Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • VM Consolidation with Vexata NVMe Storage Systems
    VM Consolidation with Vexata NVMe Storage Systems Rick Walsworth Recorded: Aug 17 2018 5 mins
    Vexata provides NVMe-based storage solutions that maximize VMware virtualized workloads providing massive consolidation, high performance for enterprise workloads such as Oracle, SQL Server, and SAS Analytics. This demo provides an exclusive view into consolidating mission critical Oracle workloads on VMs supporting a range of mixed OLTP, Analytics and Data Warehouse workloads delivering ultra-low latency over increasing workloads. If you are considering moving enterprise applications into VMware virtualized environments, Vexata delivers the performance and scale to do so with confidence.
  • Operational Alignment: Rebalance IT Process with Customer Needs
    Operational Alignment: Rebalance IT Process with Customer Needs Troy DuMoulin - VP Research & Development, Pink Elephant Recorded: Aug 17 2018 59 mins
    Let’s say your IT organization has processes in place that seem effective on the surface — you resolve service outages, provision resources, and manage changes as required. Your monthly reports may satisfy IT executive requirements, but how aware are you of your business customers’ needs and service expectations in relation to these processes? In their initial efforts to define IT service delivery processes, many organizations have unintentionally pushed customers to the end of the equation.

    Aligning interdependent resources and workflows is crucial for IT operations to be successful — but not at the expense of the customer. Too frequently, IT faces excessive pressure to deliver business metrics, and not enough significance is placed on the goals and values of the customers.

    Join Troy DuMoulin, VP Research & Development at Pink Elephant discusses how team misalignment can hinder service delivery.
  • Designing a Distributed Cloud Database for Dummies
    Designing a Distributed Cloud Database for Dummies Patrick McFadin, VP of Developer Relations at DataStax Recorded: Aug 17 2018 46 mins
    Watch Designing a Distributed Cloud Database for Dummies—the webinar. The webinar “stars” industry vet Patrick McFadin, best known among developers for his seven years at Apache Cassandra, where he held pivotal community roles. Register for the webinar today to learn: why you need distributed cloud databases, the technology you need to create the best used experience, the benefits of data autonomy and much more.
  • PMI TV: Pension transfers under the spotlight
    PMI TV: Pension transfers under the spotlight Jonathan Watts-Lay, Director, WEALTH at Work Recorded: Aug 17 2018 7 mins
    DB pension failures have been making headlines recently casting into the spotlight the support that members receive. Jonathan Watts-Lay, Director, WEALTH at work, discusses DB transfers and the best ways to protect members.
  • How financial markets are grossly underestimating recessionary risk
    How financial markets are grossly underestimating recessionary risk Edward Park, Mike Riddell Recorded: Aug 17 2018 38 mins
    Mike Riddell will talk about the macroeconomic risks to global financial markets, and some of the signals that suggest the next recession may be sooner than many people think. The talk will touch on the risks posed by global trade wars, tighter monetary policy, commodity prices and China.

    Key points:

    • Volatility over the last 10 years has been suppressed by central banks, but if history is any guide, recent monetary policy tightening is a lead indicator of greater asset price volatility and higher risk premia.
    • Tighter monetary policy contributes to slower real money supply growth, which is also a lead indictor for global economic activity.
    • Higher commodity prices are a sign of strong current growth, but they also imply weaker future growth.
  • Security, Privacy and the Next Generation Workforce (Podcast)
    Security, Privacy and the Next Generation Workforce (Podcast) Barry Scott, CTO Centrify EMEA Recorded: Aug 17 2018 30 mins
    Yahoo, Equifax and Uber are just some of the high-profile brands hit by breaches during the past twelve months but could it be younger workers that pose the biggest risk to an organisation's IT security?

    Centrify surveyed 1000 UK office workers aged 18 to 24 and 500 UK senior decision makers to measure what the decision makers think of the next generation workforce’s approach to security and compare it to real-world attitudes.

    Is there a significant gap between perception and reality in decision makers view of younger workers? The results may surprise you!

    In this podcast, Centrify's CTO Barry Scott and SC Media's Editor-in-Chief Tony Morbin discuss the next generation of workers and how their behaviour could impact the workplace.

    After listening to the podcast, don't forget to download the full report.
  • Asset class outlook: Expected real returns over the medium-term
    Asset class outlook: Expected real returns over the medium-term Peter Brooke Recorded: Aug 17 2018 31 mins
    Investors are concerned about whether “hanging in there” is a sensible strategy for meeting their real return objectives in this challenging market environment.

    We consider the Themes and Risks faced by investment markets and how we expect these to play out. This gives insight to our strategic asset-allocation including our views on offshore vs local exposure. We set out our real return expectations on the key asset classes.

    In active solutions “hanging in there” does not mean your investments are passively waiting it out
  • Her View on Making Investments
    Her View on Making Investments Jessica Gulick, CEO of Katzcy & Gail Ball, Managing Partner of Chestnut Street Ventures Recorded: Aug 16 2018 31 mins
    Cybersecurity is one of the fastest growing technology market areas. Women-owned technology companies are right in the midst of cybersecurity innovation by delivering products and solutions that protect consumers and businesses from ever-changing threats. Are you looking to help one of these companies grow by investing in their solutions? Perhaps you want to get in early and be a part of their mission to protect and prevent? If you answered yes, please join Jessica Gulick, Owner of Katzcy Consulting, and Gail Ball, Managing Partner of Chestnut Street Ventures, in a 30-minute webinar as they share their insights on identifying and investing in these exciting and fast-growing women-owned firms.
  • Ingest, Compute & Analyze IoT Data with AWS IoT Core & AWS Greengrass
    Ingest, Compute & Analyze IoT Data with AWS IoT Core & AWS Greengrass Tolga Tarhan, CTO at Onica Recorded: Aug 16 2018 61 mins
    Whether you’re using IoT to remotely control a device, track devices in the wild, or collect and predict performance and failures, you’ll need the power of AWS. By leveraging AWS' connectivity, storage, application, and analytics capabilities, you can build IoT-enabled apps quickly and at a fraction of the cost.

    We’ll cover AWS IoT Core & AWS Greengrass and discuss:
    - Device connectivity & security
    - Ingesting data with AWS IoT
    - Reacting to IoT data in real-time
    - Storing data in Amazon DynamoDB and Amazon S3.
    - Compute options with Amazon EC2 and AWS Lambda
    - Analytics: batch processing, analytics at the Edge Device


    We’ll walk through customer success stories:

    FRAC-CHEM sought to track the performance of fracking hydration units in remote field locations. Onica developed an IoT Device, software, infrastructure, and application to collect, transmit, parse, and store data. A real-time dashboard was integrated on-site allowing full transparency into deployed hydration units.

    Alistair Group needed a solution to manage their group of contractors, drivers, trucks, trailers, and load assignments. We helped build a proprietary serverless application connected to IoT devices on the trucks to manage their subcontractor fleet. The new application streamlined and automated their operations process.
  • Using Artificial Intelligence To Transform Digital Experiences
    Using Artificial Intelligence To Transform Digital Experiences Dr. Anand Rao (PwC), David Devisser (Adobe) Recorded: Aug 16 2018 46 mins
    Businesses are improving the design and delivery of digital experiences through artificial intelligence and machine learning. With Adobe Sensei, marketers are predicting and executing exceptional experiences with new integrated data services and unified profiles.

    In this session you will hear from experts and leading analysts about:
    - The role artificial intelligence and machine learning are playing in today's ecosystem
    - The capabilities Sensei can bring across marketing, analytics and advertising
    - How to begin or continue the implementation for your business

    Presented by:
    - Dr. Anand Rao, Partner, Global AI & Innovation Lead, Data & Analytics, PwC
    - David Devisser, Principal Architect, Strategic Partnerships, Adobe
  • Unified IT-OT Security Management: Strengthening Critical Infrastructure Defense
    Unified IT-OT Security Management: Strengthening Critical Infrastructure Defense Terry Olaes, Sales Engineering Lead, Central US Skybox Security Recorded: Aug 16 2018 57 mins
    Critical infrastructure — from energy production to manufacturing to public utilities — is becoming a more prevalent attack vector for nation-state threat actors as well as the common cybercriminal. These attackers are frequently exploiting the interconnectedness of IT and operational technology (OT) networks, finding their foothold in the disconnect between their security management.

    In response, many organizations are looking to unify and align their IT-OT security programs to better understand and tackle cyber risks in both environments. In this session, Skybox Security SE Terry Olaes will cover what challenges to expect in this an endeavor, and how to use comprehensive visibility and contextual intelligence to overcome them.

    In this webinar, you will learn:
    - What are the inherent risks to OT security and how the continued integration with IT impact risk in both environments
    - What are the key concerns for IT and OT security teams and how can they can align to improve security throughout the organization
    - Which elements and capabilities needed to gain seamless visibility of on-prem, cloud and OT networks
    - How to use modeling and analytics to put risk in the context of your attack surface and effectively prioritize response
  • How Odyssey Logistics transformed operations with data
    How Odyssey Logistics transformed operations with data Joe Easley, Qlik Administrator, Odyssey Logistics Recorded: Aug 16 2018 28 mins
    When Odyssey Logistics looked for new ways to improve their services, they had an idea. What if they could incorporate real-time weather alerts with the rest of their data? The result added huge value for them and their customers. Now, instead of reacting to issues, they can proactively manage customer expectations, and make sure shipments arrive on time, regardless of conditions.

    Learn how Qlik® makes it easy to capture, visualize and analyze all of your data, providing you with:

    • Actionable and immediate intelligence
    • Relevant and customized analysis
    • A single, authoritative source of truth
    Get inspired by Odyssey Logistics, and discover new ways to sharpen your competitive edge with Qlik.
  • EPISODE 1: The Economics of Managed Cloud Services & Tips for Choosing the Right
    EPISODE 1: The Economics of Managed Cloud Services & Tips for Choosing the Right Jay Gagne Recorded: Aug 16 2018 6 mins
    Watch our first installment of the Tech over Coffee series featuring, Jay Gagné, CTO and Jeff Thompson, Director of Architecture and Operations, as they bring a unique-level of candor and humor to timely tech topics and impending trends in IT and data security.
    This episode includes discussion about:
    • The most common challenges of managed services
    • The economics of managed cloud services
    • How to identify which cloud model to implement
    “Tech over Coffee will provide both our tech-peers and prospective partners and clients with down-and-dirty information about what’s happening in the ever-evolving world of information technology. In our industry, information is constantly emerging, so rather than contemplating our thoughts behind closed doors, we decided to share our views and contemplations with other curious minds.” – Jay Gagné
  • Overcoming The Cybersecurity Skills Shortage in Law Firms
    Overcoming The Cybersecurity Skills Shortage in Law Firms Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Recorded: Aug 16 2018 40 mins
    The evidence is clear: law firms of all sizes need to securely handle sensitive information associated with their clients, investigators, and witnesses. According to the American Bar Association’s 2017 Legal Technology Survey Report, 22 percent of respondents suffered a security breach at their law firms.*

    Compromised client information can destroy reputations and lead to decreased billables and lost business. While the need for improved security is evident, IT and security teams struggle to locate, retain and train talent needed to maintain and improve their security posture. So, what are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure?

    In this Arctic Wolf webinar, you will:

    - Discover why cybersecurity is top of mind in the legal community
    - Recognize the IT and Cybersecurity skills shortage and its impact on security
    - Understand how SOC-as-a-Service approaches enable law firms to rapidly improve their security posture and provide evidence to satisfy technology audits

    Save your seat today to learn more!

    *https://www.americanbar.org/groups/law_practice/publications/techreport/2017/security.html
  • The Future of Advertising: Customer-Centricity in an Increasingly Complex World
    The Future of Advertising: Customer-Centricity in an Increasingly Complex World Lauren Fisher (eMarketer), Jared Levitt (Adobe) Recorded: Aug 16 2018 47 mins
    Advertisers face an increasingly challenging balancing act to deliver personalized, integrated and relevant experiences to audiences while ensuring privacy, brand safety, and the ability to collect and analyze audience data across all channels. With the right approach and technology, however, brands can not only achieve a balance, but seize an opportunity to deliver the best digital experiences for their customers.

    In this session, brands, agencies, creative pros, marketers and technologists will learn from experts at eMarketer and Adobe who will cover how to:
    - Improve the customer experience and win trust
    - Optimize advertising effectiveness through improved analytics, targeting, and personalization across a multitude of channels
    - Ensure brand safety and prevent ad fraud
    - Apply best practices for cross-channel media measurement, including advanced TV

    Presented by:
    - Lauren Fisher, Principal Analyst, eMarketer
    - Jared Levitt, Advertising Consultant, Adobe
  • A New and Resilient Approach to Securing Critical Infrastructure and IIoT
    A New and Resilient Approach to Securing Critical Infrastructure and IIoT Michael Murray, Robert Lentz, Josh Corman, Chris Rezendes Recorded: Aug 16 2018 47 mins
    Find out how top leaders from Government and IT/OT companies are securing our critical infrastructure from cyber threats from Nation State level attacks and individual malicious actors.

    In this discussion you will learn about a new and resilient approach to cybersecurity to defend against threats to our Water, Energy and Transportation Grids. By using identity and authentication, you can block zero-day attacks from unidentified and unauthorized traffic, enable defense automation, and enable analytics integration for a closed loop system, addressing insider threats.

    Michael Murray of BlackRidge will host a panel of industry experts, including:
    - Josh Corman, Chief Security Officer and SVP of PTC
    - Robert Lentz, the first DoD CISO, and CEO Cyber Security Strategies
    - Chris Rezendes, Chief Business Officer at Context Labs
  • Build Your Cyber Budget for 2019: Part 1
    Build Your Cyber Budget for 2019: Part 1 Jerry Caponera, VP of Cyber Risk Strategy Recorded: Aug 16 2018 35 mins
    Choosing cyber vendors and balancing budgets can be a challenge. We want to help cut through the clutter and show how we build a cybersecurity budget and identify spending needs an organization needs to immediately address. This is a two-part webinar series where you will learn how to approach the cybersecurity budgeting process (as well as see common mistakes to avoid) and how to build your own cyber budget. We will offer a budget plan worksheet to guide you along the way and share best practices and takeaways.
  • Challenges of Content-driven Retailing
    Challenges of Content-driven Retailing Ali Alkhafaji (TechAspect Solutions, Inc), Joe Brannon (TechAspect Solutions, Inc) Recorded: Aug 16 2018 47 mins
    Organizations embracing a direct-to-consumer strategy are beginning to realize traditional advertising is becoming more costly and less effective. By leveraging digital marketing tools, they are starting to invest in content-driven commerce strategies with dedicated content and personalized experiences. These strategies are intended to craft contextual stories and user-driven content to drive conversion and revenue.

    This webinar focuses on the challenges facing decision-makers seeking to integrate content with ecommerce journeys.

    Presented by:
    - Ali Alkhafaji, CTO, TechAspect Solutions, Inc.
    - Joe Brannon, Global Commerce Director, TechAspect Solutions, Inc.
  • Mixing Analytic Workloads with Greenplum and Apache Spark
    Mixing Analytic Workloads with Greenplum and Apache Spark Kong Yew Chan, Product Manager, Pivotal Recorded: Aug 16 2018 35 mins
    Apache Spark is a popular in-memory data analytics engine because of its speed, scalability, and ease of use. It also fits well with DevOps practices and cloud-native software platforms. It’s good for data exploration, interactive analytics, and streaming use cases.

    However, Spark, like other data-processing platforms, is not one size fits all. Different versions of Spark support different feature sets, and Spark’s machine-learning libraries can also vary in important ways between versions, or may lack the right algorithm.

    In this webinar, you’ll learn:

    - How to integrate data warehouse workloads with Spark
    - Which workloads are better for Greenplum and for Spark
    - How to use the Greenplum-Spark connector

    We look forward to you joining the webinar.
  • From Single Purpose to Multi Purpose Data Lakes - Broadening End Users
    From Single Purpose to Multi Purpose Data Lakes - Broadening End Users Paul Moxon, VP Data Architecture and Chief Evangelist, Denodo Recorded: Aug 16 2018 53 mins
    Abstract: Historically data lakes have been created as centralized physical data storage platform for data scientists to analyze data. But lately the explosion of big data, data privacy rules, departmental restrictions among many other things have made the centralized data repository approach less feasible. In his recent whitepaper, renowned analyst Rick F. Van Der Lans talks about why decentralized multi purpose data lakes are the future of data analysis for a broad range of business users.

    Please attend this session to learn:
    The restrictions of physical single purpose data lakes
    How to build a logical multi purpose data lake for business users
    The newer use cases that makes multi purpose data lakes a necessity
  • Defending the Castle – Back to the Future using Isolated Networks
    Defending the Castle – Back to the Future using Isolated Networks John Alexander, Director of Product Marketing, OPSWAT Recorded: Aug 16 2018 58 mins
    In industries where extreme security is a requirement, like the nuclear, energy, manufacturing, financial, and defense industries, an air gapped network can be an extremely powerful defense. Air gapped networks are like dealing with the past and present at the same time: they harken back to a time before the Internet, but they are also even more useful now because of the Internet, which provides a path for both good and bad activity.

    In this presentation, we’ll discuss the concept of the air gap, or isolated network, and explain what their weaknesses are and when they should or shouldn't be used. We’ll also discuss how, when used correctly, an air gapped network can be such a powerful defense.

    Even though air gaps are extremely powerful defense mechanisms, every defense has its weakness. The key is to minimize these weaknesses by establishing a secure work flow that at the same time reduces the operational productivity concerns that surround air gapped networks. The latter portion of this presentation covers one of the most critical defense measures that is required in an air gap network, "the Kiosk", and best practices in employing "kiosks" as a critical part of an air gapped network defense strategy. We’ll also talk about data diodes, and how they can be employed to help reduce the operational cost of using an air gapped network.
  • Your Organization's Role in the Shared Responsibility Model
    Your Organization's Role in the Shared Responsibility Model Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Aug 16 2018 29 mins
    A Guide to Understanding and Taking Control

    There is no doubt managing massive amounts of enterprise data is inherently easier in the public cloud. However, given its size, that data is a target for malicious security threats from attackers both within and outside organizations. While leading cloud platforms like Amazon Web Services and Microsoft Azure can help ease the burden of cloud migration, they are not responsible for the comprehensive security and compliance checks necessary to keep your data safe in the cloud. That’s why next-generation automated cloud monitoring and security management tools like CloudCheckr are essential for closing the loop.

    In this webinar, Product Marketing Manager Todd Bernhard maps out shared responsibility models for AWS and Azure and explains how CloudCheckr keeps your data secure and compliant.
  • FROST IQ: 2018 Australia Data Center Service Providers
    FROST IQ: 2018 Australia Data Center Service Providers Audrey William is Senior Fellow and Head of Research & Yu Xuan Ng, Industry Analyst, Digital Transformation Aug 20 2018 5:30 am UTC 60 mins
    This webinar offers a comprehensive guide on the selection of Australian best-in-class data center service providers for industry CIOs and other decision-makers.

    Key Takeaways:

    - Learn more about critical trends shaping the data center market
    - Discover how these trends impact businesses
    - Identify the leading data center providers
  • MyFolio Quarterly Update
    MyFolio Quarterly Update Bambos Hambi Aug 20 2018 2:00 pm UTC 120 mins
    Bambos Hambi, Head of Multi-Manager Strategies, provides an update on the MyFolio Range. The MyFolio Funds are carefully constructed risk-based portfolios which offer your clients a choice of active and passive investment strategies across five risk levels.

    +44 (0) 20 3059 2627 - Standard International Access
    0800 368 0707 - UK Toll Free
    Access PIN: 9975890#
  • Better Test Data = Better Applications
    Better Test Data = Better Applications Prashant Pandey, CA Technologies Aug 20 2018 3:00 pm UTC 60 mins
    Companies struggle to find the right test data when testing applications which leads to bottlenecks, defects and constant delays. There is a better way and we want to show you how:

    Join us for this webcast to learn:
    - How Test Data Manager finds, builds, protects and delivers test data fast!
    - How to get your testing teams moving towards self sufficiency with test data

    Get your questions answered. Come away happy!
  • BrightTALK Masterclass Series: Time Management
    BrightTALK Masterclass Series: Time Management Abigail Barnes, Author of Time Management for Entrepreneurs Aug 20 2018 3:00 pm UTC 60 mins
    This webinar is part of BrightTALK's Masterclass Series.

    Do you often become overwhelmed because of all the things you have going on in your life? Do you wish you could be more confident in your endeavours but see yourself continuing to take on more and more?

    Join this Masterclass where you will learn:
    -How to stop feeling overwhelmed by your to-do list
    -How to prioritise your activities
    -How to avoid distractions & maintain focus

    Abigail Barnes is an award-winning entrepreneur and author of Time Management for Entrepreneurs, a book that helped thousands of readers learn how to prioritise their time and resources, increase their efficiency and create more of the results they want.

    Abigail understands human motivation and uses her life-changing wake-up call to inspire, motivate, and show audiences how they can transform their lives and results in turning fear of change into their foundation for success.
  • Encryption & Tokenization as effective GDPR Best Practices
    Encryption & Tokenization as effective GDPR Best Practices An expert panel including Alex Pezold, Mark Rasch, Ian West and Ulf Mattsson Aug 20 2018 4:00 pm UTC 90 mins
    This session will cover one of the more important aspects of GDPR: Encryption and Tokenization. In this session you will learn the relevance of Encryption and Tokenization as it applies to GDPR and what is the difference between the two security methods.
  • Live Demo of OptiView XG
    Live Demo of OptiView XG Mike Pennacchi, Network Protocol Specialists Aug 20 2018 5:00 pm UTC 60 mins
    Troubleshooting performance problems in today’s networks is only getting more complex:

    • Growth of 10G links with limited visibility
    • Increasing demands on wireless networks
    • Complex infrastructure with outdated documentation

    Last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.

    Please join us for a free webinar where Mike Pennacchi will talk about these issues and present a live demo of the OptiView® XG Network Analysis Tablet.

    XG expedites network performance problem solving by automating root cause analysis and providing guided troubleshooting to address problem areas - anywhere on the network – wired or wireless.
  • Endpoint and Network Security: Better Together
    Endpoint and Network Security: Better Together Danny Milrad, Director of Endpoint Products, and Scott Simkin, Director of Threat Intelligence, Palo Alto Networks Aug 21 2018 2:00 am UTC 60 mins
    Threats are evolving far too quickly for point products to keep up. Security point products that operate and analyze in silos have led to security gaps and fragmented policies that fail to prevent successful cyberattacks. With more than 9 million new instances of malware each month, deploying disparate point products is no longer enough.

    Join Danny Milrad, Director of Endpoint Product Marketing, and Scott Simkin, Director of Threat Intelligence Product Marketing, as they discuss:

    - The need for endpoint security to augment perimeter protections
    - The value of threat intelligence collected, analyzed and shared across the security architecture
    - 3 requirements for effective endpoint protection
    - How Traps, Palo Alto Networks advanced endpoint protection, extends protections from the firewall throughout the organization
  • Cybersecurity in the wake of recent attacks - Is Browser Isolation the solution?
    Cybersecurity in the wake of recent attacks - Is Browser Isolation the solution? Rajiv Raghunarayan, VP - Products, Cyberinc Aug 21 2018 3:00 am UTC 60 mins
    The spate of cyber-attacks continues with an increasing level of sophistication and precision and sometimes finding the easiest path – through the weakest link in the chain – the human factor. Businesses and even government organizations are constantly in an alarmed state having to deal with the aftermath of such attacks. Be it the case of City of Atlanta or the more recent SingHealth breach, it is evident that CIOs and CISOs across the globe need to re-assess their traditional security approach.

    What is Browser Isolation? And how can this technology aid CISOs, security leaders & practitioners in managing cyber threats?

    Register to watch Rajiv Raghunarayan, VP Products at Cyberinc outline a simple yet effective approach organizations - enterprise or government - could take towards reducing risk and vulnerabilities, while also driving up the productivity of their IT security teams.
  • Fighting Cybercime with Artificial Intelligence
    Fighting Cybercime with Artificial Intelligence Mr Keith Rayle, Security Strategist, Fortinet FortiGuard Labs Aug 21 2018 7:00 am UTC 60 mins
    See how artificial intelligence can be used to stop malware more quickly. Learn more about the history of artificial intelligence dating back to nearly a century plus an examination of a system comprised of highly efficient deep machine learning neural networks that are currently deployed and proactively defeating malware attacks.
  • Endpoint and Network Security: Better Together
    Endpoint and Network Security: Better Together Danny Milrad, Director of Endpoint Products, and Scott Simkin, Director of Threat Intelligence, Palo Alto Networks Aug 21 2018 9:00 am UTC 60 mins
    Threats are evolving far too quickly for point products to keep up. Security point products that operate and analyze in silos have led to security gaps and fragmented policies that fail to prevent successful cyberattacks. With more than 9 million new instances of malware each month, deploying disparate point products is no longer enough.

    Join Danny Milrad, Director of Endpoint Product Marketing, and Scott Simkin, Director of Threat Intelligence Product Marketing, as they discuss:

    - The need for endpoint security to augment perimeter protections
    - The value of threat intelligence collected, analyzed and shared across the security architecture
    - 3 requirements for effective endpoint protection
    - How Traps, Palo Alto Networks advanced endpoint protection, extends protections from the firewall throughout the organization
  • Introduction to SNIA Swordfish™ ─ Scalable Storage Management
    Introduction to SNIA Swordfish™ ─ Scalable Storage Management Alex McDonald, Vice-Chair SNIA Europe and NetApp Aug 21 2018 9:00 am UTC 75 mins
    The SNIA Swordfish™ specification helps to provide a unified approach for the management of storage and servers in hyperscale and cloud infrastructure environments, making it easier for IT administrators to integrate scalable solutions into their data centers. Swordfish builds on the Distributed Management Task Force’s (DMTF’s) Redfish® specification using the same easy-to-use RESTful methods and lightweight JavaScript Object Notation (JSON) formatting.

    Join this session to receive an overview of Swordfish including the new functionality added in version 1.0.6 released in March, 2018.
  • The Deathly Hallows of Application Security - Flaws, Vulnerabilities & Exploits
    The Deathly Hallows of Application Security - Flaws, Vulnerabilities & Exploits Paul Farrington - Director of Solutions Architects @ CA Veracode Aug 21 2018 10:00 am UTC 45 mins
    To understand the severity of a flaw you need to understand the extent to which it can be exploited. With software becoming more and more complex so does the difficulty of securing it.

    Join Paul Farrington, Director of Solutions Architect @ CA Veracode for this live webinar, where he will explore the distinctions between various security flaws and how you can combat them.

    You will leave the session understanding how to identify and address risk factors, how attackers exploit vulnerabilities & the extent to which organisations rely on AppSec technology to secure the SDLC.
  • Pervasive Integration - Introducing Hybrid Implementation Platform
    Pervasive Integration - Introducing Hybrid Implementation Platform Mikkel Iversen, Head of Integration, NNIT Aug 21 2018 11:00 am UTC 45 mins
    This session will focus on introducing pervasive integration with the different integration personas as Integration Specialists, AdHoc integrators and Citizen integrators. The session will cover the implementation of a Hybrid Integration platform and the components it can consist of: ESB, iPaaS, Api Mgt. and iSaaS. It will be described, how a HIP can supplement agile development organizations and BiModal IT.


    About Mikkel Iversen:

    Mikkel Iversen has worked with enterprise integration for the last 12 years with tasks ranging from developer, architect, business liaison to management of integration CoEs. Today he is responsible for all integration technologies and consultants in NNIT – A leader in the integration space in the Nordics.
    Mikkel focuses on integration organization and overall implementation of Pervasive integration solutions, with a shift from Center of Excellence to Center of Enablement.

    Other webinars in this Cloud Webinar Series:

    Session 2: Welcoming the Informatica Intelligent Cloud Services
    Session 3: Using IICS to orchestrate complex order processing
    Session 4: Lift & Shift (EDW) Enterprise Data warehouse to Azure
    Session 5: Customer Case: Rockwool’s Cloud journey
    Session 6: How to engage with Cloud Computing?
  • Aproveite o maximo da sua solução SAP com a SUSE e Lenovo
    Aproveite o maximo da sua solução SAP com a SUSE e Lenovo Aslan Carlos, SUSE Sales Engineer & Adriano Fratelli, Lenovo SE Aug 21 2018 1:00 pm UTC 75 mins
    Suas aplicações SAP são a base de sua transformação digital!

    Juntas, SUSE e Lenovo fazem a plataforma ideal para aplicações SAP como o SAP Hana. Fornecemos uma solução Linux para todas as aplicações SAP e trabalhamos constantemente com SAP para garantir o melhor desempenho, alta disponibilidade e segurança para sistemas SAP de missão crítica.
    Saiba o valor de seus aplicativos SAP com suporte para migração de plataforma, simplificação e consolidação:

    - Lenovo entregou mais de 7.200 sistemas SAP Hana em todo o mundo.
    - SUSE Linux Enterprise Server para aplicativos SAP é o sistema operacional recomendado e suportado para SAP Hana.
    - SUSE Manager permite que você gerencie várias distribuições Linux.
  • Governo na Palma da Mão
    Governo na Palma da Mão Rubens de Souza Aug 21 2018 1:00 pm UTC 60 mins
    CA Technologies lança solução para facilitar a vida dos cidadãos e melhorar os serviços prestados pelos órgãos públicos do estado. O GPM (Governo na Palma da Mão) integra sistemas de secretarias, ministérios e demais órgãos públicos para diminuir deslocamentos e custos de agendamento de consultas médicas e matrículas escolares, entre outros serviços fundamentais.

    Descubra como o GPM tira proveito da familiaridade dos cidadãos com as tecnologias móveis e permite em apenas alguns cliques agendar consultas médicas, fazer matrículas escolares, acompanhar o desempenho dos alunos, realizar campanhas de saúde, entre outras atividades de serviço público, sem enfrentar filas.

    Saiba Mais neste Webinar.
  • Advanced & Frictionless Security in a Multi-Cloud Environment
    Advanced & Frictionless Security in a Multi-Cloud Environment Anuj Sawani, Product Marketing Manager Aug 21 2018 1:00 pm UTC 60 mins
    Today, organizations need higher performance and faster access to the latest innovative technologies in order to grab whatever competitive edge they can. This almost always means going to the cloud.

    Unfortunately, in the rush to get there, enterprises can find themselves with data and applications scattered across private and public clouds – often multiple public clouds – spanning IaaS, PaaS and SaaS.

    Without the appropriate security and compliance strategy in place, this often results in poor visibility and increased risk. The simple truth is that multi-cloud security isn’t intuitive.

    We can make it easier. This webinar will cover:

    •Common speed bumps your security and DevOps teams face
    •Innovative security strategies to tackle a wide range of cloud risks
    •Security automation and integration within the development lifecycle
    •Achieving consistent and advanced multi-cloud protections

    Register now and learn how to secure your multi-cloud environment with advanced, frictionless protection.
  • Investing in the Internet…The Evolution Continues!
    Investing in the Internet…The Evolution Continues! Gregg Guerin, Senior Product Specialist Aug 21 2018 1:00 pm UTC 30 mins
    First Trust will be hosting a webinar discussing the power of thematic internet investing, the future potential investment behind the ‘Internet Evolution’, the growth of the internet and a way to gain exposure to the giants FANG stocks.

    Webinar Highlights:
    - Case Study: The Power of Thematic Investing and the Dow Jones Internet Composite Index
    - In-depth Discussion on The Four Mega-Cap Tech Juggernauts – the ‘FANGS’
    - Multiple Facets of the Internet: How we Use it and How It’s Changing our Lives
    - The Potential Investment Opportunities That Arise from Internet Evolution
    - First Trust’s Dow Jones Internet UCITS ETF (“FDN”): A Diversified FANG Plus Opportunity
  • The Blackhawk Webinar Hour w/ Ziad Abdelnour
    The Blackhawk Webinar Hour w/ Ziad Abdelnour Ziad Abdelnour, CEO of Blackhawk Partners, Ryan Ross Aug 21 2018 2:00 pm UTC 60 mins
    With so much information, we are starved for valuable knowledge that we can act on. This webinar will dive into how to find the real information out there, how to separate the real from the fake, how to translate that into actionable ideas, how to define the next steps, and how to empower your team to act on the real information.
  • Digital Transformation Series Part 1: Legal Insights
    Digital Transformation Series Part 1: Legal Insights Mark Fowler, VP General Counsel at Conga Aug 21 2018 3:00 pm UTC 60 mins
    For our 3-part webinar series on Digital Tranformation, we will focus on insights for key stakeholders in your organization: Legal, Sales & IT.

    In today’s business landscape, Digital Transformation of your document and contract processes can lead to improved operating efficiencies and ultimately provide your organization with a significant competitive advantage. Join us to learn why Legal professionals should have Digital Transformation on their radar as we discuss:

    - The importance of business contracts
    - How bringing efficiency to contracting processes can greatly impact the organization's bottom line
    - The need for legal departments to maximize their efficiencies and automate whenever possible