Create Your Next-Gen Network with Citrix NetScaler

Mark DeFreitas, Principal Networking Consultant at IT Weapons & David Cooper, Senior Citrix Sales Engineer at Citrix Systems
For this webcast, we’re taking an inside look at the latest networking, application access, and security features baked into the 2012 Citrix NetScaler 10 technology. Join IT Weapons and Senior Citrix Sales Engineer, David Cooper, for this technical tour of the industry’s most advanced cloud network platform; Citrix NetScaler.

Citrix NetScaler 10 enables the data centre network to become an end-to-end service delivery fabric to optimize the delivery of all web applications, cloud-based services, virtual desktops, enterprise business apps and mobile services. It ensures the performance, availability and security SLAs for any service to any user, anywhere.

During our webcast we’ll explore the following NetScaler 10 features:
• Advanced load balancing for high availability
• Citrix TriScale technology
• Application visibility and simple policy management
• Enhanced security features
Jun 12 2012
59 mins
Create Your Next-Gen Network with Citrix NetScaler
More from this community:

Cloud Computing

  • Live and recorded (4175)
  • Upcoming (130)
  • Date
  • Rating
  • Views
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer.

    This week tune in and learn about how RingCentral integrates with Google Gmail, Calendar, Docs and more.
  • „16Gb Fibre Channel HBAs - Gleich ist nicht gleich - entscheidende Vorteile mit der Emulex-Technologie“
    Entscheidende Design- und Funktionalitätsvorteile der Emulex 16Gb Fibre Channel HBAs, wie „Dynamic Port Utilization“, Brocade ClearLink-Diagnosemöglichkeiten, Daten-Priorisierung mit Quality of Service-Funktionalität, passives Cooling uvm., geben Ihren Kunden massive Vorteile beim Einsatz von Emulex Gen 5 (16Gb) Fibre Channel HBAs gegenüber anderen auf dem Markt verfügbaren Lösungen.
    Bei Gen 5 (16Gb) FC HBAs gilt wirklich – Gleich ist nicht gleich!
    Überzeugen Sie sich selbst davon, damit Sie Ihren Kunden die beste Gen 5 (16Gb) FC-Lösung anbieten können!
  • En este webcast usted aprenderá sobre cómo transformar la función de su departamento central de TI, y ser proveedor de servicios estratégicos para la empresa.
  • The BYOD trend is a symptom of consumerization in the mobile/cloud era that presents an opportunity for IT to be more relevant to the business. Recent studies show more interest than ever in BYO “anything” programs, however this transformation is hindered by concerns over security and complexity. From MacBooks and laptops to smartphones and tablets, a BYO “Anything” strategy must start with the user, not the device. By attending this webinar and discussion, you will learn:
    - How to take a people-centric approach to BYOD programs
    - Simple tips for navigating through the policy nightmares associated with BYOD
    - Key infrastructure requirement for a successful BYOD program
    - How a successful BYOD program can lead to even greater value for business mobility
  • Mobile is no longer a supplementary channel for the enterprise; It is quickly becoming the primary channel to deliver business critical information and experiences to partners, customers and employees. Join Sarvesh Jagannivas, VP of Product Marketing at MuleSoft, and Uri Sarid, CTO at MuleSoft, as they discuss the mobile enterprise opportunity, and the biggest challenges preventing successful mobile delivery.

    Join this webinar to learn:
    - Why mobile applications are the new imperative for the enterprise
    - The top challenges preventing rapid, scalable and secure mobile application development
    - Three case studies of industry leaders who are building mobile enterprises
  • Pass-the-hash and similar credential theft and reuse attacks are among the greatest security threats facing organizations today. With an impact that extends well beyond Microsoft Windows and Active Directory environments — and with no definitive means of remediation — it should come as no surprise that these types of attacks have been an underlying component of just about every targeted attack disclosed in the past several years, including those perpetrated against Saudi Aramco, Target, and The Wall Street Journal — just to name few.

    Join us Thursday, February 26th at 1 pm to learn:

    - How this highly popular and devastatingly effective class of attacks works
    - The basics of the pass-the-hash kill chain
    - An approach, based on design and administrative best practices, for mitigating attacks
    - The role privileged identity management solutions, like Xsuite, can play in implementing these practices

    Presenters:

    - Mark Bouchard, Co-Founder and VP of Research, CyberEdge Group, LLC
    - Dale Gardner, Senior Director, Product Marketing, Xceedium, Inc.
  • As a business, concerns over RTO, RPO, costs, security, and data privacy have historically made the decision for cloud backup a complicated one. However, cloud technologies continue to evolve, and can now provide substantial cost benefits while overcoming the most stringent security, data privacy, storage and performance hurdles. This makes it a perfect fit for many backup needs — especially remote office server backup.

    In this session we’ll cover:

    * The state of the cloud and the latest advancements for D2C server backup
    * How security and data storage advancements are addressing key enterprise data privacy concerns
    * How to leverage the cloud for remote office server backup and archiving, while significantly lowering storage and administration expenses
  • In the age of the customer, companies don’t decide how customer-centric their organizations need to be, customers decide on that. Providing great customer engagement and experience is a win-win for customers and companies and will drive customer loyalty and satisfaction. In order to become leaders in this connected and digital world companies need to leverage the right technologies and solutions, connect and engage with their customers, partners and employees in new ways. This will help them to become customer-centric organizations.

    Join us to learn about the next generation customer service and engagement trends and how you can leverage Salesforce to drive business value, achieve great success and become customer-centric organizations. Salesforce customer Pearson will also share their next generation customer service & engagement success story and on how they leveraged Community Cloud to meet their goals and objectives.
  • In the age of the customer, companies don’t decide how customer-centric their organizations need to be, customers decide on that. Providing great customer engagement and experience is a win-win for customers and companies and will drive customer loyalty and satisfaction. In order to become leaders in this connected and digital world companies need to leverage the right technologies and solutions, connect and engage with their customers, partners and employees in new ways. This will help them to become customer-centric organizations.

    Join us to learn about the next generation customer service and engagement trends and how you can leverage Salesforce to drive business value, achieve great success and become customer-centric organizations. Salesforce customer Pearson will also share their next generation customer service & engagement success story and on how they leveraged Community Cloud to meet their goals and objectives.
  • Scaling multiple databases with a single legacy storage system works well from a cost perspective, but workload conflicts and hardware contention make these solutions an unattractive choice for anything but low-performance applications.

    Attend the webinar to learn about:
    - How SolidFire’s all-flash storage system provides high performance at massive scale for mixed workload processing while simultaneously controlling costs and guaranteeing performance
    - How to deploy four or more database copies using SolidFire’s Oracle Validated Configuration, at a price point at or below the cost of traditional storage systems
    - SolidFire’s Quality of Service (QoS) guarantee; every copy receives dedicated all-flash performance, so IT admins can deliver solutions with confidence and maximize business efficiency
  • Channel
  • Channel profile
  • Mobility and Workshifting with Citrix! Recorded: Dec 20 2012 61 mins
    Gone are the days of physical offices, desktop computers, and traditional work hours. A workshifting strategy must address two issues to succeed:

    Employees must have access to desktops, apps, files and collaboration just like they would in the office and IT Security must control and secure business information.

    Workshifting allows companies to:

    1) Give employees the flexibility of a mobile workplace to choose the ideal time, place and device for their work
    2) Provide employees uninterrupted access to desktops and apps during business disruptions of any kind
    3) Reduce travel, labor, and real estate costs through flew-work, telework, and alternative workplace strategies.
    4) Attract and retain the best experienced people wherever you fine them!
  • Extend the Value of Citrix XenApp with AppSense Recorded: Nov 28 2012 60 mins
    Virtualization is a top priority to reduce costs and improve business efficiency for most of the world’s leading strategic IT teams. Citrix XenApp provides a delivery infrastructure that makes it easy to deliver any application to any user with high performance and security at low cost. AppSense helps you get more out of your existing Citrix XenApp infrastructure by providing additional levels of policy and personalization management, together with managing application access and system resource allocation - all in one solution.

    Join AppSense and IT Weaons to learn new approaches to:
    • Extend contextual personalization and policy management capabilities
    • Ensure optimal allocation of system resources to increase users and applications density
    • Manage application and network entitlement to a granular level
    • Control application usage and enforce Microsoft software licensing

    Register today to hear best practices and real-life success stories to extend the value of your application virtualization investments.
  • Security Myths: Separating Facts from Fiction Recorded: Nov 22 2012 45 mins
    Today's IT environments have become a security management nightmare. With the growing complexity of products, and common misconceptions of misguided marketing campaigns and misunderstandings of deployed technologies, organizations are faced with significant challenges to managing their security environments. Did you know that most security breaches today are fundamentally caused by relying on technologies to solve problems they weren’t designed to solve? The nature of the majority of attacks are opportunistic so improperly deployed access controls end up leaving organizations with a false sense of security and are vulnerable to attacks.

    In this webcast we will highlight:
    • How today’s market misunderstands the role of SSL, anti-virus and firewalls technologies
    • How to apply "defense in depth" when properly securing your infrastructure
  • Managed Services That Make Sense: Do What’s Right and Keep Your Business Safe. Recorded: Sep 6 2012 53 mins
    Does it make sense to move some of your applications and data to a cloud or data centre provider? How important are DR considerations to your lines of business? Most importantly, what should you look for in a managed services, cloud, or data centre provider?

    Today’s IT marketplace is flooded with choices; from break-fix IT support and traditional managed services to tomorrow’s Infrastructure-as-a-Service. Join IT Weapons for a no-nonsense look at today’s Data Centre and Cloud marketplace. In this webcast we’ll give you the straight talk on what to consider when you think about Canadian private cloud and data centre services for your business.
  • Create Your Next-Gen Network with Citrix NetScaler Recorded: Jun 12 2012 59 mins
    For this webcast, we’re taking an inside look at the latest networking, application access, and security features baked into the 2012 Citrix NetScaler 10 technology. Join IT Weapons and Senior Citrix Sales Engineer, David Cooper, for this technical tour of the industry’s most advanced cloud network platform; Citrix NetScaler.

    Citrix NetScaler 10 enables the data centre network to become an end-to-end service delivery fabric to optimize the delivery of all web applications, cloud-based services, virtual desktops, enterprise business apps and mobile services. It ensures the performance, availability and security SLAs for any service to any user, anywhere.

    During our webcast we’ll explore the following NetScaler 10 features:
    • Advanced load balancing for high availability
    • Citrix TriScale technology
    • Application visibility and simple policy management
    • Enhanced security features
  • 3 Tech Challenges of 2012: Mobile Device Management, DR and Security Recorded: Apr 25 2012 46 mins
    Studies show that nearly 50% of North American businesses will incorporate tablets and other new mobile platforms (iPhones, Android, Windows 8) into their corporate networks this year. Are you ready for the challenge this new technology presents for system support, management, and security?

    Join IT Weapons CEO, Ted Garner, for a candid look at the trends that are impacting today's IT leaders and the innovative strategies and tools available to help you meet those challenges head-on. In this exciting and interactive webcast we'll explore the intersecting issues around Security and Compliance, Mobile Device Management, and Disaster Recovery planning. We’ll share the insight you need to keep your business agile and resilient.
  • Improve Your Disaster Recovery Preparedness Recorded: Mar 21 2012 57 mins
    Do you worry about the business impact of data loss if disaster strikes? Does your DR plan depend on complicated, error-prone run books and manual processes? Do you refrain from testing your DR plan because it's expensive and difficult? If you've answered yes to these questions, then you're not prepared, and your business may be at risk.

    True business resilience requires investment, and monetary cost is only a portion of this investment. Developing the right disaster recovery strategy for your organization takes time and planning. Join IT Weapons and VMware for this webcast to see strategies and solutions that will improve the disaster recovery preparedness for your business.

    Attend this webcast to learn:
    •The 3 key phases to providing robust Disaster Recovery services
    •How automating processes with VMware Site Recovery Manager 5 can simplify management and ensure fast and reliable recovery
    •How IT Weapons Data Protection Services can help your organization
  • My Infrastructure is Cloud Enabled, Now What? Recorded: Feb 28 2012 50 mins
    Odds are you've already virtualized much of your server and storage infrastructure. Now you are wondering how to leverage the Cloud and realize its true benefits. All the choices available can leave you confused. When it comes to the Cloud, the direction you choose for your business can impact performance, availability, backup and disaster recovery.

    Join us for another exciting webcast where we'll explore the Cloud landscape and help you see the real differences between Public, Private, and Hybrid models. You'll leave this session understanding the tools and services available to turn today's virtual servers and storage into tomorrow's high-performance Cloud infrastructure.
  • Securing The Human Element: Get the Facts about Phishing Recorded: Feb 1 2012 41 mins
    Even with the most comprehensive security appliances at work, your people can still create security holes. The actions a user takes during their day-to-day work can leave your company exposed to security breaches and allow unauthorized entry into the corporate infrastructure. Well meaning and loyal employees can inadvertently create vulnerabilities in your environment.

    This webcast will highlight some employee behaviours and actions that can potentially compromise your corporate assets. We will also discuss some key ways you can better protect your organization and educate your users.
Live monthly webcasts for technology professionals.
Our monthly webcasts showcase an array of technology topics to keep your business feeling safe. Our goal is to deliver quick updates on what's new with IT Weapons and the IT industry at the convenience of your own schedule.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Create Your Next-Gen Network with Citrix NetScaler
  • Live at: Jun 12 2012 3:00 pm
  • Presented by: Mark DeFreitas, Principal Networking Consultant at IT Weapons & David Cooper, Senior Citrix Sales Engineer at Citrix Systems
  • From:
Your email has been sent.
or close
You must be logged in to email this