Hi [[ session.user.profile.firstName ]]

Business Continuity / Disaster Recovery

  • Latest trends revealed: The 2016 BCI Emergency Communications Report Latest trends revealed: The 2016 BCI Emergency Communications Report Owen Miles (Everbridge) & Patrick Alcantara DBCI (BCI) Recorded: Jan 17 2017 59 mins
    The Business Continuity Institute (BCI) has just published its latest research project, The Emergency Communications Report. The annual report surveyed over 600 industry professionals, reviewing emergency communications and security incident response plans for organizations around the world. This year’s findings revealed that global businesses are increasingly aware that true business resiliency is a company-wide initiative that involves taking accountability for the safety of all staff—whether they are located in the office, at home or on the road. Respondents indicated that a diversity of departments, including business continuity, IT, security, facilities, HR and more had a stake in the management, planning and enforcement of their organization’s emergency communications plans, but that an opportunity exists to optimize these processes to account for a global, mobile workforce, as well as the increased complexity and frequency of critical events and physical security incidents.

    Join Owen Miles, Managing Consultant from Everbridge, and Patrick Alcantara DBCI, Senior Research Associate at the BCI and the author of the report, for an engaging webinar that will discuss the research findings and share additional best practices for critical communications.
  • Information Security and Cyber Risk Information Security and Cyber Risk Ian Beale and Richard Cross Recorded: Jan 17 2017 60 mins
    The continued growth in size and frequency of costly data breaches has increased the pressure on senior leadership and Boards of Directors to take a rigorous approach to understanding and managing cyber security risk. With this in mind, ERM teams are being asked to weigh in the organization’s response to these risks. Join this webinar to learn from CEB how your peers manage and report on cyber security risks and work with their Information Security counterparts to ensure that their organisations are prepared for the inevitable cyber-attack.
  • Office 365 and SaaS Optimization with SD-WAN Office 365 and SaaS Optimization with SD-WAN Ramesh Prabagaran, VP Product Management & Lloyd Noronha, Head of Global Marketing, Viptela Recorded: Jan 16 2017 47 mins
    Gartner’s recent research revealed that 78% of organization are using or plan to use Office 365, and by 2019 half of the global deployments will face network related problems. Limited WAN optimization capability further complicate the problems and presents a major performance and productivity challenge for Office 365 and all SaaS applications.

    SD-WAN provides an essential set of features that solves the networking issues related to Office 365 and SaaS applications. This webinar will cover the following major topics:

    - How traditional networks impair O365 performance, and why?
    - Why enterprises overlook the importance of strategically placing cloud gateways
    - Understanding tradeoffs among reliability, performance and user-experience when architecting the WAN for your cloud
    - Best practice architectures for different kinds of SaaS applications
  • Analyst Keynote: Research Insights on the Next Generation WAN (EMA Research) Analyst Keynote: Research Insights on the Next Generation WAN (EMA Research) Shamus McGillicuddy, Senior Analyst, EMA Research Recorded: Jan 16 2017 40 mins
    Join Analyst Shamus McGillicuddy (EMA Research) as he provides insight from the research of 200 networking professionals into how enterprises are utilizing Software-Defined WAN (SD-WAN) and transforming their business connectivity.

    Going in detail on the survey results, Shamus will walk you through the key trends in SDN and SD-WAN across major enterprises. These include the major application performance issues, operational challenges, cloud migration hurdles and reasons for rapid SD-WAN adoption.

    Some of the key discussion topics will include:
    - What percentage are transitioning from MPLS to Hybrid, and why?
    - How pervasive is 4G/LTE in the WAN?
    - How Cloud migration affects WAN infrastructure teams?
    - What are the major drivers for NFV services?
    - How important is WAN optimization?
    - What are the characteristics of major organizations deploying SD-WAN?
    - What are the major tools to monitor and manage SD-WAN?

    Preview of some of the results:

    - 96% of enterprises say they use wireless as the primary network connectivity in at least some of their sites (4G/LTE is the most common wireless technology, followed by carrier/municipal Wi-Fi)
    - Only 52% of enterprises monitor their WAN provider’s service-level agreements (SLAs)
    - 30% say their service providers have violated an SLA in the past year

    The wide area network (WAN) is the essential infrastructure component to driving global communication, collaboration and data access across enterprise networks. Enterprises have been deploying traditional architectures but with increased cloud adoption and high bandwidth demands, a new architecture of connectivity is needed. IT organizations across the globe have begun adopting SD-WAN to address their new connectivity requirements.
  • Voice of the Customer: First American SD-WAN Transformation Voice of the Customer: First American SD-WAN Transformation CJ Metz, Senior IT Manager Network Engineering, First American & Archish Dalal, Senior Systems Engineer, Viptela Recorded: Jan 16 2017 48 mins
    Learn how one of the largest title insurance companies in the US is deploying Viptela SD-WAN to eliminate the word “backup” from their vocabulary.

    In this session, CJ Metz of First American will discuss how their transformative strategy for the Wide Area Network (WAN) simplifies compliance and enables resiliency for their enterprise. He will cover the business drivers and demonstrate the viability of broadband usage for critical enterprise applications.

    First American is able to reduce long term costs while boosting availability and performance at their branches; making them more resilient for business continuity in any economy.
  • Empowering Employee Productivity in the Digital Age Empowering Employee Productivity in the Digital Age Michal Gideoni, Director Product Marketing | Kyle Minar, Product Marketing Manager Recorded: Jan 16 2017 43 mins
    The 4th industrial revolution is upon us. Digital transformation is quickly becoming the most important factor of a company’s ability to compete in the fastest and most disruptive period in our history. It’s time to start asking the tough questions. How do I implement tools to enable our employees to achieve more together? How do I make sure we are optimizing mobile teams and networks without opening ourselves up to security, compliance and privacy risks? How do I get the information I need quickly to make decisions that will shape the future of my business? In this session you will learn how Microsoft is bridging the gap between people and technology with Office 365, Skype for Business, and Intelligent productivity tools, all with the built-in security, privacy and compliance you’ve come to expect.
  • Drive Customer Growth and Business Success with Cloud Business Applications Drive Customer Growth and Business Success with Cloud Business Applications Eanna Sarah, Tom Yang Recorded: Jan 16 2017 28 mins
    Hear how we’re delivering a new approach to business applications, through a single cloud service of purpose-built apps that will help you manage specific business functions.
    Turn your customers in to fans by reinventing your Sales, Customer Service, Finance, Field Service, Operations, Marketing and Project Service Automation processes. This completely integrated platform includes Productivity and Reporting tools, Internet of Things, and is also extensible through its own easy to use graphical development and workflow tools, allowing IT professionals to implement, build and deploy a new level of functionality for a wide range of business processes, using world-class technology.
  • Data Protection Everywhere Data Protection Everywhere Paul St. Vil and David Lombardi Recorded: Jan 12 2017 52 mins
    In this session learn how Dell EMC's most recent technical developments can enable you to solve the most difficult data protection challenges of today while laying the foundation to address the challenges of tomorrow. Our discussion topics will span protecting mission critical applications, virtualized environments, and next-gen apps. Additionally, we’ll discuss our capabilities when protecting workloads ‘Born in the Cloud’ or ‘Living in the Cloud’.
  • PCI DSS v3.2. A Fast Assessment to Identify What You Must Do to Comply PCI DSS v3.2. A Fast Assessment to Identify What You Must Do to Comply David Kim. ITPG Secure Compliance. SVP, Governance Risk and Compliance Recorded: Jan 12 2017 53 mins
    Your organization has little over a year to comply with the new PCI DSS v3.2 standard. If you have yet to assess your current security controls against these new standards, it’s time to start. We’ll highlight the key changes, the issues to think about, and the time required to assess, plan and implement. As a PCI Qualified Security Assessor, we know what can trip organizations up and how to avoid missteps.
  • How To Design High Performance, Cost Effective Splunk Storage How To Design High Performance, Cost Effective Splunk Storage George Crump, Storage Switzerland Recorded: Jan 12 2017 57 mins
    Splunk does an excellent job of managing data, moving data between tiers which it calls buckets. But assigning Splunk to data management tasks takes compute power away from the primary objective — rapid data analysis. In this live webinar Storage Switzerland and Tegile will discuss how the default Splunk architecture works today, what the challenges with that architecture are and how to design a storage architecture for Splunk that is both high performance and cost effective.
  • Big data storage: Options and recommendations Big data storage: Options and recommendations Jagane Sundar, WANdisco CTO Recorded: Jan 11 2017 41 mins
    Hadoop clusters are often built around commodity storage, but architects now have a wide selection of Big Data storage choices, including solid-state or spinning disk for clusters and enterprise storage for compatibility layers and connectors.

    In this webinar, our CTO will review the storage options available to Hadoop architects and provide recommendations for each use case, including an active-active replication option that makes data available across multiple storage systems.
  • Meet DataCore: Data Infrastructure for Next-Generation Data Centers Meet DataCore: Data Infrastructure for Next-Generation Data Centers Tara Callan, Marketing Manager, DataCore Software Recorded: Jan 10 2017 25 mins
    We think differently. We innovate through software and challenge the IT status quo.

    We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.

    DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.

    Join this webinar to meet DataCore, learn about what we do and how we can help your business.
  • Financial Impact of Data Breaches Financial Impact of Data Breaches Roger J. Francis, Senior Consultant at Mandiant, a FireEye company Recorded: Jan 10 2017 49 mins
    Cyber threats are constantly evolving, increasing in both sophistication and how they impact victims. In today’s world, you must battle a wide range of adversaries, from hacktivists to state-sponsored threats. The most significant of these threats are advanced attackers who carefully plan and execute breaches into victim organisations.

    In this live webinar, Roger J. Francis, Senior Consultant at Mandiant, a FireEye company, will discuss real-world incidents and steps organisations should take to minimise the financial impact of a data breach.
  • Latest trends revealed: Business in blockchain Latest trends revealed: Business in blockchain Pradeep Prasad Recorded: Jan 7 2017 60 mins
    Despite many business and technology innovations, business frictions still exist. Key business frictions drive delays, costs and risks.
    In this presentation, we examine the dimensions of business friction and attributes of blockchains that can break the status quo. Blockchains can vaporize business frictions, redefining the structure of future business networks and creating new opportunities for business transformation
    As this transformation unfolds, three things will change: a new science of organizational management, the tightening of trust and a new nexus for value exchange will emerge

    And finally, as companies seize the opportunity available to them, businesses can take few steps to best extract value from blockchains. And as the risk of doing business reduces, as the risk of formal financial reporting reduces, Business Continuity and Resilience is assured. Disaster Recovery becomes key to ensuring Blockchain delivers on its promise.

    Join Veteran Commander Pradeep Prasad, Chairman of BCI Bengaluru Forum for an engaging webinar that will demystify Blockchain for the audience.
  • How Signalhorn helps St. Claus to deliver in the 21st century How Signalhorn helps St. Claus to deliver in the 21st century Chris Kubbernus Recorded: Dec 20 2016 36 mins
    How do you connect your company to the world if it’s located in the most remote place on Earth? In the 21st century, it doesn’t matter where you are, being “always connected” is vital to your business.

    In this special Holiday Edition webinar, you will learn how Santa Claus successfully uses advanced technology in the digital era, to overcome all communication challenges. When he’s travelling on his sled around the world or sitting by the fireplace in his little house at the North Pole, Santa stays connected to keep the business running.

    And best of all, you don’t need to be Santa Claus to benefit from the best engineered communication solutions for your company.
    Join us to learn how!
  • Security in 2017 and Beyond: Symantec’s Predictions for the Year Ahead Security in 2017 and Beyond: Symantec’s Predictions for the Year Ahead Nick Savvides, Manager, Cyber Security Strategy, Asia Pacific & Japan, Symantec Corporation Recorded: Dec 20 2016 64 mins
    2017 will see even more IoT devices introduced into business networks, along with an increasingly mobile workforce enabled by cloud applications and services. This rapid evolution of the workplace necessitates a re-look at where the security industry should focus on, in the ongoing battle against cybercriminals.

    As 2016 comes to an end, our Security Intelligence team have compiled a list of the top security predictions for 2017 and beyond.

    Attend our ‘Security in 2017 and Beyond: Symantec’s Predictions for the Year Ahead’ webinar and join our discussion of the upcoming threat landscape.
  • Delivering SLA for Critical Applications using SD-WAN Policies Delivering SLA for Critical Applications using SD-WAN Policies Lloyd Noronha - Head of Global Mktg., David Klebanov - Dir. Technical Mktg. Recorded: Dec 19 2016 41 mins
    The major benefits of the SD-WAN technology is a single overlay architecture with centralized policy & management. As more enterprises deploy SD-WAN at large scale, one important question is how can network administrators guarantee performance and resiliency of critical enterprise applications – even during outages and unpredictability of the physical links.
    Webinar Highlights:
    1. Hear about the Viptela SD-WAN architecture that implements a single, software overlay over MPLS, Broadband & LTE
    2. Understand how the SD-WAN architecture provides centralized policies for critical applications
    3. Learn how the network detects network quality changes and enforces traffic steering in real-time based on SLA requirements
    4. See a live demo of applications getting steered in real-time based on network outage and SLA
  • SD-WAN Migration Best Practices SD-WAN Migration Best Practices Ramesh Prabagaran - VP Product Mgmt., Lloyd Noronha - Head of Global Mktg., David Klebanov - Dir. of Technical Mktg. Recorded: Dec 16 2016 44 mins
    In SD-WAN migrations, how do enterprises identify the pilot sites? And how do they plan the large-scale rollouts. There are important planning considerations in both small and large scale migrations. This webinar will explain how different enterprises have executed their rollouts and the lessons learned.
    Webinar Highlights
    - Case studies on how different enterprises have approached their SD-WAN migration
    - Planning your migration with the first five pilot sites
    - Executing a large scale migration of ten, hundred or thousands of sites based on templates and centralized policy
    - Role of the single overlay architecture over MPLS, Broadband & LTE in a seamless WAN transformation
  • 5 Steps to a Stress-Free Archive Migration 5 Steps to a Stress-Free Archive Migration Archive360 Migration Specialist Bob Spurzem & Mimecast Archiving Specialist Achmad Chadran Recorded: Dec 15 2016 57 mins
    A new generation of archiving platforms delivers unprecedented levels of performance, scale, and versatility to meet today’s challenges of protecting, securing, and preserving email.

    Unfortunately, many organizations still rely on archaic legacy platforms for fear that migration will put data at risk, take too much time, or exceed available budgets.

    Register for our webinar, 5 Steps to a Stress-Free Archive Migration. Archive360 Migration Specialist Bob Spurzem and Mimecast Archiving Specialist Achmad Chadran will use specific customer examples to show how you can minimize risk and cost as you consolidate your archives.

    In this webinar, you’ll learn:

    - How delaying migration can actually increase your costs and risks
    - What makes a chain of custody report mission-critical
    - Why every successful migration project starts by analyzing the legacy archive
  • What It Means To Move Your Email To The Cloud What It Means To Move Your Email To The Cloud Achmad Chadran, Mimecast Archiving Specialist Recorded: Dec 15 2016 51 mins
    Do you know all the risks of moving your email to the cloud? Cloud email is still vulnerable to attacks and data loss, and 32% of companies don’t have policies or systems preventing employees from deleting important content.*

    Think you don’t need to mitigate these risks? Snap out of it!

    Join Achmad Chadran, Mimecast Archiving Specialist, for What It Means to Move Your Email to the Cloud, an insightful look at the threat landscape faced by companies adopting Office 365™ and other cloud platforms, and how to harness best-in-class archiving solutions to neutralize those threats.

    In this webinar, you’ll learn:

    - What you get – and don’t get – from cloud email services
    - How to move email to the cloud without putting all your eggs in one basket
    - What must-haves to demand from your archiving solution provider

    *Osterman Research, North American Market for Electronic Content Archiving, 2016.
  • Pain-Free Archiving – The Mimecast Difference Pain-Free Archiving – The Mimecast Difference Achmad Chadran, Archiving Product Specialist & Bob Adams, Sales Engineer Recorded: Dec 15 2016 36 mins
    Three email megatrends are reshaping business today: accelerating growth, spiraling e-discovery, and migration to the cloud. These forces can overwhelm an outdated or ineffective archiving solution.

    Join Mimecast for Pain-Free Archiving – The Mimecast Difference, an in-depth webinar featuring a tour of Mimecast’s archiving tools.

    In this webinar, you’ll discover:

    - What makes the Mimecast archiving experience exceptional for administrators and end users
    - How MIME|OS and grid-computing architecture delivers unparalleled scale, performance, and lifecycle advantages
    - Why Mimecast’s customer renewal rate exceeds 90% year after year
  • KPIs: Aligning Your IT and Business Objectives KPIs: Aligning Your IT and Business Objectives Tricia Pattee, Vice President of Product, HOSTING Recorded: Dec 15 2016 33 mins
    At HOSTING, we understand the importance of setting up success criteria (KPIs) to measure your IT team’s impact (value) in direct partnership with the business.

    Join me, Tricia Pattee, Vice President of Product at HOSTING, for KPI: Aligning Your IT and Business Objectives, a live webinar in which I’ll discuss common problem areas that companies experience when trying to align their IT teams and business departments. I’ll go over:

    - How to define IT objectives
    - Common challenges
    - Common Approach Challenges
    - Common Tool Challenges
    - Proposed Strategies
  • The Art of Storage Management The Art of Storage Management George Crump, Curtis Preston Recorded: Dec 15 2016 62 mins
    Any organization that takes a moment to study the data on their primary storage system will quickly realize that the majority (as much as 90 percent) of data that is stored on it has not been accessed for months if not years. Moving this data to a secondary tier of storage could free up massive amount of capacity, eliminating a storage upgrade for years. Making this analysis frequently is called data management, and proper management of data can not only reduce costs it can improve data protection, retention and preservation.
  • Optimizing Data Protection for VCE VxRail Appliance Optimizing Data Protection for VCE VxRail Appliance Alex Almeida Recorded: Dec 15 2016 53 mins
    VCE VxRail Appliance with Dell EMC data protection provides simple, fast and efficient protection of data and applications regardless of where they live, against whatever might happen, and at the right service level based on business value.
  • SQL Server: Understanding Your Options for Disaster Recovery & High Availability SQL Server: Understanding Your Options for Disaster Recovery & High Availability Matt Aslett, 451 Research; Midd Carmack and Mike Donaghey, TierPoint Recorded: Dec 15 2016 41 mins
    Join Midd Carmack, Product Manager and Mike Donaghey, Manager of Database Administration at TierPoint along with Matt Aslett, Research Director for Data Platforms and Analytics at 451 Research, as they discuss the latest high availability capabilities in SQL Server 2016, how to architect to take full advantage of those features, and implications for a robust disaster recovery plan.

    Midd brings over 20 years of IT Infrastructure, Operating System and Database administration and product management experience to the discussion and will provide an overview of TierPoint as a Managed Services Provider and the company’s Hybrid IT strategy.

    Matt will explore the latest high availability capabilities in SQL Server 2016, including database mirroring, log shipping, availability groups, and failover clustering. In addition to reviewing the capabilities of each of these approaches, this session will also include a perspective on their relative merits and use-cases. Matt will also explore the drivers for managed database services, versus hands-on database administration, in delivering the goals of a database high availability strategy.

    Mike’s experience spans 15 years working with managed database clients to design and manage SQL implementations for a variety of industries, including healthcare, financial and manufacturing. Mike will offer technical perspective on implementing SQL capabilities to optimize disaster recovery protection and budget considerations. He will use case study examples describing the challenges and business requirements for a variety of SQL installs, along with strategies for solving those problems using the DR/HA features available with SQL Server today.
  • Packet Pushers Open Mic: Real SD-WAN Challenges Live Q&A Packet Pushers Open Mic: Real SD-WAN Challenges Live Q&A Ethan Banks & Greg Ferro, Analysts and Co-Hosts of Packet Pushers Jan 17 2017 5:00 pm UTC 45 mins
    What is the reality of deploying an SD-WAN? Does it really work? What are the traps, tricks, and stumbles that you need to look for?

    Ethan and Greg from the Packet Pushers will be hosting engineers who have deployed Viptela SD-WAN solutions and will be taking questions from a live audience.

    Analysts Greg Ferro and Ethan Banks, on their show “Three Real-World SD-WAN Deployments”, have interviewed many network engineers who have executed large SD-WAN projects in retail, financials, healthcare, and energy. These include companies like Kindred Healthcare, Freedom Pay, Gap, Visa, Bloomberg, Seventy Seven Energy, Greenhill, and more. They will share some of their learnings on this Live session and then open a lively discussion of everything SD-WAN.
  • A Deep Dive into StorNext 5.4 A Deep Dive into StorNext 5.4 Dave Frederick, Sr. Director of Product Marketing - Quantum and Nick Elvester, Sr. Product Manager Jan 17 2017 6:00 pm UTC 60 mins
    Quantum's StorNext 5.4 brings new levels of performance, efficiency, flexibility and compatibility to media storage and data management. Enhancements include more tiering options, support for integrated applications, and even faster network connectivity.
  • Analyst Keynote: Building the SD-WAN Business Case (Nemertes Research) Analyst Keynote: Building the SD-WAN Business Case (Nemertes Research) John Burke, Principal Analyst and CIO at Nemertes Research Jan 17 2017 6:00 pm UTC 45 mins
    SD-WAN’s transformational potential is not enough. IT teams have to build a compelling business case for making the transition. Savings from MPLS is not the only avenue by which SD-WAN can drive ROI. By providing cheaper and more transparent and automatic failover when WAN links fail, SD-WAN can reduce branch WAN outages and troubleshooting costs by 90%.

    By working with multiple vendors and enterprises, Nemertes has developed and validated an SD-WAN cost model that enables enterprise users to build that business case base on multiple key factors.

    Join Principal Research Analyst and CIO John Burke of Nemertes Research as he presents his latest research findings. These include:

    - The cost-model applied to three real SD-WAN use cases
    - The process for identifying locations that could benefit from higher bandwidth, lower rates, increased reliability, or all three
    - The cost components of connectivity, capex, troubleshooting and more.
    - The comparison between Overlay SD-WAN and In-Net WAN
  • Voice of the Customer: Kindred Healthcare SD-WAN Transformation Voice of the Customer: Kindred Healthcare SD-WAN Transformation Eyvonne Sharp, Network Engineer, Kindred Healthcare Jan 17 2017 7:00 pm UTC 45 mins
    Healthcare IT teams have sophisticated needs for SD-WAN, specifically for reliability, security and agility in M&A integration. In this webinar, Kindred Healthcare will reveal their evaluation criteria, process of migration to SD-WAN, and the results.

    Jointly presenting with Palo Alto Networks and Viptela, Kindred will explain in detail the plans and deployment experiences across hospitals, nursing centers, and contract rehabilitation in the US. Kindred is the largest diversified post-acute healthcare provider in the US, and has doubled in the last four years.

    Key Results:
    - Application performance improvement from 4x to 10x at Nursing facilities and Home clinics
    - 700% bandwidth increase
    - Estimated 5-year ROI in Millions
    - Solving complex requirements of M&A and new services in efficient and simple way

    SD-WAN Feature Requirements for Healthcare:
    - Policy based, application-aware routing over multiple, diverse connections
    - Intelligent routing based on network health & application requirements
    - Network segmentation & isolation (Multi tenant/Security)
    - Centralized policy administration & device management
    - Ability to selectively route specific traffic through security appliances (Service Chaining)
    - Application aware traffic shaping
    - Centralized provisioning feature, or zero touch methodology
    - Multiple Ethernet, MPLS or LTE connectivity options
  • VMware: A Virtual Edge Solution for Managed Branch Services VMware: A Virtual Edge Solution for Managed Branch Services Vanessa Little, Sr. Manager Global NFV EcoSystem Architecture, VMware & Ariful Huq, Product Management, Viptela Jan 17 2017 8:00 pm UTC 45 mins
    vCloud NFV is an open, carrier-grade NFVI platform. It delivers a tightly integrated solution with virtual compute, storage and networking resources coupled with intelligent operations and management capability.

    Viptela SD-WAN has achieved VMware Ready Status for NFV. SD-WAN solutions, on vCloud NFV, enable service providers to deliver elastic bandwidth, advanced services and greater flexibility in terms of cost and QoS. The Viptela SD-WAN platform opens up new opportunities for service providers by unifying WAN connection management (MPLS, Internet and 4G/LTE), segmenting traffic, providing zero touch provisioning and supporting application aware routing for enterprise customers.

    This webinar will highlight the key elements of vCloud NFV and SD-WAN in providing a fully packaged solution for Service Providers including:

    - How to accelerate and automate instantiating, provisioning and managing of virtual network services (including SD-WAN)
    - Deliver carrier-grade network availability and multi-tenancy
    - Provide advanced networking and security VNFs including switching, routing, QoS and monitoring
    - Enable single pane of glass visibility, monitoring and policy based automation
  • Auditing Neglected Critical Infrastructure Auditing Neglected Critical Infrastructure Ian Whiting - CEO Titania Group Jan 18 2017 2:00 pm UTC 30 mins
    Key network infrastructure devices are overlooked yet they provide critical functionality. Exploiting web application weaknesses and service buffer overflows is exciting, but the housekeeping of network infrastructure is not. Issues in network infrastructure devices can lead to network wide problems that would cause system admininstration nightmares. This presentation provides a review of key security devices, often side-lined when looking at security. It covers the value of these devices to "Blue Teams", issues "Red Teams" can highlight, desired outcomes and auditing practices.
  • Live Demo: Top Deployed SD-WAN Use Cases Live Demo: Top Deployed SD-WAN Use Cases David Klebanov, Director of Technical Marketing, Viptela Jan 18 2017 5:00 pm UTC 45 mins
    This live demo will cover the major use cases of SD-WAN that are applicable to both large and small enterprise scenarios. These include:

    - Brownfield deployment: Inserting SD-WAN into an existing MPLS WAN (i.e. creating an overlay over MPLS and Broadband)
    - Enabling segmentation, service insertion and extranet policies for a business partner network
    - Extending the WAN to the Cloud (AWS/Azure)
    - Enabling on-prem security with Palo Alto Networks (service chaining)
    - Defining Application-Aware policies for guaranteed SLA (real-time traffic steering with QoS)
    - Enabling cloud-security capabilities with Zscaler (service chaining)
    - Defining policies for predictable access to Office 365 and other SaaS applications

    The foundational technology elements of SD-WAN that will be covered include:

    - Single overlay over MPLS, Broadband and LTE
    - Overlay routing with OSPF, BGP, VRRP and IGMP
    - Deep packet inspection (DPI) policies
    - Authentication, encryption, PKI
    - Zero-touch provisioning
    - Segmentation and per-segment topologies
    - Service insertion and service chaining
    - Virtualized elements for Cloud (IaaS+PaaS)
    - Cloud-security and on-prem security integration
    - Integrated Management and third-party management with SNMP, NetConf, and RESTful interfaces
    - Internet gateways (DIA, Regional Exit, Centralized exits)
  • Verizon: Banking, Manufacturing, and Healthcare Case Studies in Managed SD-WAN Verizon: Banking, Manufacturing, and Healthcare Case Studies in Managed SD-WAN Mark Hollman, Managed and Professional Services, Verizon & Lloyd Noronha, Head of Global Marketing, Viptela Jan 18 2017 6:00 pm UTC 45 mins
    Verizon has some of the largest global SD-WAN deployments based on Viptela technology. We investigate the lessons learned and best practices employed in some SD-WAN deployments in the banking, healthcare and manufacturing verticals.
  • Escaping the Storage Licensing Money Pit Escaping the Storage Licensing Money Pit Dave Wright - Vice President & General Manager, NetApp SolidFire and Tim Stammers - Senior Storage Analyst, 451 Research Jan 18 2017 7:00 pm UTC 60 mins
    The tables have been stacked against storage buyers for decades, but a change is coming. Forget the endless refresh treadmill of monolithic storage systems, and licensing models that are not just inflexible, but also force you to pay again and again for the same technology. Join this webinar to learn how to liberate your storage budget, and pay for storage the way that suits your business rather than the vendors, with 451 Research senior analyst Tim Stammers, and NetApp SolidFire’s Vice President & General Manager, Dave Wright.
  • CA Technologies: Advanced Monitoring and Management of SD-WAN CA Technologies: Advanced Monitoring and Management of SD-WAN Tim Diep, Director of Product Management, CA Technologies & Jeremy Rossbach, Sr. Product Marketing Manager, CA Technologies Jan 18 2017 7:00 pm UTC 45 mins
    How does SD-WAN shift the status quo for the Operations teams? SD-WAN technology possesses sophisticated, in-built capability for operations and management, and advanced automation to address network problems in real-time. However, the Operations teams needs to seamlessly integrate this network and health status intelligence from their new SD-WAN infrastructure into their existing monitoring and management infrastructure.

    Additionally, monitoring solutions must provide visibility across all network architectures including highly dynamic and complex hybrid clouds and other SDN elements.

    This session covers the integration of CA Virtual Network Assurance and CA Performance Management with Viptela SD-WAN. The key topics that will be discussed include:

    - Eliminating visibility gaps between traditional networks and SD-WAN providing administrators with insights to optimize and transform their large hybrid networks
    - Providing relationship mapping of major IT events
    - Visualizing physical and logical dependencies in applications and service chains
    - Extending visibility for operators with network performance monitoring across cloud, SDN and SD-WAN networks (including service chains)
    - Enabling operational insight into how all elements of traditional and overlay networks affect service integrity
  • Addressing Hybrid Network Challenges in Asia Pacific with Software-Defined WAN Addressing Hybrid Network Challenges in Asia Pacific with Software-Defined WAN Hoo Shu Yee, Product Director, Singtel & Ramesh Prabagaran, VP Product Management, Viptela Jan 19 2017 6:00 am UTC 60 mins
    With APAC’s varying stages of infrastructure development, managing an enterprise Wide Area Network (WAN) in the region can be extremely challenging. This is compounded by different networking standards and service level agreements (SLAs) across countries, as well as disparities in race and culture.

    Furthermore, as more applications move onto the cloud and employees become more mobile, enterprises have to deal with growing risk of cyber attacks with increasingly complex WAN environments that combine multiple private networks and public internet services.

    In this webinar, learn more about managing an enterprise network in APAC. We will touch on how:

    - To address potential challenges with WAN architectures evolving to hybrid networks
    - To optimise and accelerate connectivity to the cloud
    - Software-Defined WAN (SD-WAN) works and helps you manage your hybrid network more effectively
    - Enterprises have leveraged SD-WAN to increase efficiency and reduce cost

    Lastly, find out how Singtel ConnectPlus SD-WAN service powered by Viptela, designed with security in mind, can help to simplify and unify your networks, while providing protection against data breaches and attacks.
  • Addressing Hybrid Network Challenges in Asia Pacific with Software-Defined WAN Addressing Hybrid Network Challenges in Asia Pacific with Software-Defined WAN Hoo Shu Yee, Product Director, Singtel & Ramesh Prabagaran, VP Product Management, Viptela Jan 19 2017 5:00 pm UTC 60 mins
    With APAC’s varying stages of infrastructure development, managing an enterprise Wide Area Network (WAN) in the region can be extremely challenging. This is compounded by different networking standards and service level agreements (SLAs) across countries, as well as disparities in race and culture.

    Furthermore, as more applications move onto the cloud and employees become more mobile, enterprises have to deal with growing risk of cyber attacks with increasingly complex WAN environments that combine multiple private networks and public internet services.

    In this webinar, learn more about managing an enterprise network in APAC. We will touch on how:

    - To address potential challenges with WAN architectures evolving to hybrid networks
    - To optimise and accelerate connectivity to the cloud
    - Software-Defined WAN (SD-WAN) works and helps you manage your hybrid network more effectively
    - Enterprises have leveraged SD-WAN to increase efficiency and reduce cost

    Lastly, find out how Singtel ConnectPlus SD-WAN service powered by Viptela, designed with security in mind, can help to simplify and unify your networks, while providing protection against data breaches and attacks.
  • Git high availability Git high availability Doug Robinson - Senior Product Manager, WANdisco Jan 19 2017 6:00 pm UTC 60 mins
    What does “high availability” mean in practical terms? Join our free webinar detailing what it takes to make your Git deployment highly available, including some of the trade-offs to expect. If you’ve got questions, this webinar is your chance to get answer from our Senior Product Manager and resident expert Doug Robinson.
  • Enabling AWS and Azure Migrations with SD-WAN Enabling AWS and Azure Migrations with SD-WAN Rob McBride, Solutions Marketing, Viptela & Ariful Huq, Product Management, Viptela Jan 19 2017 6:00 pm UTC 45 mins
    Gartner has highlighted that the differences in network services (such as routing, security and application delivery) between internal data centers and IaaS environments cause major issues during cloud migrations. Networking teams face many challenges migrating their workloads to AWS and Azure. These include:

    - Extending secure connectivity from the enterprise to the cloud is operationally complex
    - Cloud traffic flows sub-optimally through the centralized data center/DMZ, instead of directly from the branch or from a regional exit - this affects performance of applications
    - Implementing a unified WAN policy on disparate pieces of cloud infrastructure is difficult

    This webinar will dig deeper into the networking problems of cloud migrations. And how Software-Defined WAN (SD-WAN) technology makes this faster and simpler the networking teams. The following topics will be covered:

    - Extend your WAN seamlessly to AWS and Azure
    - Implement a unified WAN policy across the enterprise and cloud
    - Typical deployment scenarios for AWS and Azure
    - Real customer examples of public cloud migration
  • Zscaler: Cloud Security with SD-WAN, Case Studies and Best Practices Zscaler: Cloud Security with SD-WAN, Case Studies and Best Practices Sri Subramanian, Sr. Director of Product Management, Zscaler & David Klebanov, Director of Technical Marketing, Viptela Jan 19 2017 7:00 pm UTC 45 mins
    Gartner estimates that by the end of 2019, 30% of enterprises will use SD-WAN technology in all their branches, up from less than 1% today. And as of Nov 2016, Gartner has estimated about 50,000 production SD-WAN deployments. SD-WAN is a transformational approach to simplifying branch office networking.

    However, security is a critical factor for SD-WAN adoption, especially for cloud and Internet applications. With Zscaler and Viptela you can now secure all Internet traffic without having to backhaul it to centralized DMZs. Customers have seen more than 50% WAN cost-savings while keeping their branch offices and employees protected.

    Join Viptela and Zscaler to discuss the best practices for securing your distributed enterprise with cloud security and SD-WAN. They will also cover:

    - Common use case scenarios for SD-WAN and cloud security
    - Real world deployment examples
    - Best practices for improving your security posture with cloud security
    - Zscaler and Viptela technical integration elements
  • Anuta: Network Orchestration for Managed Branch Services Anuta: Network Orchestration for Managed Branch Services Kiran Sirupa, Director of Marketing & Praveen Vengalam, Co-Founder and VP of Engineering, Anuta Networks Jan 19 2017 8:00 pm UTC 45 mins
    SD-WAN presents a transformational opportunity for Telcos and MSPs to offer value added services. Anuta NCX orchestrator bridges the multi-vendor legacy and SD-WAN infrastructure for a smoother transition. Join us live to learn about Anuta's SD-WAN and vCPE customer deployments at global Tier-1 MSPs.
  • TFD: Network Engineer Roundtable on Deploying SD-WAN TFD: Network Engineer Roundtable on Deploying SD-WAN Panel of 8 Network Architects, moderated by Tech Field Day Jan 20 2017 5:00 pm UTC 60 mins
    Ten seasoned network engineers will debate on their views and experiences with SD-WAN. This roundtable discussion moderated by Tech Field Day focuses on how network professionals are analyzing and adopting SD-WAN technology, and integrating it into existing network architectures.

    SD-WAN has been the most rapidly deployed SDN technology. But major concerns remain on which features are the most fundamental and differentiating, and the maturity of the technology for large scale deployments. The major discussion topics will include:

    - Maturity of SD-WAN for prime-time deployment
    - Relative importance of features like routing, security, segmentation, vCPE, multi-tenancy, Application steering, SaaS, and Cloud.
    - ROI and the Before/After picture
    - Most typical use-cases across industries
    - Best practices in deploying SD-WAN based on personal experiences
  • LiveAction: Gaining Deep Visibility Into The WAN Overlay LiveAction: Gaining Deep Visibility Into The WAN Overlay David Izumo, Principal Engineer, Technical Marketing, LiveAction & Manan Shah, Director of Product Management, Viptela Jan 20 2017 6:00 pm UTC 45 mins
    Operation teams need to detect and correlate application problems with the real-time events happening on, both, the overlay and underlay networks. They also need capability for retrospective visualization into such problems. SD-WAN introduces new requirements for such advanced monitoring capabilities.

    LiveAction’s LiveNX™ is a robust visualization and analytics engine that integrates the network-generated metadata from Viptela SD-WAN technology to monitor application traffic on an end-to-end basis in real time. The retrospective visualization capability complements the intelligence provided by Viptela’s management solution and thus simplifies SD-WAN planning, monitoring and troubleshooting.

    This webinar will cover the major integration capabilities between LiveAction’s LiveNX and Viptela’s SD-WAN and share existing best practices to effectively manage the entire lifecycle of an SD-WAN deployment. These include:

    • Planning: Selecting pilot sites when planning SD-WAN deployments, identifying unsanctioned applications and end users, and establishing network utilization baselines which are used for right-sizing
    • Deployment: Using LiveNX real-time visualization to verify Viptela SD-WAN policies and assure services are not impacted in the event of brownouts or abnormal events
    • Management: Monitoring bandwidth and visualizing path control so network administrators can ensure application performance and mitigate problems before they affect users. Reporting on business applications to manage and optimize voice and video communications
  • What To Ask Your Vendor on Enterprise SD-WAN Capabilities What To Ask Your Vendor on Enterprise SD-WAN Capabilities Ramesh Prabagaran, VP Product Management, Viptela Jan 20 2017 7:00 pm UTC 45 mins
    What are the absolute essential requirements in an SD-WAN solution? Although Gartner has defined the four key requirements for SD-WAN (see below), there are some more critical features required to meet the enterprise-grade capabilities. For example, network segmentation for different kinds of applications is a widely deployed feature across all major industries, primarily to isolate critical applications and to reduce the attack surface during vulnerabilities.

    This webinar will more broadly cover the essential enterprise SD-WAN features and how they translate to common deployment scenarios in different industries. These features include:

    - Overlay capability over MPLS, Broadband and LTE
    - Unified and centralized management of all WAN infrastructure
    - Network segmentation with per-segment topologies
    - Predictable Application SLA with centralized policies and real-time traffic steering
    - Mature routing capabilities with BGP, OSPF, VRRP, and IGMP
    - Unified and centralized management of all WAN infrastructure
    - Robust-zero trust WAN security including authentication, encryptions, segmentation and service chaining

    As a background, here are Gartner’s four key requirements for SD-WAN:
    - SD-WAN solutions provide a lightweight replacement for traditional WAN routers, and are agnostic to WAN transport technologies (that is, they support MPLS, Internet, Long Term Evolution [LTE], etc.).
    - Based on business and/or application policies, SD-WAN solutions allow for load sharing of traffic across multiple WAN connections in an efficient and dynamic fashion.
    - SD-WAN solutions dramatically simplify the complexity associated with management, configuration and orchestration of WANs.
    - SD-WAN solutions must provide secure VPNs, and have the ability to integrate additional network services and offload Internet-destined traffic closer to the edge of the network.
  • ATM Threats to the Financial Sector ATM Threats to the Financial Sector Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific & Japan Jan 24 2017 5:00 am UTC 60 mins
    There’s a new threat in town – Jackpotting. It utilises malware directly infected onto ATMs, requiring no card skimmers that can be easily detected, no time needed to steal credentials, and grants access to every single dollar held in the machine.

    ATM machines may not follow the strict patch management regimes that corporate machines do, leaving their operating system potentially much more vulnerable to malware attacks. Beyond the monetary loss, being Jackpotted can also negatively impact the brand, and expose the bank to regulatory action from lack of due diligence in risk management.

    Hear how Symantec Cyber Security Services can help deliver a solution for these types of attacks. Through the combination of Data Center Security (DCS) and Managed Security Services (MSS) monitoring, you will receive prompt validated detection of both pre and post compromise attempts in near real-time, allowing faster responses and remediation.
  • Advancing Business Performance: Align IT Vendor Risk to ERM Advancing Business Performance: Align IT Vendor Risk to ERM Scott Roller 3WP; Yo Delmar, MetricStream, Albert Biketi, HPE Security -Data Security, Riskonnect Jan 24 2017 6:00 pm UTC 60 mins
    Growing exposure to IT risks has made organizations across industries volatile. Recent IT vendor incidents like data and security beaches, violation of privacy guidelines, which caused substantial fines, penalties, brand value, highlight that IT vendor risks are business risks and require focus from the leadership. An immature ITVRM programs limits the insights which are necessary for strengthening vendor relationships and building a robust ERM program. Rather than treating each risk in isolation, organizations need to have an integrated approach to manage risks holistically and in line with their business operations and objectives. With the growing dependency on IT and IT vendors, organizations need to align enterprise and IT VRM objectives to build a resilient framework suitable for today’s environment.

    During the session, panelists will discuss how organizations can strengthen vendor management in the current landscape and improve business performance.

    - Causes of Vendor Risks incidents and the impact on the enterprise
    - Best approach to align IT vendor risk to enterprise risk
    - Building mature VRM Program
    - Role of technology in integrating Vendor risk to Enterprise risk management
  • “The Best Way To Predict Your Future Is To Create It.” “The Best Way To Predict Your Future Is To Create It.” Peter McCallum Jan 24 2017 9:00 pm UTC 45 mins
    More so than ever before, businesses are requiring IT to become less about infrastructure and more about availability and mobility of data. Yesterday’s IT shops were defined by the technology they chose to use rather than capabilities they could deliver to the business and its workforce. End users have become more savvy and less willing to accept limitations of traditional, static services. Technology has to adapt to timing, location and value of data on a global basis without restrictions. Based on these trends, FreeStor grew from roots in static infrastructure to now support the widest interoperability across storage platforms, protocols, hypervisors, clouds, and applications in the industry. See how FreeStor is helping to drive the goal of “infrastructure anywhere” for seamless delivery of data anywhere users need to be.
  • 7 Questions To Consider When Looking For An Effective Endpoint Solution 7 Questions To Consider When Looking For An Effective Endpoint Solution Josh Goldfarb, VP, CTO - Emerging Technologies, FireEye, Inc. Jan 25 2017 2:00 pm UTC 45 mins
    The endpoint market is one that everyone seems to be talking about these days. With all that hype and buzz comes a confusing vendor landscape filled with nearly identical marketing speak from each and every vendor. How can the security professional make sense of all this noise? While certainly not an exhaustive list, here are seven questions to get you started.
  • Ready for GDPR? Learn about challenges and ways to comply Ready for GDPR? Learn about challenges and ways to comply CEO Richard Hibbert & Head of Products, Oliver Vistisen Jan 25 2017 3:00 pm UTC 45 mins
    The GDPR comes into force 25 May 2018 and this will have a significant impact on the way in which organisations collect, process and share data. Companies that fail to prepare for the GDPR risk incurring hefty fines of 20m euros or 4% of world-wide revenues, whichever is greatest. As such all organisations need a strategy for GDPR. By implementing a structured approach through the use of cloud-based applications, organisations will be able to effectively achieve and maintain compliance.

    In this webinar we will: explore the key provisions of GDPR, examine the challenges organisations are facing with the new rules, provide guidance for Risk Managers, Compliance Leaders and other IT Professionals on how to approach these challenges, then demonstrate how our cloud-based GDPR Applications Suite can provide effective solutions that ensure your business can achieve and maintain compliance