Natalie Williams, Duo and Athena Brown, DuoLive41 mins
In diesem Webinar lernen Sie:
Was wichtig ist bei der Planung von Zugriffsrichtlinien
Eine schnelle Top-Down-Ansicht Ihrer Umgebung und wie man die wichtigsten Daten vergrößert
Wie das Duo Insight-Tool Ihre Nutzer vor Phishing-Angriffen aufklären und schützen kann
Was ist der nächste Schritt, um den Zugriff auf Ihre kritischen Ressourcen zu sichern, nachdem Sie Ihre zentralen Authentifizierungsanforderungen erfüllt haben? Ihre Benutzer sind validiert, stellen jedoch weiterhin eine Verbindung über ein Netzwerk von potenziell anfälligen Computern und Mobilgeräten her.
Wie können Sie feststellen, welche dieser Geräte gefährdete Endpunkte sind?
In einer SANS-Umfrage unter IT-Fachleuten gaben 79% an dass die Suche nach gefährdeten Endpunkten „schwierig oder unmöglich“ ist. Das richtige Gleichgewicht zwischen Sicherheit und Benutzerkomfort zu finden ist entmutigend, insbesondere wenn BYOD und gehostete Anwendungen zum Mix hinzugefügt werden. Die gute Nachricht ist, dass es Möglichkeiten gibt dies zu vereinfachen und dieses Webinar zeigt Ihnen wie.
Natalie Williams, Virtual & Cloud Security SME, Duo Security
Natalie Williams, eine Newcomerin in der Welt der Cloud Security Sprecher, ist eine Expertin für Lösungen von Duo (MFA, Access & Beyond). Natalie unterstützt Cisco jetzt als Fachexpertin (SME), leitet Unternehmen zu die Einführung von Cloud-Diensten und Zero Trust.
Athena Brown, DACH Field Marketing Manager, Duo Security
Athena Brown, unterstützt Duo Security in Deutschland, Österreich und der Schweiz (DACH). Athena war zuvor im Bereich Compliance im Finanzdienstleistungen in London tätig und arbeitet jetzt eng mit Cisco Secure X zusammen, um die Einführung von Zero Trust und die Schulung von Duo-Produkten durch Veranstaltungen, Networking und Zusammenarbeit zu steuern.
Megan Fielding, Senior Director, Responsible Investing at Nuveen & Head of Strategic PartnershipsRecorded: Aug 2 202027 mins
Here are just a few striking data points Fielding talks about: (1) US investors poured $20.6B into ESG focused funds in 2019. (2) 70% of advisors cite superior risk management and better performance as the top reasons why their high network clients invest in responsible investing, as opposed to 39% in 2018. (3) For the first time a majority of investors, 53%, cited performance as their main motivation for investing in responsible investments.
Zev Brodsky - Content Marketing Manager at Perimeter & Len Noe - White Hat Hacker and Cyber Security SpecialistRecorded: Aug 2 202028 mins
In this edition of the Beyond the Perimeter Podcast, we discussed the Twitter hack which saw many famous celebrity accounts being hijacked which resulted in spreading a cryptocurrency scam. We also interviewed Len Noe who is a white hat hacker and cyber security specialist.
John Koetsier, Rebecca Nackson, Jana Jacobs, Hermione Way, Sunil ThomasRecorded: Aug 1 202058 mins
During this time of the Evolving Normal, brands are navigating their businesses and consumer behavior differently… because they must. The rules and methodologies marketers have followed for decades are gone for one simple reason: they don’t apply to these times of uncertainty.
Brendan Brothers, VerafinRecorded: Jul 31 202056 mins
(ACAMS Webinar Rebroadcast)
In this insightful session, Brendan Brothers, Co-Founder of Verafin and Anti-Financial Crime Specialist, will discuss the evolution of financial crime and how financial institutions can embrace innovative approaches to proactively prevent fraud and combat crime ring activity.
Brendan will outline how financial institutions can leverage big data, machine learning technology and 314(b) information sharing for effective fraud prevention, including proactive trend identification, reduction in false positive results, and collaborative investigations of multi-institutional crime ring activity.
- Understand the limitations and challenges of conventional fraud prevention approaches
- Leveraging big data, machine learning technology, and 314(b) information sharing to mitigate losses and prevent fraud
- Enhancing detection, strengthening investigations, and improving reporting to law enforcement
Dan Tesnjak, Director @ DegreedRecorded: Jul 31 202054 mins
Many L&D teams say they put workers at the center of their learning strategies, but what does that actually look like? According to our latest study done with Harvard Business Publishing Corporate Learning, workers invest 3x more time developing skills on their own as they do through company-provided resources. They’re also 67% more likely to go to their professional network rather than their companies’ learning systems to build skills.
Paul McMillan, Head of Business Collaboration, Tata Communications; Kevin Martins, Voice Architect, MicrosoftRecorded: Jul 31 202044 mins
Today’s digital companies must provide all their employees – working remote or not – with a means of collaboration using a tool that can provide every feature needed. Selecting a collaboration partner is more than a one-time decision – for true ROI and guaranteed worker productivity, enterprises must build a business strategy for collaboration.
Listen to Paul McMillan of Tata Communications and Kevin Martins of Microsoft explore these and other topics, including what Teams powered by Tata Communications is, what makes it the enterprise collaboration platform of choice, what are the latest features and capabilities, and more.
K Royal, Beth Sipula | TrustArcRecorded: Jul 31 202060 mins
CCPA is in full effect and - as of July 1, 2020 - is being fully enforced. The “wait and see” game is officially over and organizations must be fully compliant in order to avoid regulatory fines and negative publicity. There are many requirements set forth by the CCPA, and building a strong compliance plan can be daunting. Not only does the compliance plan need to be set-up for future growth and changes, but it also needs the flexibility to produce on-demand, customized reports to provide to stakeholders.
TrustArc has helped organizations of all sizes and maturity with CCPA compliance from simple assessments to full automation. Investing time upfront to perform the proper analysis and planning is key to feeling confident that your CCPA compliance program will efficiently and effectively mitigate risk while meeting business objectives.
Listen to the on-demand recording to see how TrustArc CCPA solutions help organizations of all sizes and maturity achieve and maintain compliance.
M. Iatrou - Director F.Eng. (US); T. van Steenburgh, Engineering Manager (Kubernetes); A. Chalkias, Product ManagerRecorded: Jul 31 2020118 mins
For all the benefits it offers around container orchestration, Kubernetes remains a significantly complex platform to deploy and operate. As developers and enterprises alike turn to Kubernetes for more and more types of use cases, available Kubernetes solutions often fail to meet their exact needs. Canonical’s extensive Kubernetes portfolio is centered around Charmed Kubernetes and MicroK8s, designed to provide full flexibility from cloud to edge in order to facilitate efficient innovation and scaling.
In this virtual event, Canonical’s panel of experts will discuss tools and strategies for:
- Optimising economics from cloud to edge
- Streamlining deployment and operation of Kubernetes clusters
- Lowering barriers to entry for Kubernetes in resource-limited environments
Join them as they incorporate your questions and topics of interest in their discussion live, delve into practical examples they’ve experienced through their work with hundreds of customers, and provide free resources for further support.
Paul Spiers, Founder, The New P&L - Principles & Leadership in Business Podcast seriesRecorded: Jul 31 202046 mins
The United Nations Sustainable Development Goals are both ambitious and necessary, and the global business community has both the power and the responsibility to drive cohesive commitment and action on these goals.
This week, The New P&L speaks to Founder and CEO of VATI of Sweden, Eva Vati. As one of the first consultancies in the world to offer businesses a certified methodology for integrating sustainability and the UN’s SDGs, VATI of Sweden helps executives and entrepreneurs align their commercial strategies with the UN’s SDGs, helping to future-proof their companies in the process. We discuss with Eva the critical role and responsibility businesses have in ensuring the SDGs are met, as well as the kind of leadership that is required to ensure the implementation of SDGs in a business has a positive commercial impact and sets it up for a future full of opportunity.
Paul Spiers, Founder, The New P&L - Principles & Leadership in Business Podcast seriesRecorded: Jul 31 202043 mins
The impact of AI on all aspects of our life is far-reaching. AI has incredible potential, and when and designed and developed with ethical principles underpinning it, AI can have a transformational effect on communities and businesses in many ways. But AI is not without bias – it can often carry with it the subjective assumptions and judgements of those developing it or built on data that reinforces some of the structural inequalities that exist in our businesses and our societies.
This week, The New P&L speaks to eminent criminologist, criminal psychologist, AI ethicist and data activist, Renée Cummings. Renée specialises in diverse, equitable and inclusive AI design, development and deployment; principled, responsible and trustworthy AI strategy and ethical AI policy development and governance, as well as AI risk management and crisis communications. We discuss with Renée the challenges around bias in AI and how these can be overcome, as well as regulation of this sector; what a more ethical future for AI looks like and what type of leaders we need in business to get us there.
John Smith // Principal Sales EngineerRecorded: Jul 31 202039 mins
The information security industry has experienced a number of innovations around SIEM and Endpoint Detection and Response (EDR) solutions over the past few years. These solutions have included leveraging Machine Learning and Cyber Threat Intelligence into their platforms for higher fidelity as well as better response to emerging and acute threats our industries and agencies face. Even with these advancements we have seen several devastating breaches that do more than damage a company’s brand. Unlike real-asset destruction or theft, when intellectual property is stolen or compromised, the owner is never made whole and its value cannot be recouped. The challenge with EDR and SIEM is that they must be configured or installed and any solution that must be configured or installed can be un-configured and un-installed. Many breaches have involved the evasion of properly installed and configured SIEM and EDR solutions. The covert nature of today’s malware and spyware requires a covert response, one where our adversaries are not aware of its presence. In this session, we will discuss and demo the merits of leading with Network Detection and Response (NDR) and how the use of NDR provides coverage against evasion techniques used by attackers against our existing SIEM/EDR investments. Adding the third pillar of NDR to your security triad will provide the needed stability that has been lacking from the traditional two pronged approach to security and visibility.
In this session, we will discuss the ways in which NDR compliments and in many cases improves the efficacy of your existing investments in SIEM and EDR. We will also discuss the differences in signal intelligence between what is on the wire vs what is in a log. And finally, we will discuss reasons to take a “NDR-first” approach to visibility at scale, high fidelity detections and digital surveillance.
Marci Maddox, Research Director, IDCRecorded: Jul 31 202060 mins
For many businesses, work-from-home proved once and for all that remote working can be cost efficient and productive. It also caused many IT leader’s ‘Digital Game Plans’ to double down on secure, resilient, collaborative workspaces for highly distributed workers.
On our upcoming webinar, guest speaker Marci Maddox, Research Director at IDC, will share a 10-point checklist for ECM modernization in this new workplace normal including:
- Deploying in the cloud for easier access to content and enhanced business continuity.
- Embracing rapid development to increase agility and knowledge worker productivity.
- Connecting systems (and ecosystems) to improve collaboration and decision making.
Real-time data streaming is a hot topic in the Telecommunications Industry. As telecommunications companies strive to offer high speed, integrated networks with reduced connection times, connect countless devices at reduced latency, and transform the digital experience worldwide, more and more companies are turning to Apache Kafka’s data stream processing solutions to deliver a scalable, real-time infrastructure for OSS and BSS scenarios. Enabling a combination of on-premise data centers, edge processing, and multi-cloud architectures is becoming the new normal in the Telco Industry. This combination is enabling accelerated growth from value-added services delivered over mobile networks.
Join Kai Waehner, Technology Evangelist at Confluent, for this session which explores various telecommunications use cases, including data integration, infrastructure monitoring, data distribution, data processing and business applications. Different architectures and components from the Kafka ecosystem are also discussed.
Join this online talk to learn how to:
- Overcome challenges for building a modern hybrid telco infrastructure
- Build a real time infrastructure to correlate relevant events
- Connect thousands of devices, networks, infrastructures, and people
- Work together with different companies, organisations and business models
- Leverage open source and fully managed solutions from the Apache Kafka ecosystem, Confluent Platform and Confluent Cloud
Richard Meeus, Security Technology and Strategy Director, and Mike Kane, Senior Product Marketing Manager, AkamaiRecorded: Jul 31 202044 mins
This has created a new attack surface for hacker groups such as Magecart that put your users’ personal data at risk and expose your business to regulatory punishments.
Unfortunately, most current protections offer limited help for this sophisticated attack method.
In this webinar, we will explore the elements of Magecart attacks, and compare specific pluses and minuses of different approaches that security teams can employ to combat this new threat.
You will learn more about:
• Why Magecart attacks arose now and why they are not going away
• Why Magecart attacks are so much harder to defeat than other types of script attacks
• What options are in the market today to use against Magecart and how they will work for you
Dr Veronica Broomes, CSR and Sustainability ConsultantRecorded: Jul 31 202037 mins
Join Dr Veronica Broomes, a consultant and researcher on Sustainability and CSR to discover how boards must take the lead and expand the scope of their CSR practices.
In this informative presentation, Veronica will explore how CSR and sustainability are understood and interpreted; how to move CSR beyond philanthropy; and why non-executives and trustees should make the business case for CSR.
Veronica will also explore how to embed CSR and sustainability into your core operations and how to report the effectiveness and performance of these strategies.
Veronica is active in working groups of the Sheffield Sustainability Network, has served as a Trustee of Age UK East London and is a strong advocate of integrating sustainability and CSR into core business operations.
Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.
But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.
In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.
Brian Stables, Independent ConsultantRecorded: Jul 31 202059 mins
During this webinar independent consultant Brian Stables will discuss ways of making yourself heard with some useful tools and techniques for helping others to hear your message. He will cover some key techniques for influencing including active listening and appreciative inquiry. Leading on from influencing he will explore similarities between the techniques for effective influencing and those for a successful negotiation and use an example to highlight some pitfalls along with tips for a successful and effective outcome that is acceptable to all.
Thomas Bottrill and Luke CarterRecorded: Jul 31 2020106 mins
It’s vital you get the most from your Google Cloud Platform environment from cost efficiency to scale effectiveness. That’s why we designed the Enhanced Architecture Review Service for GCP. This session is suitable for anyone looking to understand more about the ‘ways of working’ of GCP or for anyone already utilising GCP and would like to benchmark their workload to understand potential improvements that can be implemented.
Join our highly experienced and extensively qualified Reliability Engineering & Architecture team for this 2 hour virtual workshop that will introduce you to cloud architecture assessment. Using sample applications, we will provide you with an overview of the best practice ways of designing and deploying your application to GCP, focusing on the 6 core pillars of
Following on from this enablement / Google Cloud Deployment session, we will provide guidance on how you can sign up for a bespoke 121 engagement to review your GCP workloads. This 121 assessment will be conducted with you and your engineering/applications/product team and the output will be a detailed report to supercharge your Google Cloud environment.
Why Rackspace? Did you know that Rackspace has been a Gartner Magic Quadrant Leader in Managing Public Cloud environments for the last 3 years and were chosen by Google to be the FIRST Managed Services Provider for GCP? We’re also a Partner of the Year, winning the 2018 Migration award and our customers are support by a team of global experts who hold of over 300 certifications. Building and scaling clouds is what we do, now we want to empower you to do the same.
Thomas Bottrill, Rackspace Cloud Engineer for Google Cloud
Luke Carter, Rackspace Lead Solutions Architecture for Google Cloud
Ala Al-sharif, Sales Engineer, ConfluentAug 3 202010:00 amUTC46 mins
As businesses unite around Apache Kafka® as the single source of truth and Confluent Platform as the organisation's central nervous system, enabling data-centric security and governance features becomes crucial. Don’t miss ‘Data Security, Governance & Encryption at Scale’, an online talk in which speakers from Confluent, SecuPi and Marionete will discuss the things you must absolutely get right for data protection and privacy when using Apache Kafka and Confluent KSQL.
Join us on Tuesday June 2nd at 2.00 pm London time to learn more about:
1. Must-have data-centric security and GDPR/CCPA privacy requirements of streaming large scale near real time (NRT) data
2. How to classify, monitor, audit and encrypt (with Hold Your Own Key - HYOK)/mask/filter sensitive data flows for Kafka and Confluent KSQL using SecuPi Data-Centric Platform
3. How Confluent Platform and SecuPi integrate with Marionete expert services for end to end data protection and privacy compliance capabilities for Kafka implementations
Consumers today are demanding rich experiences on their own terms, on their own schedules, just in time, and on mobile. Medical appointments can be scheduled with a few taps for later in the day, photos can be uploaded from your iPhone and printed at your local pharmacy, and last minute hotel rooms can be booked for a bargain with the swipe of a thumb.
As companies race to build these omnichannel experiences, identity management challenges such as fragmented user experiences, incomplete user profile and activity information, and security at risk can slow down development efforts.
Join guest speaker Merritt Maxim, Principal Analyst at Forrester, and Jiong Liu, Product Marketing Manager at Okta to:
Learn how to use Customer Identity and Access Management (CIAM) as a foundational technology
Address critical development requirements
Accelerate time-to-market of new customer-facing experiences
Gabe Gumbs (Spirion) & Nathan Wenzler, (Tenable)Aug 3 20203:30 pmUTC30 mins
The right to be forgotten—part of the GDPR that allows people to have negative private information removed from Internet searches and directories—is seen by many as a victory for data privacy. To others, it’s burdensome and unworkable. After all, how can you be sure you’ve “forgotten” someone without retaining any information about the person you’ve forgotten?
Join this exclusive virtual interview with Gabe Gumbs, Chief Innovation Officer of Spirion during Black Hat to make sense of GDPR’s most notorious provision and learn more about:
- The paradox of the right to be forgotten
- Data Subject/Consumer Rights under GDPR and CCPA
- What are data inventories and how to leverage them to fulfill compliance requirements
- Why you need great data discovery and identification in order to have data privacy
- How businesses are handling increasing privacy and security concerns in the COVID19 / remote working era
- Recommendations for improving data privacy and security
Nathan Chessin & Tim Choi (Proofpoint)Aug 3 20204:30 pmUTC30 mins
The 2020 cyber threat landscape has changed drastically just over the last few months as some employees are mandated to work from home, and others are starting to go back in to the office. But throughout the changes, how you can ensure business continuity while keeping your end users protected?
Join Proofpoint's experts Tim Choi, VP of Product Marketing, and Nathan Chessin, VP of Americas Technical Sales Engineering, as they discuss how you can keep users connected to the data and systems they need to do their job, without compromising how you protect your organization's most valuable assets.
Nathan Chessin, VP of Americas Technical Sales Engineering, Proofpoint
Tim Choi, VP of Product Marketing at Proofpoint
Degreed’s CEO, Chris McCarthy and CLO, Kelly PalmerAug 3 20205:00 pmUTC60 mins
Join Degreed’s CEO, Chris McCarthy and CLO, Kelly Palmer as they discuss current market challenges, featuring community best practices and real client strategies that can help us solve challenges together.
Terence Jackson (Thycotic), Tim Bach (AppOmni), Michelle McLean (StackRox) & Thomas Hatch (SaltStack)Aug 3 20205:30 pmUTC60 mins
Organizations continue to grapple with security challenges associated with running applications in the cloud and on-premise. In today's multi-cloud world, applications are deployed on not just one cloud provider, but across multiple cloud providers. This brings extra complexity, especially in the context of avoiding cloud configuration mistakes, controlling access and authentication, as well as scanning for vulnerabilities.
Join industry cloud leaders and security experts for a Q&A roundtable discussion on strategies for improved cloud security and to learn more about:
- Biggest challenges for cloud security
- Cloud misconfiguration and how to avoid common mistakes
- Cloud vulnerability scanning
- Digital identity, authentication and cloud access
- How to continue offering your customers and users the agility they have come to expect employing data protection measures
- Recommendations for CISO for improving cloud security in 2020 and beyond
Terence Jackson, Chief Information Security Officer, Thycotic
Tim Bach, Vice President of Engineering, AppOmni
Michelle McLean, Vice President of Marketing, StackRox
Thomas Hatch, Founder and CTO, SaltStack
Andrew Clay Shafer, Red HatAug 3 20206:00 pmUTC33 mins
“Transformation” can be an intimidating and confusing word. While everyone can agree that transformation means change, rarely does everyone agree what should change or how to change it. As a consequence, many organizations have already endured multiple transformations with mostly disappointing results. During this keynote, Andrew Clay Shafer, Vice President of Transformation at Red Hat, will outline why organizations struggle to align on transformation outcomes, look at common pitfalls, and provide strategies to accelerate progress while increasing the impact of the effort.
Shawn Fleury (Crypsis Group), Gabe Gumbs (Spirion), Sai Chavali (Proofpoint), Lisa Plaggemier (MediaPRO)Aug 3 20208:00 pmUTC60 mins
Insider threats - whether they are current or former employees, contractors or partners with access to company systems or data who use that access maliciously or unintentionally - account for 60 percent of cyber attacks.
Insider threats are difficult to detect, and in many cases they can go unnoticed for months or years. In fact, detecting an internal threat is one of most difficult and ungrateful tasks for security teams in the organization.
Join this panel of security experts as they discuss insider threat hunting techniques and recommendations for safeguarding the enterprise against internal and external threats.
- Why are insider threats so dangerous
- Technical and human factor challenges
- How to detect and prevent malicious insider activity
- How to keep the biggest threats to your organization at bay
Shawn Fleury, Director of Risk Management, The Crypsis Group
Gabe Gumbs, Chief Innovation Officer, Spirion
Sai Chavali, Sr Product Marketing Manager, Proofpoint Insider Threat Management
Lisa Plaggemier, Chief Strategy Officer, MediaPRO
Diana Kelley (Microsoft), Brandon Hoffman (Netenrich), Jack Mannino (nVisium) & Mike Weber (Coalfire)Aug 3 20209:30 pmUTC60 mins
Cybercrime is on the rise and organizations of all sizes are vulnerable to attacks. With the proliferation of network-connected devices, applications, and ever-evolving complex network architectures, managing your organization's networks is becoming increasingly more difficult.
Join this panel of network security experts and industry leaders to learn more about:
-Trends in cyber attacks and common attack vectors
- How to identify security gaps in your network
- How to close these gaps: best practices and solutions
- Recommendations for managing and securing complex enterprise networks
Diana Kelley, Cybersecurity Field CTO, Microsoft
Brandon Hoffman, CISO, Head of Security Strategy, Netenrich
Jack Mannino, CEO at nVisium
Mike Weber, Vice President Innovation, Coalfire
Paul Sabin (ESPN), Ruchir Pandya (NBA)Aug 3 202011:00 pmUTC75 mins
Tentative Schedule: (EST)
7:05pm: The Scope of Data Science in the Sports World
Sports analytics is generally defined as using data related to any sports or game and has only recently come into the limelight . Despite the sports industry being so rich in data, adoption of analytics in sports has been rather bumpy and ambiguous and there remains plenty of room for penetration. In this fireside chat, we’ll be discussing how impactful advanced analysis and predictive modeling can outperform regular custom/legacy analysis in the sports world. We’ll also dive into conversation surrounding how state of art models outperform old analysts methods and the resulting consequences that have reshaped sports business.
James Locus, Sr. Product Marketing Manager - Menlo SecurityAug 4 20202:00 amUTC12 mins
The Menlo Security Global Cloud Proxy provides fast, secure web access to applications like Office 365 and enables IT departments to scale security services for large organizations while reducing operational costs.
Symantec Asia Pacific and Japan Channels TeamAug 4 20203:00 amUTC60 mins
Symantec recently launched a new program for our Premier Partners, where membership is now by invitation only. The program is designed to build stronger relationships with our most valued partners and to enable our partners to grow their businesses through simplified engagement, better margins and richer benefits while driving superior value with our joint customers.
As we look forward to you continuing your partnership with Symantec, we would be delighted if you could join our Asia Pacific and Japan Channel team on Wednesday, 4 August 2020 at 1pm AEST/11am SGT to learn more about the benefits you will enjoy under this new program and answer your questions.
Ralf Walkenhorst, Senior ITOA SpecialistAug 4 20208:00 amUTC68 mins
Zwischen 2017 und 2019 stieg die Zahl der Anwendungs- und Service-Ausfälle von 25 % auf 34 %. Alarmierend ist, dass 80 % dieser Ausfälle verhindert hätten werden können. Sie waren nämlich vor allem auf menschliches Versagen, Stromausfälle sowie Netzwerk- und Konfigurationsprobleme zurückzuführen. Mangelnde Transparenz bei der IT-Infrastruktur kann nicht nur zu Team- und Datensilos führen, sondern auch für eine verlangsamte Erkennung, Untersuchung und Behebung von Problemen verantwortlich sein.
Laut der neuesten Umfrage des Uptime Institute wird die Hälfte aller Workloads noch in privaten Rechenzentren ausgeführt. 25 % der befragten IT-Experten gaben jedoch an, dass sie Workloads mit höherer Wahrscheinlichkeit in eine öffentliche Cloud verlagern würden – aber nur, wenn die Transparenz besser wäre. Heutige IT-Infrastrukturen sind komplexer denn je. Und durch die zunehmende Zahl an verteilten Komponenten, die den Technologie-Stack laufend verändern, entstehen immer neue Möglichkeiten für Ausfälle bei lokalen Systemen und in der bzw. den Cloud(s).
Registrieren Sie sich für dieses Webinar und lernen Sie:
- Warum Infrastruktur-Monitoring verteilter Umgebungen heute komplexer denn je ist
- Wie Ihr Unternehmen seine Monitoring-Verfahren modernisieren und auf die Cloud-Nutzung vorbereiten kann
- Wie Sie Ausfälle bei lokalen Systemen und in der bzw. den Cloud(s) vorhersagen und vermeiden
- Warum es in hybriden Architekturen wichtig ist, Uptime, Performance und Antwortzeiten zu messen
Noah Schneider, Senior Consultant, Advanced Services Group (ASG), Hitachi VantaraAug 4 20208:00 amUTC57 mins
Are you ready to harvest the massive real-time data that your organization generates? Mastering streaming data is critical to gain an edge in business, in every industry. But most businesses still rely on batch and incremental processing. If that’s you, don’t despair. Join this session to understand key concepts, common technologies and best practices you need to succeed with streaming data. You will also learn about the Hitachi Vantara streaming data stack and how we can help you meet your goals. The session is led by an expert in the field, who has implemented IoT solutions and streaming data integration pipelines for organizations across North America.
As more services are delivered through more channels, monitoring and resolving issues becomes exponentially more difficult. Micro Focus Operations Bridge cuts through the complexity—helping you monitor applications, detect anomalies, and fix problems with speed and insight.
In this live webinar series, we explore how AIOps-powered Operations Bridge brings clarity to problems and resolutions with:
The series starts on 14 July with a high-level discussion of how Operations Bridge delivers business value in the digital enterprise. In subsequent sessions, we dive deeper into its technical capabilities and show how you can get the most from them. Please join us:
•14 July: A high-level view of Operations Bridge. Relevant for customers and those searching for an AIOps-driven solution. Register now - https://www.brighttalk.com/webcast/17092/423661
•21 July: Agentless monitoring with Operations Bridge. In this session, we cover integrating SiteScope and Operations Bridge. Register now – https://www.brighttalk.com/webcast/17092/423668
•28 July: The performance perspective. How to maximize the value of your Operations Bridge dashboard with relevant, consumable data. Register now - https://www.brighttalk.com/webcast/17092/423669
•4 August: The health of your IT estate. Operations Bridge, ETI, HI, KPI, and the relationship between them. Register now - https://www.brighttalk.com/webcast/17092/423670
Ankur Chadda, Sr. Solutions Manager, Forcepoint & Kartik Kanakasabesan, Principal PM Manager, MicrosoftAug 4 20208:00 amUTC37 mins
Learn how Forcepoint and Microsoft are working together to help organizations protect sensitive data in their hybrid environments. In this webinar, we will discuss:
- How digital transformation is driving workloads to the cloud
- Forcepoint and Microsoft integration compatibilities
- How to automate the identification, classification, and protection of critical business data
Shashwath Hegde, Solutions Architect, APACAug 4 20209:00 amUTC56 mins
A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lack the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations struggle to justify the high-cost of their defences.
We make significant investments to justify our methods of stopping evil. However, we rarely spend time in measuring our methods or investments. Instead, we rely on assumptions to guide our decisions and justify our judgements. In this session, we will explore real world data and dive deep into the performance of cybersecurity controls across enterprise networks; from email, endpoint, network to cloud-based controls and examine some alarming results. As organizations continue to struggle to justify the high-cost of their defences, Security Validation provides a solution to validate, consolidate, recoup and maximize the value from existing investments.