data or server can be accessed with the right privileges; it is therefore imperative to know who accesses critical resources, as well as when and why they do so to avoid any leak. By monitoring the users holding the keys to the kingdom - the privileged users, we are able to know what exactly happened on a system at any given time and how. Whether malicious or negligent, incidents caused by internal or external threats can be avoided quickly if visibility over the IS is restored. Session monitoring and recording dissuades malicious or negligent users while offering real-time alerts, traceability, and post-mortem analysis. Discover how some of the most dramatic cyberattacks to date could have been prevented had there been a Privileged Access Management solution in place to protect and secure target systems.Read more >
One of the most valuable capabilities of OSSIM is the ability to define policies to tune event processing and trigger actions based on certain types of events. This special user training webcast will walk you through how to use policies and actions to:
Filter unnecessary events and false positives
Trigger e-mail notifications for critical events
Improve performance of OSSIM
Turn security policies into security practice
Demand generation is getting ever harder and more complicated across multiple channels, so what's a business to do?
In this session we outline the most important steps to success in Demand Generation in 2017, based on the latest case studies. We will look across multiple channels including:
- Email marketing and eCRM
- Maximising for mobile
- Personalisation across channels
- Influencer outreach and experiential
Participants will walk away with a clear understanding of these key steps to take across their most relevant channels.
Listen to our interview at Big Data LDN with Sean Jackson, CMO at EXASOL AG.
Sean will give an overview of how you can get the most out of your data -- from cloud-based analytics to data visualization, Sean will break down the challenges you face in your quest to become a data-driven professional.
Cooling is one of the most discussed elements in the data center. Most of the time these discussions are about big projects with not quite as big return. In this webinar, Jose Ruiz, Compass Datacenters’ VP of Engineering, will discuss the little things that you may be overlooking that can have a big impact on your cooling effectivenessRead more >
DDoS Strike recently released the “State of DDoS Mitigation” report, with findings based on authorized DDoS tests on numerous companies in the telecom, tech, financial, and entertainment sectors. Despite having enterprise-level DDoS mitigation technology in place, virtually all of the targets were compromised, revealing common vulnerabilities and oversights in DDoS defenses.
Major findings included:
95% of targets experienced service degradation
78% of targets were unable to mitigate an attack
70% of targets needed non-technical improvements (people and process)
95% of targets needed rate limit tuning
Application layer attacks were the most successful and caused the longest downtime
Average bandwidth to cause downtime was only 4.3 GB/s
While problems were pervasive, the vast majority were fixable, and arose from misunderstandings about the nature of DDoS attacks and how to use DDoS mitigation technology and techniques.
In this webinar, DDoS Strike Vice President Sahba Kazerooni will dig into the report and explain how and why so many DDoS defences fail. Then he’ll explain what businesses can do to catch up and be ready when hit with a real DDoS attack.
Search engine marketing (also known as paid search) allows you to target potential customers at the moment they're searching for a business just like yours. But if you want to make the most of your SEM campaign, you'll need to learn some tricks first. Attend this Manta Trends webinar to learn how to get the most bang for your SEM buck.Read more >
There are a number of security-related questions that come up often in our conversations with clients and industry professionals. We have invited the Avaleris VP, IT Security & Emerging Technologies and three leading security experts from Microsoft to answer these questions and discuss the most pressing identity-driven security issues faced in the industry today. In this panel webinar, hear from Patrick Arnold, Senior Global Director - Enterprise Cybersecurity Group at Microsoft, Patrick Huff, Senior Director, Advanced Service Delivery at Microsoft, and Alex Weinert, Group Program Manager at Microsoft, on issues such as: “If Microsoft gets attacked, what happens to my cloud security products?” and “What is the best way to protect against cyber espionage?”. All attendees are invited to submit their own security questions in advance of the panel and during the live session.Read more >
Peter Strohkorb talks about why Smarketing® is important to business performance,the 7 most common mistakes in Sales & Marketing Alignment, and how to avoid them.Read more >