Hi [[ session.user.profile.firstName ]]

The Cloud’s Impact on Online Security

A 1-hr. Educational webinar for Rackspace and Alertlogic customers and prospects

Key topics include the following:

Definition of the Cloud: Public vs Private Cloud, In-house vs Outsourced
What are the key security concerns when moving to the Cloud
Achieving PCI in the context of a Cloud Solution
What are key evaluation criteria from a security perspective when moving to the Cloud (i.e. what should you be asking your hosting provider)


GoCompare.com case study
Background to GoCompare.com
Why did GoCompare.com decide to outsource?
What were the security concerns? How were they averted?
Benefits realised from Private Cloud
GoCompare.com’s view of the Cloud? Future vision?
Recorded Sep 14 2010 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dave Trouse, Head of Network & Security - GoCompare, John Tridgell & Matthew Johns, Rackspace; Matthew Harkrider, Alert Logic
Presentation preview: The Cloud’s Impact on Online Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • NVMe and NVMe-oF Configuration and Manageability with Swordfish and Redfish May 13 2020 6:00 pm UTC 60 mins
    Rajalaxmi Angadi, Intel; Phil Cayton, Intel; Richelle Ahlvers, Broadcom
    SNIA Swordfish is an extension of the DMTF Redfish specification to provide a unified approach for the management of storage and services in converged, hyperconverged, hyperscale, and cloud infrastructure environments. Swordfish uses a client-centric approach to develop the dynamic resource models as part of the specification, which describes client needs, management requirements, and use cases.

    NVMe-oF currently support fabric transports like RDMA (iWarp, RoCE, IB), TCP, and FC. NVMe / NVMe-oF currently lacks efficient remote configuration and provisioning management mechanisms to enable NVMe-oF scaling to large converged infrastructures – something Redfish and Swordfish can provide.

    The SNIA Swordfish specification is currently growing to include full NVMe and NVMe-oF enablement and alignment across DMTF, NVMe, and SNIA for NVMe and NVMe-oF use cases. SNIA members are contributing to specification development and helping to shape the ecosystem. This presentation will provide an overview of the work in progress to map these standards together to ensure NVMe and NVMe-oF environments can be represented entirely in Swordfish and Redfish environments.

    Join us! We welcome your feedback, and encourage participation.
  • NGN [Ep.4] UnWired: How 5G and WiFi 6 are Transforming Network Architectures Apr 30 2020 3:00 pm UTC 60 mins
    Johna Till Johnson, CEO and Founder, Nemertes Research
    Next-Generation Networks [Ep.4]

    New wireless standards like 5G and Wifi 6 aren't just "more of the same". They're dramatically transforming how networks are designed, architected, and delivered.

    Whether you're an equipment provider, a carrier, or an enterprise user, you'll want to get the insight from Nemertes' hot-off-the-presses research into success strategies and best practices for those early adopters rolling out these technologies.

    You'll learn the use cases and vertical industries that are seeing the greatest success, and find out the hiccups and stumbling blocks that organizations are experiencing. And you'll walk away with a blueprint for success when it comes to deploying these next-generation technologies.
  • Storage Networking Security Series: Protecting Data at Rest Apr 29 2020 5:00 pm UTC 75 mins
    Pierre Mouallem, Lenovo; Ahmad Atamhl, Mellanox; Steve Vanderlinden, Lenovo
    One of the most important aspects of security is how to protect the data that is just “sitting there.” How easy is it to get to? Who can get to it? If someone does get access to the data, can they read it? These are just a few of the questions that we try to answer when we go through the process of securing data.

    Contrary to popular belief, however, securing “data at rest” is not simply encrypting the data. While it is true that data encryption plays a major role in securing “data at rest,” there are several other factors that come into play and are equally as important – if not more so.

    For this webcast, we’re going to talk about those other factors (Encryption is deserving of its own, specific webcast). We will present the end-to-end process to securing “data at rest,” and discuss all the factors and trade-offs that must be considered, and some of the general risks that need to be mitigated, discussing:

    • How requirements for “data at rest” differ from “data in flight”
    • Understanding the costs of ransomware
    • How to protect cryptographic keys from malicious actors
    • Using key managers to properly manage cryptographic keys
    • Strengths and weaknesses of relying on government security recommendations
    • The importance of validating data backups... how stable is your media?
  • Next-Gen Storage Technology Apr 21 2020 3:00 pm UTC 60 mins
    Stanley Zaffos, Senior Vice President Product Marketing, Infinidat
    Digital business initiatives, AI, core to edge deployment models, security considerations and privacy laws are causing users to gradually shift their focus from building and managing data centers, to using them to deliver competitive advantage to their organizations. Creating a self-managing storage infrastructure shifts the measurement of product attractiveness away from traditional metrics like reliability, availability, performance and scale, to a storage system’s ability to autonomically meet service level agreements (SLAs); seamlessly move data between on premises storage systems and the cloud; and make upgrades and refreshes properties of the infrastructure. In other words, they want an intelligent, living infrastructure that makes data migrations a thing of the past.
    Since all storage vendors use the same components, competitive advantage will derive from differences in vendor business models, target markets and architectural innovation, and be measured by ease-of-use, ecosystem breadth, cloud integration, post-sales support effectiveness and cost. This presentation will help users to optimize their future storage infrastructure visions by exploring:

    How NVMe-oF, AIOPs and hybrid cloud are reshaping infrastructure designs
    The pros and cons of scale-up, scale-out, 3-tier, and HCI architectures
    The strengths and weaknesses of hybrid vs AFA arrays
  • So You Wanna Program Persistent Memory? Meet the PM Programming Contest Winner! Apr 14 2020 6:00 pm UTC 75 mins
    Jim Fister, Director, SNIA Persistent Memory Software Enabling
    SNIA’s Persistent Memory Hackathon Program enters its second year with 300+ developers up to speed on the latest in programming persistent memory -- and SNIA’s NVDIMM Programming Challenge just announced its first winner of distinction. Join our webcast to learn the latest developments in PM, new resources available to learn more about programming to PM, and a dive into the winning application introduced at the recent Persistent Memory Summit.
  • QUIC – Will it Replace TCP/IP? Apr 2 2020 5:00 pm UTC 75 mins
    Lars Eggert, NetApp; Tim Lustig, Mellanox
    QUIC is a new UDP-based transport protocol for the Internet, and specifically, the web. Originally designed and deployed by Google, it already makes up 35% of Google's egress traffic, which corresponds to about 7% of all Internet traffic. The strong interest by many other large Internet players in the ongoing IETF standardization of QUIC is likely to lead to an even greater deployment in the near future. This webcast will highlight:

    •Unique design aspects of QUIC
    •Differences to the conventional HTTP/TLS/TCP web stack
    •Early performance numbers
    •Potential side effects of a broader deployment of QUIC
  • The Impact of Artificial Intelligence on Storage and IT Apr 1 2020 5:00 pm UTC 75 mins
    Glyn Bowden, HPE; James Myers, Intel; Alex McDonald, NetApp
    Artificial intelligence (AI) and machine learning (ML) have been having quite the impact on most industries in the last couple of years, but what about our own IT industry? In this webcast find out how the rise of machine learning has created a new type of demand on IT operations teams as well as how those same teams can utilize new insights and capabilities driven by machine learning. We will explore:
    •The demand on infrastructure
    •Storage and data pipelines
    •The growing field of IT operations leveraging AI (aka AIOps)
  • The Making of Fibre Channel Standards Mar 31 2020 5:00 pm UTC 75 mins
    Barry Maskas, HPE; Joe Kimpler, Independent Industry Expert
    We rely on technical standards for all facets of daily life. Yet it is easy to take technology standards for granted, forgetting that they underpin the technology used every day. As participants in the IT sector it is important for us to learn how standards are developed, why standards matter and how we all benefit from them.

    In this webcast, we’ll pull back the curtain on the standard development process, explain what makes something a standard, and decode a few funky common acronyms. You’ll learn:

    •The differences between a standard and a specification
    •Who is INCITS and what’s their role?
    •T11 Fibre Channel standards development process
    •T11 Fibre Channel Standards
    •Current Fibre Channel standards under development
    •Benefits of standards when architecting Fibre Channel solutions
  • Ethernet-attached SSDs—Brilliant Idea or Storage Silliness? Recorded: Mar 17 2020 68 mins
    Mark Carlson, Kioxia; Rob Davis, Mellanox; John Kim, Mellanox; Ted Vojnovich, Lenovo
    Several SSD and networking vendors have recentl¬y demonstrated ways to connect SSDs directly to an Ethernet network. They propose that deploying Ethernet SSDs will be more scalable, easier to manage, more performant, and/or lower cost than traditional storage networking solutions that use a storage controller (or hyperconverged node) between the SSDs and the network.

    Who would want to attach SSDs directly to the network? Are these vendors brilliant or simply trying to solve a problem that doesn’t exist? What are the different solutions that could benefit from Ethernet SSDs? Which protocols would one use to access them? And how do Ethernet SSDs relate to computational storage? Join this SNIA Networking Storage Forum webcast to learn all this and more as SNIA experts discuss:

    •What are the appropriate use cases for Ethernet SSDs?
    •Why Ethernet SSDs could be appealing and more efficient
    •How Ethernet SSDs compare to other forms of storage networking
    •Different ways Ethernet SSDs can be accessed, such as JBOF/NBOF, NVMe-oF, and Key Value
    •How do Ethernet-attached SSDs enable composable infrastructures?
  • Surviving Ransomware Recorded: Mar 11 2020 51 mins
    Ensono | Zerto | Crisis Team | Cybersec Innovation Partners | Meta Defence Labs
    The estimated cost of ransomware for 2019 is $11.5bn, more than many global industries and markets. Think about that, the total cost of ransomware for this year will be more than many Fortune 1000 organizations make in revenue.

    The cost of ransomware isn’t simply the requested ransom, something most will recommend you don’t pay. It’s the cost of recovery, the cost of data loss, the loss in productivity, the intangible damage to your reputation and the most direct cost: a disruption of your services. With the prevalence and also ingenuity behind Ransomware attacks prevention isn’t the answer.

    Organizations have never had success stopping attacks. To survive, they need to build a strong internal security culture that mitigates risk. Surviving the accident is what’s important, not preventing it in the first place.

    Panel moderated by: Simon Ratcliffe, Technology Evangelist, Ensono
    Panelists: Steve Blow, UK Systems Engineering Manager, Zerto
    Bill Mew, CEO & Founder, Crisis Team
    Chani Simms, Managing Director, Meta Defence Labs
  • Enterprise Security in a Multi-Cloud World Recorded: Mar 11 2020 53 mins
    Simon Ratcliffe, Ensono | Kevin Bailey, Omnisperience | Martin McCloskey, Octopus Labs
    Due to the fast pace of cloud adoption, enterprises worldwide are looking to employ cloud security solutions to safeguard their data and workloads. Join industry experts as they discuss and debate the best strategies for breach prevention and how to make sure your practicing cyber hygiene in a world of multi-cloud computing.

    Topics for discussion will include:

    - How to adopt a multi-cloud security strategy
    - Addressing your cyber risks and challenges
    - Managing vulnerabilities, detecting breaches and responding to incidents
    - Recommendations for improving enterprise cloud security
    - Why prevention has failed insider threat


    Moderated by: Simon Ratcliffe, Technology Evangelist, Ensono
    Panelists:
    Martin McCloskey, Senior Security Operations Analyst, Octopus Labs
    Kevin Bailey, Managing Director & Principal - Security Research, Omnisperience
  • [Panel] Exploring Real World Digital Transformation at the Edge Recorded: Feb 20 2020 45 mins
    Michelle Ruyle | Fred Hintermister | Dr. Lorraine Basset | Dale Tucker
    Edge computing is key to meeting Digital Transformation demands, and at the dawn of this new decade, nearly every industry will be able to take advantage of edge technology to propel their Digital Transformation programs.

    Join this panel, live or on demand, to take a closer look at how real businesses and verticals are implementing edge computing, and the challenges and successes they’re seeing.

    From understanding the business requirements, and overcoming the complex technical requirements, we’ll look at:

    - Dealing with the hyper-converged infrastructure demands of edge computing for digital transformation
    - Automation and remote management capabilities for edge sites
    - Navigating how edge computing requires organizations to change their thinking around new revenue streams, products, services, and business models
    - And more

    Moderator: Michelle Ruyle, CEO & Founder, Optimized Channel
    Fred Hintermister, Vice President, Energy Protection, Global Resilience Federation
    Dr. Lorraine Bassett, Principal, WWPS Technical Business Development Leader, IoT, Amazon Web Services
    Dale Tucker, Senior Director Global Alliances, Equinix
  • Smart Cities’ Digital Transformation: Hosted Edge IOT Platforms Recorded: Feb 20 2020 44 mins
    Chris Davis Vice President, Smart Cities and Strategic Alliances CIMCON Lighting, Inc.
    Smart cities are driving towards Digital Transformation to improve city operations and citizen services. Innovative outdoor Edge technologies deployed on smart streetlights will accelerate that transformation by powering connected sensors and controls, collecting data, managing devices and cybersecurity, local processing, backhaul over wireless networks, and cloud applications for user displays, alerts, reporting and data analytics.
    This webinar introduces an Innovative, outdoor Smart City Edge IoT Platform. Installed on a luminaire, the Edge-based platform performs multiple data functions for connected sensors – capture, analysis, aggregation from multiple sensors, and communication – to cloud SaaS applications. In addition, the Edge platform delivers network flexibility, communicating data to the cloud over both wireless smart grid and cellular networks.
    Technology factors driving Edge platform adoption and wireless infrastructures for smart city applications will be discussed:
    •Improve security
    •Speed data analysis
    •Reduce the volume of data transmissions
    •Lower hardware compute and storage costs
    •Edge Analytics
    oDiagnostic analysis
    oMetrics and measurement for real-time analysis
    oData analysis plus Artificial Intelligence and Machine Learning

    Real and installed “smart” applications using this technology – urban planning, traffic statistics, bicycle and people counting, road condition monitoring, environmental air quality, power line monitoring, video and audio analytics – and their associated benefits will be highlighted.
  • Cloud to Edge: Architecting for the Next Generation of the Internet Recorded: Feb 20 2020 43 mins
    Wesley Reisz, VP of Technology at Section, Chair of QCon San Francisco, & Co-Host of the InfoQ Podcast
    Edge computing continues to make headlines as leading enterprises, including Amazon and Walmart, announce differentiation strategies centered around this emerging compute paradigm.

    Centralized cloud infrastructure, as we know it today, isn’t equipped to handle the amount of data being generated by an explosion of connected devices. At the same time, user expectations around speed, availability, security, privacy, personalization and more are driving application developers to seek new ways to differentiate themselves in crowded markets. Many software architects are turning to edge computing as a path to innovation.

    Join Wes Reisz (VP of Technology at Section and Co-host of the InfoQ Podcast) as he demonstrates why now is the time to adopt an effective edge strategy and what it means to architect, build and deploy edge-aware distributed systems.

    Key Takeaways:

    - Understand the current state of edge computing and common use cases driving adoption, including real-world stories of how organizations are leveraging application architecture as a competitive advantage.
    - Gain tactical insights on how to evaluate your current application architecture to identify opportunities and begin implementing an effective edge strategy today.
    - Learn how to speed up development cycles, eliminate operational overhead, and improve developer experience using automation techniques such as GitOps at the edge.
  • Digital Transformation at the Edge enabled by standardization Recorded: Feb 20 2020 37 mins
    Cristina Badulescu, Vice Chair, NFV ISG, ETSI
    As 5G roll-outs take off, enabling a variety of new applications and services running at the network Edge plays an essential role in establishing new business models and revenue streams. Digital transformation becomes a pre-requisite for the 5G networks offering automation, zero-touch management and orchestration of not only the necessary resources and connectivity needed for edge computing and of the edge computing platforms offered, but also the applications running at the edge.

    Multi-vendor deployments require interoperability, enabled by the current standardization work support as well as its further evolution in support of emerging business models and their required deployment models. Standards Developing Organizations such as ETSI NFV, ETSI ZSM as well as 3GPP and open source initiatives are building blocks for multi-vendor deployments and for rapidly adding new edge applications and services.
  • Using Network Orchestration to Build an Open, Elastic Edge Recorded: Feb 20 2020 36 mins
    Diego R. Lopez, Senior Technology Expert at Telefonica I+D, chair ETSI ISGs NFV and PDL
    The most promising use cases for edge computing, related to demanding network features and scenarios like industrial IoT, require to go beyond current network services, and support a much more dynamic way of consuming them.

    The traditional borders between local and wide area networks, between network segments, and between application and network services themselves tend to blur into a continuum of network services supporting user applications.

    Techniques like the emerging In-Network Computing paradigm require multi-dimensional openness (among computing environments, across network segments, along geographical areas and operators…) and have to rely on holistic network orchestration to achieve the promise of an elastic edge.
  • Digital Transformation at the Edge Recorded: Feb 20 2020 33 mins
    Simon Ratcliffe, Technology Evangelist, Ensono
    This webinar will examine Edge Computing across a variety of environments and discuss how to build a stable, secure and manageable Edge environment that can form the foundation for transformational change within organisations. Edge is not a new idea but exploiting the Edge effectively does require some new thinking some of which is counter-intuitive in the modern cloud centric world in which we operate. 5G is going to unleash a whole new wave of possibilities around remote devices and as IT functions we are going to be under more and more pressure to deliver on the promise so we need to get our houses in order and build a platform that will act as a springboard and not pitch us flat on our faces.
  • Fundamentals of 5G Transformation: Security and other Associated Challenges Recorded: Feb 19 2020 33 mins
    Jacob Andreas Roya, Director of IT Operations, Phoenix IS-IT Corporation
    Jacob will discuss the ramifications of 5G transformation and associated challenges from a security standpoint.

    He will also cover the fundamentals of industry transformation to 5G, SDN and NGA, both industrial and commercial, and what to expect from such a technological shift.


    About the presenter:
    Jacob has been the IT Director at Phoenix IS-IT Corporation, a subsidiary of Phoenix Communications, since 2016. Phoenix is an MSP, offering a wide range of IT/IS services for small to mid-sized business organizations in the mid-south. Phoenix Communications was founded in 1994 in Memphis TN and have since received nationwide recognition for custom designed automation systems.

    Jacob has spent the last eight years in network engineering and systems administration, with a focus on cybersecurity and penetration testing in the past four.

    He is also heavily focused on threat management, attack simulations and remediation technologies. Jacob's background also includes signal processing and RF design, primarily in the 3GPP and 802.11 domain, which he's now included as part of his ongoing security research.
  • Software Defined Wide Area Network (SD-WAN) for The Modern Networks Recorded: Feb 19 2020 42 mins
    Wayne Xing, Network Solution Architecture, Visualzero Solutions, 6xCCIE, CISSP, VCP-NV
    Organizations are deploying more applications in the cloud, implementing more devices in branch offices and consuming more bandwidth. Traditional connectivity options such as Multiprotocol Label Switching (MPLS), Frame-Relay, Leased Line etc. can be expensive and slow to provision, and provide limited bandwidth in many locations.

    Many organizations are looking for an agile connectivity solution for their digital transformation into the cloud era. SDWAN (software defined Wide Area Network) fundamentally creates a secure scalable fabric with the most limited amount of state on the edge device and performs most of the fabric decision making in the controller. This allows organizations to have the flexibility to make topologies as needed, add segments as needed and to be able to deliver into the environment new and old styles of capabilities while maintaining a well-developed routing environment.

    Key takeaways:
    - The combination of app content, app delivery and app consumption are resulting in an evolving WAN situation

    - Challenges such as poor application experiences, increased WAN services spend, and a lack of visibility and control are making it difficult for IT to provide the business with a platform to support faster innovation

    - Most IT organizations are interested in realizing a common set of benefits such as consistent high-quality user experiences, reduced cost, simplified operations and lower risk

    - The journey to the next generation software defined WAN requires considering various technical capabilities such as transport independence, ubiquitous data plane, automatically secure routed endpoints, resiliency, application aware routing, cloud readiness, simple secure network segmentation, centralized policy enforcement and layer 4-7 flexible services insertion

    - Migrating to a software defined WAN does not need to be difficult as long as one knows the best approach to a software-defined WAN environment.
  • Object Storage: What, How and Why Recorded: Feb 19 2020 64 mins
    Chris Evans, Architecting IT; Rick Vanover, Veeam; Alex McDonald, NetApp; John Kim, Mellanox
    There are many types of storage technologies, both in how they are interconnected, consumed and designed. Object storage is no different in that it brings its own set of unique characteristics to the market. In this webinar, storage experts Rick Vanover and Chris Evans will explain:

    •What object storage is and what it does
    •How to use object storage
    •Essential characteristics of typical consumption
    •Why object storage is important to the future of storage and computing technologies

    After you watch the webcast, check out the Q&A blog at https://bit.ly/2xa63fH
Best practices for achieving Enterprise IT and operational efficiency.
The Enterprise Architecture channel presents the next generation of Enterprise IT: recognizing the strategic importance of digital transformation and the data center to make companies more nimble and competitive. These presentations will help demanding IT and BizOps professionals achieve flexibility, scalability and performance with reduced risk and complexity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Cloud’s Impact on Online Security
  • Live at: Sep 14 2010 1:00 pm
  • Presented by: Dave Trouse, Head of Network & Security - GoCompare, John Tridgell & Matthew Johns, Rackspace; Matthew Harkrider, Alert Logic
  • From:
Your email has been sent.
or close