Hi [[ session.user.profile.firstName ]]

Data Security & Protection with the New Windows 10

Get significant security protection with Windows 10! As the most secure Windows ever, Windows 10 offers significant security protection.

With more than 250 million threats online in any given day, security for your business has never been more critical. These threats can cause loss of data and personal information with increased risk of identity theft. Windows 10 includes built-in protection to help keep you more secure with all new features in the Anniversary update.

Join this webcast to learn more about the two major new security features that launched with the Anniversary update:
•Windows Defender Advanced Threat Protection (WDATP) detects, investigates, and responds to advanced malicious attacks on networks by providing a more comprehensive threat intelligence and attack detection
•Windows Information Protection enables businesses to separate personal and organizational data and helps protect corporate data from accidental data leaks.
Recorded Oct 27 2016 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Stephen Jeffries, Technical Architect, Microsoft
Presentation preview: Data Security & Protection with the New Windows 10

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Get self-service of passwords with HPE Service Anywhere – FREE Version! Recorded: Nov 10 2016 46 mins
    Finn Jensen, FastPassCorp
    Service Desk Institute has just published a new report on corporate self-service of passwords. The report reveals significant difficulties for a majority of large companies when introducing self-service of passwords for end-users. At least 5 major problems cause users to reject self-service.
    This Webinar will highlight the results, and present the successful best practices from FastPassCorp, which enables customers to reach 75-90% adoption.
    The FastPassCloud solution can be delivered together with HPE Service Anywhere and Service Manager.
  • Data Security & Protection with the New Windows 10 Recorded: Oct 27 2016 36 mins
    Stephen Jeffries, Technical Architect, Microsoft
    Get significant security protection with Windows 10! As the most secure Windows ever, Windows 10 offers significant security protection.

    With more than 250 million threats online in any given day, security for your business has never been more critical. These threats can cause loss of data and personal information with increased risk of identity theft. Windows 10 includes built-in protection to help keep you more secure with all new features in the Anniversary update.

    Join this webcast to learn more about the two major new security features that launched with the Anniversary update:
    •Windows Defender Advanced Threat Protection (WDATP) detects, investigates, and responds to advanced malicious attacks on networks by providing a more comprehensive threat intelligence and attack detection
    •Windows Information Protection enables businesses to separate personal and organizational data and helps protect corporate data from accidental data leaks.
  • Connecting Your Devices Through IoT Recorded: Oct 7 2016 20 mins
    Jeremy Foster, Senior Technical Evangelist, Microsoft
    Once you've got your Internet of Things (IoT) Hub set up and you've tested it by creating a simulated device, it's time to talk to your Hub from something real. This webcast will help you do just that.

    Here, you'll take a look at the whole device landscape, learn about the starter kits available for getting you up and running quickly with Azure IoT, and see all of the available SDKs available to get your devices talking to Azure. You'll also learn how you can use open-source device SDKs for multiple platforms, including Linux, Windows, and real-time operating systems.

    Join this webcast to learn how to:
    •Write device code using the popular and open source Node.js framework
    •Register your device with IoT Hub and start sending and receiving messages
    •Manage devices using a tool called IoT Hub Explorer
  • PPM 9.40: How the New Features of HPE PPM can Help your PMO Recorded: Oct 4 2016 55 mins
    Barbara Lewis, HPE
    HPE Project and Portfolio Management 9.40 was recently released with some significant updates and improvements. This webinar will introduce the new features included in this release and how those features can help you improve your project and program processes.
    HPE Project and Portfolio Management 9.40 was recently released with some significant updates and improvements. This webinar will introduce the new features included in this release and how those features can help you improve your project and program processes.

    Features being covered include:

    NEW! Program type for true program lifecycle governance and management
    NEW! Program UI
    · Easier tracking of issues, risks and scope changes

    · Timeline tab

    NEW! Ability for PPM to create a release in HPW Agile Manager
  • How Not to Get Hacked Recorded: Sep 29 2016 60 mins
    Microsoft
    Sony, Target and now Yahoo! -- you can't let this to happen to you or your business. Help your organization avoid being front page news due to a security breach.

    Every organization large and small wants to avoid this all too common reality. From the unintentional sharing of data by employees through a rogue email, to losing data via a lost computer, to surviving hacker attacks, there's a lot to manage.

    Join this webcast to learn the top 5 ways to protect your organization and make sure your company isn't the next one hacked.

    This webcast is part of our Digital Security in the Modern World webcast series. Sign up for this session, or the entire series today!
  • Intro to Microsoft Azure's Internet of Things (IoT) Recorded: Sep 29 2016 26 mins
    Jeremy Foster, Senior Technical Evangelist, Microsoft
    The Internet of Things (IoT) is already a huge deal and it's only going to get bigger

    There are far more devices connected to the internet than there are people in the world and that number is projected to grow dramatically in the coming years. Whether you're an individual hobbyist or an enterprise developer, there's a great chance you'll find need for a cloud-based service to listen to the devices in your IoT solution, facilitate communication, and even communicate back to the devices telling them how to behave.

    That's why there's Azure IoT. Azure IoT includes the dedicated IoT Hub service, IoT solution templates called IoT Suite, as well as many other general services for processing IoT data and turning them into real business insight. With a little time and learning, you’ll have a service designed to handle massive amounts of communication with devices, but also able to scale down to startup and even hobbyist scenarios.

    Join this webcast to learn how to:
    •Conceptualize why you might need a cloud-based hub solution
    •Easily set up an IoT Hub in Azure
    •Create simulated devices and communicate to your hub
  • Effective IT Security in a Connected Mobile World Recorded: Sep 27 2016 34 mins
    Microsoft
    Learn how all employees can work and collaborate securely! The new world of work demands that people collaborate faster and more seamlessly than ever before.

    Your employees have access to cloud-based apps, personal devices, and pervasive internet connectivity. All these things are great for getting work done, but your company is still held to high standards around security, and auditing, and you can't afford to make a wrong move.

    Join this webcast to explore some common security scenarios such as:
    •How do you provide access when you can't always control the endpoint?
    •How do you know where all your company's files are right now?
    •If you terminate an employee, how would you know what files they had in their possession.?
    •Could you wipe a terminated employee's corporate data while leaving their personal content alone?

    This webcast is part of our Digital security in the modern world webcast series. Sign up for this session, or the entire series today!
  • 5 Ways Digital Learning Helps Build Amazing IT Organizations Recorded: Sep 27 2016 48 mins
    Jeanette Jacobs, HPE
    Success in the idea economy requires technological agility. You have to act quickly to seize opportunity, respond to threats, turn great ideas into reality and stay ahead of the competition – and these capabilities rely on having an amazing IT organization.

    Amazing IT teams are competent, aligned to the business, highly collaborative and constantly adapting to change. These attributes just don’t happen. You need talent, you need a continuous education strategy and you need the tools to make it happen. Join this webinar to learn how implementing a continuous education strategy using the new HPE ART Enterprise Learning Edition (ELE) will help your journey to amazing.
  • What Going Digital Really Means to IT Recorded: Jul 19 2016 64 mins
    Bill Briggs, CTO, Deloitte Consulting LLP Ross Mason, Founder and VP of Product Strategy, MuleSoft
    Almost everyone is undergoing digital transformation, but not everyone knows the right way to do it. In a recent MuleSoft survey, 96 percent of respondents are executing on digital transformation initiatives or planning to do so in the near future. However, the results also showed that just 18 percent of IT decision makers are confident that they will succeed in meeting this year’s digital transformation goals. To do this effectively, IT teams need different skill sets, tools, and more importantly, different mindsets. Join Bill Briggs, CTO at Deloitte, and Ross Mason, Founder and VP of Product Strategy at MuleSoft, to learn how IT can grow beyond “business as usual".
  • From the Field to the Back Office: Complete Digital Transformation for Energy Recorded: May 24 2016 50 mins
    Joseph Yoklavich, National Sales Director for Energy
    Attend this webinar to find out why USG&E, Engie and other energy companies choose OutSystems for application development and integration. You’ll see:

    •How to build a mobile application visually in minutes
    •How easy continuous change can be with Integrated App Feedback
    •How simple and fast integration with existing back-office systems and data can be
  • End-to-End Visibility into Application Availability using HPE BPM and Sitescope Recorded: May 18 2016 70 mins
    Haim Snir, Dov Hershkovitch
    Managing applications while providing a top-notch user experience can be a challenge to any organization using the traditional systems-centric, bottom-up approach to application management. The bottom-up approach is not scalable to handle the issues and challenges with ever-changing, distributed environments.

    Within an end-to-end business service, operations teams rely on having data for each component and setting a threshold or status check for everything that can go wrong. In essence, systems monitoring focuses on looking for what could go wrong instead of focusing on the desired results. The diversity of applications such as Web, Enterprise, Composite, Mobile, and Cloud make the bottom-up approach impossible to deploy and maintain.

    Join us for this Webinar to learn the latest about Business Process Monitor (BPM) and SiteScope capabilities. For BPM we will review the new real devices monitors, new selenium monitoring and tips for BPM such as how to use dynamic baselines and script parameters. For Sitescope we will review our new Web interface, automatic docker monitoring, ChatOps integration and more...
  • Chef and Azure: A Recipe for DevOps Success Recorded: Apr 20 2016 35 mins
    Corey Wagehoft from 10th Magnitude and Andre Elizondo from Chef
    Like peanut butter and chocolate or bacon and eggs, Chef and Microsoft Azure just go better together. Join Corey Wagehoft of 10th Magnitude and Andre Elizondo of Chef for this live webinar to learn how Chef and Azure can help your organization accelerate its adoption of DevOps practices. Combining Azure’s cloud services with Chef’s automation capabilities can make you faster, more flexible and better able to deliver value to customers.

    Join the webinar to learn:
    • What makes Chef and Azure a powerful combo, and how to decide whether they’re the right fit for your organization
    • How Chef and Azure enable DevOps practices and benefits
    • A real-world example of how one company uses Chef and Azure to automate the configuration and maintenance of hundreds of servers
    • How to get started with Chef on Azure
  • Getting Beyond Flash 101 - Flash 102 Selecting the Right Flash Array Recorded: Apr 14 2016 62 mins
    George Crump, Storage Switzerland
    Join Storage Switzerland and Data Direct Networks (DDN) for a live webinar, "Getting Beyond Flash 101 - Flash 102 Selecting the Right Flash Array”. We will discuss the different types of flash storage and compare them, why vendors want to replace your SAN instead of enhance it and what you can do to not only protect your current storage investments but also prepare a path to the future.
  • What is NFS: An NFS Primer Recorded: Mar 23 2016 63 mins
    Alex McDonald, SNIA-ESF Vice Chair, Chad Hintz, SNIA-ESF Board Member
    The popular & ubiquitous Network File System (NFS) is a standard protocol that allows applications to store and manage data on a remote computer or server. NFS provides two services; a network part that connects users or clients to a remote system or server; and a file-based view of the data. Together these provide a seamless environment that masks the differences between local files and remote files.

    This SNIA Ethernet Storage Forum Webcast is an introduction and overview presentation to NFS for technologists and tech managers interested in understanding:
    oNFS history and development
    oThe facilities and services NFS provides
    oWhy NFS rose in popularity to dominate file based services
    oWhy NFS continues to be important in the cloud
  • 4 Ways to Improve NetApp Storage Performance Without Replacing It Recorded: Mar 17 2016 59 mins
    George Crump, Storage Switzerland
    Join Storage Switzerland Lead Analyst George Crump and Avere Systems Director Chris Bowen for a live webinar on March 17th at 1:00pm ET, "4 Ways to Improve NetApp Storage Performance Without Replacing It". In this webinar, George and Chris will discuss why NAS storage performance is so critical, how to balance storage performance and storage capacity, and four ways to improve storage performance without replacing your existing NAS system.
  • 2016 Data Centre Colocation Trends, APAC Market Supply Data Recorded: Mar 16 2016 47 mins
    Jabez Tan, Senior Analyst, Data Centres,Structure Research
    What are the top data centre colocation trends for 2016. How have past predictions played out so far? Singapore and Hong Kong have stood out as the top 2 data centre markets in the Asia Pacific region. We take a quantitative deep dive into the data centre supply and revenue generation for each market, and how much revenue is being generated from colocation services.
  • Storage Performance Benchmarking: Block Components Recorded: Mar 8 2016 61 mins
    Ken Cantrell, Mngr, Performance Engineering, NetApp; Mark Rogov, Advisory Systems Engineer, EMC; David Fair - Chair, SNIA-ESF
    The third installment of our performance benchmarking Webcast series, “Storage Performance Benchmarking: Block Components” aims to continue educating anyone untrained in the storage performance arts to ascend to a common base with the experts. In this Webcast, you will gain an understanding of the block components of modern storage arrays and learn storage block-world terminology, including:

    •How storage media affects block storage performance
    •Integrity and performance trade-offs for data protection: RAID, Erasure Coding, etc.…
    •Terminology updates: seek time, rebuild time, garbage collection, queue depth and service time

    After the Webcast, visit our Webcast Q&A blog too http://sniaesfblog.org/?p=521
  • Top 6 Cases for Implementing a Low-Code Platform - and Two Real Examples Recorded: Mar 1 2016 61 mins
    John Rymer of Forrester Research
    Low-code platforms have become a critical factor in helping AD&D organizations rapidly deliver applications to win, serve and retain customers.

    With these platforms, enterprises are routinely delivering apps much faster than conventional methods. But can these platforms truly scale across the full modern app lifecycle? What are the top use cases for deploying a low-code platform?

    Join John Rymer of Forrester Research for an engaging discussion about the innovative ways organizations are utilizing low-code platforms across the app lifecycle. Hear from IT executives with Autoliv, Estafeta and NES Financial as they talk candidly about how low-code platforms have driven growth and competitive advantage in their organizations.
  • Migrating Applications to Public Cloud Services: Roadmap for Success Recorded: Feb 17 2016 52 mins
    John Meegan, Mike Edwards, and Claude Baudoin from the Cloud Standards Customer Council
    The migration of applications to cloud computing must be done in a strategic and methodical manner. Existing enterprise applications must be thoroughly assessed to determine which workloads can benefit most from early migration to the cloud. Key considerations including costs of migration, application redesign, application performance and availability, security and privacy requirements, and regulatory requirements must be taken into account. The aim of this presentation from the Cloud Standards Customer Council is to provide a practical reference to help enterprise IT and business decision makers analyze and consider application migration to cloud computing. The presentation focuses primarily on the migration of applications to public cloud services. It includes a list of steps, along with guidance and strategies, that takes into consideration both business and technical requirements.
  • Encryption Key Management Simplified Recorded: Jan 21 2016 37 mins
    Liz Townsend, Director of Business Development, Townsend Security
    Your encrypted data is only as secure as your encryption keys. A strong encryption key management strategy is essential for a comprehensive security policy, as well as meeting compliance requirements. Attendees of this presentation will learn:

    - Principles and best practices for encryption key management including key management, key storage, secure key retrieval, key escrow, key mirroring, industry standards, compliance guidelines, and system audit
    - Why certifications are important for meeting compliance regulations such as PCI-DSS and HIPAA/HITECH
    - How key management systems work and how to evaluate vendor solutions.

    This is a non-technical session but will be of value to developers and implementers. Attendees will learn the core principles of effective and secure encryption key management. These principles can be used in developing in-house key management solutions or in evaluating vendor solutions.

    What you'll learn:

    - What is encryption key management and why is it important?
    - Principles of industry-standard key management
    - Industry must-haves for effective key management
    - Challenges of home grown key management solutions
    - Important certifications for meeting compliance and evaluation vendors
Technical Webinars on Enterprise Technology
The IT Specialist Round Table is a series of webinars dedicated to enterprise computing. Our speakers are leading IT professionals and executives with a wealth of knowledge and experience in selecting, implementing and maintaining business applications around the globe.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Data Security & Protection with the New Windows 10
  • Live at: Oct 27 2016 6:00 pm
  • Presented by: Stephen Jeffries, Technical Architect, Microsoft
  • From:
Your email has been sent.
or close