3M has developed, introduced and commercialized an unprecedented sustainable halocarbon clean extinguishing agent whereby researchers have struck a balance of not only being effective in fire extinguishing but also demonstrating superior environmental properties in combination with a low toxicity and reduced space and weight requirements. It should also possess sufficient chemical/thermal stability during handling and in end use.. This halocarbon belongs to the fluoroketone class. The chemical formula of CF3CF2C(O)C(CF3)2 is identified in the new ISO 14520 standard by the ASHRAE nomenclature FK-5-1-12.
Commercially known as 3MTM Novec™ 1230 Fire Protection Fluid and manufactured by 3M Company, this novel clean extinguishing agent has been shown to combine the performance and environmental attributes sought by industries that demand the high level of performance previously provided by halon until its phase-out. Compared to inert gas and water mist, systems using Novec 1230 fluid are much compacter and as such require much less space (and weight concerns).
What is unprecedented is this fluoromaterial's environmental properties that are on the order of naturally occurring compounds. Novec 1230 fluid has a surprisingly short atmospheric lifetime and yet has exhibited the stability necessary for use as a clean extinguishing agent.
Novec 1230 fluid was introduced in 2002 as a halon replacement alternative to HFCs and now has a history of use globally for the protection of special hazards / high value assets, especially in occupied spaces resulting in greenhouse gas emission reduction in industries where environmental objectives stress the use of sustainable technologies.
Join the first www.itsecurityguru.org webinar on: "If there are so many vulnerabilities, why isn't the world on fire?"
In this inaugural webcast from IT Security Guru, editor Dan Raywood will be joined by some of information security's biggest names to discuss if there are so many flaws in hardware, software and open source projects, why is the world not at a standstill? Recently flaws have been revealed to be present in the US military's missile system (http://itsecurityguru.org/top-ten-stories/pentagon-reports-concerns-flaws-missile-defences/), and as well as a monthly patch for the most used browser (http://www.netmarketshare.com/browser-market-share.aspx?qprid=2&qpcustomd=0) and the open source communication protocol used by thousands of websites, so why is the world not on fire with this in mind?
For this webcast, we will be joined by industrial controls and cyber risk researcher Lewis Henderson, who brings 15 years of experience of enterprise and Government-level advanced technical security solution knowledge. Lewis has published a series of Management Guides, geared towards promoting Cyber Risk to the C suite.
Also speaking is Conrad Constantine, formerly of AlienVault and the man who caught the RSA breach. Over the past year Conrad has been coding full time on a project after spending 15 years on the front lines of defence work in telecom, medical and media corporations.
Finally we also welcome Cris Thomas, technical manager at Tenable and a former member of the hacker collective L0pht. Chris was known as Spacerogue and his work included creating the Hacker News Network and The Whacked Mac Archives, which was the largest and the most popular Macintosh security website.
Join us at 3pm on Wednesday 30th July for a lively and humorous debate on the state of security when it comes to insecure applications and platforms, and help you realise both how to manage with vulnerabilities and fix what our speakers deem to be the most critical flaws first.
Kindle Fire is not just for reading your favorite novel anymore!
Kindle Fire devices, like the new Kindle Fire HD and HDX are making inroads in the workplace with employees accessing email and sensitive data through corporate networks. Including Kindle Fire products in your BYOD program can reap significant productivity benefits for businesses, schools, healthcare and all types of organizations, but security is key.
View this webinar to learn about:
- New Kindle Fire devices and Amazon's Fire OS 3.0 "Mojito" and how they advance productivity in the enterprise
- How schools can deliver powerful educational content on Kindle Fire devices while protecting student privacy
- How to use MaaS360 to secure Amazon's Fire OS 3.0 "Mojito" for Kindle Fire HD and HDX tablets in BYOD programs
MaaS360 integration with Kindle Fire provides the controls for IT to confidently embrace Kindle Fire tablets knowing that sensitive data and network access can be secured easily and reliably. Enterprise features available on the Kindle Fire HD and HDX include device encryption, native VPN client, single sign-on, and certificate-based enrollment.
Kaushik Srinivas, Product Manager at Fiberlink, presents new Kindle Fire product advances and show you how you can quickly and easily incorporate these powerful devices in your BYOD and education programs.
In the landscape of vulnerability management, you know that effective prioritization of vulnerabilities is the difference between "playing the numbers game" and truly being an InfoSec rock star. But too often, our primary resource--the CVSS--is relied on too heavily, with disastrous consequences.
Michael Roytman, Chief Data Scientist at Kenna, will explain what IT security professionals miss by placing too much trust in CVSS when it comes to prioritization efforts. He will also explain what information should absolutely be taken into consideration in order to focus on vulnerabilities posing the greatest risk. Topics covered include:
- Why CVSS sometimes gets it wrong
- Specific examples of serious exploits being given low scores
- What IT security professionals should do to supplement CVSS
- How the proper use of threat intelligence can accelerate your vuln management program
This webcast examines the critical steps for an ideal security change workflow and offers ways to automate the entire firewall change management process. It includes a demonstration of the AlgoSec Security Management Suite, using a real-life firewall change request.Read more >
Join us for this exciting webinar as we introduce the FireEye Labs Advanced Reverse Engineering (F.L.A.R.E.) and learn about:
* FLARE's background, mission and industry-leading team members
* Reversing Agent .BTZ (Case Study)
* Reversing .NET samples (Case Study)
* Proactive assessment of security software via RE (Case Study)
You'll also get an in-depth look at two prevalent malware families and learn how to combat against these targeted attacks.
Many IT Operations teams are trying to cope with the increasing complexity of their environment but are struggling to move beyond the perpetual “fire-fighting” mode of operation. Transforming IT Operations from reactive to predictive is a challenging journey. But staying on track is much easier when you can follow a well-travelled path.
HP Software Professional Services has been at the epicenter of the IT Operations environment and learned the best ways to transform service management across the organization. We’ll share our Business Service Management (BSM) maturity model and how it can help you evolve your IT operations from reactive to predictive management. In this session you will find out:
• What the BSM maturity model is
• How to tell where you are and w hat new capabilities you need in order to increase your maturity
• How you can use a maturity-based approach to manage business services
Are you tired of reactive service management? Join this webinar to find out how to begin the journey toward proactive service management with process integration.Read more >
Only 22% of data breaches are as a result of an external attack on corporate servers . In the vast majority of cases, breaches involve the inadvertent mishandling of information by insiders or third party partners. For example: a confidential document is accidentally sent to the wrong person, an employee drops files into a consumer-grade file sharing solution to access them on holiday, or an organisation terminates a relationship with a partner or supplier after having shared proprietary information with them.
Enabling your staff to work remotely, on a multitude of devices, and on unsecured networks is essential for many 21st century businesses. However, such a model also has very specific risks, particularly for financial services, life sciences and other IP-intensive industries.
This webcast addresses the technological challenges of maintaining full control of your most sensitive information - even once it goes beyond the firewall - while maintaining the freedom and flexibility necessary to allow your staff and other stakeholders to work as efficiently as possible.
Stewart Room, Partner, Field Fisher Waterhouse
Nick Harwood, Lead Security Specialist, Barclays
Bola Rotibi, Founding Member, (ISC)2 Application Security Advisory Board
Richard Anstey, EMEA CTO, Intralinks
Cloud applications and BYOD have brought new functionality to enterprise networks—and unfortunately, also new security weaknesses and opportunities for cyber espionage. Theft of intellectual property and proprietary data now amounts to billions of dollars in losses each year.
Register now for this webcast with lead analyst firm Gartner that explores how Internal Segmentation Firewalls (ISFW) close a major security gap for businesses of all sizes.
Learn about the growing pervasiveness of targeted attacks worldwide, with current data that shows how a single malicious breach can cripple a company
Understand how ISFWs differ from traditional firewalls—and why they can uniquely reduce the attack surface, contain internal threats, and minimize damages after a breach occurs
Find out why multi-gigabit performance is critical to an ISFW’s ability to provide deep visibility without slowing down the network
Don’t miss the “Strong on the Inside: The Growing Need for Internal Segmentation Firewalls” webcast, featuring leading experts from Gartner and Fortinet as they discuss the latest in internal network security for today’s threat landscape.
Who says submitting a request or reporting an issue has to take forever? Done right, an IT self-service portal enables users to request IT services, log issues, search a knowledge base and track progress in seconds without picking up the phone or sending a single email. Turn service requests into a one-stop shopping experience before they become “fires” for your organization.
Attend this webinar and learn:
• How to enable a consumer-like experience across IT and throughout your business
• Ways to improve service quality with automation
• Tips for how to share information through a centralized knowledge base
This morning’s presenters regroup for this panel session, in which Dennis Hall represents the advising community. He’ll ask the questions his peers need answered to help them build smarter portfolios for clients and seek the panel’s views on the challenges the advising community faces and how they should overcome these issues.Read more >
Time and territory management is elusive and yet so essential. Join us for 7 sure-fire sales hacks from real sellers who found smart workarounds and processes to become more productive every single day.Read more >
In today’s world of bi-modal IT, the battle continues to rage between CMOs wanting to make rapid-fire technology purchasing decisions and IT teams struggling to balance business integrity while at the same time evaluating and implementing new technologies. That battle is never truer than when it comes to Partner Relationship Management (PRM) solutions, which have been proven to as much as double indirect sales, but are often bogged down by organizational alignment issues. This new webinar featuring Global SaaS PRM leader Impartner CMO Dave R Taylor and Gartner Research Director and PRM Analyst Ilona Hansen, outlines the following five key questions sales and marketing pros need to ask up front to streamline PRM purchase decisions with IT.Read more >
Webinars are a powerful tool for engaging prospects and filling the sales funnel, and their increasing popularity amongst B2B marketing and sales teams is a testament to this. However, developing effective presentations for your online audience is easier said than done.When delivering remote presentations, speakers are often competing with email, social media, YouTube and the likes.So, how do you get your key message to resonate with your audience in an engaging, persuasive, and memorable way in this era of perpetual digital distraction?
In the age of Big Data, this is where science comes in. Research has shown that there are numerous tactics to take your webinar presentations to the next level.
In this session, Susannah Shattuck, Content Marketing Manager at Prezi, and Dallas Jessup, Content Marketing Manager at BrightTALK, will narrow down the must-implement tactics and discuss:
- How to be a more persuasive presenter - backed by science;
- Sure-fire ways to ensure your message is ingrained into your audience’s brains;
- Why you should focus on visuals and stories for revenue generating webinar presentations.
One of the challenges of being a sales leader is leading change. In today’s competitive marketplace, salespeople must be willing and able to adapt to changes, such as focusing on a new customer segment or a new product, for instance. Often these changes are met with resistance, especially from top performing salespeople who are comfortable with the way things currently are.
As a leader, how do you overcome resistance to change? How can you accelerate the change process?
In this webinar, Matt Hallett and Dr. Bobby Hoffman will talk about the psychological aspects behind change and discuss practical strategies you can implement to help create a well-oiled sales machine that fires on all cylinders.
Note: The views expressed in this webinar are the views of the authors and do not necessarily reflect the
views of AvidXchange or the University of Central Florida.
Listen to real-world examples of how Lean IT made a difference.
•Better IT customer service desk by reducing Muda (waste) to improve incident flow.
•IT prevents loss of major business customers by reducing Mura (variance) to improve customer services.
•Service Desk managers develop strategy & tactics to free up executive resources by reducing time spent on major outages.
See how Lean CSI methods, tools and techniques were used to overcome barriers to change.
•Everything is top priority
•Too busy fire-fighting
•That’s never worked here before
•No executive buy-in
•Under time-crunch to get things done
•Resource capacity/skill/knowledge constraints
•People naturally resist change
•Making improvements stick and deliver value is not easy.
This session is to share how IT Managers used proven Lean IT improvement practices to deliver quality to customers, identify waste and eliminate it, improve efficiency and the overall speed of execution.
The traditional performance management approach of ratings and annual appraisals is under fire, and rightly so. But what do you do instead?
This webinar is a shortened version of my all day workshop at December’s CIPD Performance Management Conference and will look at an alternative approach where you will learn about...
· The wider performance system operating in your organisation.
· A diagnostics tool to discover the levers to pull to change the system.
· Capability, and how to view it in a new way to improve future performance
· The real role managers should play in performance management.