Hi [[ session.user.profile.firstName ]]
Sort by:
    • Sustainable fire suppression solution for data centres - 10am CET, April 3rd Sustainable fire suppression solution for data centres - 10am CET, April 3rd Bart Goeman, 3M Electronics Markets Materials Division Recorded: Apr 3 2012 11:00 am UTC 48 mins
    • 3M has developed, introduced and commercialized an unprecedented sustainable halocarbon clean extinguishing agent whereby researchers have struck a balance of not only being effective in fire extinguishing but also demonstrating superior environmental properties in combination with a low toxicity and reduced space and weight requirements. It should also possess sufficient chemical/thermal stability during handling and in end use.. This halocarbon belongs to the fluoroketone class. The chemical formula of CF3CF2C(O)C(CF3)2 is identified in the new ISO 14520 standard by the ASHRAE nomenclature FK-5-1-12.
      Commercially known as 3MTM Novec™ 1230 Fire Protection Fluid and manufactured by 3M Company, this novel clean extinguishing agent has been shown to combine the performance and environmental attributes sought by industries that demand the high level of performance previously provided by halon until its phase-out. Compared to inert gas and water mist, systems using Novec 1230 fluid are much compacter and as such require much less space (and weight concerns).
      What is unprecedented is this fluoromaterial's environmental properties that are on the order of naturally occurring compounds. Novec 1230 fluid has a surprisingly short atmospheric lifetime and yet has exhibited the stability necessary for use as a clean extinguishing agent.
      Novec 1230 fluid was introduced in 2002 as a halon replacement alternative to HFCs and now has a history of use globally for the protection of special hazards / high value assets, especially in occupied spaces resulting in greenhouse gas emission reduction in industries where environmental objectives stress the use of sustainable technologies.

      Read more >
    • If there are so many vulnerabilities, why isn't the world on fire? If there are so many vulnerabilities, why isn't the world on fire? Dan Raywood, Editor of IT Security Guru Recorded: Jul 30 2014 2:00 pm UTC 39 mins
    • Join the first www.itsecurityguru.org webinar on: "If there are so many vulnerabilities, why isn't the world on fire?"

      In this inaugural webcast from IT Security Guru, editor Dan Raywood will be joined by some of information security's biggest names to discuss if there are so many flaws in hardware, software and open source projects, why is the world not at a standstill? Recently flaws have been revealed to be present in the US military's missile system (http://itsecurityguru.org/top-ten-stories/pentagon-reports-concerns-flaws-missile-defences/), and as well as a monthly patch for the most used browser (http://www.netmarketshare.com/browser-market-share.aspx?qprid=2&qpcustomd=0) and the open source communication protocol used by thousands of websites, so why is the world not on fire with this in mind?

      For this webcast, we will be joined by industrial controls and cyber risk researcher Lewis Henderson, who brings 15 years of experience of enterprise and Government-level advanced technical security solution knowledge. Lewis has published a series of Management Guides, geared towards promoting Cyber Risk to the C suite.

      Also speaking is Conrad Constantine, formerly of AlienVault and the man who caught the RSA breach. Over the past year Conrad has been coding full time on a project after spending 15 years on the front lines of defence work in telecom, medical and media corporations.
      Finally we also welcome Cris Thomas, technical manager at Tenable and a former member of the hacker collective L0pht. Chris was known as Spacerogue and his work included creating the Hacker News Network and The Whacked Mac Archives, which was the largest and the most popular Macintosh security website.

      Join us at 3pm on Wednesday 30th July for a lively and humorous debate on the state of security when it comes to insecure applications and platforms, and help you realise both how to manage with vulnerabilities and fix what our speakers deem to be the most critical flaws first.

      Read more >
    • Kindle Fire in the Workplace - New Enterprise Features! Kindle Fire in the Workplace - New Enterprise Features! Kaushik Srinivas, Product Manager at Fiberlink Recorded: Oct 10 2013 6:50 pm UTC 53 mins
    • Kindle Fire is not just for reading your favorite novel anymore!

      Kindle Fire devices, like the new Kindle Fire HD and HDX are making inroads in the workplace with employees accessing email and sensitive data through corporate networks. Including Kindle Fire products in your BYOD program can reap significant productivity benefits for businesses, schools, healthcare and all types of organizations, but security is key.

      View this webinar to learn about:

      - New Kindle Fire devices and Amazon's Fire OS 3.0 "Mojito" and how they advance productivity in the enterprise
      - How schools can deliver powerful educational content on Kindle Fire devices while protecting student privacy
      - How to use MaaS360 to secure Amazon's Fire OS 3.0 "Mojito" for Kindle Fire HD and HDX tablets in BYOD programs

      MaaS360 integration with Kindle Fire provides the controls for IT to confidently embrace Kindle Fire tablets knowing that sensitive data and network access can be secured easily and reliably. Enterprise features available on the Kindle Fire HD and HDX include device encryption, native VPN client, single sign-on, and certificate-based enrollment.

      Kaushik Srinivas, Product Manager at Fiberlink, presents new Kindle Fire product advances and show you how you can quickly and easily incorporate these powerful devices in your BYOD and education programs.

      Read more >
    • CVSS Under Fire: How to Solve The Prioritization Problem CVSS Under Fire: How to Solve The Prioritization Problem Michael Roytman, Chief Data Scientist at Kenna Recorded: Aug 26 2015 3:45 pm UTC 43 mins
    • In the landscape of vulnerability management, you know that effective prioritization of vulnerabilities is the difference between "playing the numbers game" and truly being an InfoSec rock star. But too often, our primary resource--the CVSS--is relied on too heavily, with disastrous consequences.

      Michael Roytman, Chief Data Scientist at Kenna, will explain what IT security professionals miss by placing too much trust in CVSS when it comes to prioritization efforts. He will also explain what information should absolutely be taken into consideration in order to focus on vulnerabilities posing the greatest risk. Topics covered include:

      - Why CVSS sometimes gets it wrong
      - Specific examples of serious exploits being given low scores
      - What IT security professionals should do to supplement CVSS
      - How the proper use of threat intelligence can accelerate your vuln management program

      Read more >
    • Move beyond the fire-fighting with predictive service operations Move beyond the fire-fighting with predictive service operations Gerben Verstraete, HP Software Recorded: Feb 20 2014 6:00 pm UTC 41 mins
    • Many IT Operations teams are trying to cope with the increasing complexity of their environment but are struggling to move beyond the perpetual “fire-fighting” mode of operation. Transforming IT Operations from reactive to predictive is a challenging journey. But staying on track is much easier when you can follow a well-travelled path.

      HP Software Professional Services has been at the epicenter of the IT Operations environment and learned the best ways to transform service management across the organization. We’ll share our Business Service Management (BSM) maturity model and how it can help you evolve your IT operations from reactive to predictive management. In this session you will find out:

      • What the BSM maturity model is
      • How to tell where you are and w hat new capabilities you need in order to increase your maturity
      • How you can use a maturity-based approach to manage business services

      Read more >
    • Security Beyond the (Fire)wall Security Beyond the (Fire)wall Lead Security Specialist,Barclays,(ISC)2 Apps Security Advisory Board; Partner, Field Fisher Waterhouse; EMEA CTO, Intralinks Recorded: Jun 19 2013 2:00 pm UTC 61 mins
    • Only 22% of data breaches are as a result of an external attack on corporate servers . In the vast majority of cases, breaches involve the inadvertent mishandling of information by insiders or third party partners. For example: a confidential document is accidentally sent to the wrong person, an employee drops files into a consumer-grade file sharing solution to access them on holiday, or an organisation terminates a relationship with a partner or supplier after having shared proprietary information with them.

      Enabling your staff to work remotely, on a multitude of devices, and on unsecured networks is essential for many 21st century businesses. However, such a model also has very specific risks, particularly for financial services, life sciences and other IP-intensive industries.

      This webcast addresses the technological challenges of maintaining full control of your most sensitive information - even once it goes beyond the firewall - while maintaining the freedom and flexibility necessary to allow your staff and other stakeholders to work as efficiently as possible.

      Speakers include:
      Stewart Room, Partner, Field Fisher Waterhouse
      Nick Harwood, Lead Security Specialist, Barclays
      Bola Rotibi, Founding Member, (ISC)2 Application Security Advisory Board
      Richard Anstey, EMEA CTO, Intralinks

      Read more >
    • STRONG ON THE INSIDE: The Growing Need for Internal Segmentation Firewalls STRONG ON THE INSIDE: The Growing Need for Internal Segmentation Firewalls Fortinet and Gartner Recorded: Mar 21 2016 8:40 pm UTC 220 mins
    • Cloud applications and BYOD have brought new functionality to enterprise networks—and unfortunately, also new security weaknesses and opportunities for cyber espionage. Theft of intellectual property and proprietary data now amounts to billions of dollars in losses each year.

      Register now for this webcast with lead analyst firm Gartner that explores how Internal Segmentation Firewalls (ISFW) close a major security gap for businesses of all sizes.

      Learn about the growing pervasiveness of targeted attacks worldwide, with current data that shows how a single malicious breach can cripple a company

      Understand how ISFWs differ from traditional firewalls—and why they can uniquely reduce the attack surface, contain internal threats, and minimize damages after a breach occurs

      Find out why multi-gigabit performance is critical to an ISFW’s ability to provide deep visibility without slowing down the network

      Don’t miss the “Strong on the Inside: The Growing Need for Internal Segmentation Firewalls” webcast, featuring leading experts from Gartner and Fortinet as they discuss the latest in internal network security for today’s threat landscape.

      http://glowpoint.com/wp-content/uploads/2015/02/gartner-logo.png

      Read more >
    • The Science of Engaging Webinar Presentations The Science of Engaging Webinar Presentations Susannah Shattuck, Content Marketing Manager at Prezi and Dallas Jessup, Content Marketing Manager at BrightTALK Upcoming: May 18 2016 4:00 pm UTC 45 mins
    • Webinars are a powerful tool for engaging prospects and filling the sales funnel, and their increasing popularity amongst B2B marketing and sales teams is a testament to this. However, developing effective presentations for your online audience is easier said than done.When delivering remote presentations, speakers are often competing with email, social media, YouTube and the likes.So, how do you get your key message to resonate with your audience in an engaging, persuasive, and memorable way in this era of perpetual digital distraction?

      In the age of Big Data, this is where science comes in. Research has shown that there are numerous tactics to take your webinar presentations to the next level.

      In this session, Susannah Shattuck, Content Marketing Manager at Prezi, and Dallas Jessup, Content Marketing Manager at BrightTALK, will narrow down the must-implement tactics and discuss:
      - How to be a more persuasive presenter - backed by science;
      - Sure-fire ways to ensure your message is ingrained into your audience’s brains;
      - Why you should focus on visuals and stories for revenue generating webinar presentations.

      Read more >
    • Better Customer Service Desk using Lean IT Thinking Better Customer Service Desk using Lean IT Thinking David Smith President Micromation Inc. ITSM, ITIL, Lean, Kaizen, ISO, TCO, Author – Implementing Metrics Recorded: Mar 16 2016 3:00 pm UTC 44 mins
    • Listen to real-world examples of how Lean IT made a difference.
      •Better IT customer service desk by reducing Muda (waste) to improve incident flow.
      •IT prevents loss of major business customers by reducing Mura (variance) to improve customer services.
      •Service Desk managers develop strategy & tactics to free up executive resources by reducing time spent on major outages.

      See how Lean CSI methods, tools and techniques were used to overcome barriers to change.
      •Everything is top priority
      •Too busy fire-fighting
      •That’s never worked here before
      •No executive buy-in
      •Under time-crunch to get things done
      •Resource capacity/skill/knowledge constraints
      •People naturally resist change
      •Making improvements stick and deliver value is not easy.

      This session is to share how IT Managers used proven Lean IT improvement practices to deliver quality to customers, identify waste and eliminate it, improve efficiency and the overall speed of execution.

      Read more >