3M has developed, introduced and commercialized an unprecedented sustainable halocarbon clean extinguishing agent whereby researchers have struck a balance of not only being effective in fire extinguishing but also demonstrating superior environmental properties in combination with a low toxicity and reduced space and weight requirements. It should also possess sufficient chemical/thermal stability during handling and in end use.. This halocarbon belongs to the fluoroketone class. The chemical formula of CF3CF2C(O)C(CF3)2 is identified in the new ISO 14520 standard by the ASHRAE nomenclature FK-5-1-12.
Commercially known as 3MTM Novec™ 1230 Fire Protection Fluid and manufactured by 3M Company, this novel clean extinguishing agent has been shown to combine the performance and environmental attributes sought by industries that demand the high level of performance previously provided by halon until its phase-out. Compared to inert gas and water mist, systems using Novec 1230 fluid are much compacter and as such require much less space (and weight concerns).
What is unprecedented is this fluoromaterial's environmental properties that are on the order of naturally occurring compounds. Novec 1230 fluid has a surprisingly short atmospheric lifetime and yet has exhibited the stability necessary for use as a clean extinguishing agent.
Novec 1230 fluid was introduced in 2002 as a halon replacement alternative to HFCs and now has a history of use globally for the protection of special hazards / high value assets, especially in occupied spaces resulting in greenhouse gas emission reduction in industries where environmental objectives stress the use of sustainable technologies.
Join the first www.itsecurityguru.org webinar on: "If there are so many vulnerabilities, why isn't the world on fire?"
In this inaugural webcast from IT Security Guru, editor Dan Raywood will be joined by some of information security's biggest names to discuss if there are so many flaws in hardware, software and open source projects, why is the world not at a standstill? Recently flaws have been revealed to be present in the US military's missile system (http://itsecurityguru.org/top-ten-stories/pentagon-reports-concerns-flaws-missile-defences/), and as well as a monthly patch for the most used browser (http://www.netmarketshare.com/browser-market-share.aspx?qprid=2&qpcustomd=0) and the open source communication protocol used by thousands of websites, so why is the world not on fire with this in mind?
For this webcast, we will be joined by industrial controls and cyber risk researcher Lewis Henderson, who brings 15 years of experience of enterprise and Government-level advanced technical security solution knowledge. Lewis has published a series of Management Guides, geared towards promoting Cyber Risk to the C suite.
Also speaking is Conrad Constantine, formerly of AlienVault and the man who caught the RSA breach. Over the past year Conrad has been coding full time on a project after spending 15 years on the front lines of defence work in telecom, medical and media corporations.
Finally we also welcome Cris Thomas, technical manager at Tenable and a former member of the hacker collective L0pht. Chris was known as Spacerogue and his work included creating the Hacker News Network and The Whacked Mac Archives, which was the largest and the most popular Macintosh security website.
Join us at 3pm on Wednesday 30th July for a lively and humorous debate on the state of security when it comes to insecure applications and platforms, and help you realise both how to manage with vulnerabilities and fix what our speakers deem to be the most critical flaws first.
Kindle Fire is not just for reading your favorite novel anymore!
Kindle Fire devices, like the new Kindle Fire HD and HDX are making inroads in the workplace with employees accessing email and sensitive data through corporate networks. Including Kindle Fire products in your BYOD program can reap significant productivity benefits for businesses, schools, healthcare and all types of organizations, but security is key.
View this webinar to learn about:
- New Kindle Fire devices and Amazon's Fire OS 3.0 "Mojito" and how they advance productivity in the enterprise
- How schools can deliver powerful educational content on Kindle Fire devices while protecting student privacy
- How to use MaaS360 to secure Amazon's Fire OS 3.0 "Mojito" for Kindle Fire HD and HDX tablets in BYOD programs
MaaS360 integration with Kindle Fire provides the controls for IT to confidently embrace Kindle Fire tablets knowing that sensitive data and network access can be secured easily and reliably. Enterprise features available on the Kindle Fire HD and HDX include device encryption, native VPN client, single sign-on, and certificate-based enrollment.
Kaushik Srinivas, Product Manager at Fiberlink, presents new Kindle Fire product advances and show you how you can quickly and easily incorporate these powerful devices in your BYOD and education programs.
In the landscape of vulnerability management, you know that effective prioritization of vulnerabilities is the difference between "playing the numbers game" and truly being an InfoSec rock star. But too often, our primary resource--the CVSS--is relied on too heavily, with disastrous consequences.
Michael Roytman, Chief Data Scientist at Kenna, will explain what IT security professionals miss by placing too much trust in CVSS when it comes to prioritization efforts. He will also explain what information should absolutely be taken into consideration in order to focus on vulnerabilities posing the greatest risk. Topics covered include:
- Why CVSS sometimes gets it wrong
- Specific examples of serious exploits being given low scores
- What IT security professionals should do to supplement CVSS
- How the proper use of threat intelligence can accelerate your vuln management program
Join us for this exciting webinar as we introduce the FireEye Labs Advanced Reverse Engineering (F.L.A.R.E.) and learn about:
* FLARE's background, mission and industry-leading team members
* Reversing Agent .BTZ (Case Study)
* Reversing .NET samples (Case Study)
* Proactive assessment of security software via RE (Case Study)
You'll also get an in-depth look at two prevalent malware families and learn how to combat against these targeted attacks.
Many IT Operations teams are trying to cope with the increasing complexity of their environment but are struggling to move beyond the perpetual “fire-fighting” mode of operation. Transforming IT Operations from reactive to predictive is a challenging journey. But staying on track is much easier when you can follow a well-travelled path.
HP Software Professional Services has been at the epicenter of the IT Operations environment and learned the best ways to transform service management across the organization. We’ll share our Business Service Management (BSM) maturity model and how it can help you evolve your IT operations from reactive to predictive management. In this session you will find out:
• What the BSM maturity model is
• How to tell where you are and w hat new capabilities you need in order to increase your maturity
• How you can use a maturity-based approach to manage business services
Are you tired of reactive service management? Join this webinar to find out how to begin the journey toward proactive service management with process integration.Read more >
Only 22% of data breaches are as a result of an external attack on corporate servers . In the vast majority of cases, breaches involve the inadvertent mishandling of information by insiders or third party partners. For example: a confidential document is accidentally sent to the wrong person, an employee drops files into a consumer-grade file sharing solution to access them on holiday, or an organisation terminates a relationship with a partner or supplier after having shared proprietary information with them.
Enabling your staff to work remotely, on a multitude of devices, and on unsecured networks is essential for many 21st century businesses. However, such a model also has very specific risks, particularly for financial services, life sciences and other IP-intensive industries.
This webcast addresses the technological challenges of maintaining full control of your most sensitive information - even once it goes beyond the firewall - while maintaining the freedom and flexibility necessary to allow your staff and other stakeholders to work as efficiently as possible.
Stewart Room, Partner, Field Fisher Waterhouse
Nick Harwood, Lead Security Specialist, Barclays
Bola Rotibi, Founding Member, (ISC)2 Application Security Advisory Board
Richard Anstey, EMEA CTO, Intralinks
Who says submitting a request or reporting an issue has to take forever? Done right, an IT self-service portal enables users to request IT services, log issues, search a knowledge base and track progress in seconds without picking up the phone or sending a single email. Turn service requests into a one-stop shopping experience before they become “fires” for your organization.
Attend this webinar and learn:
• How to enable a consumer-like experience across IT and throughout your business
• Ways to improve service quality with automation
• Tips for how to share information through a centralized knowledge base
This morning’s presenters regroup for this panel session, in which Dennis Hall represents the advising community. He’ll ask the questions his peers need answered to help them build smarter portfolios for clients and seek the panel’s views on the challenges the advising community faces and how they should overcome these issues.Read more >
The traditional performance management approach of ratings and annual appraisals is under fire, and rightly so. But what do you do instead?
This webinar is a shortened version of my all day workshop at December’s CIPD Performance Management Conference and will look at an alternative approach where you will learn about...
· The wider performance system operating in your organisation.
· A diagnostics tool to discover the levers to pull to change the system.
· Capability, and how to view it in a new way to improve future performance
· The real role managers should play in performance management.
How to generate real business value with microservices.
The Microservices movement has caught fire in enterprise IT. Companies of all sizes are investigating how they can emulate the successes and characteristics of companies like Netflix, Amazon and Gilt. While much of the discussion around Microservices focuses on technological aspects such as containerization and automation, there is also business strategy to consider.
Join this webinar to learn:
- The importance of strategy, culture, organization and product thinking in your microservices approach
- How companies are using microservices to add real business value
- Practical steps you can take to bring microservices into your organization
DevOps is a key ingredient for success to meet the rapid fire changes of the Digital Revolution. Despite that fact - many projects start out with the right intentions but quickly fizzle and fade because of common implementation mistakes that impact the Business and IT alike. Join Guest Speakers - Andi Mann (formerly of CA/EMA) and Brian Elkins (VP Technology) along with host Jeanne Morain - for tips, tricks and strategies for avoiding or recovering from common DevOps implementation mistakes.Read more >
Just as any organization can face risks and threats and have vulnerabilities; the same is true with members of supply chains. Individual suppliers can be at risk through a variety of events, such as fires, floods, technology failures and power outages.
This webinar discusses risks to supply chains and will provide guidance on identifying those risks and defining strategies for mitigating them.
Fires. Storms. Floods. Attacks. When you think of disasters, you may think of the headlines in the news and the pictures of communities recovering from misfortune. But think for a moment of how much your school depends on its technology and how much smoother the return to normalcy could be after a disaster if you had the peace of mind that your school's data was protected, backed-up and recoverable. That's one less worry.
Join us for Microsoft Azure for Disaster Recovery in Education to learn how to have a strong disaster recovery solution in place in case the worst-case scenario happens. Learn how Microsoft Azure can help you eliminate the need for investment in expensive backup datacenter or hosting-based disaster recovery solutions.
This session will cover how you can:
•Lower traditional cost of operating: roughly 50% cost reduction over most on-premises disaster recovery
•Gain peace of mind: Reliable, offsite, & potentially geo-replicated backup storage
•Benefit from increased uptime: 99.9% availability guaranteed Fast, automatic, testable backups
Plus, learn more about how a disaster recovery plan and assessment by SADA Systems, a Microsoft U.S. Education Cloud Productivity Partner of the Year ensures that your organization is prepared for the unexpected before it’s too late.
Regular and representative testing is the only sure-fire way of confirming that you have the capability, people, and processes in place to respond to unplanned events - whether they be positive, such as a sudden increase in demand for your products, or negative, such as a fire in your Head Office. However, at IBM we believe that Resilience should be designed in from the start; not just in IT systems but across the entire seven layer model of all Enterprises - from the Business Strategy, through the Organisational structure, within the Applications that support Business processes, through infrastructure and into the underlying building fabric of office and data centres.
Dr Martin Jowett and Dr Peter Newport MCBI will outline the important aspects all Enterprises should be adopting to prepare themselves for today's modern Business demands as the need to be 'always on' becomes a reality.