Hi [[ session.user.profile.firstName ]]
Sort by:
    • Protect & Secure Your Data in the Cloud Protect & Secure Your Data in the Cloud Microsoft Upcoming: Oct 28 2016 6:00 pm UTC 60 mins
    • Protect your data with Microsoft AvePoint powered by Azure.

      AvePoint offers data-centric protection for Office 365, File Shares, and SharePoint with AvePoint Compliance Guardian. AvePoint automatically highlights data security concerns in Yammer, OneDrive, SharePoint Online or on-premises, and File Shares, keeping your data more secure. With the amount of data and connected devices on the rise, a data breach and cyber security threats are becoming more and more real.

      Join this webcast to learn how to:

      Gain insight into compliance health with discovery and targeted reporting
      Standardize content classification with automated tagging
      Identify and review alerts by risk score to identify incidents before they become costly fines

      Read more >
    • Top 5 B2B Marketing Strategies: An Agency Perspective Top 5 B2B Marketing Strategies: An Agency Perspective Ryan Osman, SEM Manager at Obility Recorded: Oct 24 2016 5:00 pm UTC 48 mins
    • Choosing between an in-house marketing team or an agency is a tough decision. Although there are shortcomings with either, there’s one glaring issue that faces B2B businesses who go in-house; they miss out on all of the shared learnings that come with an agency. Join this webinar to discover insights from an agency’s diverse client portfolio perspective.

      We’ll cover top B2B agency strategies such as:
      - Tracking performance of ad campaigns versus sales cycles
      - Structuring campaigns and ad budgets
      - Utilizing top BETAs
      - Orchestrating major conferences and events
      - Developing effective Landing Pages

      We’ll also review the top campaign strategies that have driven the best results for us in 2016.

      Read more >
    • Top Ten Trouble Spots for Accountants Top Ten Trouble Spots for Accountants Wilhelm Dingler Recorded: Oct 27 2016 6:00 pm UTC 59 mins
    • Wilhelm Dingler has provided legal counsel to thousands of professionals over the past 30 years. During this webinar Attorney Dingler will discuss the Top Ten Trouble Spots for Accountants.

      Bookkeeping services.
      Objectivity and personal contact with an audit client.
      Lack of an engagement letter.
      Lack of clarity of the work to be performed.
      Tax advice beyond area of expertise.
      Fiduciary duty claims.
      Lack of internal procedures for follow-up.
      Advising more than one party to a transaction.
      Lack of disclaimers in prepared financial statements.
      Failure to keep current in ones education and training.

      Read more >
    • How Do I Get My Compound Into Phase I? How Do I Get My Compound Into Phase I? Scott Boley, PhD, DABT, Greg Ruppert, BA Upcoming: Nov 3 2016 3:00 pm UTC 60 mins
    • Careful assessment of the relationship between efficacy and toxicity is vital to drug developers as they seek advancement of their compounds. Nonclinical testing is required to establish a safe starting dose for the initial human clinical trials. In partnering with our pharmaceutical and biotechnology Sponsors, our goal is to improve the odds of selecting the right lead candidates, and to conduct the right studies in the right way, taking all factors into consideration to ensure a successful IND submission.
      As part of this webinar we will outline the nonclinical studies needed to progress a therapeutic into a Phase I clinical trial. We will cover small molecules to vaccines to biopharmaceuticals as well as standard indications to life-threatening and rare/orphan indications.

      Read more >
    • Reduce Risks and Secure Your Mobile Endpoints Reduce Risks and Secure Your Mobile Endpoints Phil Hochmuth, Program Director, IDC’s Enterprise Mobility; John Michelsen, Chief Product Officer, Zimperium Recorded: Oct 27 2016 4:00 pm UTC 57 mins
    • A long-held assumption about mobile technology in general is that endpoint security technologies are unnecessary since mobile operating systems (OSs) are inherently more secure than PC OSs. For policy enforcement and security on mobile devices, IT organizations have looked to enterprise mobility management (EMM) platforms for additional security and device control. However, there is a detection and enforcement gap between devices and back-end EMM, which does not provide real-time monitoring of app activity, network traffic, and overall endpoint health.

      Mobile endpoint protection is critical and BYO complicates the issue since enterprises may or may not own the mobile endpoint. Employee owned devices introduce many more risks and variables than enterprises account for and we wish to inform you on this webinar. Join Phil and John to learn how to privately secure your BYO devices and measure the risks these devices bring into your network.


      - How to privately secure BYOD mobile endpoints
      - How to classify risky devices by examining installed applications
      - How to create a plan to reduce risks introduced by mobile devices

      Read more >
    • . עדכון שותפים רבעוני קומוולט ישראל . עדכון שותפים רבעוני קומוולט ישראל רוני כפטל , מנהל טכנולוגיות בקומוולט ישראל Upcoming: Oct 31 2016 8:00 am UTC 75 mins
    • ספטמבר 2016 הוא מועד השחרור של גרסת SP5 של קומוולט 11.
      לאחר כמות ההפתעות והשיפורים שיצאו בגרסת SP4 ששוחררה ביוני, נשמח להזמין את שותפינו לסמינר מקוון אשר יכלול את סיכום החידושים האחרונים בשני ה SP 4 ו 5.
      בין הדברים אשר נציג יהיו:
      •אינטגרציה עם שירותי הענן של MS ו Amazon אשר שופרה וכוללת כעת גם יכולות DR לענן
      •אינטגרציה של יכולות ה Block level  עם אפליקציות ושחזור מידי של אפליקציות
      •יכולות DR של Oracle  באמצעות קומוולט
      •יכולות מתקדמות בנושא וירטוליזציה – open stack ו web scale, נציג את פתרון ה SDN- Software defined Storage מבית קומוולט ועוד המון המון הפתעות.
      מצפים לשמוע ממכם המון שאלות ,יש לנו המון תוכן

      Read more >
    • Clustered File Systems: No Limits Clustered File Systems: No Limits John Kim, SNIA-ESF Chair, James Coomer, DDN, Alex McDonald, SNIA-ESF Vice Chair Recorded: Oct 25 2016 5:00 pm UTC 64 mins
    • Today's storage world would appear to have been divided into three major and mutually exclusive categories: block, file and object storage. Much of the marketing that shapes much of the user demand would appear to suggest that these are three quite distinct animals, and many systems are sold as exclusively either SAN for block, NAS for file or object. And object is often conflated with cloud, a consumption model that can in reality be block, file or object.

      But a fixed taxonomy that divides the storage world this way is very limiting, and can be confusing; for instance, when we talk about cloud. How should providers and users buy and consume their storage? Are there other classifications that might help in providing storage solutions to meet specific or more general application needs?

      This webcast will explore clustered storage solutions that not only provide multiple end users access to shared storage over a network, but allow the storage itself to be distributed and managed over multiple discrete storage systems. In this webcast, we’ll discuss:
      •General principles and specific clustered and distributed systems and the facilities they provide built on the underlying storage
      •Better known file systems like NFS, GPFS and Lustre along with a few of the less well known
      •How object based systems like S3 have blurred the lines between them and traditional file based solutions.

      This webcast should appeal to those interested in exploring some of the different ways of accessing & managing storage, and how that might affect how storage systems are provisioned and consumed. POSIX and other acronyms may be mentioned, but no rocket science beyond a general understanding of the principles of storage will be assumed. Contains no nuts and is suitable for vegans!

      Read more >
    • Refusing to Break: Lessons Learned From My First Job in Tech Refusing to Break: Lessons Learned From My First Job in Tech Melanie Rich-Wittrig, Writer, Security Nerd & Aerialist at SecurityCandy.com Upcoming: Nov 2 2016 5:00 pm UTC 45 mins
    • While most members of the predominantly male tech industry are supportive of female professionals, some still act in ways that isolate women.

      Join today's speaker, Melanie Rich-Wittrig, a writer, security nerd and aerialist of SecurityCandy.com as she talks about her experiences early on in her career in tech. Find out how confronting a hostile situation has made her stronger. This talk will cover challenges that women are facing and the most effective strategies to overcome these challenges.

      Presenter Bio:
      Melanie Rich-Wittrig is the creator of SecurityCandy.com and is studying Information Security at Carnegie Mellon University. She worked as a systems administrator for a couple of years after earning her BS in Computer Science at University of Texas at Dallas. Now, she focuses on making cybersecurity education more accessible and attractive to diverse groups of children.

      Read more >
    • How to Deliver Amazing Apps Fast in the Idea Economy: a DevOps Transformation How to Deliver Amazing Apps Fast in the Idea Economy: a DevOps Transformation Raffi Margaliot, Genefa Murphy, Tali Levi Joseph Recorded: Oct 27 2016 1:00 pm UTC 55 mins
    • Want to deliver apps fast on any form factor? Feel like you’re balancing speed versus quality, and your end users are suffering? Hear how HPE’s Application Delivery Management business unit transformed their own approach to software delivery to both accelerate their time to market and deliver a set of solutions that better meet the needs of their customers. Learn about the three T’s that formed the foundation of this transformation, from technology, to technique to talent; and hear about how this influenced the next generation of HPE’s application delivery offerings; ranging from core ALM to next-gen predictive analytics and mobile solutions.

      Hear about HPE’s Application Delivery vision, strategy and journey first-hand
      Discover the three things it takes to transform software delivery and rise to the challenge of DevOps
      Learn how to successfully deliver high quality apps at speed and scale

      Read more >
    • Activated Charcoal: Making sense of endpoint data Activated Charcoal: Making sense of endpoint data Greg Foss, Head of Global Security Operations, LogRhythm and Sarah Miller Threat Intelligence Analyst, Carbon Black Recorded: Oct 26 2016 1:00 pm UTC 64 mins
    • Security operations is all about understanding and acting upon of large amounts of data. When you can pull data from multiple sources, condense it down and correlate across systems, you are able to highlight trends, find flaws and resolve issues.

      This webcast will cover the importance of monitoring endpoints and how to leverage endpoint data to detect, respond and neutralize advanced threats.

      You’ll discover:

      - Why endpoints are the new perimeter
      - How employees can strengthen your security operations strategy
      - Techniques to test and validate security awareness program
      - How to take the data that Carbon Black collects, correlate it against thousands of endpoints, and dynamically neutralize threats using the LogRhythm security intelligence and analytics platform

      Register now to learn how LogRhythm and Carbon Black can help you strengthen your overall security operations strategy—all within a single interface.

      Read more >
    • Transitioning from Managed Services to Managed Security: One Partner’s Success Transitioning from Managed Services to Managed Security: One Partner’s Success Garrett Gross & Tim Foley Recorded: Oct 25 2016 5:00 pm UTC 63 mins
    • Over the past 10 years, IT managed services have become universally available and moving from a luxury to more of a must-have. Building on this notion of IT as a service, more companies are recognizing the need for a comprehensive security posture but may lack the ability or desire to manage in-house. This leaves the door open to whom will provide this security as a service.

      Join us as we explore one partner’s journey from managed services to managed security. Dataprise has been a leading provider of IT managed services for over a decade and now offers a complete managed security service.

      During this webcast, we’ll get an inside look into:

      The basics of becoming a MSSP
      Tools MSSPs use to build their service
      Common challenges in creating a managed security service

      Read more >
    • Next-Generation End-to-End MDM Solution from Informatica Next-Generation End-to-End MDM Solution from Informatica Ben Rund, Prash Chandramohan Upcoming: Nov 1 2016 3:00 pm UTC 30 mins
    • Creating the ultimate master record with a 360-degree view just got re-mastered. Join us as we talk about Informatica MDM – a true multi-domain MDM solution, available both on-premise and in the cloud.

      Take a look “under the hood” as we share the freshest updates for our data quality, data integration, and business process management workflow integrations with Informatica MDM. Learn how to improve your customer and business profiles with our Contact Validation Data-as-a-Service powered by Dun & Bradstreet, which helps you fill in the missing information you need, for accurate records you can swear by.

      Join us for a live webinar to tour what’s new in Informatica MDM:

      •See the latest features and functionalities available in our flagship MDM solution

      •Explore the flexible and powerful user interface with rich new page layouts that make it easier to view, add and update business-critical data and relationships

      •Meet Entity 360, an intuitive UI platform for building business user focused rich interfaces such as Customer 360, Product 360, and Supplier 360

      Who is this webinar for?

      •Current Informatica MDM customers who want to know what’s latest from industry leader

      •MDM consultants, practitioners, and developers who want to stay on top of MDM advancements

      •You! Just browsing or researching MDM options? Perfect! Or maybe you’re MDM-curious? Awesome! This webinar will help you understand what Informatica MDM does, how it’s used, what’s possible, and whether or not it fits your business needs

      Ranked as a clear leader in top analyst reports, including Gartner MQ, Forrester Wave, and The Information Difference MDM Landscape, Informatica MDM has been awarded top scores for customer satisfaction, innovative technology, and market strength.

      Can’t attend the live webinar? Sign up today and we’ll send you the on-demand recording afterward.

      Read more >
    • 2017 Long-Term Capital Market Assumptions 2017 Long-Term Capital Market Assumptions John Bilton, Stephanie Flanders, Stephen Macklow Smith, Jonathon Griggs Recorded: Oct 27 2016 2:00 pm UTC 58 mins
    • Now in its 21st year of publication, the Long-Term Capital Market Assumptions (LTCMA) provides our annual assessment of the long-term outlook across all major asset classes and markets over the next 10 to 15 years. Many investors rely on J.P. Morgan's LTCMA's time-tested projections to help build stronger portfolios.

      Join John Bilton, Head of Global Multi-Asset Strategy, Stephanie Flanders, Chief Market Strategist for the UK and Europe, Stephen Macklow-Smith, Portfolio Manager, European Equity Group, and Jonathan Griggs, Director of Applied Research for our Global Fixed Income, Currency & Commodities Group, as they share highlights and themes from the report, and how our LTCMA can empower better decisions.

      If you prefer to listen over the telephone please use the appropriate dial in details from the numbers below.

      Password: 48866

      United Kingdom Local Call: +44 (0) 844 581 9089
      Austria: +43 (0) 2 68220 56552
      Belgium: +32 (0) 2 789 8603
      Denmark: +45 3271 4573
      Finland: +358 9 2319 5437
      France: +33 (0) 1 7037 7166
      Germany: +49 (0) 69 7104 45598
      Hungary: +36 (06) 1 700 8142
      Ireland: +1 800 930 488
      Italy: +39 02 36269665
      Netherlands: 0207948426
      Norway: 21563318
      Poland: +48 22 397 9053
      Portugal: +351 3 0880 2081
      Spain: +34 91 787 0777
      Sweden: +46 (0) 8 50520424
      Switzerland: +41 (0) 22 592 7103
      Standard International dial: +44 (0) 20 3003 2666

      Read more >