Hi [[ session.user.profile.firstName ]]
Sort by:
    • Software Security and Best Practices in the AWS Cloud
      Software Security and Best Practices in the AWS Cloud Mike Morain, AWS Marketplace Solutions Architect Recorded: Jun 6 2017 9:35 am UTC 29 mins
    • Meet security-sensitive requirements faster. AWS provides several security capabilities and services to increase privacy and control network access that enable private or dedicated connections from your on-premises environment. In addition to the already secure AWS Cloud, AWS Marketplace offers industry-leading solutions to help you secure operating systems, platforms, applications and data that can integrate with existing controls in your AWS Cloud and hybrid environments.

      Learning objectives:

      - Learn about Marketplace security policies to ensure AWS Marketplace product security (Managed Catalog Operations)
      - Explore Security applications: vendor-enforced best-practices
      - Augmenting AWS Security offerings with Marketplace products.

      Read more >
    • GDPR update - less than 1 year to May 2018
      GDPR update - less than 1 year to May 2018 Greg Day, EMEA VP & CSO Palo Alto Networks Recorded: Aug 22 2017 1:00 pm UTC 63 mins
    • The General Data Protection Regulation (GDPR) and the Network and Information Security (NIS) Directive will both be enforced as of May 2018. You may think you’re ready for these laws, but covered companies may need to improve the security of personal data they hold, and of their networks and information systems. Data breaches and security incidents will have to be reported. As they prepare for the GDPR and NIS, it is imperative that organisations understand their cybersecurity risks and invest appropriately.

      Greg Day, EMEA VP & CSO Palo Alto Networks, explains the security-related requirements.

      Read more >
    • Security for Embedded Applications: Authorization for SaaS Companies
      Security for Embedded Applications: Authorization for SaaS Companies Olivier Meyer, Zoomdata Recorded: Sep 11 2017 3:00 pm UTC 3 mins
    • Watch this video to learn how the two models of SaaS multi-tenancy affect the deployment of embedded platforms.

      Multi-tenancy models typically fall within one of two approaches: isolated and shared. The isolated model is arguably safer, but the shared model is more efficient for the SaaS company. An embedded analytics platform needs to support both. Moreover, to support the co-mingled or shared model, the embedded platform needs to support row-level security. Row-level security ensures that tenants only see the data relevant to that customer. Row-level security can be implemented via the embedded platform or it can be enforced by the data source.

      Read more >
    • GDPR update - less than 1 year to May 2018
      GDPR update - less than 1 year to May 2018 Greg Day, EMEA VP & CSO Palo Alto Networks Recorded: Jul 12 2017 11:55 am UTC 62 mins
    • The General Data Protection Regulation (GDPR) and the Network and Information Security (NIS) Directive will both be enforced as of May 2018. You may think you’re ready for these laws, but covered companies may need to improve the security of personal data they hold, and of their networks and information systems. Data breaches and security incidents will have to be reported. As they prepare for the GDPR and NIS, it is imperative that organisations understand their cybersecurity risks and invest appropriately. Greg Day, EMEA VP & CSO Palo Alto Networks, explains the security-related requirements.

      Read more >
    • We Need a Trust and Transparency Model for The Internet of Things
      We Need a Trust and Transparency Model for The Internet of Things Sean Martin, ITSPmagazine | David Billeter and Naresh Persaud, CA Technologies | Mandeep Khera Recorded: Aug 16 2017 5:00 pm UTC 64 mins
    • Today, security on the Internet is dependent on the trust between participants on the network. This is challenging because trust involves more than humans in this case and there are over 8.7 Billion devices already online today. And, trust is about to become more involved because, according to a Cisco study, 99% of the things in the world today will be connected to the Internet in the near future which means we will need a new model for trust and digital identity to manage this massive scale of trust we will need.

      In this ITSPmagazine webinar, a panel of subject matter experts will explore the challenges and solutions to building trust on the Internet of things, looking at what identity means in the world of mobile devices and other Internet-connected things. Remember, it's not just the user that has an identity...

      Some of the topics planned for the discussion include:
      - What are some of the devices we see being used in business?
      - Why do devices need identities?
      - What does device-to-user authentication look like?
      - What does device-to-device authentication look like?
      - What role do applications play in the IoT world?
      - How can all of these identities and activities be managed and policies enforced at scale?

      --------

      Moderator
      - Sean Martin, CISSP, Editor-in-Chief at ITSPmagazine

      Expert Panelists
      - David Billeter, CISO at CA Technologies
      - Mandeep Khera, Information Security Thought Leader and Executive
      - Naresh Persaud, Sr. Director Security, Product Marketing, CA Technologies

      Read more >
    • CA Briefings Part 6: Step 4: Governance and Tying it all Together
      CA Briefings Part 6: Step 4: Governance and Tying it all Together John Hawley, VP Security Strategy, CA Technologies; Brandon Dunlap (Moderator) Recorded: Mar 21 2017 5:00 pm UTC 60 mins
    • Controlling the access of all users, especially privileged ones, is essential not only for risk reduction but also for easier compliance. But, controlling access isn't enough. Organizations need to govern all user access to ensure that no user has more access than they need, and that segregation of duties policies are enforced. On March 21, 2017 at 1:00PM Eastern, CA Technologies and (ISC)2 will highlight the steps for strengthening the enterprise and increasing customer engagement as well as key aspects of effective identity governance, including for contractors and partners who might have access to your systems. Included in the discussion will be key capabilities and processes to help create leading-edge identity governance deployments that can improve the security of your critical data and simplify compliance audits.

      Read more >
    • Making GDPR's 'big ideas' work for you and your data
      Making GDPR's 'big ideas' work for you and your data Alexandra Leonidou, Senior Associate, Foot Anstey Recorded: Apr 20 2017 2:00 pm UTC 56 mins
    • The impending GDPR changes will bring to the forefront two ‘big concepts’ to the marketing world – Accountability and Data Governance. In this webinar we will explore how marketers can look at GDPR as a positive advantage. You’ll learn how to potentially use these ‘big concepts’ to both increase consumer trust and start to build a true business asset from your customer data.

      The GDPR is due to kick in from May 2018 and whilst you may have heard about impending fines and risks to your use of customer data we have teamed up with Alexandra Leonidou, Privacy and Data Protection expert at leading Law Firm Foot Anstey to provide insight into the positive changes that you can bring about through the enforced changes.

      This Webinar is aimed at Marketing Professionals that want to:

      1) Know how to comply with GDPR in practical terms.
      2) Find out how GDPR can bring about improved consumer trust, increased confidence in ‘marketing data’ and streamlined processes.

      Read more >
    • The Future of Continuous Compliance is Automation
      The Future of Continuous Compliance is Automation Guest Forrester Analyst Robert Stroud and Evident.io Solutions Architect Sebastian Taphanel Recorded: Dec 16 2016 12:25 am UTC 59 mins
    • The demand for security professionals who analyze cloud risk and security has never been greater! Traditional approaches are no longer as effective and require new cloud security tools and technologies to become more productive. In order to build secure applications faster, security and compliance measures must be enforced at the speed of scale. Automation is essential for Modern IT organizations.

      The future looks bright for DevOps as new Cloud Security platforms, automation, and self-service tools fill the gaps to overcome key challenges and bottlenecks, delivering Continuous Compliance.

      Join guest Forrester Analyst Robert Stroud and Evident.io Solutions Architect Sebastian Taphanel to understand the key trends, challenges, and emerging solutions that portend the future of Continuous Compliance and Security in the Cloud including:

      - Key challenges in compliance and automation with Cloud Security tools
      - Cloud Security and Compliance skills that will be required in the future
      - The trend toward and need for Compliance Automation tools for DevOps
      - Risk changes over time and how to adjust your posture

      Read more >
    • A Survival Guide to Enterprise Security Policy Compliance
      A Survival Guide to Enterprise Security Policy Compliance Ofer Or, VP Products, Tufin Recorded: Jun 29 2016 3:00 pm UTC 32 mins
    • Every enterprise needs a survival guide for compliance. The risk associated with cyber security has a big spotlight on it today—and it’s become a Board-level topic for many enterprises. Compliance with cyber security requirements has transitioned from a "check the box" mentality to a stringent program whereby regulatory requirements and standards as well as enterprise policies and best practices are diligently met, continuously enforced and proven through regular audits. Yet, preparing for audits and maintaining audit readiness takes valuable time and resources– and has become quite a burden!
      Join this session to learn about the 6 steps for surviving in today’s compliance jungle.

      Read more >
    • Levelling the intermittency of renewables with coal - costs and risks
      Levelling the intermittency of renewables with coal - costs and risks Dr Lesley Sloss Recorded: Jun 8 2016 11:00 am UTC 42 mins
    • Countries are setting ever higher goals for producing power from clean, renewable energies and some are actively turning their backs on fossil fuels. However, many of these regions are discovering the real challenges of trying to produce baseload power for public consumption from renewable sources which are, at best, intermittent, and, at worse, unpredictable and unreliable. Until large scale energy storage is available and affordable, baseload power from coal, gas, and/or nuclear will remain necessary in many regions for several more years. Obviously this baseload power is required when renewable output is low (when the sun doesn't shine and the wind doesn't blow). However, it is also still required to make up the balance of power in a diverse energy mix. Under the new energy policy regimes in many regions, renewable sources have priority into the grid and sit in the guaranteed dispatch mix in the base region which coal used to occupy. Coal has now been nudged into the dispatchable area of the mix, being asked to ramp up or down or even to idle or run beyond normal capacity, sometimes at short notice, to produce the balance of power required to maintain grid output. And whilst coal plants can run relatively flexibly, this does not come without cost. Most older coal-fired units were designed to run at steady output. Asking these plants to cycle and ramp puts stresses on the plant which can result in added cost, less efficient production, increased wear and tear and, in some cases, damage causing enforced outages for repair and/or upgrade. This webinar, looks at the stresses placed on coal-fired plants as they are asked to help levelise and counterbalance the intermittency of renewable sources, concentrating on the risks and costs. Case studies and examples of issues being encountered in the USA, the UK and Germany are included.

      Read more >
    • Survival Guide for SharePoint: Part 4 – Automating SharePoint Services
      Survival Guide for SharePoint: Part 4 – Automating SharePoint Services Edmund White Recorded: Sep 9 2015 6:00 pm UTC 59 mins
    • Our SURVIVAL GUIDE webinar series has taught you how to FIX all of your problems and to make sure that your changes and policies are ENFORCED.

      Now it’s time to make your life easier AUTOMATING the repetitive and time-consuming processes involved with managing your SharePoint deployments.

      Sounds great, right? But what does that mean? How would you like to:
      * Get end users the resources they need quickly by providing clear direction about what services are available and how to use them?
      * Offer an out-of-the-box service catalog for your users to choose from?
      * Fulfill requests for provisioning, administration, security, content and lifecycle management changes without having to burden IT?
      * Automatically tag, classify, and apply retention policies from the creation of documents to full site collections?

      Register now to join AvePoint Field Product Manager Edmund White, as he shows you how our SURVIVE GUIDE can automate the steps involved in configuring, managing, and enforcing SharePoint governance and compliance policies.

      Don’t JUST SURVIVE, be a force for change and get back to focusing on more strategic, higher-value operations.

      Read more >
    • Maximizing the Efficiency and Security of Container-based Virtualization
      Maximizing the Efficiency and Security of Container-based Virtualization Tom Spencer and Veer Muchandi Recorded: Jul 18 2017 5:00 pm UTC 52 mins
    • Until recently, a large majority of the virtualized data center infrastructure used hypervisors. This was especially the case in enterprise datacenters. But the hyperscale cloud infrastructure drove up the need for using commodity hardware and open source software, largely driven by the need for cost control and ease of deployment. Containers have emerged as a strong and viable alternative to hypervisors. Containers are seeing a rapid increase in deployment within software defined datacenters, largely driven by its ability to deliver true bare metal performance without the cost, complexity and overhead of hypervisor based virtualization.

      Solarflare XtremeScale Software-Defined NICs are a unique solution for Containers providing maximum efficiency, performance and security. Using a hybrid approach, Solarflare supports both kernel mode for an efficient Container solution while simultaneously offering a kernel bypass option to accelerate applications and networking, increasing scalability and providing both telemetry and security on a per-Container basis.

      Read more >
    • What is Lossless Network Capture, and Why it’s Vital to Your Mission
      What is Lossless Network Capture, and Why it’s Vital to Your Mission Scott Schweitzer and Les Davis Recorded: May 2 2017 5:00 pm UTC 42 mins
    • It’s commonly said in packet capture that the one packet you miss is ALWAYS the most important packet. That’s why lossless network packet capture is a vital component in the security and performance of your mission. Today given the huge traffic volumes common in most missions it’s not surprising to learn that many monitoring tools never see a complete picture of what it is they’re really monitoring. It is challenging to launch a forensic investigation into a problem knowing that perhaps some pieces of the puzzle may be missing.

      Please join us to learn how lossless network packet capture from Solarflare can provide agencies with an effective means of natively enhancing the security, and performance of their mission systems and applications.

      Read more >
    • "The Wire Can’t Lie" - Empowered by Solarflare’s New SolarCapture Product Range
      "The Wire Can’t Lie" - Empowered by Solarflare’s New SolarCapture Product Range Ramzi Zabaneh Recorded: Mar 14 2017 5:00 pm UTC 43 mins
    • “The Wire Can’t Lie”: From packet data to network management wisdom, empowered by Solarflare’s new SolarCapture product range

      This webinar will cover:
      - Consolidated network monitoring can be used to rapidly identify, isolate and solve application and business problems in finance, service provider and government networks, with typical use cases

      - Both ROI and flexibility can be optimized through the powerful feature set of the new SolarCapture turnkey solution, with 40 GbE lossless-to-disk packet capture provided in an open platform

      - SolarCapture is special, key products, functionality and options in the SolarCapture family, as well as details on upcoming product features

      Read more >
    • Enhancing Performance and Security of Mission Apps with Enhanced Networking
      Enhancing Performance and Security of Mission Apps with Enhanced Networking Scott Schweitzer, Bob Gourley Recorded: Jan 31 2017 6:00 pm UTC 46 mins
    • It has been said that latency breeds contempt, this is especially true in the defense and intelligence communities where seconds can be the difference between life and death. In order to keep pace with rapidly evolving mission demands, agencies are constantly advancing their capabilities in the areas of distributed analytics and private cloud. Today, agency compute infrastructures rely on networking, not only for the delivery of content to end users, but increasingly for the distributed real-time processing of mission critical data. However, the server market, once dominated by differentiated offerings from a myriad of OEMs, has been commoditized by the adoption of virtualization and cloud computing technologies and services. While this commoditization has led to countless new analytic capabilities, it has also shifted the focus away from the hardware components and onto the software stack which has, in turn, created inefficiencies in both the overall performance and security of deployed systems.


      Join us to learn more about how enhanced networking capabilities from Solarflare can provide Agencies with a cost effective means of natively enhancing the performance and security of mission systems and applications.

      Read more >
    • The Power of Policy
      The Power of Policy Dave Ewart, Senior Director Product Marketing Recorded: Jun 25 2014 4:00 pm UTC 40 mins
    • Today’s business is made up of two opposing forces; closed policies enforced by IT and governance, and the open connectivity and mobility that users require.

      Join our webinar ‘The Power of Policy’ as we uncover key drivers for policy implementation and discuss new thinking and technologies for securing collaboration and file sharing.

      Attend to learn:

      • The legal requirements, user needs, and risk that drive policy enforcement
      • The required capabilities to facilitate compliance, risk mitigation, and data leakage prevention
      • Best practice and real world examples for harmonizing the need for policy with the need for mobility

      Read more >