Monitoring infrastructure is a crucial function in any datacenters. Due to the complexities involved, IT administrators have traditionally either requested services from consultant firms or bought pre-packaged Management Packs to monitor their infrastructure. Come learn what new options are available for IT administrators that make it possible to create robust management packs that adapt to the needs of your business.
With the upcoming release of Windows 10, there will new and updated ways to deploy Windows. In this session, we’ll review new recommendations for upgrading existing devices using a simple in-place upgrade process, provisioning tools for transforming new devices into ones ready for enterprise use, as well as updates to traditional deployment tools and techniques (ADK and beyond). We’ll also talk about application compatibility, hardware requirements, and other common deployment questions.
Today we are able to see a clear shift in how enterprises are targeted by malware engineers. The attack landscape has adapted to the new world and they now perform targeted attacks, especially over the social networks. Because guess what? The CEO, CTO, or even the girl next door has a social network account. Join this session and explore how social engineering has grown over time and examine lessons learned from the field on how to best mitigate those traps.