Hi [[ session.user.profile.firstName ]]

ExtraHop Webcasts & Videos

  • Date
  • Rating
  • Views
  • Stop Malicious Activity by Analyzing Network Behavior Stop Malicious Activity by Analyzing Network Behavior Chris Matthieu, Director of IoT Engineering, Citrix, John Smith, Principal Solutions Architect, ExtraHop Networks Recorded: Jan 10 2017 33 mins
    In the ever-evolving world of persistent threats to your environment the only way to keep up with malicious actors is by utilizing behavior based profiling. In this webinar, we will show how you can rethink the network to detect and remediate threats in real time. When wire data visibility from ExtraHop meets automated response from Citrix Octoblu you're able to protect your environment without having to spend all your time wading through alerts.

    This webinar is perfect for any network or security professionals who are keen to maintain optimum visibility accross their entire network, allowing them to neutralise threats and reduce vulnerabilities.

    About the presenters:

    John Smith is Solutions Architect at ExtraHop and author of the wiredata.net blog. He is a Citrix Technology Professional and 16-year IT veteran specializing in application delivery, event correlation, security, web applications, and application virtualization. John’s background gives him an invaluable perspective on the challenges facing IT, and creating new approaches to deal with them. Follow him on Twitter: @jmsazboy

    Chris was the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flows, processes and sensor data, and analyze/react to real-time events and messages as well as big data trends and anomalies.
    Follow him on Twitter: @ChrisMatthieu
  • How to Cut Your Network Troubleshooting Time in Half How to Cut Your Network Troubleshooting Time in Half Nick Brackney & Jim Sullivan Recorded: Dec 14 2016 36 mins
    Are you stuck sifting through large volumes of data on your network to find answers? There's a better way.

    See how ExtraHop can help you solve problems faster by making sense of the data in motion through your network and delivering visibility across the application delivery chain.

    This webinar is perfect for any network or security professionals who are keen to maintain optimum visibility across their entire network, allowing them to get a full view of the traffic on their network, neutralise threats, reduce vulnerabilities and improve their network infrastructure.
  • Data Center Migration: The Difference Between Anxiety and Success Data Center Migration: The Difference Between Anxiety and Success Nick Brackney - Product Marketing Manager Recorded: Dec 9 2016 22 mins
    It is critical for organizations to onboard new technologies and improve processes to remain competitive. Yet, safely navigating a migration or consolidation project can be challenging.
    The ExtraHop platform takes the guesswork out of application and data center migration by providing complete visibility and performance metrics that make clear the risks, but also support the success, of projects at any scale. By knowing before going, you can avoid unnecessary downtime and be sure that your user experiences remain consistent.
    In this webinar, ExtraHop' Nick Brackney explains how the ExtraHop platform helps to ensure successful migrations and consolidations.
  • IoT Challenges: How to Find the Answers on Your Network IoT Challenges: How to Find the Answers on Your Network Shaun Henderson & Peter Connolly, ExtraHop Networks Recorded: Nov 23 2016 20 mins
    Whether they are ready for it or not, IT Operations teams have the Internet of Things (IoT), including BYOD devices such as smart watches, added to their growing list of responsibilities.

    With employees bringing in potentially compromised devices holding malicious malware, it's time for enterprise IT to understand the environment and not just tick the security compliance box.

    On the other hand, IoT poses an opportunity for IT organizations to add significant value to the business by providing real-time operational intelligence and enterprise architecture. A new network monitoring approach called wire data analytics analyzes communications on the network to extract valuable IoT security, performance, and even operations data—and requires no agents!

    This webinar is ideal for any networking, architecture or security professional looking to improve visibility across their network, to reduce threats and vulnerabilities and especially those with a focus on the Internet of Things (IoT).
  • Backup on the Wire: Ransomware Recovery Based on Precision Packet Capture Backup on the Wire: Ransomware Recovery Based on Precision Packet Capture Tyson Supasatit & Kanen Clement, ExtraHop Networks Recorded: Nov 14 2016 18 mins
    Tyson Supasatit and Kanen Clement explain how the ExtraHop solution for ransomware detection and file recovery works.
  • The Why and How of Monitoring DICOM Performance The Why and How of Monitoring DICOM Performance ExtraHop Networks Recorded: Oct 25 2016 19 mins
    Radiology departments and medical imaging units are among the fastest-growing, most profitable services provided by healthcare organizations. DICOM (Digital Imaging and Communications in Medicine), is a binary, upper-level protocol used to store and transmit medical images. When DICOM deployments malfunction, or work slowly, patient experience suffers, and cashflow drops.

    Monitoring DICOM with an eye for performance optimization is increasingly critical for successful healthcare providers. This webinar discusses how ExtraHop can provide the visibility needed to maintain peak DICOM performance in deployments of any size.
  • ESG's 7 Core Criteria for Comparing and Evaluating ITOA Platforms ESG's 7 Core Criteria for Comparing and Evaluating ITOA Platforms Shaun Henderson & Owen Cole, ExtraHop Networks Recorded: Oct 21 2016 25 mins
    As IT environments grow more sophisticated by the day, complexity rises and many CIOs and IT directors lose visibility of their assets and clarity into each asset's performance. The unfortunate result creates IT 'black boxes,' which bring detrimental hazards to enterprise customers when changes are required or things go wrong within interdependent environments. This problem extends beyond the walls of the data center and spans all offices and mobile workers.

    According to ESG analysts' Dan Conde and Nik Rouda - "Modern monitoring must be real-time, at scale, and capable of providing visibility wherever IT assets reside. IT Operations Analytics is at the forefront of this monitoring evolution, but understanding how these often diverse technologies fit together and what benefits they deliver to IT can be complex."

    Join us for a discussion on Conde & Rouda's seven core criteria for enterprise buyers currently evaluating ITOA and monitoring platforms.
  • How to Avoid the Citrix Blame Game How to Avoid the Citrix Blame Game Colin Pittham, VP EMEA & Idjiwa Adjido, Head of Sales Engineering - ExtraHop Recorded: Sep 29 2016 29 mins
    When applications and desktops are delivered over Citrix, the Citrix administration team becomes the front-line for responding to complaints about slow performance. But more than 60 percent of the time, the root cause of the problem lies outside of the Citrix environment.

    In this webinar, you’ll learn how wire data analytics can enable Citrix administrators to not only see end-user experience for ICA sessions, but also dig into application and infrastructure performance to uncover the real reason for slowdowns.
  • Real-Time Ransomware Detection and Investigation Real-Time Ransomware Detection and Investigation Chris Abella, Technical Marketing Engineering with ExtraHop Recorded: Sep 13 2016 3 mins
    Chris Abella from Technical Marketing Engineering provides a two-minute overview of the ransomware detection and investigation solution. This demo shows how you can detect and investigate ransomware infections by observing malicious behavior on the network. This type of real-time visibility and correlation across tiers is not possible with other approaches, and also does not rely on virus signatures.

Embed in website or blog