Hi [[ session.user.profile.firstName ]]
Sort by:
    • Ein Ausweg aus dem Daten-Dschungel
      Ein Ausweg aus dem Daten-Dschungel Marco Rossi, Consulting Systems Engineer Upcoming: Jun 20 2018 9:00 am UTC 60 mins
    • Mit FireEye Threat Analytics in kürzester Zeit das eigene SIEM realisieren.

      Die Erfahrungen mit klassischen SIEM-Lösungen haben immer wieder gezeigt, dass durch deren Implementierung recht schnell große Datenmengen und gleichzeitig viele Alarme erzeugt werden. Damit werden noch lange nicht alle für die Cyber-Sicherheit relevanten Probleme gelöst
      Wir zeigen Ihnen, wie Sie schnell zu einer SIEM-Lösung kommen, die einen entscheidenden Mehrwert aus dem Daten-Dschungel bietet um:
      •Kostspielige und aufwändige Installation zu vermeiden
      •Die hohe Anzahl an Alarmen und der damit verbundene Aufwand zu priorisieren
      •Angriffe und Aktivitäten in Ihrem Netzwerk sofort zu erkennen

      Ergänzen Sie Ihre bestehende SIEM-Lösung und steigern Sie damit deutlich das Cyber-Security-Niveau Ihrer Organisation.

      Read more >
    • Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting
      Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting John Grim and David Kennedy, Verizon Enterprise Solutions Upcoming: Jun 20 2018 2:00 pm UTC 90 mins
    • Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

      This month's theme: Cyber-Espionage and Threat Hunting

      Our Verizon Threat Research Advisory Center presenters will be:
      •Chris Novak, Director, Investigative Response
      •Jihana Clemetson, Senior Analyst, Threat Intelligence
      •Marcus Cymerman, Senior Analyst, Network Forensics
      •David Kennedy, Managing Principal, Open Source Intelligence
      •John Grim, Senior Manager, Investigative Response – Americas

      For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.

      Following the cyber-espionage insights, we'll cover the following topics:

      •Current Intelligence
      •Attacks & Threat Indicators
      •Latest Malware Trends
      •Significant Vulnerabilities

      Read more >
    • FICON 101
      FICON 101 Patty Driever, IBM; Howard Johnson, Broadcom; J Metz, Cisco Recorded: Jun 19 2018 5:00 pm UTC 62 mins
    • FICON (Fibre Channel Connection) is an upper-level protocol supported by mainframe servers and attached enterprise-class storage controllers that utilize Fibre Channel as the underlying transport. Mainframes are built to provide a robust and resilient IT infrastructure, and FICON is a key element of their ability to meet the increasing demands placed on reliable and efficient access to data. What are some of the key objectives and benefits of the FICON protocol? And what are the characteristics that make FICON relevant in today’s data centers for mission-critical workloads?

      Join us in this live FCIA webcast where you’ll learn:

      • Basic mainframe I/O terminology
      • The characteristics of mainframe I/O and FICON architecture
      • Key features and benefits of FICON

      Read more >
    • FCoE vs. iSCSI vs. iSER
      FCoE vs. iSCSI vs. iSER J Metz, Cisco; Saqib Jang, Chelsio; Rob Davis, Mellanox; Tim Lustig, Mellanox Upcoming: Jun 21 2018 5:00 pm UTC 75 mins
    • The “Great Storage Debates” webcast series continues, this time on FCoE vs. iSCSI vs. iSER. Like past “Great Storage Debates,” the goal of this presentation is not to have a winner emerge, but rather provide vendor-neutral education on the capabilities and use cases of these technologies so that attendees can become more informed and make educated decisions.

      One of the features of modern data centers is the ubiquitous use of Ethernet. Although many data centers run multiple separate networks (Ethernet and Fibre Channel (FC)), these parallel infrastructures require separate switches, network adapters, management utilities and staff, which may not be cost effective.

      Multiple options for Ethernet-based SANs enable network convergence, including FCoE (Fibre Channel over Ethernet) which allows FC protocols over Ethernet and Internet Small Computer System Interface (iSCSI) for transport of SCSI commands over TCP/IP-Ethernet networks. There are also new Ethernet technologies that reduce the amount of CPU overhead in transferring data from server to client by using Remote Direct Memory Access (RDMA), which is leveraged by iSER (iSCSI Extensions for RDMA) to avoid unnecessary data copying.

      That leads to several questions about FCoE, iSCSI and iSER:

      •If we can run various network storage protocols over Ethernet, what
      differentiates them?
      •What are the advantages and disadvantages of FCoE, iSCSI and iSER?
      •How are they structured?
      •What software and hardware do they require?
      •How are they implemented, configured and managed?
      •Do they perform differently?
      •What do you need to do to take advantage of them in the data center?
      •What are the best use cases for each?

      Join our SNIA experts as they answer all these questions and more on the next Great Storage Debate.

      Read more >
    • One Year to Go! Your CA/Orchestria ‘End-of-Life’ Transition Plan
      One Year to Go! Your CA/Orchestria ‘End-of-Life’ Transition Plan John Pepe (Proofpoint) & Christopher Amatulli (Technically Creative) Upcoming: Jun 20 2018 5:00 pm UTC 60 mins
    • Still on CA / Orchestria ‘Data Protection’ and don’t know where to start?

      End-of-Life happens in just 12 months and Proofpoint has a proven plan to migrate your data and detection logic to its new ‘Intelligent Supervision’ platform designed to increase the relevancy of alerts paired with intuitive workflows.

      In this short webinar, Proofpoint and Technically Creative will discuss migration best practices and present a plan to have customers up-and-running by summer 2019, so there is no gap in regulatory compliance.

      Join us as our experts discuss:

      - Where to Start
      - Summer 2019 Transition Plan
      - Upgrading to Intelligent Supervision
      - Ongoing Support

      Join CA / Orchestria ‘Data Protection’ experts John Pepe and Christopher Amatulli from Technically Creative for insights on making a timely, successful transition, all while remaining compliant.

      Read more >
    • [Ep.17] Ask the Expert: Data Migration and Third Party Maintenance
      [Ep.17] Ask the Expert: Data Migration and Third Party Maintenance Chris Crotteau, Director of Strategic Product Development & Glenn Fassett, GM - EMEA, Curvature Upcoming: Jun 20 2018 4:00 pm UTC 60 mins
    • How easy is it to move data?

      Between traditional, on-premises data centers, hosted/collocated data centers, and infrastructure as a service (IaaS) through the large cloud providers, where to store your data and run your business critical applications is now a source of significant complexity in the IT world. Understanding your application set and business needs, then determining where best to run those applications and store their data presents a host of challenges both old and new.

      So where does Third Party Maintenance fit into all of this? Or better yet….what IS Third Party Maintenance?

      Join us for an engaging discussion with Curvature’s IT infrastructure experts to learn:

      •What Third Party Maintenance (TPM) is and how it has become a vital market segment focused first and foremost on the client’s needs
      •How TPM can cost-effectively extend the life of IT assets and align the lifetime of those assets to your application and software lifecycles
      •How TPM can enable you to manage major IT infrastructure transitions in a much more cost effective manner

      About the experts:

      Chris primarily works in the Services department as a Solutions Architect developing technological solutions and strategies for clients. As a technology expert, Chris leads a team of technical engineers to develop new tactics and processes for clients from development to design. Chris was named Employee of the Year in 2005 and 2009.

      Glenn is responsible for the strategic growth and expansion throughout Europe. Previously, Glenn managed Curvature’s international operations and led the company’s entry into Europe in 2002, successfully launching Curvature’s Asia-Pacific division in 2007. Prior to leading this international expansion, Glenn managed enterprise accounts as a distinguished member of Curvature’s U.S. sales organization beginning in 1996.

      Read more >
    • How to Enable Trust, Interoperability, & Shared Credentials
      How to Enable Trust, Interoperability, & Shared Credentials Ora Niknamfard, Product Marketing Manager Security at CA Technologies Upcoming: Jun 21 2018 5:00 pm UTC 60 mins
    • The promise of digital identity is to remove silos; minimize redundancies; facilitate better collaboration; and shape a foundation for regulatory compliance.
      The challenge with digital identity is that it requires shared credentials that force you to deliberately assess:

      • Managing physical access
      • Protecting PII
      • Delivering cross-agency services
      • Revising digital consumer interaction

      In this session, Ora Niknamfard, Product Marketing Manager Security at CA Technologies will share industry best practices to help ensure credentials are, in fact, interoperable. Plus, you’ll have a unique opportunity to explore the architectural measures that can manage identity assurance levels and identity verification for both logical and physical access.

      Implementing a digital identity strategy can be complicated. Let CA help.

      Read more >
    • Implementing Virtualized Network Encryption to Secure SD-WANs
      Implementing Virtualized Network Encryption to Secure SD-WANs Stan Mesceda, Senior Product Manager at Gemalto and Julian Fay, CTO at Senetas Upcoming: Jun 21 2018 3:00 pm UTC 60 mins
    • Today enterprises and service providers are increasingly using network functions virtualization (NFV) and software-defined networking (SDN) technologies to design, deploy and manage their networks and cloud-based services. These software-based technologies give organizations cost and operational benefits because they move network functions from dedicated hardware appliances to virtual servers. These same technologies can be now be applied to how encryption is deployed and managed to protect sensitive data and communications the flow across SD-WANs.

      In this webinar you will learn about:
      •What is the best network fit for virtualized encryption
      •How to implement a virtual network encryption appliance in software-defined network
      •What are the cost, operational and performance benefits of virtual encryption
      •What it means to be transport layer independent and how you can protect network traffic simultaneously across Layers 2, 3 and 4

      Read more >
    • Using Data Science to Build an End-to-End Recommendation System
      Using Data Science to Build an End-to-End Recommendation System Ambarish Joshi and Jeff Kelly, Pivotal Upcoming: Jun 21 2018 5:00 pm UTC 60 mins
    • We get recommendations everyday: Facebook recommends people we should connect with; Amazon recommends products we should buy; and Google Maps recommends routes to take. What all these recommendation systems have in common are data science and modern software development.

      Recommendation systems are also valuable for companies in industries as diverse as retail, telecommunications, and energy. In a recent engagement, for example, Pivotal data scientists and developers worked with a large energy company to build a machine learning-based product recommendation system to deliver intelligent and targeted product recommendations to customers to increase revenue.

      In this webinar, Pivotal data scientist Ambarish Joshi will take you step-by-step through the engagement, explaining how he and his Pivotal colleagues worked with the customer to collect and analyze data, develop predictive models, and operationalize the resulting insights and surface them via APIs to customer-facing applications. In addition, you will learn how to:

      - Apply agile practices to data science and analytics.
      - Use test-driven development for feature engineering, model scoring, and validating scripts.
      - Automate data science pipelines using pyspark scripts to generate recommendations.
      - Apply a microservices-based architecture to integrate product recommendations into mobile applications and call center systems.

      Read more >
    • How to make digital work in medtech
      How to make digital work in medtech Bryn Davies (Critical Insights), Lars U. Diemer (Agnitio), Markus Ott (Ascensia), Jerome d'Astros (Edwards Lifesciences) Upcoming: Jun 21 2018 11:00 am UTC 75 mins
    • The rise of mobile devices and apps, not to mention the involvement of non-medical technology players, is creating a wave of irrevocable digital change for medtech.
      It’s transforming how the sector reaches and engages with its stakeholders and customers, and in doing so provides vital opportunities to reshape a company’s commercial model.
      But although the sector can lay claim to some key success stories with digital technology, there remain a number of roadblocks impeding real digital progress for medtech.

      In this webinar we will discuss key digital lessons for medtech from other healthcare sectors, steps to take for a successful digital transformation and how to ensure ROI from digital technology.
      The free webinar will also see our expert panel:
      •Explore the practical impacts of the new medtech business model
      •Re-think the customer experience for payers and HCPs
      •Learn how digital technology enables you to deliver more customer value – while powering commercial success
      •Find out how virtual engagement technologies can make it happen
      •See best practices and use cases from your peers

      Read more >