Hi [[ session.user.profile.firstName ]]

ExtraHop Webcasts & Videos

  • Date
  • Rating
  • Views
  • How to avoid the Citrix blame game
    How to avoid the Citrix blame game Phil Swainson, Head of Technical Services, KedronUK and Peter Connolly, Systems Engineer, ExtraHop Recorded: Apr 6 2017 32 mins
    When applications and desktops are delivered over Citrix, the Citrix administration team becomes the front-line for responding to complaints about slow performance. But more than 60% of the time, the root cause of the problem lies outside of the Citrix environment.

    In this webinar, you’ll learn how wire data analytics can enable Citrix administrators to not only see end-user experience for ICA sessions, but also dig into application and infrastructure performance to uncover the real reason for slowdowns.

    Hope to see you there!

    Key words: Virtualization, Citrix, Application, AppDev, Infrastructure, Cloud Computing
  • ExtraHop + ServiceNow = Seamless IT Service Management
    ExtraHop + ServiceNow = Seamless IT Service Management ExtraHop Networks Recorded: Mar 23 2017 3 mins
    See how ExtraHop and ServiceNow combine for deeper insight, greater security, and automated remediation!
  • Panel Discussion: Cyber Security Strategies and Trends in 2017
    Panel Discussion: Cyber Security Strategies and Trends in 2017 Jeff Costlow, ExtraHop Networks; Francois Raynaud, DevSecCon; Rami Mizrahi, TopSpin Security & Josh Downs, BrightTALK Recorded: Feb 21 2017 48 mins
    These days it's not a matter of if you'll be breached, but when. Security teams in the modern enterprise must accept that as well as efforts to protect their perimeter, they must also focus on understanding their east-west traffic.

    This panel discussion will look at the trends and technologies influencing cyber security strategy in 2017, in particular those that deal with effectively monitoring your network to ensure your organisation handles vulnerabilities and stays breach free.

    Panelists:

    - Josh Downs, Community Manager - Information Security, BrightTALK (moderator)

    - Jeff Costlow, Director of Security, ExtraHop Networks

    - Rami Mizrahi, VP of R&D, TopSpin Security

    - Francois Raynaud, Founder, DevSecCon

    Tune into this panel conversation if you're a network or security professional looking to hear the latest trends and security best-practices to defend against a constantly evolving opponent.
  • Stop Malicious Activity by Analyzing Network Behavior
    Stop Malicious Activity by Analyzing Network Behavior Chris Matthieu, Director of IoT Engineering, Citrix, John Smith, Principal Solutions Architect, ExtraHop Networks Recorded: Jan 10 2017 33 mins
    In the ever-evolving world of persistent threats to your environment the only way to keep up with malicious actors is by utilizing behavior based profiling. In this webinar, we will show how you can rethink the network to detect and remediate threats in real time. When wire data visibility from ExtraHop meets automated response from Citrix Octoblu you're able to protect your environment without having to spend all your time wading through alerts.

    This webinar is perfect for any network or security professionals who are keen to maintain optimum visibility accross their entire network, allowing them to neutralise threats and reduce vulnerabilities.

    About the presenters:

    John Smith is Solutions Architect at ExtraHop and author of the wiredata.net blog. He is a Citrix Technology Professional and 16-year IT veteran specializing in application delivery, event correlation, security, web applications, and application virtualization. John’s background gives him an invaluable perspective on the challenges facing IT, and creating new approaches to deal with them. Follow him on Twitter: @jmsazboy

    Chris was the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flows, processes and sensor data, and analyze/react to real-time events and messages as well as big data trends and anomalies.
    Follow him on Twitter: @ChrisMatthieu
  • How to Cut Your Network Troubleshooting Time in Half
    How to Cut Your Network Troubleshooting Time in Half Nick Brackney & Jim Sullivan Recorded: Dec 14 2016 36 mins
    Are you stuck sifting through large volumes of data on your network to find answers? There's a better way.

    See how ExtraHop can help you solve problems faster by making sense of the data in motion through your network and delivering visibility across the application delivery chain.

    This webinar is perfect for any network or security professionals who are keen to maintain optimum visibility across their entire network, allowing them to get a full view of the traffic on their network, neutralise threats, reduce vulnerabilities and improve their network infrastructure.
  • Data Center Migration: The Difference Between Anxiety and Success
    Data Center Migration: The Difference Between Anxiety and Success Nick Brackney - Product Marketing Manager Recorded: Dec 9 2016 22 mins
    It is critical for organizations to onboard new technologies and improve processes to remain competitive. Yet, safely navigating a migration or consolidation project can be challenging.
    The ExtraHop platform takes the guesswork out of application and data center migration by providing complete visibility and performance metrics that make clear the risks, but also support the success, of projects at any scale. By knowing before going, you can avoid unnecessary downtime and be sure that your user experiences remain consistent.
    In this webinar, ExtraHop' Nick Brackney explains how the ExtraHop platform helps to ensure successful migrations and consolidations.
  • IoT Challenges: How to Find the Answers on Your Network
    IoT Challenges: How to Find the Answers on Your Network Shaun Henderson & Peter Connolly, ExtraHop Networks Recorded: Nov 23 2016 20 mins
    Whether they are ready for it or not, IT Operations teams have the Internet of Things (IoT), including BYOD devices such as smart watches, added to their growing list of responsibilities.

    With employees bringing in potentially compromised devices holding malicious malware, it's time for enterprise IT to understand the environment and not just tick the security compliance box.

    On the other hand, IoT poses an opportunity for IT organizations to add significant value to the business by providing real-time operational intelligence and enterprise architecture. A new network monitoring approach called wire data analytics analyzes communications on the network to extract valuable IoT security, performance, and even operations data—and requires no agents!

    This webinar is ideal for any networking, architecture or security professional looking to improve visibility across their network, to reduce threats and vulnerabilities and especially those with a focus on the Internet of Things (IoT).
  • The Why and How of Monitoring DICOM Performance
    The Why and How of Monitoring DICOM Performance ExtraHop Networks Recorded: Oct 25 2016 19 mins
    Radiology departments and medical imaging units are among the fastest-growing, most profitable services provided by healthcare organizations. DICOM (Digital Imaging and Communications in Medicine), is a binary, upper-level protocol used to store and transmit medical images. When DICOM deployments malfunction, or work slowly, patient experience suffers, and cashflow drops.

    Monitoring DICOM with an eye for performance optimization is increasingly critical for successful healthcare providers. This webinar discusses how ExtraHop can provide the visibility needed to maintain peak DICOM performance in deployments of any size.
  • ESG's 7 Core Criteria for Comparing and Evaluating ITOA Platforms
    ESG's 7 Core Criteria for Comparing and Evaluating ITOA Platforms Shaun Henderson & Owen Cole, ExtraHop Networks Recorded: Oct 21 2016 25 mins
    As IT environments grow more sophisticated by the day, complexity rises and many CIOs and IT directors lose visibility of their assets and clarity into each asset's performance. The unfortunate result creates IT 'black boxes,' which bring detrimental hazards to enterprise customers when changes are required or things go wrong within interdependent environments. This problem extends beyond the walls of the data center and spans all offices and mobile workers.

    According to ESG analysts' Dan Conde and Nik Rouda - "Modern monitoring must be real-time, at scale, and capable of providing visibility wherever IT assets reside. IT Operations Analytics is at the forefront of this monitoring evolution, but understanding how these often diverse technologies fit together and what benefits they deliver to IT can be complex."

    Join us for a discussion on Conde & Rouda's seven core criteria for enterprise buyers currently evaluating ITOA and monitoring platforms.

Embed in website or blog