Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Highlights of HPE Data Protector: Current and outlook to next release version Highlights of HPE Data Protector: Current and outlook to next release version Uli Wallscheid, Technical Consultant, HPE Information Management, specialist for HPE Data Protector Recorded: Mar 24 2017 62 mins
    Is your infrastructure evolving so fast that your existing backup environment can’t cope? Join presenter Uli Wallscheid, HPE Technical Consultant and specialist for HPE Data Protector, to learn what HPE has to offer with Data Protector, including features and benefits you never knew were available.

    You’ll also get a sneak preview of the next release version and will learn how it addresses the challenges of complexity, cost, and recoverability of today’s information-driven enterprises, with features such as:
    • Added platforms and integrations
    • New Virtualization features
    • Security updates
    • Storage integrations
  • Новые технологии Outotec для перекачки пульп Новые технологии Outotec для перекачки пульп Евгений Жмарин, руководитель технологического направления Recorded: Mar 24 2017 55 mins
    Основной темой вебинара является концепция комплексного подхода Outotec к выбору шламовых насосов для перекачки пульп.

    По статистике, операционные затраты на работу насосов в среднем составляют 4-6% от расходов обогатительной фабрики, поэтому правильный выбор насосов и режимов их эксплуатации является важной составляющей оптимизации производства.

    Начиная с 2016 года, компания Outotec стала стратегическим партнером GIW Industries – одного из мировых лидеров по поставкам шламовых насосов. Объединяя обширные знания Outotec в технологиях обогащения и многолетний опыт GIW в области проектирования и изготовления шламовых насосов, мы готовы предоставить нашим заказчикам комплексные решения по перекачке пульп, обладающие высоким коэффициентом использования оборудования и оптимизированными операционными затратами, а также обеспечивающие стабильность технологических процессов и максимальную производительность.

    Темы вебинара:
    1. Партнерство Outotec/GIW – уникальные решения в области перекачки пульп;
    2. Модельный ряд шламовых насосов Outotec GIW. Исследования, проектирование, производство;
    3. Комплексный подход к выбору шламовых насосов. Решения в области измельчения, флотации, сгущения, фильтрации и др.;
    4. Оптимизация систем перекачки пульп и модернизация насосов.
  • Turvallisuus kilpailuetuna – harjoittelu tekee mestarin Turvallisuus kilpailuetuna – harjoittelu tekee mestarin Jarno Limnell Recorded: Mar 24 2017 61 mins
    Webinaarissa esitellään, mitä turvallisuus on vuonna 2017, miten turvallisuuden uusi normaalitila vaikuttaa liiketoimintaan, ja miltä turvallisuuden tulevaisuus näyttää. Lisäksi katsotaan konkreettisen harjoittelun merkitystä onnistuneen lopputuloksen aikaansaamiseksi.

    Jarno Limnéll tarkastelee omassa osuudessaan mm. fyysisen ja digitaalisen turvallisuuden keskeisiä muutostrendejä, sekä turvallisuuden merkityksen vahvistumista kilpailukykyisen liiketoiminnan ja laadukkaan palveluntuotannon mahdollistajana. Hänen osaamisessaan yhdistyy poikkeuksellisen laaja yhteiskunnallisen turvallisuuden ymmärrys sekä käytännölliset havainnot toimintaympäristön muutosten vaikutuksista toiminnan perusteisiin ja edellytyksiin.

    Martti Setälän esityksessä tarkastellaan johdon valmius- ja kriisiharjoittelun roolia ja mahdollisuuksia häiriöttömän toiminnan kehittämisessä sekä häiriötilanteiden tehokkaassa kriisinhallinnassa ja palautumisessa. Miten harjoituksen suunnittelu-, toteutus- ja palautevaiheita hyödyntäen voidaan kehittää organisaation tärkeitä osaamisia, ohjeistuksia ja prosesseja? Miten harjoitustoimintaa kannattaa kehittää osana organisaation oppimista ja koulutusta? Miten harjoitustoiminta rakentaa organisaation sisäistä ja organisaatioiden välistä yhteistyötä ja tilanneymmärrystä?

    Harjoittelu ja simulointi on tärkeää myös IT palvelunhallinnan kja projektinhallinnan oppimisessa ja sisäistämisessä. Wakarulta löydät simulaatiopelit näiden aihealueiden sisäistämiseen.

    Puhujat:

    Jarno Limnéll, Kyberturvallisuusjohtaja Insta Group Oy:ssä ja Kyberturvallisuuden professori Aalto-yliopistossa.

    Martti Setälä, Asiakkuus- ja kehitysjohtaja, Insta Trust Oy.
  • Rapid7 InsightIDR Product Demo - APAC Rapid7 InsightIDR Product Demo - APAC Eric Sun and Pat Haley Recorded: Mar 24 2017 48 mins
    Rapid7 InsightIDR delivers trust and confidence: you can trust that any suspicious behavior is being detected, and have confidence that with the full context, you can quickly remediate.

    Developed side-by-side with incident response teams, InsightIDR eliminates data complexity, reduces alert fatigue, and makes analytics accessible to all. You see only what you need to see – from endpoint to cloud.

    By integrating with your existing network & security stack, InsightIDR leverages user behavior analytics to correlate the millions of events your organization generates daily to the exact users and assets behind them. Along with custom included intruder traps, you'll automatically detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing. Combined with a fully searchable data set and endpoint interrogation, InsightIDR directly addresses the gaps found in most of today's detection technologies, including SIEM and IPS.

    Watch this video to learn how InsightIDR can help you:

    - How to cut through the noise to detect attacks
    - How to investigate incidents faster
    - How to end the drudgery of security data management
    - Q&A
    - And more!
  • Avoiding IT and Operational Technology Convergence Pitfalls Avoiding IT and Operational Technology Convergence Pitfalls Dan Ortega - Vice President of Marketing Recorded: Mar 23 2017 4 mins
    In this video, we discuss pitfalls to avoid when consolidating IT and Operational Technologies

    A key technology convergence impacting the mainstream adoption of the Internet-of-Things (IoT) is the coming together of Information Technology (IT) and Operational Technology (OT).
    Below we explore five potential pitfalls to avoid when considering unified IT and OT:
    1.Visibility: Improving visibility across unified IT/OT infrastructure has some benefits such as enabling a single service desk to handle both IT and OT domains, and being able to use common management tools.

    2.Security: We have discussed how operational technology can create a risk for IT. There is, however, an upside of converging IT and OT. The converged technology infrastructure can be subject to the same security policies and can use common compliance controls.

    3.Scalability: By operating OT and IT in separate silos, you miss out on opportunities to procure complimentary technology for both. Purchasing can negotiate better discounts if they are buying technology in high volumes and IT gets to buy IT and OT technology that works together because it can be pre-integrated.

    4.Administration: By keeping IT and OT separated, an organization cannot benefit from being able to lower administration costs through streamlining and centralizing management.

    5.Collaboration: Higher up the food chain, since OT is normally more closely aligned with how the business makes money, a converged IT and OT solution can improve the partnership between business and IT.
    Blazent focuses on providing near real-time insights that can be gained by being able to ingest and analyze large numbers of IT and IoT data streams, correcting data gaps and inconsistencies before the data is consumed.
  • RSA 2017 — Security and Availability RSA 2017 — Security and Availability Bryan Embrey, Senior Product Marketing Manager, Cradlepoint Recorded: Mar 23 2017 1 min
    At RSA 2017, Cradlepoint Senior Product Marketing Manager Bryan Embrey discusses security and five-nines availability that is cloud-monitored and cloud-managed through a single pane of glass.
  • RSA 2017 — SDN for IoT RSA 2017 — SDN for IoT Todd Kelly, SVP for Emerging Technologies, Cradlepoint Recorded: Mar 23 2017 2 mins
    At RSA 2017, Cradlepoint SVP for Emerging Technologies Todd Kelly discusses the influx of the Internet of Things, and how a Software-Defined Perimeter approach can foster single-pane-of-glass management of networks, applications, and workloads.
  • Azure Weekly Webcast: Transforming your Workloads with Azure Stack Azure Weekly Webcast: Transforming your Workloads with Azure Stack Mack Ratcliffe, Christian Booth & Mark Mortimore, Microsoft Recorded: Mar 23 2017 37 mins
    Join us for a technical deep dive into Azure Stack and learn how to transform your workloads.

    Azure Stack provides customers and service providers with a seamless and consistent way to run mission-critical application workloads in their datacenter and in the Azure public cloud for a true hybrid experience.

    Join this webcast to:
    - Learn how Azure Stack fits into Microsoft’s hybrid cloud story
    -Understand what business and technical gaps are addressed by Azure Stack
    - Get to know Azure Stack architecture

    This webcast is part of our Explore weekly hot topics on Microsoft Azure webcast series. Sign up for this session, or the entire series today!
  • RSA 2017 — All-in-One Solutions in Branches & Vehicles RSA 2017 — All-in-One Solutions in Branches & Vehicles Kevin Johnson, Solution Architect, Cradlepoint Recorded: Mar 23 2017 2 mins
    At RSA 2017, Cradlepoint Solution Architect Kevin Johnson talks about all-in-one network connectivity and security through Cradlepoint routers — both at the branch and in vehicles.
  • Apache Cassandra: Best Practices and Troubleshooting Apache Cassandra: Best Practices and Troubleshooting Ben Slater, Chief Product Officer at Instaclustr Recorded: Mar 23 2017 55 mins
    With any path to success, there are always some common pitfalls to avoid. With 8 million node hours of experience running Cassandra, and currently managing more than 100 clusters globally for a wide range of clients, Instaclustr has done all the hard work for you.

    Through that experience, our team has been able to identify and implement best practices for our clients with applications on Cassandra with great success.

    Our 45 minute live webinar will provide you with the vital tools and insider tips to ensure your applications are running smoothly on Cassandra.

    What you’ll discover:
    -Learn best practices and common pitfalls
    -Discuss how to identify their applicability in your use case
    -Examine strategies to move existing applications to best practice alignment
  • FireEye Government Forum: The Hill Perspective FireEye Government Forum: The Hill Perspective FireEye Recorded: Mar 23 2017 22 mins
    Keynote: The Hill Perspective
    Senator Mark Warner, Virginia
  • FireEye Government Forum: The DoD Perspective FireEye Government Forum: The DoD Perspective FireEye Recorded: Mar 23 2017 27 mins
    Keynote: DOD Perspective
    Rear Admiral Gene F. Price, Deputy Commander, U.S. Navy
  • FireEye Government Forum: A Federal to Private Sector Perspective FireEye Government Forum: A Federal to Private Sector Perspective FireEye Recorded: Mar 23 2017 25 mins
    Keynote: A Federal to Private Sector Perspective
    Rear Admiral Sam Perez, U.S. Navy (RET) Managing Director, SBD Advisors
  • FireEye Government Forum: Enabling the Government CISO to Command and Protect FireEye Government Forum: Enabling the Government CISO to Command and Protect FireEye Recorded: Mar 23 2017 48 mins
    Along with compliance requirements, agency Chief Information Security Officers oversee the security of the government’s networks and critical infrastructure from domestic and foreign attacks. The monitoring and fortification of these systems is critical to protecting the public’s health, safety and economic prosperity. Potential oversights can put the nation at risk to insider threats and those seeking to gain access to sensitive data, intelligence or possibly launch malicious programs into our systems and networks. This session will take a deep-dive into the immediate and long-term hurdles facing CISOs across all levels of government missions from providing security for information systems that support operations and assets to the expansion of responsibility for whole agency cyber accountability.
  • FireEye Government Forum: Opening Keynote FireEye Government Forum: Opening Keynote FireEye Recorded: Mar 23 2017 49 mins
    In order to protect themselves, federal, state and local governments and their partners need a clearer picture of the rapidly-evolving threat landscape that has drastically changed with new rules of engagement. Nation-state actors, cyber criminals and hackers have become less predictable. The attack surface continues to grow with the rise in connectivity, data loads and access to industrial control systems. To identify, assess, respond and mitigate threats such as ransomware, extortion, espionage and zero-day attacks, as well as predict and prevent the “unknown threat,” agencies need to build intelligence-led security operations. CIOs and CISOs are drowning in their own security stack while analysts are exhausted by “alert fatigue.” Operationalizing security enables security professionals to rapidly collect, analyze and disseminate threat intelligence across the enterprise, assess risk based on an adversary’s motivation and capability and align resources to the most impactful threats.
  • Customer Expectations in 2017: Exceeding Demand with Cloud & Digital Customer Expectations in 2017: Exceeding Demand with Cloud & Digital Alexandra Rijnoveanu, Business Applications Architect Recorded: Mar 23 2017 38 mins
    Customers' expectations are rising.

    According to the Customer 2020 Report, customer experience will overtake price and product as the key brand differentiator by 2020. Thanks to the Internet, consumers have access to more brands, products, and services than ever before, and thanks to the proliferation of mobile devices, they expect information everywhere and anywhere. Regardless of your industry, the people you want to reach will demand a consistent, rich digital experience across devices. Consumers' rising expectations actually create an opportunity for forward-thinking organizations. While this may seem hard to navigate or possibly overwhelming, there are an extensive set of integrated tools to help you in the journey and to successfully adapt.

    These tools will also empower your team to enhance their collaboration and productivity. Explore how your organization can tailor and leverage these tools to reflect and enhance your unique offering.

    Join this webcast to:

    - Learn how to shift to a customer-centric strategy and what is the core value
    - See how Microsoft Dynamics 365 becomes your customer hub of information and interactions
    - Explore how the extended Microsoft Cloud offering provides the latest solutions to enrich your customer knowledge and experience
    - Hear transformative customer stories from different industries and how Microsoft made the difference
  • How Tableau pairs Jamf with Code42 to provide a better device choice experience How Tableau pairs Jamf with Code42 to provide a better device choice experience Matt Peterson, Tableau - Aimee Simpson, Code42 - Tad Johnson, Jamf Recorded: Mar 23 2017 37 mins
    Today, end users and IT alike understand the role technology plays in powering productivity. Employee success hinges on having the right tools and technology to work smarter and faster. As a result, businesses have found themselves with a mixture of device types and operating systems in their organization. So how can you adapt to efficiently support and enable employees through device choice?

    In this webinar, we’ll explore how Tableau Software succeeds in a cloud-first, mixed device environment that allows employees to choose their preferred operating system.

    Watch this 30-minute webinar to learn:

    *The benefits and challenges associated with Tableau’s mixed device environment
    *How Tableau performs data migrations for users who are switching platforms
    *Recommendations and considerations for offering Macs to your users


    Speakers:

    Matt Peterson,Technical Support Specialist,Tableau
    Aimee Simpson, Product Marketing Manager, Code42
    Tad Johnson, Solutions Architect, Jamf
  • Rapid7 InsightIDR Product Demo Rapid7 InsightIDR Product Demo Eric Sun and Pat Haley Recorded: Mar 23 2017 51 mins
    Rapid7 InsightIDR delivers trust and confidence: you can trust that any suspicious behavior is being detected, and have confidence that with the full context, you can quickly remediate.

    Developed side-by-side with incident response teams, InsightIDR eliminates data complexity, reduces alert fatigue, and makes analytics accessible to all. You see only what you need to see – from endpoint to cloud.

    By integrating with your existing network & security stack, InsightIDR leverages user behavior analytics to correlate the millions of events your organization generates daily to the exact users and assets behind them. Along with custom included intruder traps, you'll automatically detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing. Combined with a fully searchable data set and endpoint interrogation, InsightIDR directly addresses the gaps found in most of today's detection technologies, including SIEM and IPS.

    Watch this video to learn how InsightIDR can help you:

    - How to cut through the noise to detect attacks
    - How to investigate incidents faster
    - How to end the drudgery of security data management
    - Q&A
    - And more!
  • Overcoming eTail Challenges to Deliver Exceptional Customer Experiences Overcoming eTail Challenges to Deliver Exceptional Customer Experiences Michael Milligan, Sr. Director Product & Solution Marketing and Charlie Kraus, Sr. Product Marketing Manager Recorded: Mar 23 2017 55 mins
    Online retailing is no longer as simple as duplicating the in-store experience. It is about so much more. Online retailers are expected to deliver fast, personalized shopping experiences featuring rich media and video, to customers on any device, wherever and whenever they choose.

    These realities have introduced a host of challenges for retailers, but they also offer significant opportunities to improve customer conversion and retention.

    What does this mean for retailers trying to deliver exceptional online experiences that maximize revenue and build customer loyalty?

    Join us as we review the technical challenges that impact your ability to deliver exceptional e-tail customer experiences, and strategies for overcoming them.

    Some of the topics that will be covered, include:
    · What customers expect from their online shopping experience;
    · What it takes to deliver a compelling omnichannel experience to reach customers;
    · How to support traffic spikes and seasonal demand;
    · Why website performance is key to improving conversion rates;
    · How best to safeguard your website against malicious attacks.
  • Beyond the WAN: Networking the Enterprise Data Center to the Cloud Beyond the WAN: Networking the Enterprise Data Center to the Cloud Jim Davis, 451 Research; Josh Snowhorn, CyrusOne; Ramsey El-Fakir, Fi-Tek Recorded: Mar 23 2017 48 mins
    Enterprises are using a variety of cloud and SaaS services to remain competitive, but can lose out when their network architecture either becomes a deployment bottleneck or impedes application performance. Network interconnection has often taken a back seat to other issues in application design and deployment, but enterprises should not continue to ignore this critical component of infrastructure.

    In this webinar, we examine how today’s interconnection services can break what used to be the tight links between distance, capacity and cost. Indeed, a rethink of networking strategies in the datacenter can help unlock more agility and efficiency in digital enterprise transformation efforts.

    This session will look at issues affecting enterprise use of datacenter networking services, including:

    -Changing cloud consumption patterns by enterprises, employees, partners and customers
    -The different types of interconnection offered by multi-tenant datacenters, including datacenter interconnect, and cloud exchange
    -Real world experiences of enterprises who have leveraged interconnection to solve application performance and availability issues
    -How datacenter interconnect services can be used for disaster recovery, enhanced application performance, and access to partner and vendor ecosystems
  • Prevent, Detect, and Respond – Securing Government and Education Onsite and in t Prevent, Detect, and Respond – Securing Government and Education Onsite and in t Panel of 11 experts moderated by PSTE Recorded: Mar 23 2017 72 mins
    The Public Sector Technology Exchange (PSTE), an independent venue that hosts national thought leadership forums on the challenges of government, education, and technology, hosts a webinar entitled “Prevent, Detect, and Respond – Securing Government and Education Onsite and in the Cloud.”

    Hear this leadership forum on demand to gain insights on:
    •Security best practices for government and education
    •Strategies for rapid response to breaches
    •Reducing your departmental cyber attack surface
    •Preparing for the “powder keg” situation in your organization
    •What hackers love about the cloud
    •Threat research trends on the future of cyber warfare

    Webinar Panelists:

    Chris Hill - Acting Deputy Chief Information Security Officer
    State of Illinois

    John Matelski - Chief Innovation and Information Officer
    DeKalb County, Georgia

    Rick Howard - Chief Security Officer
    Palo Alto Networks

    Matt Morton - Chief Information Security Officer and Assistant Chief Information Officer
    University of Nebraska Omaha

    Elayne Starkey - Chief Security Officer
    State of Delaware

    Lars Schmekel - Chief Security Officer
    Miami Dade County, Florida

    Gary Hayslip - Chief Information Security Officer
    City of San Diego, California

    Walter Tong - Director, Cyber Intelligence
    State of Georgia

    Duane Kuroda - Sr. Manager, Advanced Technologies
    Proofpoint

    Bob Leek - Deputy Chief Information Officer
    Multnomah County, Oregon

    Palo Alto Networks and Proofpoint are the sponsors of this leadership forum.
  • Proving the Business Value of Network Transformation Proving the Business Value of Network Transformation DCD, Juniper Recorded: Mar 23 2017 1 min
    A short video from DCD, that covers the key findings from an IDC paper, whereby 9 companies were interviewed to provide their insight and analysis on how Juniper Networks have helped them.
  • Uniting a global development workforce with Juniper Uniting a global development workforce with Juniper Dave Uebele, Juniper Networks, SCM Engineer and Russ Hill, WANdisco, SCM Specialist Recorded: Mar 23 2017 58 mins
    Join us to learn how Juniper Networks relies on WANdisco to unite a globally distributed development workforce within Subversion, delivering results such as:
    - A 24/7 Continuous Integration environment with zero Subversion downtime
    - Increased productivity and maximized valuable engineering time and efficiency
    - Eliminated the effects of network failures and the dependency on legacy backup procedures
  • The New Threshold of Comprehensive Security – Why Self-Healing is Imperative The New Threshold of Comprehensive Security – Why Self-Healing is Imperative Kim Ellery, Director, Product Marketing, Absolute Recorded: Mar 23 2017 30 mins
    Traditional strategies for protecting endpoints are failing as attacks increase in relentlessness and sophistication. This reality has elevated the demands on security professionals and requires that organizations adopt new security paradigms that unlock the power of self-healing systems. To stop security breaches at the source, we must become faster at intelligently detecting and responding to threats. This timely webinar from Absolute explores how to realize self-healing systems in your own organization and ensure preparedness in the face of evolving threats.
  • Next-Gen Enterprise Cloud Contract Management: A Microsoft Case Study Next-Gen Enterprise Cloud Contract Management: A Microsoft Case Study Michel Gahard, General Counsel, Nancy Gillespie, Solution Specialist, Microsoft, Niranjan Umarane, GM Product, Icertis Recorded: Mar 23 2017 59 mins
    Join us for this upcoming live webinar to find out how your Contract Lifecycle Management system could be working harder for you. The webinar details Microsoft’s experience in moving from a ‘patchwork’ of third-party and internal solutions, to a scalable, streamlined solution from Icertis.

    About the speakers and what you will learn:

    Michel Gahard, Associate General Counsel & General Manager, Microsoft

    Hear first-hand from Michel about the challenges Microsoft faced and the solutions and implementation best practices they followed for a successful adoption of a NexGen Contract Management system and how implementing the Icertis Contract Management platform resulted in:

    - Increased contract compliance
    - 60% increase in contract speed
    - About 40% decrease in cost

    Niranjan Umarane, General Manager of Product Management, Icertis

    Niranjan will highlight implementation best practices for a large enterprise-wide initiative and discuss what is so unique about the Icertis Contract Management platform, including:

    - Configurable Business Rules Management for a globally dynamic environment
    - NextGen, easy-to-use interface
    - Quickly get up-and-running in 4-5 months
    - Scalability and flexibility based on the cloud-native architecture