Hi [[ session.user.profile.firstName ]]
Sort by:
    • Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Michael Suby, Vice President of Research at Frost & Sullivan Recorded: Aug 24 2016 1:00 pm UTC 36 mins
    • Unfortunately many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that transpired in “days or less” has risen from 67% to 84% over the last 10 years. Over this same time period, the percent of compromise discoveries that occurred in “days or less” also improved, but not enough to narrow the time gap between compromise and discovery. In other words, the bad guys are accelerating their exploits faster than the good guys are accelerating their ability to discover.

      The path to narrowing the time gap between compromise and discovery, and then neutralising business-impacting incidents, is through a comprehensive and mission-oriented Security Information and Event Management (SIEM). A well-designed SIEM not only advances security objectives, but it also works to direct personnel and process for maximum impact. With limited resources and a rising number of attacks, not all solutions are created equal. You need to ensure they are getting the best bang for your buck.

      In this webinar, Michael Suby, vice president of research at the global research and consulting organization Frost & Sullivan, will discuss the factors that contribute to SIEM’s total cost of ownership.

      You’ll learn:

      • How to calculate the total cost of ownership of a SIEM
      • The basic functionality that every SIEM should have to confidently breeze through preliminary activities
      • The SIEM attributes that will have a lasting impact on your organization’s cost efficiency in effectively managing risk

      Join us to learn the features that should be on the top of your scorecard when evaluating a SIEM for either first-time deployment or replacement.

      Read more >
    • The Role of FPGAs in SparK Accelerators The Role of FPGAs in SparK Accelerators Shreyas Shah, Principal Data center Architect, Xilinx Upcoming: Aug 29 2016 5:00 pm UTC 60 mins
    • In the cloud computing era, data growth is exponential. Every day billions of photos are shared and large amount of new data created in multiple formats. Within this cloud of data, the relevant data with real monetary value is small. To extract the valuable data, big data analytics frame works like SparK is used. This can run on top of a variety of file systems and data bases. To accelerate the SparK by 10-1000x, customers are creating solutions like log file accelerators, storage layer accelerators, MLLIB (One of the SparK library) accelerators, and SQL accelerators etc.

      FPGAs (Field Programmable Gate Arrays) are the ideal fit for these type of accelerators where the workloads are constantly changing. For example, they can accelerate different algorithms on different data based on end users and the time of the day, but keep the same hardware.

      This webinar will describe the role of FPGAs in SparK accelerators and give SparK accelerator use cases.

      Read more >
    • Using your Load Balancer for Application Performance Monitoring Using your Load Balancer for Application Performance Monitoring Ashish Shah, Director of Product, Avi Networks Recorded: Aug 25 2016 5:00 pm UTC 47 mins
    • Load balancers occupy an important position (in the path of application traffic) on the enterprise network. Yet, traditional application delivery controllers (ADCs) are unable to provide meaningful application insights to drive business decisions. Avi Networks’ software-defined architecture for load balancing separates the control plane (management layer) from the data plane (load balancers) to generate continuous insights about applications.

      In this 30 minute presentation from Avi Networks, learn how you can get rich analytics and actionable insights into end user experience, application performance, resource utilization, security, and anomalous behavior. See how you can benefit from:

      • A “Network DVR” to record and replay traffic events to pinpoint app issues
      • At-a-glance view of all virtual services throughout the system
      • Real-time visibility into DDoS attacks, SSL versions and ciphers used in transactions
      • Health scores that give you immediate feedback on application performance

      Read more >
    • Información en línea de Aplicaciones y experiencia de usuario Información en línea de Aplicaciones y experiencia de usuario Raul Castillo Recorded: Aug 24 2016 3:00 pm UTC 61 mins
    • Hola Sr/Señora,

      Actualmente las Aplicaciones son el front del negocio hacia el usuario final (interno y/o externo), por ello elementos como: facilidad de uso, tiempos de respuesta y/o fallas en la transacción al tomar los servicios tienen incidencias directas en imagen, abandono de la transacción y por consiguiente perdidas de oportunidades e ingresos.

      Lo invitamos a este webinar donde podrá resolver las siguientes preguntas:

      ¿Puede su empresa conocer la experiencia de usuarios brindada a través de sus aplicaciones?
      ¿Tiene su empresa visibilidad de indicadores de experiencia de los usuarios que le permitan tomar decisiones y/o le permitan evidenciar la evolución del servicio?

      CA Technologies

      Read more >
    • Fintech: Good and Bad News for Inclusive Sustainable Finance Fintech: Good and Bad News for Inclusive Sustainable Finance Hazel Henderson (FRSA) Recorded: Aug 22 2016 5:00 pm UTC 47 mins
    • This presentation, FINTECH: Good and Bad News for Inclusive Sustainable Finance, will explore issues surrounding the rapid deployment of computerized electronic platforms, cryptocurrencies and algorithms now disrupting legacy financial firms and their models.

      Good News: this disruption was long overdue and welcome where it overturns inefficient, inequitable, over-priced services, democratizing lending, investment, banking, payments, remittance and widens easy availability of transactions. Widespread adoption of Blockchain-based distributed ledgers offer closer monitoring of financial ethics and performance. Bad News: this electronic, information-rich disruption of legacy finance ranges from algorithmic high-frequency trading (HFT) we explored for the UN Inquiry (2015) to the rapid co-option and buyouts of companies in the FINTECH 100 by the big legacy banks; the excessive run-up in pre-IPO valuations, focusing on big wins, short-term profits – evidence of the same excesses and unsustainable practices needing reform. Even the ingenious market-based reform in IEX’s platform’s technological designed “speed bump” which levels the playing field for investors also can be subverted to extort fees by unscrupulous firms. Vulnerability, internet and spectrum capacity as well as security issues need attention.

      While FINTECH offers so many opportunities for reforming and democratizing finance, the race is on to own and control these disruptive firms and their profits. Steering FINTECH firms toward globally inclusive, sustainable development goals as in the UN’s SDGs must now be built in. Ethical standards are key in optimal systemic design. How best to measure their social and environmental impacts, performance metrics and accounting, and monitor prudential architecture at global and national levels? How can we help design FINTECH for inclusive sustainable finance and markets?

      Read more >
    • The State of Influencer Marketing The State of Influencer Marketing Brian Solis, Principal Analyst, Altimeter Group Recorded: Aug 23 2016 5:00 pm UTC 63 mins
    • Traditional digital advertising channels are delivering declining results, forcing marketers to look for new alternatives that deliver better ROI. Influencer marketing has emerged as a powerful new addition to the marketing mix.

      This study takes an in-depth look at the current state of influencer marketing and provides insight into how to run programs successfully. Both influencers and brands were surveyed to identify where they are aligned in their approach to influencer marketing and where there are gaps between the two. Topic areas covered include:

      - Budget allocation
      - Preferred social platforms
      - Key challenges faced
      - Measuring success
      - Top performing tactics
      - Why influencer marketing works

      About the speaker:
      Brian Solis is principal analyst at Altimeter Group (a Prophet company). Solis is globally recognized as one of the most prominent thought leaders, speakers, and published authors in new technology, digital marketing and culture shifts.

      Read more >
    • Become a Cloud Master with the HPE Helion Cloud Suite Become a Cloud Master with the HPE Helion Cloud Suite Keri Sprinkle, Neil Miles, Kiran Makarla HPE Recorded: Aug 23 2016 3:00 pm UTC 56 mins
    • In our first Helion Cloud Suite web event, we introduced you to the new software suite from HPE that brings together a full range of hybrid cloud capabilities, enabling you to deliver and manage the full spectrum of applications and technologies -- from traditional, virtualized, cloud native and containers -- across a broad range of infrastructure environments.

      Join this web event for a deeper dive, and be the first to see this new suite in action:

      Manage hybrid and multi-cloud environments
      Develop, deploy, and scale cloud-native applications
      Drive business performance with focused analytics

      More than just a hybrid cloud management platform, the HPE Helion Cloud Suite can help you manage any cloud, any environment, and any technology for any application. Go beyond cloud management, and learn what it means to become a cloud master.

      View Part 1 of this 2 part series at: http://www.vivit-worldwide.org/members/group_content_view.asp?group=103644&id=600517

      Read more >
    • How to migrate and manage security policies in a segmented data center How to migrate and manage security policies in a segmented data center Professor Avishai Wool, AlgoSec CTO Recorded: Aug 23 2016 3:00 pm UTC 53 mins
    • Network segmentation is an effective strategy for protecting access to key data assets, and impeding the lateral movement of threats and cyber criminals inside your data center. With network virtualization, such as VMware NSX, now a reality it's now far easier and quicker to set up granular security policies for east-west traffic within the data center. Yet the added granularity of securities policies creates significant complexity.
      Presented by renowned industry expert Professor Avishai Wool, this technical webinar will provide strategies and best practices to help organizations migrate and manage security policies efficiently within a micro-segmented data center.
      During the webinar Professor Wool will cover how to:
      · Identify and securely migrate legacy applications to a micro-segmented data center
      · Effectively define and enforce security policies for East-West traffic
      · Manage the micro-segmented data center alongside traditional on-premise security devices
      ·Identify risk and manage compliance in a micro-segmented data center
      · Use network segmentation to reduce the scope of regulatory audits
      · Identify and avoid common network segmentation mistakes

      Read more >
    • The Evolution of File The Evolution of File Glen Olsen Product Manager Recorded: Aug 25 2016 2:00 pm UTC 54 mins
    • Over a decade ago, API-accessible key/value-based storage was introduced as a service by Amazon and as software by Caringo. Amazon’s service-based approach matured quickly, while the general storage market slowly adopted the API approach. The on-premise market demanded a traditional file interface, leading to various “gateway” products. However, for the majority of use cases, the logical file gateway architecture is flawed. Is it time for file to evolve with object? This webinar examines the past decade in file interface gateways and the needs of the market versus what is available.

      Read more >
    • Cradlepoint’s Extensibility Platform, SDK & New COR Devices Cradlepoint’s Extensibility Platform, SDK & New COR Devices Cradlepoint's Product Management Team Recorded: Aug 23 2016 4:00 pm UTC 44 mins
    • Cradlepoint announced it is delivering an innovative Router Software Development Kit (SDK) and extensibility platform to enable enterprises to customize Machine-to-Machine (M2M) and Internet of Things (IoT) connectivity to meet their specific business needs, applications, and network requirements.

      With the new Router SDK and extensibility platform, enterprises can now build and customize more intelligent, application-specific solutions on top of Cradlepoint’s latest COR IBR routers. Developers and enterprise customers can now create tailored M2M and IoT applications on top of Cradlepoint Solution Platforms that can precisely address their specific business needs.

      The extensibility platform launches in conjunction with new additions to Cradlepoint’s COR family of M2M-IoT and in-vehicle routers — the COR IBR600B and COR IBR650B. The new routers include embedded Cat4 modems that will perform at higher speeds and support additional bands. They also support auto-carrier selection that automatically connects to the U.S. wireless carrier associated with the SIM card installed.

      The new routers support the COR Extensibility Dock that enables dual modems, extra Ethernet ports, and support for a third party expansion card, as well as, Cradlepoint’s SDK and extensibility platform that enable customers, partners, and third parties to write custom scripts and then securely push those scripts down to the router fleet for distributed computing at the Networks Edge.

      Read more >
    • Executive Webinar Series: Cut Audit Prep with Continuous Compliance Executive Webinar Series: Cut Audit Prep with Continuous Compliance John Parmley, Area VP, Tufin Recorded: Aug 24 2016 3:00 pm UTC 32 mins
    • Today's expectations of security executives is to do more with less: provide tighter security with less resources for a dynamic, hybrid, complex IT environment.
      As an existing Tufin customer, you can turn the Tufin Orchestration Suite from a management tool into a strategic infrastructure.

      Join us for the second webinar in our Executive Webinar Series: "Cut Audit Prep and Tighten Security with Continuous Compliance" and learn how you can maximize your Tufin investment to:
      •Cut audit preparations by enforcing continuous compliance across the hybrid network
      •Tighten security posture with a unified zone-based security policy
      •Maximize agility AND policy compliance with proactive risk analysis
      Reserve your seat now!
      We look forward to you joining us.

      Read more >
    • Standardization and visibility of security controls in Hybrid Standardization and visibility of security controls in Hybrid Avinash Prasad and Munish Gupta of Infosys Ltd Recorded: Aug 24 2016 3:00 pm UTC 50 mins
    • The needs for IT agility for business, is driving adoption of flexible computing environments including IaaS, Private Cloud among others. The challenge associated with this transformation towards the Hybrid cloud environment is the assurance around the security for the workloads and data. Specific issues arise due to the “Shared security model ” of the varying Cloud environments in terms of implementation of security, compliance and optimization in these environments.

      The need of the hour is to ensure effective security governance through standardization of security controls/Policies across Hybrid cloud deployments are driven by embedded security mechanisms with lesser bolted-on overhead on the IT security teams. One successful example is the leveraging of “security for the cloud from the cloud” to provide elastic and adaptive security services for the hybrid cloud

      In this webinar, Avinash Prasad, AVP, Information & Cyber Risk Management and Munish Gupta, Principal – Information & Cyber Risk Management , Infosys (NYSE: INFY) will share their experiences with respect to standardization of security controls in Hybrid cloud environments.

      Read more >