Hi [[ session.user.profile.firstName ]]
Sort by:
    • Saving Your Bacon with the Cloud When Your Data Center is On Fire
      Saving Your Bacon with the Cloud When Your Data Center is On Fire Kenneth Hui, Technical Marketing Engineer at Rubrik Recorded: Oct 12 2017 9:30 pm UTC 33 mins
    • Ok, so your data center may not catch on fire (at least we hope not). However, the consequences can be just as dire if critical data is lost, a virtual machine crashes or a portion of your data center becomes unavailable. In an emergency, how confident are you about restoring your company’s data in a timely fashion, especially when every minute of downtime may mean lost revenues from and credibility with your customers. What if your company can’t afford the cost of maintaining a disaster recovery site? How long would it take for you to recover from a site disaster?

      Participants will learn:

      - How you can leverage the public cloud for cost effective DR for your on-premises infrastructure

      - What factors do you need to consider to use the Cloud for DR

      - Different approaches to architecting DR in the Cloud, including pilot light, warm standby and hot site.

      Read more >
    • Enterprises under fire - how to manage risk and response
      Enterprises under fire - how to manage risk and response Kaspersky Lab Recorded: Sep 21 2017 1:00 pm UTC 87 mins
    • On Thursday, 21 September, from 14.00 to 15.30 BST/15.00 to 16.30 CET, Kaspersky Lab will be joined by senior business and IT experts at the Kaspersky CyberSecurity Summit 2017, to debate the top threats facing enterprises – and what they mean for CISOs in terms of incident response, business continuity and risk management. Participants will leave armed with clear, actionable intelligence.

      Speakers: Duncan Brown, Associate Vice President, European Security Practice, IDC; Christian Toon, Chief Information Security Officer, Pinsent Masons LLP; Roderick Clayton, EVP and Co-lead, Global Issues and Crisis, Weber Shandwick; Juan Andres Guerrero-Saade, Principal Security Researcher, Global Research and Analysis Team, Kaspersky Lab; and Alessio Aceti, Head of Enterprise Division, Kaspersky Lab.

      The event will be moderated by Geoff White, Television news reporter (BBC and Channel 4 News) and investigative journalist.

      The cyberthreat landscape is becoming ever more complex and destructive. Over the last 12 months, attacks targeting enterprises have increased significantly in both number and range – with a measurable impact on operations, revenue, customers and reputation.

      In this summit, experts from IT and business will discuss the most dangerous cyberthreats targeting enterprises, how to stay protected even when breached, as well as threat intelligence, incident response, the legal, insurance and communications challenges – and more.

      Participants will be able to join in the debate and ask questions. They will leave armed with clear, actionable intelligence.

      Read more >
    • Sustainable fire suppression solution for data centres - 10am CET, April 3rd
      Sustainable fire suppression solution for data centres - 10am CET, April 3rd Bart Goeman, 3M Electronics Markets Materials Division Recorded: Apr 3 2012 11:00 am UTC 48 mins
    • 3M has developed, introduced and commercialized an unprecedented sustainable halocarbon clean extinguishing agent whereby researchers have struck a balance of not only being effective in fire extinguishing but also demonstrating superior environmental properties in combination with a low toxicity and reduced space and weight requirements. It should also possess sufficient chemical/thermal stability during handling and in end use.. This halocarbon belongs to the fluoroketone class. The chemical formula of CF3CF2C(O)C(CF3)2 is identified in the new ISO 14520 standard by the ASHRAE nomenclature FK-5-1-12.
      Commercially known as 3MTM Novec™ 1230 Fire Protection Fluid and manufactured by 3M Company, this novel clean extinguishing agent has been shown to combine the performance and environmental attributes sought by industries that demand the high level of performance previously provided by halon until its phase-out. Compared to inert gas and water mist, systems using Novec 1230 fluid are much compacter and as such require much less space (and weight concerns).
      What is unprecedented is this fluoromaterial's environmental properties that are on the order of naturally occurring compounds. Novec 1230 fluid has a surprisingly short atmospheric lifetime and yet has exhibited the stability necessary for use as a clean extinguishing agent.
      Novec 1230 fluid was introduced in 2002 as a halon replacement alternative to HFCs and now has a history of use globally for the protection of special hazards / high value assets, especially in occupied spaces resulting in greenhouse gas emission reduction in industries where environmental objectives stress the use of sustainable technologies.

      Read more >
    • If there are so many vulnerabilities, why isn't the world on fire?
      If there are so many vulnerabilities, why isn't the world on fire? Dan Raywood, Editor of IT Security Guru Recorded: Jul 30 2014 2:00 pm UTC 39 mins
    • Join the first www.itsecurityguru.org webinar on: "If there are so many vulnerabilities, why isn't the world on fire?"

      In this inaugural webcast from IT Security Guru, editor Dan Raywood will be joined by some of information security's biggest names to discuss if there are so many flaws in hardware, software and open source projects, why is the world not at a standstill? Recently flaws have been revealed to be present in the US military's missile system (http://itsecurityguru.org/top-ten-stories/pentagon-reports-concerns-flaws-missile-defences/), and as well as a monthly patch for the most used browser (http://www.netmarketshare.com/browser-market-share.aspx?qprid=2&qpcustomd=0) and the open source communication protocol used by thousands of websites, so why is the world not on fire with this in mind?

      For this webcast, we will be joined by industrial controls and cyber risk researcher Lewis Henderson, who brings 15 years of experience of enterprise and Government-level advanced technical security solution knowledge. Lewis has published a series of Management Guides, geared towards promoting Cyber Risk to the C suite.

      Also speaking is Conrad Constantine, formerly of AlienVault and the man who caught the RSA breach. Over the past year Conrad has been coding full time on a project after spending 15 years on the front lines of defence work in telecom, medical and media corporations.
      Finally we also welcome Cris Thomas, technical manager at Tenable and a former member of the hacker collective L0pht. Chris was known as Spacerogue and his work included creating the Hacker News Network and The Whacked Mac Archives, which was the largest and the most popular Macintosh security website.

      Join us at 3pm on Wednesday 30th July for a lively and humorous debate on the state of security when it comes to insecure applications and platforms, and help you realise both how to manage with vulnerabilities and fix what our speakers deem to be the most critical flaws first.

      Read more >
    • Kindle Fire in the Workplace - New Enterprise Features!
      Kindle Fire in the Workplace - New Enterprise Features! Kaushik Srinivas, Product Manager at Fiberlink Recorded: Oct 10 2013 6:50 pm UTC 53 mins
    • Kindle Fire is not just for reading your favorite novel anymore!

      Kindle Fire devices, like the new Kindle Fire HD and HDX are making inroads in the workplace with employees accessing email and sensitive data through corporate networks. Including Kindle Fire products in your BYOD program can reap significant productivity benefits for businesses, schools, healthcare and all types of organizations, but security is key.

      View this webinar to learn about:

      - New Kindle Fire devices and Amazon's Fire OS 3.0 "Mojito" and how they advance productivity in the enterprise
      - How schools can deliver powerful educational content on Kindle Fire devices while protecting student privacy
      - How to use MaaS360 to secure Amazon's Fire OS 3.0 "Mojito" for Kindle Fire HD and HDX tablets in BYOD programs

      MaaS360 integration with Kindle Fire provides the controls for IT to confidently embrace Kindle Fire tablets knowing that sensitive data and network access can be secured easily and reliably. Enterprise features available on the Kindle Fire HD and HDX include device encryption, native VPN client, single sign-on, and certificate-based enrollment.

      Kaushik Srinivas, Product Manager at Fiberlink, presents new Kindle Fire product advances and show you how you can quickly and easily incorporate these powerful devices in your BYOD and education programs.

      Read more >
    • CVSS Under Fire: How to Solve The Prioritization Problem
      CVSS Under Fire: How to Solve The Prioritization Problem Michael Roytman, Chief Data Scientist at Kenna Recorded: Aug 26 2015 3:45 pm UTC 43 mins
    • In the landscape of vulnerability management, you know that effective prioritization of vulnerabilities is the difference between "playing the numbers game" and truly being an InfoSec rock star. But too often, our primary resource--the CVSS--is relied on too heavily, with disastrous consequences.

      Michael Roytman, Chief Data Scientist at Kenna, will explain what IT security professionals miss by placing too much trust in CVSS when it comes to prioritization efforts. He will also explain what information should absolutely be taken into consideration in order to focus on vulnerabilities posing the greatest risk. Topics covered include:

      - Why CVSS sometimes gets it wrong
      - Specific examples of serious exploits being given low scores
      - What IT security professionals should do to supplement CVSS
      - How the proper use of threat intelligence can accelerate your vuln management program

      Read more >
    • Security Beyond the (Fire)wall
      Security Beyond the (Fire)wall Lead Security Specialist,Barclays,(ISC)2 Apps Security Advisory Board; Partner, Field Fisher Waterhouse; EMEA CTO, Intralinks Recorded: Jun 19 2013 2:00 pm UTC 61 mins
    • Only 22% of data breaches are as a result of an external attack on corporate servers . In the vast majority of cases, breaches involve the inadvertent mishandling of information by insiders or third party partners. For example: a confidential document is accidentally sent to the wrong person, an employee drops files into a consumer-grade file sharing solution to access them on holiday, or an organisation terminates a relationship with a partner or supplier after having shared proprietary information with them.

      Enabling your staff to work remotely, on a multitude of devices, and on unsecured networks is essential for many 21st century businesses. However, such a model also has very specific risks, particularly for financial services, life sciences and other IP-intensive industries.

      This webcast addresses the technological challenges of maintaining full control of your most sensitive information - even once it goes beyond the firewall - while maintaining the freedom and flexibility necessary to allow your staff and other stakeholders to work as efficiently as possible.

      Speakers include:
      Stewart Room, Partner, Field Fisher Waterhouse
      Nick Harwood, Lead Security Specialist, Barclays
      Bola Rotibi, Founding Member, (ISC)2 Application Security Advisory Board
      Richard Anstey, EMEA CTO, Intralinks

      Read more >
    • Let the Data do the Work for You with Operational Intelligence
      Let the Data do the Work for You with Operational Intelligence David Myers, Sr. Principal Product Manager Upcoming: Nov 2 2017 3:00 pm UTC 60 mins
    • Is your IT ops team suffering from alert fatigue? Are your mainframe experts spending too much time in war rooms fighting fires? Discover how incorporates machine learning to help you proactively prevent production issues and dramatically reduce the noise and false alarms coming into your IT ops centers. It’s all about working smarter not harder and letting the data do the work for you. Discover how CA Mainframe Operational Intelligence allows you to automatically correlate data from many sources to surface alert patterns and actionable insights that will help your novice IT operators quickly triage and accurately identify root cause of problems. Protect your mainframe experts from being pulled into every fire drill and free them up to provide more strategic value to your business.

      Read more >
    • STRONG ON THE INSIDE: The Growing Need for Internal Segmentation Firewalls
      STRONG ON THE INSIDE: The Growing Need for Internal Segmentation Firewalls Fortinet and Gartner Recorded: Mar 21 2016 8:40 pm UTC 220 mins
    • Cloud applications and BYOD have brought new functionality to enterprise networks—and unfortunately, also new security weaknesses and opportunities for cyber espionage. Theft of intellectual property and proprietary data now amounts to billions of dollars in losses each year.

      Register now for this webcast with lead analyst firm Gartner that explores how Internal Segmentation Firewalls (ISFW) close a major security gap for businesses of all sizes.

      Learn about the growing pervasiveness of targeted attacks worldwide, with current data that shows how a single malicious breach can cripple a company

      Understand how ISFWs differ from traditional firewalls—and why they can uniquely reduce the attack surface, contain internal threats, and minimize damages after a breach occurs

      Find out why multi-gigabit performance is critical to an ISFW’s ability to provide deep visibility without slowing down the network

      Don’t miss the “Strong on the Inside: The Growing Need for Internal Segmentation Firewalls” webcast, featuring leading experts from Gartner and Fortinet as they discuss the latest in internal network security for today’s threat landscape.

      http://glowpoint.com/wp-content/uploads/2015/02/gartner-logo.png

      Read more >