Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • The Essential Skills All Product Managers Must Master
    The Essential Skills All Product Managers Must Master
    ProductPlan, Pivotal Labs, Jama Software, The Product Stack Recorded: Dec 14 2018 60 mins
    What does it take to be a product manager? Is there a cookie-cutter template, a perfect mold
    into which all PMs should seek to fit? Are the skills finite and easily definable? In the next
    Product Stack webinar, we’re going to find out together if there is a such a thing as a paragon ofproduct management—and if you’re on track to be that kind of PM.

    Here’s what you’ll learn if you join our webinar::

    ●Let’s be truthful: what is and is not a product manager function?
    ●What are the soft skills that product managers should cultivate?
    ●What are the hard skills product managers should know?

    Annie Dunham, Director of Product Management at ProductPlan.
    Isabelle Berner, Product Manager at Pivotal Labs.
    Kevin Steigerwald is the VP of Products and UX at Jama Software.
    Ronan Dunlop, Marketing Director, Pivotal and Co-Founder of The Product Stack.
  • From LTO to the Cloud: Your Last Data Migration with Backblaze and StorageDNA
    From LTO to the Cloud: Your Last Data Migration with Backblaze and StorageDNA
    Tridib Chakravarty, StorageDNA and Nilay Patel, Backblaze Recorded: Dec 14 2018 32 mins
    Do you have content archived on LTO-5 or LTO-6 tape? If so, what’s your plan for migrating it before it’s too late? LTO-8 is available now, and manufacturers only guarantee at most two generations of backward compatibility. That is, presuming the tape doesn’t fail first.

    With the right strategy, modernizing your archive by migrating from LTO to the cloud doesn’t have to be painful or time-consuming.

    Join this webinar with experts from StorageDNA and Backblaze and learn how to:
    - Avoid the pitfalls of manual LTO migrations with StorageDNA Smart Migration
    - Build a cloud-based archive with Backblaze B2 that you never have to migrate again
    - Unlock the value of your archival content though fast, direct cloud access
  • [Video] Expert Panel: How to Protect Against Hackers in 2019
    [Video] Expert Panel: How to Protect Against Hackers in 2019
    Moderator: Graham Cluley | Panelists: Michael Howard, Louella Ferscunandes, Howard Roberts Recorded: Dec 14 2018 39 mins
    In this HP Security Panel webinar, we’ll look beyond The Wolf films to discuss the smartest ways of safeguarding against hackers.

    Listen and hear how our expert panelist address a series of pressing issues such as:

    • Are vendors using scaremongering to sell their own services?
    • If faces are the new fingerprints, what are the security risks?
    • How big a threat is IoT and what’s the next Mirai Botnet?
    • Is the public sector the weakest link?
    • Can security be baked into the hardware?

    This is an excellent opportunity to gain invaluable security insights from experts on the frontlines.

    Panelists include:

    Graham Cluley: Award-winning security blogger - moderator
    Michael Howard: Head of Security Practice, HP Inc.
    Louella Fernandes: Research Director Quocirca
    Howard Roberts: Print Technologist, HP Inc.

    Stay connected to the latest HP Security Solutions by visiting:

  • Flash Webinar - Talking Storage Consolidation vs. Storage Sprawl with SolarWinds
    Flash Webinar - Talking Storage Consolidation vs. Storage Sprawl with SolarWinds
    Storage Switzerland and SolarWinds Recorded: Dec 14 2018 16 mins
    Join Storage Switzerland and SolarWinds for our Friday Flash webinar. In 15 minutes our panel of experts provide you the information you need so you can better deal with storage sprawl in your data center. Storage Switzerland finds that most organizations have five to six different storage systems and three or four different vendors within their storage infrastructure. These diverse storage architectures can be expensive and time consuming if not correctly managed.

    In 15 Minutes learn:
    - What is causing storage sprawl
    - How to stop storage sprawl
    - Is storage consolidation the right objective
    - How to manage a diverse storage infrastructure
  • Assessing Cyber Risk - Challenges and Solutions
    Assessing Cyber Risk - Challenges and Solutions
    STEPHEN HEAD - Experis Finance: Director of IT Risk Advisory Services Recorded: Dec 14 2018 60 mins
    Managing cyber risk in today’s digital environment is extremely challenging, whether your organization is public, private or governmental. In response to the growing frequency and severity of cyber-attacks, many organizations have decided it’s time to focus more of their efforts on cyber risk, starting with a cyber risk assessment. This approach to proactively dealing with the risk of cyber-attacks increases the organization’s awareness of the potential impacts and costs, and enables them to take actions that reduce the overall risk to the organization, minimize the impact of cyber-attacks, and more predictably ensure the continuity of essential services.

    This webinar will provide participants with a high-level overview of assessing cyber risk and explore the following:
    •Threats and root causes of breaches
    •The changing regulatory landscape
    •Security frameworks and tools
    •Practical ways to assess your risk and organizational exposure
    •Key elements of a successful cyber risk management program
  • How Process Owners Can Build Their Own ‘Apps’ in 15 Minutes Using SMAX Studio
    How Process Owners Can Build Their Own ‘Apps’ in 15 Minutes Using SMAX Studio
    Neville Ward, Senior Solutions Architect & Noel Hopkinson, Senior Solutions Architect Recorded: Dec 14 2018 28 mins
    Codeless configuration is commonly accepted as the only way to ensure that process modifications can be seamlessly incorporated into software upgrades without requiring teams of programmers to make the changes.

    Join this webinar to discover how Micro Focus Service Management Automation X (SMAX) Studio takes codeless configuration to the next level by enabling new process-based applications to be created in minutes. Designed for IT and line of business personnel, SMAX offers fast and risk-free configuration and extension of service management applications.

    With SMAX, Enterprise Service Management is delivered out of the box and is based on content such as HR workflow management, ideation and proposal management, and portfolio optimization—all of which can be easily extended or complemented with brand new content using SMAX Studio.

    In this webinar, you’ll learn:

    How SMAX Studio offers faster Time to Value and Lower TCO
    How our modern user interface enables the instant creation of new applications
    How the required data model, business rules, forms, notifications, reports, and user-defined actions can be created without coding
  • How to Choose Your Big Data Analytics Solution
    How to Choose Your Big Data Analytics Solution
    Dominic Colson, ITOM Solutions Architect Recorded: Dec 14 2018 21 mins
    In the past, IT operations teams tended to focus on using either big data analytics or machine learning to grow business intelligence. But the big data landscape has evolved, and emerging platforms now combine both types of solutions. The question is, how do you choose the one that’s right for you?

    This 35-minute webinar tells you how. You’ll learn:

    What big data is and where it fits in your IT operation.
    How to ensure comprehensive insight into past, present, and future states of IT systems. (Hint: Employ AIOps platforms that can ingest and access log data, text data, wire data, metrics, and API data.)
    How multivendor solutions can be deployed and supported across both new and existing applications.
    How the Micro Focus solution works (you’ll see a demo) and why it’s worth your consideration.
  • Exploring the benefits of alternative credit
    Exploring the benefits of alternative credit
    Toby Orpin, Martin Reeves and Jonathan Joiner Recorded: Dec 14 2018 12 mins
    In this video panellists discuss alternative credit, ask how schemes can use it in their portfolios and explain the benefits of allocating to this asset class
  • Segurança, Escalabilidade e Econômia de Recursos, por que escolher um só?
    Segurança, Escalabilidade e Econômia de Recursos, por que escolher um só?
    Marcelo Arantes Recorded: Dec 14 2018 45 mins
    A SUSE Fornece uma infraestrutura ágil e simples de gerenciar, com maior velocidade de entrega, durabilidade e confiabilidade. Acelere a inovação e reduza os custos, transformando sua infraestrutura corporativa de armazenamento com uma solução inteligente de armazenamento definido por software, verdadeiramente aberta e unificada.
  • Essential Retail & Retail Design World’s 2018 Round Up
    Essential Retail & Retail Design World’s 2018 Round Up
    Moderators - Caroline Baldwin & Matthew Valentine Recorded: Dec 14 2018 47 mins
    Essential Retail and Retail Design World sit down with a mulled wine (or two) to discuss their favourite retail stories of the year and their predictions for 2019.

    Join editors Caroline Baldwin and Matthew Valentine for their Christmas webinar on the 14 December 2018 to discover:
    •What were the hottest trends of 2018?
    •What is coming around the corner in 2019 in terms of the latest technology and design trends?
    •And the answer to the biggest question of the year – is the high street really dying? Is it a terminal disease or can we save our favourite shops?
  • Visibilità, conoscenza e controllo per potenziare il tuo ecosistema di sicurezza
    Visibilità, conoscenza e controllo per potenziare il tuo ecosistema di sicurezza
    Luca Pesce Recorded: Dec 14 2018 63 mins
    La gestione della sicurezza e la risposta agli eventi informatici sono tra le principali sfide affrontate dalle aziende. La mancanza di visibilità e conoscenza di questi rischi nel tuo ambiente di rete aggrava ulteriormente il problema.

    Guarda questo webinar per scoprire come adottare un approccio olistico e connesso all'orchestrazione della sicurezza. Scopri come implementare policy e controlli di sicurezza più intelligenti per un ambiente di rete più focalizzato, sicuro e conforme. Argomenti del webinar:

    • Realizzare un accesso Single Sign-On (SSO) per il provisioning e la gestione dei servizi di sicurezza per la rete, gli endpoint e il cloud
    • Gestire tutti i processi e i servizi di sicurezza da un’unica e semplice interfaccia cloud comune
    • Ottenere visibilità e consapevolezza situazionale della sicurezza di rete da un unico pannello
    • Assicurare una gestione delle policy priva di errori
    • Implementare ed eseguire il provisioning dei firewall in remoto attraverso il cloud
  • 5 DŮVODŮ PROČ: Commvault appliance znamená snadné a jednoduché nasazení
    5 DŮVODŮ PROČ: Commvault appliance znamená snadné a jednoduché nasazení
    Presentátor: Miroslav Dvořák, Commvault system engineer Recorded: Dec 14 2018 12 mins
    Vážení zákazníci a obchodní partneři,

    prosím přijměte pozvání na další ze série bezplatných webinářů společnosti Commvault, tentokrát na téma: “5 DŮVODŮ PROČ Commvault appliance znamená snadné a jednoduché nasazení”.

    V dnešním dynamicky se měnícím byznys prostředím společností stále více a více volají po komplexním, spolehlivém a rychle implementovatelném řešení pro ochranu dat svých lokalit. Tato prezentace se zaměřuje na 5 důvodů proč Commvault appliance je nejlepší a nejrychlejší cesta k zajištění lepší připravenosti obnovy dat a to od datových center až k regionálním pobočkám.
  • Netzwerk Upgrades bereiten Ihnen Kopfschmerzen?
    Netzwerk Upgrades bereiten Ihnen Kopfschmerzen?
    Daniela Fusaro, Senior Solutions Architect Recorded: Dec 14 2018 18 mins
    Trotz der unstillbaren Nachfrage nach Bandbreite müssen Unternehmen die Sicherheitsrichtlinien des Netzwerks immer noch schnell überprüfen und durchsetzen. Das ist besonders schwierig, wenn Sie Netzwerke von 10 Gb auf 40 Gb oder von 40 Gb auf 100 Gb aufrüsten.

    Nehmen Sie teil am Webcast von Daniela Fusaro, Senior Solutions Architect bei Gigamon. Sie erläutert, wie Sie die mit diesen Netzwerkupgrades verbundenen Sicherheitsrisiken lösen, Ihre Sicherheit stärken, die IT vereinfachen und Kosten senken können.

    Sie erfahren folgendes:
    - Erhöhen Sie Ihren ROI für die Sicherheit: Filtern Sie die richtigen Daten aus dem Netzwerkverkehr der physikalischen, virtuellen und Cloud-Infrastruktur und leiten Sie diese an die relevanten Tools weiter
    - Reduzieren Sie Ihr Sicherheitsrisiko: Überdenken Sie Ihre Netzwerksicherheitsarchitektur neu, indem Sie verschlüsselten Datenverkehr nur einmal entschlüsseln und die Überprüfung dieser Daten durch mehrere Sicherheitstools ermöglichen
    - Verbessern Sie die Reaktion auf Bedrohungen: Erkennen Sie Muster und Bedrohungsvektoren in heterogenen Netzwerken schneller

    Finden Sie heraus, wie sowohl Netzwerk- als auch Security-Teams bei Netzwerk-Upgrades schneller und sicherer zusammenarbeiten können, um Sicherheitsbedenken zu lösen - registrieren Sie sich noch heute!
  • Mitä on Lean ja miten HICCS OHD auttaa kokonaisvaltaisen Leanin käyttöönotossa?
    Mitä on Lean ja miten HICCS OHD auttaa kokonaisvaltaisen Leanin käyttöönotossa?
    Kalevi Kaski ja Niklas Christides Recorded: Dec 14 2018 61 mins
    Webinaarin kuvaus - pitkä
    Mitä on LEAN? Tuohon kysymykseen voidaan vastata hyvin erilaisilla painotuksilla. Webinaarissa lähdetään liikkeelle aiheen alkulähteiltä ja kerrotaan miten länsimaat ”löysivät” Leanin. Samoin tuodaan esiin, miten HICCS OHD auttaa kokonaisvaltaisen Leanin käyttöönotossa?

    Nykyajan suuri haaste on saavuttaa kokonaisvaltainen 'Lean' toiminalle, ja se voidaan ainoastaan saavuttaa kun katsotaan yhtiötä ja sen tehokuutta kokonaisaltaisesti 'organisimi' ajatuksella. Organismi 'yleisesti ottaen' toimii vain optimitasolla, kun kaikki osa-alueet ovat terveitä ja se tekee jatkuvasti työtä sen eteen että se sopeutuisi ja selviää omassa elinympäristössä. Hyvä yhtiö on organisimi joka kehittyy orgaanisesti, liian hitaasti se jää jalkoihin ja liian nopeasti se tuhoaa itsensä.

    HICCS OHD Platform tuo meille työkalun, jolla voidaan kartoittaa yhtiön 'organismin' terveys ja kehitystarpeet helpolla liikennevalo vertauksella. Käytäntö perustuu siihen, että yhtiön tehokkuus ja valmius hoitaa tarvittavat tehtävät ja kartoitetaan kokonaisvaltaisesti kysely muodossa [MS Excel], josta saadaan kuva yhtiön tilasta osa-alueittain.

    Kartoituksen perusteella voidaan tehdä jatkuvuus ja kehityssuunnitelmia, jotka ovat kustannustehokkaita ja aidosti tarpeellisia kokonaiskuvaan ja kehitystarpeisiin nähden. Kannattaa muistaa ja huomioida, että nykymaailmassa ei ole yhtäkään yhtiötä, jolla ei olisi kehitystarpeita.

    Tulevaisuuden 'Lean' yhtiö arvioi itseään kriittisesti, on valmis tekemään vaikeitakin päätöksiä nopeasti, ei hitaasti kuten nykypäivänä ja seuraa omaa kehitystä tarkasti [past, present, future]. OHD tarjoaa yhtiöille mahdollisuuden ottaa ensi-askel kohti kokonaisvaltaista 'Lean' tulevaisuutta.
  • Системы хранения Dell EMC старшего класса: что нового в PowerMax и XtremIO X2
    Системы хранения Dell EMC старшего класса: что нового в PowerMax и XtremIO X2
    Александр Седавных, Системный инженер Recorded: Dec 14 2018 43 mins
    Приходите узнать, что нового появилось в системах хранения Dell EMC старшего класса (High-End Storage). Новый Dell EMC PowerMax, самый быстрый в мире массив, является последним дополнением к нашему лидирующему в отрасли портфелю СХД. PowerMax построен на основе проверенных корпоративных функций VMAX, а также обеспечивает беспрецедентную производительность благодаря технологии NVMe и автоматическому размещению данных для максимальной производительности благодаря встроенному механизму машинного обучения. Эта сессия также посвящена XtremIO X2 - специально разработанному массиву с архитектурой All-Flash, ориентированной на метаданные, и обеспечивающему еще более высокую производительность, большую емкость, сеервисы передачи данных и простоту. «Фишка» сессии - уникальный встроенный механизм репликации XtremIO, основанный на метаданных.
  • Tiedonhallintalaki tulossa, mitä ja kenelle?
    Tiedonhallintalaki tulossa, mitä ja kenelle?
    Jarkko Koivuniemi Recorded: Dec 14 2018 48 mins
    Hallituksen Digitalisoidaan julkiset palvelut -kärkihankkeen päätoimenpiteisiin kuuluu uuden tiedonhallintalain valmistelu. Tiedonhallinnan uudistamisen tavoitteena on varmistaa tietojen monipuolinen, sujuva ja turvallinen hyödyntäminen julkisissa palveluissa. Tulossa on siis uusi tiedonhallintaa koskeva yleislaki, julkisen hallinnon tiedonhallintalaki Laki tulisi voimaan vuoden 2019 alkupuolella. Tule webinaariin kuuntelemaan ajatuksia, mihin pitää varautua.

    Julkisen hallinnon tiedonhallintaon muutosten edessä.


    - Sääntelykohteet
    - Tiedonhallinta ja tietoturvallisuus
    - Tietoturvallisuussäännöksiä
    - Tekniset rajapinnat
    - VAHTI suositusvaatimukset
    - Asianhallinta ja tietoaineistojen muodostaminen
    - Metatietoa ja rekistereitä
    - Tiedonhallinnan elinkaarikysymykset ja arkistointi
    - JHS-179 ja kokonaisarkkitehtuuri
  • Real-Time Data Streaming in the Insurance Industry
    Real-Time Data Streaming in the Insurance Industry
    Christian Nicoll, Generali Switzerland + Kai Waehner, Confluent + Christopher Knauf, Attunity Recorded: Dec 13 2018 52 mins
    Speakers: Christian Nicoll, Director of Platform Engineering & Operations, Generali Switzerland + Kai Waehner, Technology Evangelist, Confluent + Christopher Knauf, DACH Sales Director, Attunity

    Insurance companies are facing similar challenges like all other disrupted market segments like the change of customer expectations and hence the need of differentiating itself new as a brand in a challenging market environment. But at the same time, it underlies a very strict regulatory pressure.

    Generali Switzerland, as many market leaders in every industry, have understood the power of data to reimagine their markets, customers, products, and business model and managed this change by building their Connection Platform within one year.

    Christian Nicoll, Director of Platform Engineering & Operations at Generali Switzerland guides us through their journey of setting up an event-driven architecture to support their digital transformation project.

    Attend this online talk and learn more about:
    -How Generali managed it to assemble various parts to one platform
    -The architecture of the Generali Connection Platform, including Confluent, Kafka, and Attunity.
    -Their challenges, best practices, and lessons learned
    -Generali’s plans of expanding and scaling the Connection Platform
    -Additional Use Cases in regulated markets like retail banking
  • Arrow's AI Future with David Fearne - a Big Data Beard podcast
    Arrow's AI Future with David Fearne - a Big Data Beard podcast
    Cory Minton and Brett Roberts Recorded: Dec 13 2018 43 mins
    Director of AI and BI at Arrow Electronics, David Fearne, sits down with the Big Data Beard for his second appearance on the show and muses about the rapid evolution from Big Data to AI in the enterprise and the challenges organizations are and will face making real impacts with these emerging technologies.

    This episode was recorded in the Dell EMC sponsor booth at Splunk conf2018 in Orlando, FL. A big thanks to Splunk, Dell EMC, and Arrow for making this possible.
  • Liz Cain - How Sales Development will Evolve with Product-Led Growth
    Liz Cain - How Sales Development will Evolve with Product-Led Growth
    Tenbound Recorded: Dec 13 2018 34 mins
    How do you buy things today?

    You may not realize it, but the process has changed dramatically in the last few years.

    Fast growing companies like @slack @dropbox @drift and @expensify make it so easy to get started, after a little while you love the product and are pulling out your wallet to buy or asking your boss for budget. It’s the consumerization for IT purchase.

    Our guest this week is Liz Cain, who is at the forefront of the Product-Led movement, supporting companies working with @openviewpartners in Boston and beyond as a Partner.

    In this episode, we discuss Product-Led growth, and how it relates to Sales Development.

    Good news, it makes the customer experience better and the Sales Development role more valuable. This is a must listen!

    Big thanks to @Darryl Praill of @VanillaSoft for making this podcast possible. Check out their new Sales Engagement solutions.

    Next week: Are you stuck in Analysis Paralysis? Break out of the trap and balance research with action to crush your goals.

    #SDR #BDR #salesdevelopmentrep #salesdevelopment #prospecting #coldcalling #salesloft #outreach #sales #tenbound #salesforce #salesappointment #revenue #salesops #salesdev19
    #marketingops #salesforce #tech #salestech #marketingtech #salestraining #brighttalk
    #salesenablement #discoverorg #leadgeneration #accountbasedmarketing #abm #salesdev18
  • Secure Your Digital Crown Jewels with Micro-Segmentation
    Secure Your Digital Crown Jewels with Micro-Segmentation
    Faraz Aladin, Director of Product Marketing @ Illumio Recorded: Dec 13 2018 49 mins
    The sheer intensity and frequency of modern cyberattacks requires you implement new controls to reduce your attack surface and minimize the impact of a breach. The goal? Prevent unauthorized East-West traffic in the event of a breach to ultimately protect the high-value assets of your company. In this webinar, we'll discuss:

    - The anatomy of a breach

    - Techniques to mitigate the risk of being compromised

    - How to use micro-segmentation enabled by real-time visibility to secure your crown jewels
  • Maximize IT Efficiency with SAM on a Single Platform
    Maximize IT Efficiency with SAM on a Single Platform
    Ryan Wood-Taylor, Martijn Braamskamp Recorded: Dec 13 2018 63 mins
    Join this webinar to learn how you can enable end-to-end software life cycle management from a true single platform to optimize software spend and reduce license compliance risk. You will hear from Softline, a ServiceNow SAM partner, about the critical functions and processes that can make your SAM program successful. See a demo of how embedding SAM into everyday IT management such as IT infrastructure changes and Application Portfolio Management are industry game changers.

    Imagine what’s possible when you run SAM from the same place you manage IT.

    In this webinar, you’ll learn:

    How to reduce your software spend
    Where to mitigate license compliance risk
    To drive action natively on the Now platform with intelligent IT operations
  • Turning Structured Content into 'How To' Videos
    Turning Structured Content into 'How To' Videos
    Wouter Maagdenberg, TXTOmedia Recorded: Dec 13 2018 47 mins
    Structured content is an ideal starting place for creating and producing rich media in bulk. A new technology created by TXTOmedia transforms this native and localized written documentation into rich media, such as animation, live-action video, and interactive visuals in an automated, fast, and cost-effective way — enabling versioning and respecting existing workflow processes within large organizations.

    TXTOmedia supports XML and Structured Content in multiple languages which is then parsed by and transformed into rich media automatically. This allows you to take existing structured content and create video, slides, visual TOC, Hot Spot Images and Interactive Product Models.

    –Watch instead of read; visuals and video are preferred above text by most audiences.
    – Rich media creation is no longer a painful manual and disconnected process
    –Technical publications become more vital for sales.


    Wouter Maagdenberg started his career in 1996 with a specialized web agency for the media, music and sports industry in Amsterdam. He focussed on streaming media and continued to develop rich media software. In 2011 he sold his technology company to SDL. Today, Wouter focuses on the auto-creation of video and other rich media content. His company TXTOmedia delivers solutions to transform existing content into rich media such as animations and video for today's screens, AR and VR. 
  • A Recap of re:Invent 2018: NEW AWS Services and Announcements
    A Recap of re:Invent 2018: NEW AWS Services and Announcements
    Matt van Zanten, DevOps Engineer, Onica Recorded: Dec 13 2018 26 mins
    Didn't make it to re:Invent 2018? Missed some of the key announcements? We got you! Join us for our 60 minutes webinar which will take you through key new AWS announcements including AWS RoboMaker, AWS Timestream and AWS IoT Events hosted by Onica's Matt van Zanten, DevOps Engineer.

    Here's what we will cover:
    -Net New Industry Services to AWS like AWS RoboMaker and AWS Ground Station
    -New Windows improvements and services such as Amazon FSX for Windows File Server
    -Additions and expansions to Serverless computing including Firecracker and AWS Lambda Layers
    -AWS IoT events and Onica’s involvement as a launch partner leveraging IoTanium
    -New management & governance services like the AWS Well-Architected Tool, AWS Control Tower and AWS Security Hub that make it easier for users to take on AWS on their own.
  • Introduction to ExtAngular: Early Access
    Introduction to ExtAngular: Early Access
    Marc Gusmano Recorded: Dec 13 2018 53 mins
    Our upcoming Ext JS 6.7 release will include an exciting new product -- Ext Angular! With ExtAngular developers can use all 115+ pre-built Ext JS components, Ext JS layout system and theming environment with the Angular framework.

    Join our upcoming webinar for a preview of the new ExtAngular product and you will learn:

    - How to incorporate ExtAngular into your existing Angular projects
    - How to integrate your apps into an Angular CLI generated project
    - How to utilize Sencha Themer to create great looking ExtAngular applications

    This session will also demonstrate how to access ExtAngular as part of our Early Access program via the Early Access Sencha npm repository
  • Transforming Cloud Connectivity & Security in Distributed Networks 
    Transforming Cloud Connectivity & Security in Distributed Networks 
    Jim Fulton, Director Product Marketing, Forcepoint Recorded: Dec 13 2018 35 mins
    Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps.
    In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security solution enables highly distributed organizations to improve productivity, reduce costs, better manage risk, and streamline compliance.
  • パブリッククラウドを安心して活用するためのセキュリティ対策ご紹介
    世羅 英彦, プリンシパルセールスエンジニア, 株式会社シマンテック Dec 17 2018 7:00 am UTC 60 mins



  • Обзор решения Dell EMC Hybrid Cloud for Microsoft Azure Stack
    Обзор решения Dell EMC Hybrid Cloud for Microsoft Azure Stack
    Андрей Николаев, Специалист по облачным платформам Dec 17 2018 8:00 am UTC 60 mins
    Присоединяйтесь, чтобы узнать, как построить полноценное облако для IaaS и PaaS сервисов “из коробки”. Поговорим о решении Dell EMC Hybrid Cloud for Microsoft Azure Stack.
    Вебинар проводится при поддержке компании Intel®.
  • Data Protector zum Wochenstart: DP 10.20 Neuerungen
    Data Protector zum Wochenstart: DP 10.20 Neuerungen
    Uli Wallscheid, DP Solutions Product Manager, Micro Focus Dec 17 2018 8:00 am UTC 90 mins
    In den Webinaren „Data Protector zum Wochenstart“ stellt Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vor.

    Im Webinar am 17. Dezember dreht sich alles um das Thema Data Protector 10.20: Das interne Reporting wurde in Data Protector 10.20 weiter ausgebaut. Desweiteren erhalten Sie einen Einblick in alle neuen Features der Version 10.20 von Data Protector.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb.

    Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.
  • Обзор новых возможностей в ПО резервного копирования Micro Focus Data Protector
    Обзор новых возможностей в ПО резервного копирования Micro Focus Data Protector
    Александр Аверин, технический консультант по управлению информацией Micro Focus в России и СНГ Dec 17 2018 8:00 am UTC 60 mins
    В рамках вебинара мы расскажем вам о новом функционале программных решений Micro Focus по резервному копированию и восстановлению данных (Data Protector) и аналитике систем резервированя данных (Backup Navigator)
  • Der Anstieg von Cyberattacken auf dem DACH-Markt und wie man ihre Auswirkungen m
    Der Anstieg von Cyberattacken auf dem DACH-Markt und wie man ihre Auswirkungen m
    Flaviu Lang & Maik Pietsch | Cloudflare - Experten für Cyber-Sicherheit | DACH Dec 17 2018 9:00 am UTC 27 mins
    Dieses Webinar bietet Ihnen einen Überblick über die Lage der Cyber-Sicherheit in der DACH Region. Thematisiert werden die verschiedensten Formen, die Cyberangriffe einnehmen können, sowie passenden Schutzmechanismen, die Sie in Ihrem Unternehmen implementieren können.
  • Micro Focus ARA: Automating Software Delivery
    Micro Focus ARA: Automating Software Delivery
    Malafronte, Paola Dec 17 2018 9:00 am UTC 60 mins
    Looking for a single tool that increases software delivery cadence and unites Agile and DevOps practices to implement Continuous Delivery?

    Micro Focus Application Release Automation (ARA) is the solution that can bring enterprise DevOps efficiencies to your software delivery process.

    Why use Micro Focus ARA?
    •Scale from a single laptop to the largest enterprise.
    •Supports Continuous Delivery
    •Uses a flexible, robust, extensible plug-in for seamless integration
    •The drag-and-drop, graphical process editor eliminates manual deployments
    •Plan, track, and control application releases with end-to-end visibility
  • Faster, Efficient, More Intelligent Incident Response Orchestration
    Faster, Efficient, More Intelligent Incident Response Orchestration
    Andy Yeates, Engineer, IBM Resilient Dec 17 2018 10:00 am UTC 40 mins
    The Resilient incident response platform (IRP) empowers cyber security teams to orchestrate their incident response processes, and respond to and resolve incidents faster, more effectively, and more intelligently. The Resilient IRP is the leading platform for orchestrating and automating incident response processes.

    This presentation will showcase the Resilient IRP’s ability to enable complete IR orchestration and automation - aligning security teams' people, process, and technologies into a single hub for incident response. By understanding the capabilities of the solution, attendees can learn how to:

    • Achieve greater intelligence and efficiency by integrating your existing security technologies, including SIEMs, EDR, threat intelligence, and more.

    • Adapt to real-time incident conditions with Resilient Dynamic Playbooks –ensuring a fast and complete response to all incident types.

    • Build, configure, and maintain your own IR action plans within hours or days
  • Blockchain for Supply Chain: How Real is it?
    Blockchain for Supply Chain: How Real is it?
    Victoria Brown, Senior Research Manager, IDC Retail Insights and Nelson Petracek, CTO, TIBCO Software Inc Dec 17 2018 10:00 am UTC 23 mins
    Bitcoin is a hot topic these days, but the technology underneath this digital crypto-currency can potentially be used to build solutions for industries faced with supply chain inefficiencies. Other than simply recording transactions on a ledger, what other aspects of this industry could be impacted by blockchain? Can smart contracts be used to achieve more automated and streamlined interactions in a secure context? And where do concepts such as IoT and AI/ML fit?

    Join this panel discussion to hear about blockchain technology, solution offerings, and related concepts such as smart contracts. We will look at how blockchain can streamline supply chain interactions and improve the visibility and trust of these transactions across a network of participants. The session will discuss what we, as technologists, must consider as part of a blockchain deployment, and how this technology may impact your purchasing experience in the future.
  • European Commission Technical Expert Group: Call for Feedback on the EU Taxonomy
    European Commission Technical Expert Group: Call for Feedback on the EU Taxonomy
    Elodie Feller | Nathan Fabian | Martin Spolc Dec 17 2018 2:30 pm UTC 60 mins
    The Technical Expert Group on Sustainable Finance set up by the Commission in July 2018 has launched a call for feedback on EU action to develop a unified EU-wide classification system – or taxonomy – for environmentally sustainable economic activities.

    The call for feedback aims to help the Technical Expert Group engage with a broad range of stakeholders and experts and will close on 22 February 2019.
    Find out more: https://ec.europa.eu/info/publications/sustainable-finance-taxonomy_en

    This Webinar will provide background and guidance on the feedback process to support stakeholders and experts interested in contributing.

    Presented by:

    • Martin Spolc, Head of Unit, DG Financial Stability, Financial Services and Capital Markets Union, European Commission
    • Nathan Fabian, Chief Responsible Investment Officer, PRI, Chair of the TEG Taxonomy Working Group
    • Elodie Feller, Investment Programme Lead, UNEP FI, Observer in the Technical Expert Group
  • More Things You Can Do with a Security Policy Management Solution
    More Things You Can Do with a Security Policy Management Solution
    Dania Ben Peretz, Product Manager Dec 17 2018 3:00 pm UTC 45 mins
    Are you getting the most out of your Security Policy Management Solution?

    Today’s security policy management solutions do much more than automate traditional change management tasks. And yet, managing processes is becoming increasingly complex, time consuming and riddled with errors.

    Many professionals believe they need additional sophisticated tools to address these challenges. However, you may already have what you need, up and running in your organization.

    Join us in this webinar to learn how AlgoSec’s solution simplifies and automates security policy management to make the enterprise more agile, more secure and more compliant across your ever-changing network:

    •Gaining visibility of unsecured traffic used by your business applications
    •Closing the gaps in your network map to get your automation in place faster
    •Tying cyberattacks to business impact
    •Being audit-ready all the time
  • 5 things CISOs & CIOs must do in 2019 – Cybersecurity Handbook
    5 things CISOs & CIOs must do in 2019 – Cybersecurity Handbook
    Balaji Desikamani, VP - Marketing & Channel Sales Dec 17 2018 5:00 pm UTC 60 mins
    As year 2018 draws to a close, one thing is clearly evident – more enterprises than ever are getting breached and the traditional line of defenses are simply not holding up! With an unprecedented sophistication to these new breed of cyberattacks, now run by organized syndicates instead of mere criminals, and an equal pressure on resources, CIOs and CISOs are facing a classic dilemma. How does one secure their enterprise and actively reduce risk, while they also strive to empower their employees, organizations and digitally transformed businesses to be productive and competitively agile in the marketplace.

    As the cybersecurity space innovates and evolves, there are clear must-do items that CIOs and CISOs must act upon for dramatically improving their cybersecurity with optimal investment and time. Attend this webinar as Bala Desikamani, Vice President – Marketing, Cyberinc highlights ‘5 things CISOs & CIOs must do in 2019’. He will offer a simple yet highly effective approach that will help leaders secure and significantly mitigate the risk to their businesses while empowering their businesses and employees with a new level of freedom and productivity.

    The webinar will cover

    1. A brief reprise of the harsh realities of Cybersecurity today
    2. Caught in the web: The vicious reactive model of cybersecurity
    3. Breaking free: The Cybersecurity Handbook – 5 thing CISOs and CIOs must do in 2019
    4. The path to get there – dramatically reduce attack surface, unlock value and empower organizations
  • Consumption Based Data Management Providing Peace of Mind
    Consumption Based Data Management Providing Peace of Mind
    Storage Switzerland, Veeam, HPE Dec 17 2018 6:00 pm UTC 60 mins
    Consumption based IT is a curated set of IT solutions that focus on business outcomes. As the name implies it is purchased on a pay-as-you-go model. The goal of consumption based IT is to simplify establishing IT infrastructure that incorporates both the on-premises data center and the cloud to support a wide variety of workloads including traditional transactional databases, big data analytics, containers and many others.

    A key aspect of consumption based IT is how the data created by these workloads will be protected. In fact, the right consumption based IT solution should curate end-to-end backup directly into the solution.

    In our live webinar join Storage Switzerland, Veeam, and HPE to learn about consumption based IT, what to look for in a consumption based solution, how data protection can protect the solution and how data protection can be offered as a consumption based solution protecting both legacy and new architectures.
  • Closing the DevOps/SecOps Security Gap
    Closing the DevOps/SecOps Security Gap
    Bashyam Anant, Vice President Product Management, Cavirin Dec 17 2018 6:00 pm UTC 60 mins
    As 2019 approaches, DevOps & SecOps are looking to minimize the risks due to change management delays and manual processes. Today's existing approaches are good at monitoring and presenting what is wrong, but don’t take that vital next step in automating the correction of any issues.

    In this Webinar we will show you how to close the security gap through auto-remediation, combining AWS Lambda functions and Ansible Playbooks. Auto-remediation extends from your cloud security posture to your VMs and container instances, on-prem, or in the cloud.

    Can't make the date? No problem. Simply complete the registration form and we'll send you the recording to watch at your convenience.

    Earn one CPE credit for attending this webcast.
  • Ask the Expert: Everything You Ever Wanted To Know About SD-WAN
    Ask the Expert: Everything You Ever Wanted To Know About SD-WAN
    Ritesh Mukherjee, Vice President Product Management at 128 Technology Dec 17 2018 6:00 pm UTC 60 mins
    Bring your toughest questions and most important SD-WAN challenges to Ritesh Mukherjee, Vice President of Product Management at 128 Technology.
  • Learn about HYCU Data Protection for Nutanix – Introducing version 3.5
    Learn about HYCU Data Protection for Nutanix – Introducing version 3.5
    Paul Nashawaty, Chief Evangelist | Global Product Marketing Leader HYCU, Inc. Dec 18 2018 5:00 am UTC 30 mins
    Building on HYCU data protection offering for Nutanix, release 3.5 takes the current offering to the next level. The purpose of this session is to provide a brief overview of HYCU then introduce the extended features and enhancements with our latest release. In this session, you will learn about:
    •The added support for Nutanix Volume Groups and why it matters to you
    •Advanced reporting capabilities built into the HYCU user interface – no need to use different tools / interfaces
    •The only simplified protection of SAP HANA leveraging the Nutanix platform
    •And many additional features
  • VMware vSAN Technology: актуальное решение для гиперконвергентной инфраструктуры
    VMware vSAN Technology: актуальное решение для гиперконвергентной инфраструктуры
    Николай Куликов, менеджер по развитию бизнеса VMware Dec 18 2018 8:00 am UTC 60 mins
    Самые «быстрорастущие» продукты Dell Technologies - VxRail и VxRack - основаны на VMware vSAN, ведущем решении хранения для гиперконвергентной инфраструктуры (HCI). Послушайте экспертов, обсудите, как последние инновации vSAN помогают организациям модернизировать свою инфраструктуру и обеспечить общие операции – от границы до ядра сеит и облаков. Узнайте у экспертов, как работают последние функции vSAN.
  • BL-Global Flexible
    BL-Global Flexible
    Guy Wagner Dec 18 2018 9:00 am UTC 120 mins
  • Securing the IoT: Keeping planes in the air and the lights on at home
    Securing the IoT: Keeping planes in the air and the lights on at home
    Adam Brady & Mark Baker, LogRhythm Dec 18 2018 9:00 am UTC 48 mins
    The Internet of Things (IoT) will generate, process and share more data than ever before. Data that needs to be secured.

    The data generated by non-traditional sensors and systems can help detect anomalous behaviour and maintain the uptime we expect from the new wave of connected devices.

    In this webinar, LogRhythm’s security experts will explain how this data can be used, with examples from a range of industries – from jet turbine manufacturers to in-home automation providers.

    Join the webinar to discover:
    1. How IoT devices blur the boundaries between IT security, operational technology and security in the physical world
    2. How to gain visibility into the data generated by these devices – and what it really means
    3. What customers have experienced through real-life use cases
  • Cherwell + Everbridge: IT-Services schneller als je zuvor wiederherstellen
    Cherwell + Everbridge: IT-Services schneller als je zuvor wiederherstellen
    Aria Naderi; Zbigniew Skurczynski Dec 18 2018 9:00 am UTC 60 mins
    IT-Vorfälle treten ständig auf, von Ausfällen, Verlangsamungen von Anwendungen bis hin zu Cyberangriffen und einigen, die kritischer sind als andere. Bei IT-Vorfällen, die eine sofortige Aufmerksamkeit erfordern, müssen IT-Experten rechtzeitig einbezogen und verschiedene Gruppen informiert und/oder aktualisiert werden. Die Herausforderung, vor der die meisten Unternehmen stehen, besteht in der Koordination der Reaktion auf IT-Vorfälle, wenn Zeit im Vordergrund steht. Zum Beispiel, wie man:
    Sammeln und verwalten Sie alle relevanten Informationen zentral.
    Identifizieren Sie den geeigneten Informationsaustausch mit verschiedenen Rollen.
    Sicherstellung einer zeitnahen und effektiven Reaktion zwischen den Teams
    Ermöglicht eine effiziente Zusammenarbeit unabhängig vom Standort der Mitarbeiter.

    In diesem Webinar erläutern Aria Naderi von Cherwell und Zbigniew Skurczynski von Everbridge, wie die integrierte Cherwell-Everbridge-Lösung Unternehmen bei der Verwaltung, Kontrolle und Automatisierung ihrer Reaktion auf IT-Vorfälle unterstützt, um die Auswirkungen auf ihre IT-Experten und ihr Unternehmen zu minimieren.
  • La modernisation de votre architecture de données avec Microsoft Azure
    La modernisation de votre architecture de données avec Microsoft Azure
    Cédric Israel (Informatica et Ludovic Bouaziz (Microsoft) Dec 18 2018 9:00 am UTC 60 mins
    Les data warehouses dans le Cloud public, tel qu'Azure SQL Data Warehouse, offrent des fonctionnalités robustes, ne requièrent pratiquement aucun investissement en amont et s'accompagnent des avantages liés au Cloud : élasticité, évolutivité infinie et agilité.

    Avec les data warehouses dans le Cloud, vous payez pour ce dont vous avez besoin, quand vous en avez besoin, éliminant ainsi la nécessité d'une planification de capacité complexe et d'investissements en capital fixe.

    Le déplacement d'un data warehouse vers le cloud réclame une approche incrémentale et gouvernée afin de délivrer des résultats rapides en assurant le minimum d’interruption dans les applications existantes et les tâches d'analyses de données.

    A l'occasion de ce webinar Ludovic Bouaziz, Pre-sales Engineer Data platform & AI chez Microsoft pour Azure SQL DW et Cédric Israel, Integration Cloud Sales Specialist chez Informatica échangeront sur :

    • Opportunités et challenges rencontrés dans les projets déplacement de data warehouse vers le Cloud
    • Meilleurs pratiques
    • Construction d'un business case et préparation de l'adoption d'Azure

    Durant les 3 prochaines années, plus de la moitié des entreprises seront concernées par l'évolution ou le remplacement de leur système décisionnel et analytique.

    Participez à ce webinar le 18 décembre afin d’apprendre comment initier, rapidement et facilement, votre transition vers le data warehouse Cloud avec Informatica et Microsoft Azure.
  • Authoring in The Lancet — Learn from the Editors!
    Authoring in The Lancet — Learn from the Editors!
    John McConnell, Editor-in-Chief of The Lancet Infectious Diseases Dec 18 2018 9:30 am UTC 75 mins
    Join John McConnell, Editor-in-Chief of The Lancet Infectious Diseases to learn about techniques and strategies for authoring in high-impact journals. Mr. McConnell will present his experience working with researchers and authors throughout the research publishing cycle. You will learn how to develop papers for premium publications, and how to broadly disseminate findings. Do not miss this engaging webinar, join and ask any questions that you feel will benefit your research!
  • Wie rechtfertigen Sie die Kosten eines AppSec-Programms?
    Wie rechtfertigen Sie die Kosten eines AppSec-Programms?
    Julian Totzek-Hallhuber, Principal Solutions Architect at Veracode Dec 18 2018 10:00 am UTC 45 mins
    Traditionell haben die meisten Führungskräfte die IT Sicherheit als notwendiges Übel betrachtet - eine Investition, die nur erforderlich war, um ein schlechtes Ergebnis zu vermeiden, aber nicht als etwas, das neue Kunden einbringen oder den Umsatz steigern würde. Aber das scheint sich zu ändern. Wir stellen zunehmend fest, dass die Erstellung sicherer Software zu einem Wettbewerbsvorteil führt und das Endergebnis steigert.

    Dieses Webinar, das von Julian Totzek-Hallhuber - Principal Solutions Architect bei Veracode gehalten wird, hilft Ihnen dabei, AppSec zu unterstützen. Durch die Darstellung des möglichen ROI einer Cloud-basierten Anwendungssicherheitslösung, die in den Softwareentwicklungslebenszyklus integriert ist, stellen wir Ihnen die Tools zur Verfügung, die Sie zur Erstellung Ihres C-Level-Pitch benötigen.
  • Passwords: The Keys to your (Online) Kingdom
    Passwords: The Keys to your (Online) Kingdom
    David Emm, Principle Security Researcher and Prof. Steven Furnell, Professor of Information Security, University of Plymouth Dec 18 2018 11:00 am UTC 75 mins
    24/7 connectivity is fast becoming an integral part of everyday life. Most of us now routinely bank, shop and socialise online, and the Internet is the life-blood of business.

    Yet too many of us fail to secure our online identities adequately. This presentation will examine why this is important, what we should do to secure our online accounts and how criminals exploit our lack of security.


    Steven Furnell is a the Associate Dean and IT Security Professor at the University of Plymouth. His research interests spans multiple areas including: Cyber Security / IT Security, including user authentication, biometrics, cyber crime, intrusion detection and response, security management and culture, usable security; Internet Technologies and Applications; Mobility.
    A published author, Steven will share his insights we can all individually make it harder for Cyber Criminals to access your passwords.

    David Emm is a Principle Research Analyst at Kaspersky Lab and regularly delivers presentations on malware and other IT security threats at industry events, highlighting what organisations and consumers can do to stay safe online. He also provides comment to broadcast and print media on the ever-changing cyber-security and threat landscape. David has a strong interest in malware, ID theft and the human aspects of security, and is a knowledgeable adviser on all aspects of online security.
  • App and Network Attacks
    App and Network Attacks
    Akhilesh Dhawan, Dir of Prod Marketing- Cloud/Security Citrix & Darshant Bhagat, Dir of Prod Management/Strat Citrix Dec 18 2018 11:00 am UTC 47 mins
    Find out how the Citrix Security approach brings together the entire Citrix portfolio to address internal and external threats by providing holistic visibility and proactive protection of your company assets.

    This webinar deep dives into: protection of applications from on-premise to the cloud, hypervisor protection of servers before the threat hits the operating system, and device and user protection from external threats. Proactively counter internal and external threats through analytics.
  • Analytics für alle - Mit Datenvirtualisierung zu Self-Service BI
    Analytics für alle - Mit Datenvirtualisierung zu Self-Service BI
    Thomas Niewel, Technical Sales Director, Denodo Dec 18 2018 1:00 pm UTC 45 mins
    Self-Service-Analytics ermöglicht es Geschäftsanwender Analysen selbständig durchzuführen und sich damit aus der Abhängigkeit der IT zu lösen. Das spart wertvolle Zeit, da Reportings ohne den Umweg über die IT Abteilungen erstellt werden und es Fachabteilungen ermöglicht, kritische Entscheidungen schneller zu treffen.

    In diesem Webinar erläutern wir, wie Sie mithilfe von Datenvirtualisierung, Echtzeitzugriffe auf integrierte unternehmensweite Daten erhalten und eine geeignete Infrastruktur aufbauen um Self-Service-Analysen bereitstellen zu können.


    - Wie können fragmentierte Daten nahtlos zusammengeführt werden?
    - Wie lässt sich die wartungs- und kostenintensive Datenintegrationen mithilfe einer virtuellen Datenschicht ersetzen?
    - Wie kann Datensicherheit erhalten und die Herkunft der Daten nachvollziehbar bleiben?


    1) Das Verspechen von Self-Service BI
    2) Der Aufbau einer Self-Service Infrastruktur
    3) Live Demo
    4) Q&A