Hi [[ session.user.profile.firstName ]]
Sort by:
    • How to Leverage New Technologies in Today's Digital World How to Leverage New Technologies in Today's Digital World Herbert Quinde- Industry Sales Microsoft, Dux Raymond Sy- CTO AvePoint, Tricia Morris- Sr Product Marketing Manager Microsoft Upcoming: Oct 28 2016 8:00 pm UTC 60 mins
    • Is government really broken? Or do we simply need a more responsive government?

      In our fast-paced, customer-centric world, the public has grown accustomed to having their needs met on their own terms and on their own time. When it comes to customer engagement, the private sector has set the bar high. Citizens expect the same experience with their government. In order to improve services and gain an edge in today’s digital world, public agencies need to leverage technologies that enable new digital service models and more effectively engage the public. Technology trends such as cloud, mobile, social media, and the Internet of Things (IoT) present opportunities for innovation that will help bridge the gap between the citizen-facing organization’s mission and the public’s needs. Microsoft Dynamics empowers government employees to engage with constituents in a more agile manner and optimize city operations and infrastructure in an innovative and adaptable way.

      Join this webcast to learn how to:

      Understand what digital transformation of citizen services means, including engagement with citizens, empowerment of city employees, optimization of city operations and infrastructure
      Perceive the value of technology in improving citizen services, including efficient resolution of citizen issues, reduced cost of citizen service delivery, accelerated economic development, quality of life improvements, and ranking
      Gain insight into the rich technology options available, including cloud, mobile, digital customer service, constituent data privacy

      Read more >
    • Protect & Secure Your Data in the Cloud Protect & Secure Your Data in the Cloud Microsoft Upcoming: Oct 28 2016 6:00 pm UTC 60 mins
    • Protect your data with Microsoft AvePoint powered by Azure.

      AvePoint offers data-centric protection for Office 365, File Shares, and SharePoint with AvePoint Compliance Guardian. AvePoint automatically highlights data security concerns in Yammer, OneDrive, SharePoint Online or on-premises, and File Shares, keeping your data more secure. With the amount of data and connected devices on the rise, a data breach and cyber security threats are becoming more and more real.

      Join this webcast to learn how to:

      Gain insight into compliance health with discovery and targeted reporting
      Standardize content classification with automated tagging
      Identify and review alerts by risk score to identify incidents before they become costly fines

      Read more >
    • Top 5 B2B Marketing Strategies: An Agency Perspective Top 5 B2B Marketing Strategies: An Agency Perspective Ryan Osman, SEM Manager at Obility Recorded: Oct 24 2016 5:00 pm UTC 48 mins
    • Choosing between an in-house marketing team or an agency is a tough decision. Although there are shortcomings with either, there’s one glaring issue that faces B2B businesses who go in-house; they miss out on all of the shared learnings that come with an agency. Join this webinar to discover insights from an agency’s diverse client portfolio perspective.

      We’ll cover top B2B agency strategies such as:
      - Tracking performance of ad campaigns versus sales cycles
      - Structuring campaigns and ad budgets
      - Utilizing top BETAs
      - Orchestrating major conferences and events
      - Developing effective Landing Pages

      We’ll also review the top campaign strategies that have driven the best results for us in 2016.

      Read more >
    • . עדכון שותפים רבעוני קומוולט ישראל . עדכון שותפים רבעוני קומוולט ישראל רוני כפטל , מנהל טכנולוגיות בקומוולט ישראל Upcoming: Oct 31 2016 8:00 am UTC 75 mins
    • ספטמבר 2016 הוא מועד השחרור של גרסת SP5 של קומוולט 11.
      לאחר כמות ההפתעות והשיפורים שיצאו בגרסת SP4 ששוחררה ביוני, נשמח להזמין את שותפינו לסמינר מקוון אשר יכלול את סיכום החידושים האחרונים בשני ה SP 4 ו 5.
      בין הדברים אשר נציג יהיו:
      •אינטגרציה עם שירותי הענן של MS ו Amazon אשר שופרה וכוללת כעת גם יכולות DR לענן
      •אינטגרציה של יכולות ה Block level  עם אפליקציות ושחזור מידי של אפליקציות
      •יכולות DR של Oracle  באמצעות קומוולט
      •יכולות מתקדמות בנושא וירטוליזציה – open stack ו web scale, נציג את פתרון ה SDN- Software defined Storage מבית קומוולט ועוד המון המון הפתעות.
      מצפים לשמוע ממכם המון שאלות ,יש לנו המון תוכן

      Read more >
    • How Do I Get My Compound Into Phase I? How Do I Get My Compound Into Phase I? Scott Boley, PhD, DABT, Greg Ruppert, BA Upcoming: Nov 3 2016 3:00 pm UTC 60 mins
    • Careful assessment of the relationship between efficacy and toxicity is vital to drug developers as they seek advancement of their compounds. Nonclinical testing is required to establish a safe starting dose for the initial human clinical trials. In partnering with our pharmaceutical and biotechnology Sponsors, our goal is to improve the odds of selecting the right lead candidates, and to conduct the right studies in the right way, taking all factors into consideration to ensure a successful IND submission.
      As part of this webinar we will outline the nonclinical studies needed to progress a therapeutic into a Phase I clinical trial. We will cover small molecules to vaccines to biopharmaceuticals as well as standard indications to life-threatening and rare/orphan indications.

      Read more >
    • Reduce Risks and Secure Your Mobile Endpoints Reduce Risks and Secure Your Mobile Endpoints Phil Hochmuth, Program Director, IDC’s Enterprise Mobility; John Michelsen, Chief Product Officer, Zimperium Recorded: Oct 27 2016 4:00 pm UTC 57 mins
    • A long-held assumption about mobile technology in general is that endpoint security technologies are unnecessary since mobile operating systems (OSs) are inherently more secure than PC OSs. For policy enforcement and security on mobile devices, IT organizations have looked to enterprise mobility management (EMM) platforms for additional security and device control. However, there is a detection and enforcement gap between devices and back-end EMM, which does not provide real-time monitoring of app activity, network traffic, and overall endpoint health.

      Mobile endpoint protection is critical and BYO complicates the issue since enterprises may or may not own the mobile endpoint. Employee owned devices introduce many more risks and variables than enterprises account for and we wish to inform you on this webinar. Join Phil and John to learn how to privately secure your BYO devices and measure the risks these devices bring into your network.


      - How to privately secure BYOD mobile endpoints
      - How to classify risky devices by examining installed applications
      - How to create a plan to reduce risks introduced by mobile devices

      Read more >
    • Refusing to Break: Lessons Learned From My First Job in Tech Refusing to Break: Lessons Learned From My First Job in Tech Melanie Rich-Wittrig, Writer, Security Nerd & Aerialist at SecurityCandy.com Upcoming: Nov 2 2016 5:00 pm UTC 45 mins
    • While most members of the predominantly male tech industry are supportive of female professionals, some still act in ways that isolate women.

      Join today's speaker, Melanie Rich-Wittrig, a writer, security nerd and aerialist of SecurityCandy.com as she talks about her experiences early on in her career in tech. Find out how confronting a hostile situation has made her stronger. This talk will cover challenges that women are facing and the most effective strategies to overcome these challenges.

      Presenter Bio:
      Melanie Rich-Wittrig is the creator of SecurityCandy.com and is studying Information Security at Carnegie Mellon University. She worked as a systems administrator for a couple of years after earning her BS in Computer Science at University of Texas at Dallas. Now, she focuses on making cybersecurity education more accessible and attractive to diverse groups of children.

      Read more >
    • Risk Based Security in a Hyper-Connected World Risk Based Security in a Hyper-Connected World Dr. Pierre Tagle, Head of Governance and Risk for SecureWorks for Asia South Recorded: Oct 24 2016 11:00 pm UTC 61 mins
    • For many organisations, investments in new processes and technologies is on top of the priorities list. From behavioral analytics, big data solutions, and "one touch" processes that require no manual intervention, companies are always on the lookout for technology innovations that can achieve a considerable return on investment. When companies consider cybersecurity in such a technology dependent world, most ask, "How can we secure our business and comply with the changing legal and regulatory standards?" instead of, "How do we make business focused, intelligent investments given the cyber security risks we face?"

      In this webcast, Dr. Pierre Tagle, Head of Governance and Risk for SecureWorks for Asia South, will discuss the risk-based cybersecurity operating model to help companies identify and protect their most critical information assets and business processes. Dr. Tagle will focus on the most critical actions for any organisation building a risk-based security program.

      Key topics covered include:

      - Prioritising information assets based on value to the organisation
      - Identifying and prioritisng risks to the assets
      - Reduce risks with quick wins
      - Build and deliver a security plan that aligns business and technology
      - Ensure continuous business engagement on the topic of cyber security

      Read more >
    • How to Deliver Amazing Apps Fast in the Idea Economy: a DevOps Transformation How to Deliver Amazing Apps Fast in the Idea Economy: a DevOps Transformation Raffi Margaliot, Genefa Murphy, Tali Levi Joseph Recorded: Oct 27 2016 1:00 pm UTC 55 mins
    • Want to deliver apps fast on any form factor? Feel like you’re balancing speed versus quality, and your end users are suffering? Hear how HPE’s Application Delivery Management business unit transformed their own approach to software delivery to both accelerate their time to market and deliver a set of solutions that better meet the needs of their customers. Learn about the three T’s that formed the foundation of this transformation, from technology, to technique to talent; and hear about how this influenced the next generation of HPE’s application delivery offerings; ranging from core ALM to next-gen predictive analytics and mobile solutions.

      Hear about HPE’s Application Delivery vision, strategy and journey first-hand
      Discover the three things it takes to transform software delivery and rise to the challenge of DevOps
      Learn how to successfully deliver high quality apps at speed and scale

      Read more >
    • Clustered File Systems: No Limits Clustered File Systems: No Limits John Kim, SNIA-ESF Chair, James Coomer, DDN, Alex McDonald, SNIA-ESF Vice Chair Recorded: Oct 25 2016 5:00 pm UTC 64 mins
    • Today's storage world would appear to have been divided into three major and mutually exclusive categories: block, file and object storage. Much of the marketing that shapes much of the user demand would appear to suggest that these are three quite distinct animals, and many systems are sold as exclusively either SAN for block, NAS for file or object. And object is often conflated with cloud, a consumption model that can in reality be block, file or object.

      But a fixed taxonomy that divides the storage world this way is very limiting, and can be confusing; for instance, when we talk about cloud. How should providers and users buy and consume their storage? Are there other classifications that might help in providing storage solutions to meet specific or more general application needs?

      This webcast will explore clustered storage solutions that not only provide multiple end users access to shared storage over a network, but allow the storage itself to be distributed and managed over multiple discrete storage systems. In this webcast, we’ll discuss:
      •General principles and specific clustered and distributed systems and the facilities they provide built on the underlying storage
      •Better known file systems like NFS, GPFS and Lustre along with a few of the less well known
      •How object based systems like S3 have blurred the lines between them and traditional file based solutions.

      This webcast should appeal to those interested in exploring some of the different ways of accessing & managing storage, and how that might affect how storage systems are provisioned and consumed. POSIX and other acronyms may be mentioned, but no rocket science beyond a general understanding of the principles of storage will be assumed. Contains no nuts and is suitable for vegans!

      Read more >
    • Transitioning from Managed Services to Managed Security: One Partner’s Success Transitioning from Managed Services to Managed Security: One Partner’s Success Garrett Gross & Tim Foley Recorded: Oct 25 2016 5:00 pm UTC 63 mins
    • Over the past 10 years, IT managed services have become universally available and moving from a luxury to more of a must-have. Building on this notion of IT as a service, more companies are recognizing the need for a comprehensive security posture but may lack the ability or desire to manage in-house. This leaves the door open to whom will provide this security as a service.

      Join us as we explore one partner’s journey from managed services to managed security. Dataprise has been a leading provider of IT managed services for over a decade and now offers a complete managed security service.

      During this webcast, we’ll get an inside look into:

      The basics of becoming a MSSP
      Tools MSSPs use to build their service
      Common challenges in creating a managed security service

      Read more >
    • Activated Charcoal: Making sense of endpoint data Activated Charcoal: Making sense of endpoint data Greg Foss, Head of Global Security Operations, LogRhythm and Sarah Miller Threat Intelligence Analyst, Carbon Black Recorded: Oct 26 2016 1:00 pm UTC 64 mins
    • Security operations is all about understanding and acting upon of large amounts of data. When you can pull data from multiple sources, condense it down and correlate across systems, you are able to highlight trends, find flaws and resolve issues.

      This webcast will cover the importance of monitoring endpoints and how to leverage endpoint data to detect, respond and neutralize advanced threats.

      You’ll discover:

      - Why endpoints are the new perimeter
      - How employees can strengthen your security operations strategy
      - Techniques to test and validate security awareness program
      - How to take the data that Carbon Black collects, correlate it against thousands of endpoints, and dynamically neutralize threats using the LogRhythm security intelligence and analytics platform

      Register now to learn how LogRhythm and Carbon Black can help you strengthen your overall security operations strategy—all within a single interface.

      Read more >