dcsimg
eSeminars The Online Seminar Standard
logo
eSeminars Live - We bring together an elite list of editors, industry luminaries, analysts and expert panel speakers on an interactive webcasting platform.

Upcoming Events >>>

  • Aug 26, 2015

    Register

    Building the Business Case for Better Website Security

    A number of high-profile attacks on popular websites have helped move the discussion of security from the data center to the C-suite. If your organization is faced with tight budgets or is having difficulty attracting buy-in for improvements to its website security, this eSeminar provides tips that can help. Attend this live event to learn how to create the business case for upgrading website security and better understand how tighter security serves as a competitive differentiator, improves brand image, helps search engine optimization, and more.

    Read More >>>

  • Aug 27, 2015

    Register

    Time-to-Value: Conquer Your App Backlog and Bring Mobile Solutions to Market Faster

    This webcast will help IT service providers explore how leading toolsets can speed up the development process to fully leverage cloud and mobile technologies, delivering faster time-to-value and enhanced business agility. We’ll dispel many common misconceptions about mobility, and establish baselines for superior back-end systems to support both the app dev and the operational aspects of application delivery.

    Read More >>>

  • Sep 01, 2015

    Register

    State of the Internet – Security Report 2015

    Drawing on a wealth of cyber security information, Akamai's State of the Internet Report provides a distinctive view into today's online web attack trends. Akamai sees more than 2 trillion Internet interactions each day, mitigates 40 – 50 DDoS attacks each week, and scrutinizes hundreds of millions of IP addresses each month. Join this webinar to hear an overview of key findings from Q2 2015, including DDoS and web application attack trends by industry, third party plug-in vulnerabilities, and the reemergence of the RIP protocol.

    Read More >>>

  • Sep 03, 2015

    Register

    Essential Hyper-V Backup and Recovery Tips

    Businesses run on applications. The job of your infrastructure is to ensure those applications are available when users need them, which today means 24/7/365. This webinar will describe several challenges that organizations and IT professionals face on a daily basis when it comes to providing effective availability within Microsoft Hyper-V environments. You'll learn how to assess your backup and recovery needs, critically important virtual hard disk considerations, and common recovery techniques to help you manage your always-on business.

    Read More >>>

  • Sep 09, 2015

    Register

    Messaging in a Box: Messaging for the Next Decade

    Messaging is a critical capability for most businesses. IBM MQ Appliance provides the application connectivity performance of its messaging software in a physical messaging appliance. With its plug-and-play ease of deployment, your organization can achieve enterprise messaging with easier administration and better security, along with server consolidation, remote outpost deployments, and partner connectivity.

    Read More >>>

  • Sep 16, 2015

    Register

    Adapting IT in a Digital Age

    By 2018, Gartner estimates that 30% of organizations will formalize workforce digital literacy strategies to improve business outcomes and employee engagement. Supporting mobile devices and consumerized apps from a secure, tightly monitored, controlled IT system has been difficult – and risky. Yet, as more and more personal technologies invade the enterprise, the traditional IT balance will become even more outmoded, causing CIOs, IT directors, and even Human Resources professionals to rethink what is acceptable in the workplace.

    Read More >>>

  • Sep 17, 2015

    Register

    How to Sell Backup to Your CFO

    A CFO is responsible for managing financial risks, so getting their buy-in on a data backup and recovery strategy should be easy – right? But some CFOs focus on minimizing costs and see data protection as another expense from IT that spends a lot of money already. You need a plan.

    Read More >>>

  • Sep 23, 2015

    Register

    Development Platform in the Cloud - Why, What, and How

    The cloud is not just about a runtime platform for your projects – now, you can do your development in the cloud, too. Check out this upcoming webinar to learn how the cloud improves your development experience and team collaboration. Join Dana Singleterry, Principal Product Manager for Oracle Dev Tools, as she discusses how to simplify every aspect of the development lifecycle, including requirements gathering, version management, code reviews, build automation, and continuous integration. Discover how improving your team collaboration with cloud-based dev can help you deliver better applications faster.

    Read More >>>

Data Management

Lower RTOs™ with Veeam Explorers for Microsoft SQL Server, Active Directory and Exchange

Organizations are modernizing their data centers in order to provision IT services faster, strengthen security, and reduce costs. However, businesses are facing new demands from end users, including access to data and applications 24/7, no patience for downtime or data loss, and exponential data growth at 30-50% per year. This opens an availability gap between always-on user requirements and IT’s ability to effectively deliver availability.

Sponsored by Veeam

Storage

SQL Server 2014 High Availability & Disaster Recovery with Pure Storage

Microsoft SQL Server includes a high availability option called AlwaysOn Availability Groups (AGs). In this session we will see how AGs are implemented using a Windows Server Failover Cluster and SQL Server 2014 with the Pure Storage FlashArray.

Sponsored by Pure Storage

Security

CyberArk Introduces Privileged Account Security for SSH Keys

Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise.

Sponsored by CyberArk