Webinars and Other Events

CLOUD CON  EXPO 2013  

CloudAccess CEO Kevin Nikkhoo will be on the  panel Challenges of Cloud Computing in Highly Scalable and Secure Enterprises at the upcoming CloudCon Expo in San Francisco.

WEDNESDAY MAY15 3:30 PDT    REGISTER

Challenges of Cloud Computing in Highly Scalable and Secure enterprises

Learn how to better manage assignment of workloads to resources via API, giving you tight control for security and easy agility to horizontally scale up your horizontally scaled components, allowing you to allocate your ‘reserve capacity’ for alternate uses when you are not at peak. The approach enables the need for agility without large number of assets sitting idle or at very low utilization ratio.

.

.

BACK BY POPULAR DEMAND!!

THREATS AND CLOUD-BASED COUNTERMEASURES

THURSDAY MAY10 10:00 PDT    REGISTER

REGISTER EARLY BECAUSE WE MAXED OUT LAST MONTH!!!!!

Hundreds of thousands of times every day, your IT environment is being probed, prodded and in some cases attacked. And these attacks are getting more and more advanced. Current research suggests only about 40% of new Malware even gets detected. It’s not a question of if your network will be attacked, but when and how will you respond.

Using cloud-based tools, explore how to identify, prioritize and neutralize some of the  growing threats to the security of your IT landscape. Join OUR cloud security experts  as they dissect several of the most pressing current risks that plague systems today and share cloud-based strategies to best combat these looming threats.

  • Malicious hackers or online activists?
  • Regulatory or industry requirements?
  • Malware, viruses or botnets?
  • Attacks from within?
  • New unregulated technologies like smartphones

Traditional risk management and security initiatives may not be sufficiently agile to deal with the potential impacts from activity in cyberspace

EVERYTHING I KNOW ABOUT CLOUD SECURITY I LEARNED FROM STAR TREK:

WEDNESDAY MARCH 21 10:30

Cloud-based security is the new frontier for forward-thinking enterprises, and as a new paradigm some definitive best practices are emerging. Interestingly enough, those lessons can be traced back to a show that shaped many of our interest in computing…StarTrek. Take a voyage to the next frontier of security best practices.

Join us for an informative and fun, FREE 45-minute presentation/ roundtable to boldly go where IT asset protection is headed.

– Does your strategy have a Prime Directive?
– How do Tribbles figure in your security configuration?
– Which Spock runs your SIEM initiative…the one with or without the beard?

REGISTER

Miss the event? When you follow this blog, we’ll send you the recorded link

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s