The control points that CISOs were responsible for have largely disappeared so innovative CISOs have to deploy a risk-based security approach. And CIOs must move from thinking of their data center as the corporate epicenter, and admit that the Internet is their new corporate network.
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
The Briefing Room with Malcolm Chisholm and Druva
Live
The emergence of the mobile workforce has left an indelible mark on the enterprise; every employee is now mobile, and business data continues to be dispatched to the far reaches of the enterprise. While this has added enormous opportunity for increased productivity, it has also muddied the waters when it comes to controlling and protecting valuable data assets. As companies quickly evolve to address the new set of challenges posed by this shift in data usage, IT must ensure that all data, no matter where it’s generated or stored, is available and governed just as if it were still safely behind the corporate firewall.
Register for this episode of The Briefing Room to hear veteran Analyst Malcolm Chisholm as he explains the myriad challenges that mobile data introduces when addressing regulations and compliance needs, requiring new approaches to data governance. He’ll be briefed by Dave Packer of Druva, who will outline his company’s converged data protection strategy, which brings data center class capabilities to backup, availability and governance for the mobile workforce. He will share strategies to meet regional data residency, data recovery, legal hold and eDiscovery requirements and more.
Servicedesk and IT Support Show, London 2017
Audio from the presentation:
https://soundcloud.com/diversifieduk/sits-2017-is-devops-really-changing-it-support-jon-hall-bmc
Cloud Computing for Nonprofit Organizations4Good.org
Cloud computing will be entering the mainstream in 2012. Learn about the options, benefits, risks that nonprofits will face with this growing technology.
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Tudor Damian
The payoff of successful Digital Transformation can be essential for companies engaged in highly-competitive markets. Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success.
With the emergence of the Cloud, IT risk has suffered yet another radical transformation. The past couple of years have also brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people's IT security awareness, especially when moving to the Cloud.
Based on real-life projects and experience from recent years, this session provides a quick insight into the role that the Cloud plays within Digital Transformation initiatives, touching on challenges companies usually face when dealing with governance, security, change management & cost-control. Examples and case studies included.
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
The Briefing Room with Malcolm Chisholm and Druva
Live
The emergence of the mobile workforce has left an indelible mark on the enterprise; every employee is now mobile, and business data continues to be dispatched to the far reaches of the enterprise. While this has added enormous opportunity for increased productivity, it has also muddied the waters when it comes to controlling and protecting valuable data assets. As companies quickly evolve to address the new set of challenges posed by this shift in data usage, IT must ensure that all data, no matter where it’s generated or stored, is available and governed just as if it were still safely behind the corporate firewall.
Register for this episode of The Briefing Room to hear veteran Analyst Malcolm Chisholm as he explains the myriad challenges that mobile data introduces when addressing regulations and compliance needs, requiring new approaches to data governance. He’ll be briefed by Dave Packer of Druva, who will outline his company’s converged data protection strategy, which brings data center class capabilities to backup, availability and governance for the mobile workforce. He will share strategies to meet regional data residency, data recovery, legal hold and eDiscovery requirements and more.
Servicedesk and IT Support Show, London 2017
Audio from the presentation:
https://soundcloud.com/diversifieduk/sits-2017-is-devops-really-changing-it-support-jon-hall-bmc
Cloud Computing for Nonprofit Organizations4Good.org
Cloud computing will be entering the mainstream in 2012. Learn about the options, benefits, risks that nonprofits will face with this growing technology.
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Tudor Damian
The payoff of successful Digital Transformation can be essential for companies engaged in highly-competitive markets. Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success.
With the emergence of the Cloud, IT risk has suffered yet another radical transformation. The past couple of years have also brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people's IT security awareness, especially when moving to the Cloud.
Based on real-life projects and experience from recent years, this session provides a quick insight into the role that the Cloud plays within Digital Transformation initiatives, touching on challenges companies usually face when dealing with governance, security, change management & cost-control. Examples and case studies included.
EMC XtremIO and EMC Isilon scale-out architectures make them an ideal fit to handle the demanding Splunk requirements around intensive workloads. EMC brings the same enterprise-class data services to Splunk that earned them best of breed status across the board in area such Scale-Out NAS storage, data protection, compliance and performance tiering.
MT81 Keys to Successful Enterprise IoT InitiativesDell EMC World
Success with enterprise Internet of Things (IoT) initiatives begins with strong partnerships between IT and operations technology (OT) organizations and identifying relevant use cases with measurable ROI. Next, choosing the right IoT architecture and technology requires determining the capabilities are needed at the edge and what are needed in the cloud and datacenter to minimize cost and enable analytics-driven action. This session will discusses the challenges involved with introducing sensors and smart devices into your network, including building infrastructure and analytics capabilities , and securing data and applications. Learn how Dell'S IoT-specific gateways, edge analytics software and infrastructure solutions provide flexible architecture options for multiple IoT use cases.
CloudCamp Chicago - November 2013 Fighting Cloud FUDCloudCamp Chicago
Slides from the November CloudCamp Chicago. This time, we fought off Cloud FUD "Fear, uncertainty, and doubt"
Lightning talks included in these slides:
Tech in Illinois - Fred Hoch, Chairman, Illinois Technology Association @fredhoch
- "A retrospective of the Cloud, then and now" - Michael Segel, Segel & Associates; Founder of CHUG @chihadoopusers
- "Scientific Clouds: Hard Numbers vs. FUD" - Steve Timm, Lead FermiCloud Project, FermiLabs @StevenCTimm
- "Enterprise Adoption - The Chasm is Crossed" - Sashi Desikan, Global Executive, Pega Cloud at PegaSystems @PegaSashi
- "hybrid cloud governance" - Mike Bresett, Account CTO, Unisys @bresett
- "How we fought and are fighting Cloud FUD" - Paul Inboriboon, Director of Tech Infrastructure,Alzheimer's
Association @inboriboon
- "Can you make your cloud rain at the press of a button?" Robert Clarke, Account Executive, Crissie Insurance Group @RobertKClarke
Digital workspaces
are becoming powerful competitive differentiators in all industries.
That’s because businesses are seeking new levels of agility in
their processes and service delivery methods. They also want
flexibility for their employees.
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for leading meaningful security discussions with the board of directors; engaging end users to protect business information; and meeting security-related compliance requirements.
Today, secure remote access must support the increased demands of productivity, mobility and business continuity. Learn why traditional VPNs are not up to the task and why remote desktop access is superior for cost-effectively achieving enterprise-wide remote access and mobility.
Redefining Business Mobility and Customer ExperienceCitrix
The financial services industry faces unprecedented pressure from customer demands, regulatory mandates, emerging technologies and highly-competitive markets. Citrix powers
financial services mobility to help companies deliver consistent customer service across traditional and digital channels, improve employee productivity and retention, and increase
IT efficiency, while at the same time ensuring security across their evolving infrastructures.
Leveraging extensive research and interviews from leading IT analyst firm EMA, these slides--based on the webinar--will provide you with unique insights into cloud adoption, along with associated trends, such as shadow IT.
You will also learn how innovative approaches to dependency mapping, inventory and usage can help to make public and private cloud migrations more effective in optimizing costs and maximizing value.
Cloud Services: Resolving the Trust vs. Uptake ParadoxcVidya Networks
cVidya's Nava Levy presents for the panel discussion on Cloud adoption - Is it an Opportunity or Threat? As Cloud adoption grows exponentially, Cloud Security concerns also grow. Panel discussion from TM Forum's Management World 2012 in Dublin.
Melbourne Office 365 User Group - February 2015Michael Frank
Melbourne Office 365 User Group - February 2015
What's New?
Much has changed since our November meeting. We will give you an update about the recent Office 365 news and features.
Office 365 Australia
Late in 2014 Microsoft announced the arrival of Office 365 to Australian Data Centres. This will affect both new and existing customers in Australia, so we will explore what this means for both groups and take a look at when you can start using the local service.
http://www.meetup.com/Melbourne-Office-365-Meetup
MT85 Challenges at the Edge: Dell Edge GatewaysDell EMC World
"Fog architecture for computing at the edge of the network utilizes edge gateways to aggregate data from multiple devices, perform edge analytics and take real-time action, and introduce data and network security at the edge. This session will explore the differences between traditional proprietary gateways and Dell's intelligent edge gateways including communication protocols, operating systems, and software and hardware-level security.
"
See how hosting Sage 300 CRE (formerly Sage Timberline Office) or Sage 100 Contractor on the Cloud will save you time money and headaches. Increase data security, improve response times, gain anywhere, anytime access and reduce IT maintenance! Hosting and data migration services from Ledgerwood Associates are customized for Sage software (Timberline and Master Builder). Get up on the Cloud quickly and painlessly with Timbercloud.
3 Ways Companies Are Slashing IT Costs with VDICitrix
The need to reduce costs and simplify IT can’t come at the expense of security. By implementing VDI with Citrix XenDesktop, organizations can lower capital and operating expenses while avoiding costly breaches or regulatory fines. This white paper describes the experiences of three companies who reduced costs, simplified IT and met their business objectives.
EMC XtremIO and EMC Isilon scale-out architectures make them an ideal fit to handle the demanding Splunk requirements around intensive workloads. EMC brings the same enterprise-class data services to Splunk that earned them best of breed status across the board in area such Scale-Out NAS storage, data protection, compliance and performance tiering.
MT81 Keys to Successful Enterprise IoT InitiativesDell EMC World
Success with enterprise Internet of Things (IoT) initiatives begins with strong partnerships between IT and operations technology (OT) organizations and identifying relevant use cases with measurable ROI. Next, choosing the right IoT architecture and technology requires determining the capabilities are needed at the edge and what are needed in the cloud and datacenter to minimize cost and enable analytics-driven action. This session will discusses the challenges involved with introducing sensors and smart devices into your network, including building infrastructure and analytics capabilities , and securing data and applications. Learn how Dell'S IoT-specific gateways, edge analytics software and infrastructure solutions provide flexible architecture options for multiple IoT use cases.
CloudCamp Chicago - November 2013 Fighting Cloud FUDCloudCamp Chicago
Slides from the November CloudCamp Chicago. This time, we fought off Cloud FUD "Fear, uncertainty, and doubt"
Lightning talks included in these slides:
Tech in Illinois - Fred Hoch, Chairman, Illinois Technology Association @fredhoch
- "A retrospective of the Cloud, then and now" - Michael Segel, Segel & Associates; Founder of CHUG @chihadoopusers
- "Scientific Clouds: Hard Numbers vs. FUD" - Steve Timm, Lead FermiCloud Project, FermiLabs @StevenCTimm
- "Enterprise Adoption - The Chasm is Crossed" - Sashi Desikan, Global Executive, Pega Cloud at PegaSystems @PegaSashi
- "hybrid cloud governance" - Mike Bresett, Account CTO, Unisys @bresett
- "How we fought and are fighting Cloud FUD" - Paul Inboriboon, Director of Tech Infrastructure,Alzheimer's
Association @inboriboon
- "Can you make your cloud rain at the press of a button?" Robert Clarke, Account Executive, Crissie Insurance Group @RobertKClarke
Digital workspaces
are becoming powerful competitive differentiators in all industries.
That’s because businesses are seeking new levels of agility in
their processes and service delivery methods. They also want
flexibility for their employees.
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for leading meaningful security discussions with the board of directors; engaging end users to protect business information; and meeting security-related compliance requirements.
Today, secure remote access must support the increased demands of productivity, mobility and business continuity. Learn why traditional VPNs are not up to the task and why remote desktop access is superior for cost-effectively achieving enterprise-wide remote access and mobility.
Redefining Business Mobility and Customer ExperienceCitrix
The financial services industry faces unprecedented pressure from customer demands, regulatory mandates, emerging technologies and highly-competitive markets. Citrix powers
financial services mobility to help companies deliver consistent customer service across traditional and digital channels, improve employee productivity and retention, and increase
IT efficiency, while at the same time ensuring security across their evolving infrastructures.
Leveraging extensive research and interviews from leading IT analyst firm EMA, these slides--based on the webinar--will provide you with unique insights into cloud adoption, along with associated trends, such as shadow IT.
You will also learn how innovative approaches to dependency mapping, inventory and usage can help to make public and private cloud migrations more effective in optimizing costs and maximizing value.
Cloud Services: Resolving the Trust vs. Uptake ParadoxcVidya Networks
cVidya's Nava Levy presents for the panel discussion on Cloud adoption - Is it an Opportunity or Threat? As Cloud adoption grows exponentially, Cloud Security concerns also grow. Panel discussion from TM Forum's Management World 2012 in Dublin.
Melbourne Office 365 User Group - February 2015Michael Frank
Melbourne Office 365 User Group - February 2015
What's New?
Much has changed since our November meeting. We will give you an update about the recent Office 365 news and features.
Office 365 Australia
Late in 2014 Microsoft announced the arrival of Office 365 to Australian Data Centres. This will affect both new and existing customers in Australia, so we will explore what this means for both groups and take a look at when you can start using the local service.
http://www.meetup.com/Melbourne-Office-365-Meetup
MT85 Challenges at the Edge: Dell Edge GatewaysDell EMC World
"Fog architecture for computing at the edge of the network utilizes edge gateways to aggregate data from multiple devices, perform edge analytics and take real-time action, and introduce data and network security at the edge. This session will explore the differences between traditional proprietary gateways and Dell's intelligent edge gateways including communication protocols, operating systems, and software and hardware-level security.
"
See how hosting Sage 300 CRE (formerly Sage Timberline Office) or Sage 100 Contractor on the Cloud will save you time money and headaches. Increase data security, improve response times, gain anywhere, anytime access and reduce IT maintenance! Hosting and data migration services from Ledgerwood Associates are customized for Sage software (Timberline and Master Builder). Get up on the Cloud quickly and painlessly with Timbercloud.
3 Ways Companies Are Slashing IT Costs with VDICitrix
The need to reduce costs and simplify IT can’t come at the expense of security. By implementing VDI with Citrix XenDesktop, organizations can lower capital and operating expenses while avoiding costly breaches or regulatory fines. This white paper describes the experiences of three companies who reduced costs, simplified IT and met their business objectives.
Digital Transformation, Cloud Adoption and the Impact on SAM and SecurityFlexera
Learn from IDC Analyst Carla Arend on the topic of digital transformation, cloud adoption and the impact on software asset management (SAM) and security teams.
On-premises web gateways are being disrupted, and the model of providing web content security is changing. The pace of technology change and evolving employee work habits are pushing on-premises gateways out of the picture. Many companies are outsourcing their Security to Managed Security Service Providers.
Zscaler is the only carrier-grade Security as a Service platform.
Zscaler serves large enterprises, governments & mid-sized organizations in 185+ countries.
Zscaler protects 13M+ users across 5,000+ clients.
Rethinking Data Availability and Governance in a Mobile WorldInside Analysis
The Briefing Room with Malcolm Chisholm and Druva
Live Webcast on June 9, 2015
Watch the archive: https://bloorgroup.webex.com/bloorgroup/lsr.php?RCID=baf82d3835c5dfa63202dcbe322a3ad7
The emergence of the mobile workforce has left an indelible mark on the enterprise; every employee is now mobile, and business data continues to be dispatched to the far reaches of the enterprise. While this has added enormous opportunity for increased productivity, it has also muddied the waters when it comes to controlling and protecting valuable data assets. As companies quickly evolve to address the new set of challenges posed by this shift in data usage, IT must ensure that all data, no matter where it’s generated or stored, is available and governed just as if it were still safely behind the corporate firewall.
Register for this episode of The Briefing Room to hear veteran Analyst Malcolm Chisholm as he explains the myriad challenges that mobile data introduces when addressing regulations and compliance needs, requiring new approaches to data governance. He’ll be briefed by Dave Packer of Druva, who will outline his company’s converged data protection strategy, which brings data center class capabilities to backup, availability and governance for the mobile workforce. He will share strategies to meet regional data residency, data recovery, legal hold and eDiscovery requirements and more.
Visit InsideAnalysis.com for more information.
Enterprises that are embracing cloud computing are interested in driving fundamental changes in their business so they can compete in the future. IT transformation, enabled by cloud adoption, is a key component of this future success—from tighter alignment with business unit stakeholders to increased agility and pace of innovation. In this session, we explore the potential for transformation that comes with cloud adoption, and we discuss how some of the world’s leading enterprises were able to transform. We also explore organizational and technology best practices that you can implement to support transformation in your organization.
EMEA10: Trepidation in Moving to the CloudCompTIA UK
Today’s buzz centres on cloud computing. What is it exactly? Will it dent your revenues or does it have potential to add capabilities to your business? How do you deliver value when you don’t “install” anything? Learn how to use this new approach to delivering IT services in your business, what to consider and where it makes sense – and where it doesn’t! Dave Sobel, CEO of Evolve Technologies, talks to you about how to develop cloud offerings and how you position your business for growth around online services. Strategies come from real life experience, industry data, and collaboration with other solution providers to give you the best way to take on the big, bad cloud.
Skip the Security Slow Lane with VMware Cloud on AWSTrend Micro
While migrating your infrastructure to the cloud offers an opportunity to rethink your approach to management and security, it can create a patchwork of processes and tools, a disorganized team, and duplication of work. In a few years, you may learn that the IT security team needs a unified approach to data protection and you must already overhaul your “new” setup. You thought you were speeding ahead with improved operations and lower costs, but you are actually in the security slow lane! Pull over and find a new route forward with VMWare on AWS by leveraging tools you know in an environment you already understand. Save years of work by utilizing a common set of tools, operational processes, and security framework when moving to the cloud. Learn tips and tactics from Trend Micro and Capgemini for setting your teams up for success now…and tomorrow.
This was one of Trend Micro's sessions presented at VMworld 2017.
Overcoming the Challenges of Architecting for the CloudZscaler
The concept of backhauling traffic to a centralized datacenter worked when both users and applications resided there. But, the migration of applications from the data center to the cloud requires organizations to rethink their branch and network architectures. What is the best approach to manage costs, reduce risk, and deliver the best user experience for all your users?
Watch this webcast to uncover the five key requirements to overcome these challenges and securely route your branch traffic direct to the cloud.
The rise of IT as Service (ITaaS) is result of the intense rate of change brought about by technologies such as cloud computing, social media, consumerization, mobility, analytics and big data. The pace of change is only increasing, and these emerging technologies need to be rapidly integrated into modern enterprise, almost in real-time. Enter ITaaS, on-demand. In its various forms, ITaaS on-demand solves the myriad problems of modern IT resource consumption. When technology is restructured to be flexible, fast and ready, capabilities are provided based on usage. Transitioning to an on-demand hybrid infrastructure is a complete transformation that can support your future business goals, help fuel business innovation and turn IT from a cost center to a value center. This is the future of IT, it will be hybrid, and it will be on-demand with utmost flexibility, scalability and cost-efficiency.
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014Exponential_e
Can we spend less on IT, work less, but accomplish more?
Join us at The Ritz to discover how Exponential-e’s innovative hybrid services combine the best of traditional IT competencies, with world leading connectivity, Cloud and communication services - and make the impossible, possible.
Our CEO, Lee Wade, will be amongst a selection of key speakers, who will share their views on how innovations in Cloud services can be combined with advanced networking technology and service provider experience to deliver the real benefits businesses have been seeking.
We'll seek to explain how you can spend less on IT, work less and still accomplish more. We'll demonstrate why your Cloud is only as good as your network, and how you can transition to the Cloud efficiently and securely.
Seems too good to be true? Come and see for yourself.
View our Cloud video and more on YouTube: https://www.youtube.com/user/Exponentialltd
Three Key Steps for Moving Your Branches to the CloudZscaler
Is backhauling traffic the most efficient way to route traffic when your workloads move to the cloud? The migration of applications from the data center to the cloud calls for a new approach to networking and security. But, keeping up with application demands and user expectations can be a struggle. Explore the challenges and benefits of establishing secure local breakouts from someone who has done it.
Similar to The evolving CIO|CISO relationship (20)
With the majority of everyday work handled over the internet, it no longer makes sense to backhaul traffic to centralized data centers—the MPLS costs are too high and the bandwidth too scarce. You need a new approach to networking and security.
It’s 2019 and your users are working from anywhere but the office, enterprise applications have migrated to the cloud or hybrid environment, and VPN is no longer the answer to private application access in this new world of user-to-app connectivity.
As security professionals, how can we be sure that we’re ready for 2019? After the last few years, when our practices and conventions have been tested again and again, it’s a little daunting to consider what may face us in the year ahead. Will attackers set their sights on cloud apps? Will hackers join forces with organized crime? Will governments look to the private sector to deal with the skills gap? What will happen to cybersecurity budgets? Join us to get answers to these questions and more.
Three ways-zero-trust-security-redefines-partner-access-chZscaler
One of the toughest IT challenges has been figuring out how to allow users to bring their own devices to work while maintaining the security of internal apps. It becomes even more complicated when a good chunk of users are partners, contractors, and other third parties—those who present a disproportionately high security risk.
IT teams have begun to leverage a zero trust security strategy that enables third parties and users on unmanaged devices to securely access internal apps. But can such access be accomplished without placing users on the network and without a mobile client?
With over 10,000 users and 900 locations across 22 countries, Kelly Services exemplifies the diversified multinational organization. But as Kelly Services looked to standardize on Office 365, it became apparent that full application support across the Office 365 suite would require a complete network transformation, from a legacy hub-and-spoke network to a modern direct-to-cloud architecture.
Join this session to hear first-hand how Kelly Services was able to drive down MPLS and networking costs, deliver a fast Office 365 application experience to users around the globe, and fundamentally transform its network infrastructure.
According to Harvard Business Review, there have been more than 50,000 mergers, acquisitions, and divestitures worldwide in each of the past three years, and 2018 shows no signs of abating. While each M&A is unique, for IT, they all tell a similar, excruciating story: IT scrambles to figure out the fastest way to keep services running in order to minimize disruption and maximize ROI for the business.
Get an office 365 expereience your users will love v8.1Zscaler
Whether you’re looking to deploy Office 365 on your network, or you’ve already begun the migration, there’s one measurement of success that is paramount: user experience. With multiple apps and services, including latency-sensitive applications like Skype, it’s critical to optimize your network for the fastest O365 experience. Microsoft recommends accessing Office 365 directly via the internet, but many companies don’t have the proper network setup. It’s no surprise, then, that Office 365 deployments frequently don’t go as planned.
Three ways-zero-trust-security-redefines-partner-access-v8Zscaler
One of the toughest IT challenges has been figuring out how to allow users to bring their own devices to work while maintaining the security of internal apps. It becomes even more complicated when a good chunk of users are partners, contractors, and other third parties—those who present a disproportionately high security risk.
Schneider electric powers security transformation with one simple app copyZscaler
When Schneider Electric decided to undergo a digital transformation initiative, they knew their approach to security would also need to transform. As their apps moved to the cloud and their users left the network, the Schneider team needed a way to deliver consistent security controls across a globally dispersed workforce of 140,000 users.
The era of cloud and mobility has changed the way we work and transformed the internet into the transport network for most enterprises. Even so, many continue to rely on security technologies designed for the old world, when users and data were on the network and applications were housed in the data center.
ESG believes that the challenge of using legacy security methods in the cloud era will be a key catalysts for the adoption of a new user- and application-centric approach known as zero trust security. The zero trust model is enabled by the software-defined perimeter (SDP), delivering secure anywhere access to internal applications without the use of VPN technology.
Today’s threat landscape has triggered an explosion of new security solutions all promising to identify threats and reduce risk. Yet, with all these new approaches, breaches continue to rise as organizations struggle to use their security controls effectively and quickly respond to threats.
Moving from appliances to cloud security with phoenix children's hospitalZscaler
Applying consistent and robust security controls across your remote workforce hasn’t gotten any easier. The complexity brought about by mobile devices, cloud apps, untrusted networks, and more are compounded by the inspection demands of SSL traffic and the performance limitations of security appliances
Ready to deploy Office 365? If you think it’s going to be easy enough, you may want to think again. Microsoft Office 365 was designed to be accessed directly via the internet, and most companies simply don’t have the appropriate network setup.
Faster, simpler, more secure remote access to apps in awsZscaler
Although 60% of enterprises now run apps on AWS, the user experience for remote users is typically slow as most traffic is still tunneled through their data center breaking the cloud experience.
Moving the crown jewels to the cloud requires a trusted cloud provider. This is why almost 40% of enterprises choose to run internal applications on Azure, which was designed to deliver more choice, scalability, and speed. However, this also extends the security perimeter to the Internet - rendering network-centric security methods obsolete.
Ready to deploy Office 365? If you think it’s going to be easy enough, you may want to think again. Microsoft Office 365 was designed to be accessed directly via the internet, and most companies simply don’t have the appropriate network setup. It’s no surprise, then, that deploying Office 365 without proper guidance can delay deployments and cause a terrible user experience
According to Google, almost 80 percent of websites loaded in Chrome are over HTTPS, and Zscaler ThreatLabZ research shows that more than 50 percent of malware now hides in SSL/TLS-encrypted traffic. The problem is that many organizations don’t have the budget to fully inspect encrypted traffic, so SSL becomes a blindspot and IT is faced with a major compromise. Meanwhile, hackers are getting more and more creative in how they deliver malware in SSL/TLS, which creates new inspection challenges.
Adopting an SD-WAN solution is the best option that network organizations have to respond to a range of requirements such as lowering cost, increasing availability and providing high quality user experiences. However, network organizations are also under pressure to deliver best-of-breed security and in virtually all instances, adopting an SD-WAN solution results in implementing Direct Internet Access (DIA) which is challenging to secure using security appliances.
IT leaders have talked for years about routing traffic directly to the internet from the branch, but network complexity and security challenges have been too great. Times have changed, and today digital transformation is pushing organizations to rapidly evolve branch office IT and security architectures to take advantage of cloud services.
Join a conversation with Zeus Kerravala, Founder and Principal Analyst, ZK Research, and Bill Lapp, Vice President of Customer Success, Zscaler, to discuss the challenges of cloud migration, along with the opportunities it presents. We’ll explore the best ways to address complexity and security in the branch, and discuss a strategic approach to providing a scalable architecture for the adoption of SaaS and cloud services
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
1. The evolving roles of CISOs and CIOs
Larry Biagini
Chief Technical Evangelist
Jason Georgi
Director, Transformation Office
2. Engage in the Discussion
• Type your questions into the chat box in the Webex
panel or email us at webcast@zscaler.com
• We’ll try to get to all questions during the Q&A
session. If we do not get to your question, we’ll make
sure to follow up afterwards
• At the end of the webcast – please let us know how
we did! By answering three questions, you will be
entered into a drawing for an Amazon Echo!
3. Jason Georgi
Jason Georgi
Head of the Value Management Office
• Jason has over 23 years of experience driving innovation
initiatives across global organizations
• He joined Zscaler two years ago after spending nine years
at GE, where he led GE’s Global Network Shared Services
• Jason is currently the Director of Zscaler's Transformation
Office. His office works with customers and partners to
understand the benefits of IT transformation in terms of
business outcomes.
Jason Georgi
Director,
Transformation Office
Zscaler
4. Larry Biagini
Jason Georgi
Head of the Value Management Office
• Larry Biagini recently retired as Vice President and Chief
Technology Officer of GE
• While at GE, Larry’s focus was on contemporizing
infrastructure, employee services and deploying cloud
technology enabling secure usage of those services by GE’s
employees, customers and partners
• At Zscaler, Larry helps customers and partners better plan and
execute their inevitable move towards expanding their use of
cloud services
Larry Biagini
Chief Technical Evangelist
5. Cloud: what’s all the fuss about?
enterprise decision-makers
who are building private clouds
enterprise decision-makers
procuring public cloud services
global public cloud market by
2020, up from $146B in 2017
Source: Forrester Research survey
38%
32%
$236B
6. Cloud adoption will accelerate…
Creating new opportunities and threats
The point is…
13. Transformation does not start in the data center
12
It starts with the organizational mindset of
doing business differently
14. What has to change?
CISO
• Shift from “security
and controls” to “risk
and enablement”
1
3
CIO
• Shift from technology-
first to business-first
CTO
• Shift from
architecting corporate
networks to
embracing the cloud
16. • It is a business discussion
around why unsanctioned apps are
being used
• Understanding the usage helps frame
the risk associated
• Is usage malicious or careless?
• Either way, do we have a data leakage
or exfiltration problem?
15
To keep from breaking new business processes and models, and be
compliant…change the conversation from ’CONTROL' to ’RISK'
CISO’s evolving mindset
21. Unmatched security – all
users, branches, and
devices
Consistent policy and
protection by design vs.
exception
Always up-to-date
No need to be patient zero
Consolidate point products
and simplify IT
Cloud-enabled network
Rapid deployment
Policy based Access for
Internal, Cloud and SaaS
No Capex, elastic
subscription fee
Reduced Opex, no box
management
Manage Security &
Compliance policy vs.
Technology
No yearly maintenance fee
Reduced MPLS costs
Higher productivity –
local breakouts
Prioritize business apps
Consistent User experience
Empowers users to leverage
cloud apps
Intelligent Peering for
SaaS/O365
Anywhere Access with ZPA
Fast Response Time
(End-Users)
Reduced Risk
(CISO)
IT Simplification
(CTO / IT Head)
Impressive Value
(CIO / CFO)
The foundation of a modern access and security architecture
26. Zscaler: A foundation for modern access and security
Access to the Internet & Apps1
SAML
Integratio
n
IDENTITY & ACCESS4
REPORTING & ANALYTICS6
Inbound & Outbound Gateway
BRANCH (SD-WAN)3
FW/IPS:
DDoS:
DATA CENTER PROTECTION2
MDM:
AV:
Encryption:
ENDPOINT PROTECTION5
27. (BROADBAND)
A three-step journey to cloud and mobility transformation
SECURE
Up-level your security
Enable secure SD-WAN / local Internet
breakouts – optimize backhaul.
Deliver a better and more secure
user experience.
TRANSFORM
Cloud-enable your network
SIMPLIFY
Remove point products
Phase out gateway appliances at
your own pace.
Reduce cost and
management overhead.
Make Zscaler your next hop
to the Internet.
Fast to deploy. No infrastructure
changes required.
28. Key Takeaways
27
• Move from IT and Security shops to digital enablers
• Speed is the new currency in the connected world, friction is unacceptable
• Legacy technology can and will hold you back, address it
• Realize work is an activity, not a place
• Get visibility into cloud services consumed by your users
• Legacy controls cannot keep you safe in the digital world
• Stop talking Security with your board, start talking about addressable risk
29. 28
Jason Georgi
Director, Transformation Office,
Zscaler
Learn more about transformation
Other Webcasts
Lessons for thriving - not just surviving - in the cloud
Jay Chaudhry - Zscaler & Frederik Janssen – Siemens
On Demand: zscaler.com/company/webcasts
Questions and next steps
Larry Biagini
Chief Technical Evangelist,
Zscaler
Cloud vs. On-Premises Security: Can you afford not to switch?
A review of the cost dimensions to consider when IT is making a strategic move to the cloud
On Demand: zscaler.com/company/webcasts
30. Create a frictionless experience
Protect your users from the Internet – Zscaler Internet Access
Protect your network from your users – Zscaler Private Access
Editor's Notes
I appreciate you taking the time to meet with us today. We’re very excited to share some significant changes that are happening in the industry and provide some color around how and why a lot of our customers are transforming their enterprise IT through cloud enablement.
With Zscaler fully deployed, it provides a lot of value to all key users and stakeholders.
For users we deliver a fast user experience by eliminating the latency associated with stacks of appliances and backhaul.
From a risk perspective, there is no question on the value of protection our cloud delivers.
The shift to the cloud eliminates patch management, outage windows, and vendor end-of-life issues — allowing you to focus on more important things than updating boxes.
From a financial perspective, it’s all Opex and we can optimize MPLS spend.
So if you’re looking to either improve your overall security posture or secure your mobile worker, evaluating SD-WAN transformation to simply the branch and reduce costs, deploying Office 365 and/or migrating your apps from the data center to AWS or Azure, we can help.
We are often asked where exactly Zscaler fits and what do we replace appliance-based infrastructures.
First we very carefully select 1 of the 6 security areas where we want to play in the security ecosystem. Let me walk you through these 6 areas, because with 3,000 security vendors all trying to talk the same lingo it gets very confusing in terms of who does what. We categorized them into six buckets:
Access to the Internet and cloud applications through the outbound and inbound gateway we have been talking about. We deliver all this functionality.
Data center protection. We don't really fit into trying to protect your legacy data center. You still need traditional firewall boxes and DDoS protection. We believe a majority of apps will move to the cloud and this market will eventually go away. We do however, interoperate with these vendors to create a tunnel from your edge router or firewall to our cloud.
Intelligent routing of traffic around your branch. Internet traffic is routed locally, and data center traffic is routed over MPLS. SD-WAN is getting a lot of attention as companies like to minimize the hardware footprint in the branch and simplify management. Some are driving to the Internet-only branch. We are working with these vendors to make it a checkbox to route traffic to Zscaler.
Identity and access management. It becomes extremely important in today's mobile world. We work with Microsoft ADFS, Ping, and OKTA via a SAML integration.
Endpoints. Here you may use MDM for device management, doing endpoint encryption and running AV. The challenge with AV is that malware morphs so rapidly it can’t keep up with it. That’s why a lot of companies are moving away from signature-based AV.
Rich reporting through inline traffic inspection. This last area is an important one. All the logs files are correlated in real time, providing visibility into users, apps, and threats blocked within a minute or 2 for all users around the world. Many large companies want to correlate logs across firewalls, switches and Zscaler in their SIEM. We have the ability to stream logs to a SIEM via our Nanolog streaming service (NSS).
With Zscaler it’s simple to get started. In fact, we’ve cut over 40,000 in 1 weekend night and 160,000 users over 60 days.
All you need to do to make Zscaler your next hop to the Internet is to make Zscaler your default route. A number of customers did this to block threats that were going undetected by their current security appliances without making any policy changes. Some also start by securing their mobile workers, then migrating their office locations. This allows them to take their security from a 6 or 7 to a 9 or 9.5 out of 10. No one is perfect. One ZPA customer got started with one of the uses cases before replacing their entire VPN infrastructure.
The second phase of the journey involves phasing out security appliances to reduce cost and complexity. This can be done at your pace, but more often than not, this is typically shortly after or in tandem with starting to send traffic to Zscaler.
With Zscaler in place, the third phase of the journey is about routing traffic locally via Internet breakouts to Zscaler. By routing traffic locally companies can optimize their MPLS spend and deliver a more secure and better user experience. Office 365 has been a key accelerator for local breakouts as Microsoft now recommends routing traffic locally and doing local DNS. So users are connecting to the closest Office 365 pop and on their CDN Network as fast as possible. ExpressRoute is now only recommending for very specific use cases. Microsoft also cautions against hub-and spoke-architectures with centralized proxies for a variety of reasons.