Hi [[ session.user.profile.firstName ]]

Cloud Computing

  • Addressing Hybrid Network Challenges in Asia Pacific with Software-Defined WAN Addressing Hybrid Network Challenges in Asia Pacific with Software-Defined WAN Hoo Shu Yee, Product Director, Singtel & Ramesh Prabagaran, VP Product Management, Viptela Recorded: Jan 19 2017 47 mins
    With APAC’s varying stages of infrastructure development, managing an enterprise Wide Area Network (WAN) in the region can be extremely challenging. This is compounded by different networking standards and service level agreements (SLAs) across countries, as well as disparities in race and culture.

    Furthermore, as more applications move onto the cloud and employees become more mobile, enterprises have to deal with growing risk of cyber attacks with increasingly complex WAN environments that combine multiple private networks and public internet services.

    In this webinar, learn more about managing an enterprise network in APAC. We will touch on how:

    - To address potential challenges with WAN architectures evolving to hybrid networks
    - To optimise and accelerate connectivity to the cloud
    - Software-Defined WAN (SD-WAN) works and helps you manage your hybrid network more effectively
    - Enterprises have leveraged SD-WAN to increase efficiency and reduce cost

    Lastly, find out how Singtel ConnectPlus SD-WAN service powered by Viptela, designed with security in mind, can help to simplify and unify your networks, while providing protection against data breaches and attacks.
  • Combining Mobile and Web App Technologies to Get Supercharged Agility Combining Mobile and Web App Technologies to Get Supercharged Agility Ken Spokas Technical Director & BPM/BRMS Practice Lead, Vizuri Maggie Hu Senior Solution Architect, Red Hat Recorded: Jan 19 2017 56 mins
    Taking a fully dynamic web application driven by rules and creating a native mobile app out of it may sound time-consuming. Learn how to do it in no time, with a minimum amount of code.

    Watch this webcast to see a quick survey app modified on the fly. You'll learn:
    • How straight-forward rules can create complex interactions in the app.
    • How processes in business process management (BPM) can add order.
    • Some great insights into how these technologies play together.
    • Get ideas on how they could be a great solution to your next mobile application development challenge.
  • Helping flydubai Takeoff with APIs and Digital Transformation Integration Helping flydubai Takeoff with APIs and Digital Transformation Integration Mohammed Ahteshamuddin, Vice President IT, flydubai & Paul Crerand, Director Solution Consulting, MuleSoft Recorded: Jan 18 2017 60 mins
    IATA estimates that by 2034 there will be 7.3 billion air passengers globally, which is twice more than what we have today. Alongside economic forces and passenger demands, pressure on the aviation and travel industry remains as intense as ever.

    Since launching in 2009, flydubai has strived to remove barriers to travel and enhance connectivity between different cultures. With 90 destinations in 44 countries, flydubai has embarked on a digital transformation journey to help enhance business agility, flexibility and the customer experience. Connecting and integrating your SaaS platforms, APIs and application networks is critical in today's digital world, regardless of industry.

    Join Mohammed Ahteshamuddin, Vice President IT – Customer Experience & Passenger Services System, flydubai, and Paul Crerand, Director Solution Consulting, MuleSoft, on Thursday, December 8 at 10am (GMT) for a live webinar as they share their story and best practices.
  • Solving Today's Mobile and IoT Security Challenges Solving Today's Mobile and IoT Security Challenges Jon Garside, Product Marketing Manager & Rich Boyer, CIO, NTT i3 Recorded: Jan 18 2017 61 mins
    IoT devices are on your network. Do you know how what to do with them?
    Join this presentation to learn the latest cyber threat insights and the security challenges surrounding IoT.

    Learn more about:

    •Misconceptions in the security model for wired vs. wireless networks
    •Managing policies for IoT in the enterprise using contextual data
    •The value of device roles and real-time enforcement for IoT
  • Your 2017 Cloud Security Action Plan Your 2017 Cloud Security Action Plan Maxim Integrated - Matt Hollcraft, CISO & Dave Ruedger, Chief Security Architect; Bitglass - Rich Campagna, SVP Products Recorded: Jan 18 2017 57 mins
    We are now three plus years into widespread adoption across industries of public SaaS apps like Office 365. Despite this momentum, security and compliance remain top challenges. This webinar, featuring Matt Hollcraft, CISO for Maxim Integrated, Dave Ruedger, Chief Security Architect for Maxim Integrated, and Rich Campagna, SVP of Products for Bitglass, will help you build a 2017 action plan to embrace public cloud without sacrificing security and compliance.

    While offering practical, actionable advice for major apps like Office 365, Matt, Dave and Rich will address your top concerns, such as unmanaged device access, external sharing, and mitigating controls. They also will provide real world examples of how other organizations have securely navigated the public cloud.
  • Escaping the Storage Licensing Money Pit Escaping the Storage Licensing Money Pit Dave Wright - Vice President & General Manager, NetApp SolidFire and Tim Stammers - Senior Storage Analyst, 451 Research Recorded: Jan 18 2017 57 mins
    The tables have been stacked against storage buyers for decades, but a change is coming. Forget the endless refresh treadmill of monolithic storage systems, and licensing models that are not just inflexible, but also force you to pay again and again for the same technology. Join this webinar to learn how to liberate your storage budget, and pay for storage the way that suits your business rather than the vendors, with 451 Research senior analyst Tim Stammers, and NetApp SolidFire’s Vice President & General Manager, Dave Wright.
  • CA Technologies: Advanced Monitoring and Management of SD-WAN CA Technologies: Advanced Monitoring and Management of SD-WAN Tim Diep, Director of Product Management, CA Technologies & Jeremy Rossbach, Sr. Product Marketing Manager, CA Technologies Recorded: Jan 18 2017 44 mins
    How does SD-WAN shift the status quo for the Operations teams? SD-WAN technology possesses sophisticated, in-built capability for operations and management, and advanced automation to address network problems in real-time. However, the Operations teams needs to seamlessly integrate this network and health status intelligence from their new SD-WAN infrastructure into their existing monitoring and management infrastructure.

    Additionally, monitoring solutions must provide visibility across all network architectures including highly dynamic and complex hybrid clouds and other SDN elements.

    This session covers the integration of CA Virtual Network Assurance and CA Performance Management with Viptela SD-WAN. The key topics that will be discussed include:

    - Eliminating visibility gaps between traditional networks and SD-WAN providing administrators with insights to optimize and transform their large hybrid networks
    - Providing relationship mapping of major IT events
    - Visualizing physical and logical dependencies in applications and service chains
    - Extending visibility for operators with network performance monitoring across cloud, SDN and SD-WAN networks (including service chains)
    - Enabling operational insight into how all elements of traditional and overlay networks affect service integrity
  • Verizon: Banking, Manufacturing, and Healthcare Case Studies in Managed SD-WAN Verizon: Banking, Manufacturing, and Healthcare Case Studies in Managed SD-WAN Mark Hollman, Managed and Professional Services, Verizon & Lloyd Noronha, Head of Global Marketing, Viptela Recorded: Jan 18 2017 44 mins
    Verizon has some of the largest global SD-WAN deployments based on Viptela technology. We investigate the lessons learned and best practices employed in some SD-WAN deployments in the banking, healthcare and manufacturing verticals.
  • Live Demo: Top Deployed SD-WAN Use Cases Live Demo: Top Deployed SD-WAN Use Cases David Klebanov, Director of Technical Marketing, Viptela Recorded: Jan 18 2017 45 mins
    This live demo will cover the major use cases of SD-WAN that are applicable to both large and small enterprise scenarios. These include:

    - Brownfield deployment: Inserting SD-WAN into an existing MPLS WAN (i.e. creating an overlay over MPLS and Broadband)
    - Enabling segmentation, service insertion and extranet policies for a business partner network
    - Extending the WAN to the Cloud (AWS/Azure)
    - Enabling on-prem security with Palo Alto Networks (service chaining)
    - Defining Application-Aware policies for guaranteed SLA (real-time traffic steering with QoS)
    - Enabling cloud-security capabilities with Zscaler (service chaining)
    - Defining policies for predictable access to Office 365 and other SaaS applications

    The foundational technology elements of SD-WAN that will be covered include:

    - Single overlay over MPLS, Broadband and LTE
    - Overlay routing with OSPF, BGP, VRRP and IGMP
    - Deep packet inspection (DPI) policies
    - Authentication, encryption, PKI
    - Zero-touch provisioning
    - Segmentation and per-segment topologies
    - Service insertion and service chaining
    - Virtualized elements for Cloud (IaaS+PaaS)
    - Cloud-security and on-prem security integration
    - Integrated Management and third-party management with SNMP, NetConf, and RESTful interfaces
    - Internet gateways (DIA, Regional Exit, Centralized exits)
  • What’s Next In Securing Identities? Key Identity & Access Management Trends What’s Next In Securing Identities? Key Identity & Access Management Trends Danna Bethlehem Recorded: Jan 18 2017 43 mins
    Over the past year, we have seen data breaches shift towards identity-based breaches, targeting personal information of either employees or consumers. The access to the information is used to craft and construct highly organized attacks on enterprises and is a growing contributor to identity theft. The problem is compounded by the convergence of personal and work place identities, ultimately creating major security challenges for companies.

    Our 2016 Authentication and Access Management survey found 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. During the webinar, we’ll be discussing this and other trends in the strong authentication and access management market, including:

    -The status of the two-factor authentication market and what we can expect in the years to come
    -The enterprise risk issues of using social media credentials to access to corporate resources
    -The role the cloud is playing in the enterprise especially as it relates to single sign on and application management and access
    -The ongoing challenges enterprises cite as barriers to mass adoption of a mobile workforce
  • 2017 Trends in Services 2017 Trends in Services Kelly Morgan, Research Vice President - Services Recorded: Jan 18 2017 32 mins
    The next wave of cloud computing is coming, and it is going to take the shape of serving distinct enterprise needs in an on-demand fashion. It is normal for enterprise IT departments to provision or procure IaaS, PaaS or SaaS services now. That in turn means that a larger galaxy of business needs and operational complexities will be tackled as the next way to monetize cloud infrastructure. The trickle of specialized providers doing boutique services such as disaster recovery as a service, compliance as a service and database as a service could well become a flood.

    Join Kelly Morgan, Research Vice President for Services as she uncovers what service providers will need to change in order to gain a competitive advantage in 2017, and what the sources of demand for multi-tenant datacenters will be in the coming year.
  • Key Strategies and Best Practices To Proactively Protect Digital Assets and Apps Key Strategies and Best Practices To Proactively Protect Digital Assets and Apps Charlie Kraus,Sr. Product Marketing Manager, Limelight Networks & Kerrion Burton-Evans,Solutions Engineer, Limelight Networks Recorded: Jan 18 2017 54 mins
    In the last few months we have seen cyber attacks on corporations as diverse as Deutsche Telekom and Tesco. From the boardroom to the backroom there is an increasing awareness of complex cyber-security attacks. Businesses need a proactive solution that not only protects digital content and properties but also keeps one step ahead of these evolving threats.

    Join us on 18th January for a live webinar with Limelight's digital security experts, who will share specific use cases to illustrate key strategies and best practices for a cloud-based security solution.
  • The Role of IT: Change or Die The Role of IT: Change or Die Kevin Linsell, Director of Strategy & Architecture, Adapt Recorded: Jan 18 2017 36 mins
    Cloud, Mobile, Big Data, Social Media - the pillars to our new digital society and a springboard for innovation by businesses of all shapes and sizes. But so what? It’s all just hype, right? Should you be starting to do things differently? Join us for this webinar if you want a reality check...

    Duration: 30 mins + Q&A
  • Hybrid/Cloud UC: Getting the Transition Right Hybrid/Cloud UC: Getting the Transition Right Zeus Kerravala - ZK Research | Skip Chilcott - IR Recorded: Jan 18 2017 64 mins
    Cloud UC is being rapidly adopted in the enterprise, but recent research has shown many organizations continue to be challenged with how to effectively integrate cloud in their existing UC ecosystem. The journey to the cloud is different for every organization, as is the end goal; whether your enterprise intends to keep some applications on-premises and adopt a hybrid solution or go fully cloud-based, you are tasked with constructing a roadmap that dictates which parts of your organization to migrate and when.

    In this webinar, we’ll look at practical ways to get this transition to cloud UC right. You’ll hear from experts that can help you determine how to:
    - Plan, deploy, and migrate
    - Operate, troubleshoot problems, and optimize performance
    - Maximize usage and adoption by ensuring optimal user experience along the way
  • IDC CloudView Survey Says: Accelerate & Enhance your Cloud Competencies IDC CloudView Survey Says: Accelerate & Enhance your Cloud Competencies Scott Emigh, CTO of Corporate Accounts & Jonathan Swartz, Azure National Solution Director Recorded: Jan 17 2017 26 mins
    According to IDC's CloudView 2016 survey, 58% of organizations have embraced the cloud for more than one or two workloads, but only 5% believe they have an optimized cloud strategy.

    When beginning your journey to the cloud, the first step is often the most challenging. Poor guidance, complex technologies, security questions, and regulatory concerns, plus the ever-increasing pressures to innovate while managing costs, lead to indecision for many business and IT leaders.

    To give customers the tools they need for cloud success, Microsoft gathered insights from thousands of customer engagements to create the Cloud Accelerator Program—a structured, targeted series of lessons and resources for quickly achieving measurable cloud results.

    Join this webcast to:
    - Learn from the success of others. Get the skills, tools, and approaches to solving business problems enabled by the power of the Azure platform.
    - Discover the breadth of the Azure platform. Find new ways to help solve your company’s most critical business problems.
    - Experience all that the Azure platform can bring to your business. Use hands-on content and real solutions running in your environment to create real business value.
    - Implement the insights gained from thousands of customers in your own environment with the help of Microsoft and our partners.
  • How Process Automation Works Within the NOC & Infrastructure How Process Automation Works Within the NOC & Infrastructure Jeremy Axmacher, Platform Engineer Recorded: Jan 17 2017 45 mins
    To cope with business demand, servers must be built – which is a highly manual process that often lacks standardization. Join this webinar with CA Technologies’ internal IT team, as they discuss how CA Process Automation enables them to automation core infrastructure tasks, including server deployment, maintenance and retirement – and saved their team 20 hours a day of manual work.

    You will learn:
    How CA Technologies’ internal IT team saves time automating triage and remediation
    How workflows can be easily adapted to detect issues quickly
    How new servers are now deployed within a matter of minutes with standardized builds and security protocols
  • How to Fine-Tune a Microservice Architecture with API Management How to Fine-Tune a Microservice Architecture with API Management Keith Babo Product Manager, Red Hat Manfred Bortenschlager Director, API Marketing Development, Red Hat Recorded: Jan 17 2017 36 mins
    With the increased speed of business and the transitory nature of apps and services, agility is paramount. To meet this need, successful organizations have turned to DevOps philosophies and solutions based on microservices architectures (MSAs).

    Application programming interfaces (APIs) are crucial in every MSA (Microservice Architecture) to link the various microservices. Solutions based on MSAs and DevOps are effective, but bring some challenges. While microservices allow flexible, agile deployments, they can be harder to manage and can create complex scenarios.

    Watch and learn:
    • How to establish effective continuous integration and delivery pipelines using Red Hat® OpenShift, Docker, and Kubernetes.
    • How to get security, control, and visibility of the microservice APIs using the 3scale by Red Hat API management platform and the 3scale nginx-based API gateway running on Docker.
  • VMware: A Virtual Edge Solution for Managed Branch Services VMware: A Virtual Edge Solution for Managed Branch Services Vanessa Little, Sr. Manager Global NFV EcoSystem Architecture, VMware & Ariful Huq, Product Management, Viptela Recorded: Jan 17 2017 34 mins
    vCloud NFV is an open, carrier-grade NFVI platform. It delivers a tightly integrated solution with virtual compute, storage and networking resources coupled with intelligent operations and management capability.

    Viptela SD-WAN has achieved VMware Ready Status for NFV. SD-WAN solutions, on vCloud NFV, enable service providers to deliver elastic bandwidth, advanced services and greater flexibility in terms of cost and QoS. The Viptela SD-WAN platform opens up new opportunities for service providers by unifying WAN connection management (MPLS, Internet and 4G/LTE), segmenting traffic, providing zero touch provisioning and supporting application aware routing for enterprise customers.

    This webinar will highlight the key elements of vCloud NFV and SD-WAN in providing a fully packaged solution for Service Providers including:

    - How to accelerate and automate instantiating, provisioning and managing of virtual network services (including SD-WAN)
    - Deliver carrier-grade network availability and multi-tenancy
    - Provide advanced networking and security VNFs including switching, routing, QoS and monitoring
    - Enable single pane of glass visibility, monitoring and policy based automation
  • Voice of the Customer: Kindred Healthcare SD-WAN Transformation Voice of the Customer: Kindred Healthcare SD-WAN Transformation Eyvonne Sharp, Network Engineer, Kindred Healthcare Recorded: Jan 17 2017 36 mins
    Healthcare IT teams have sophisticated needs for SD-WAN, specifically for reliability, security and agility in M&A integration. In this webinar, Kindred Healthcare will reveal their evaluation criteria, process of migration to SD-WAN, and the results.

    Jointly presenting with Palo Alto Networks and Viptela, Kindred will explain in detail the plans and deployment experiences across hospitals, nursing centers, and contract rehabilitation in the US. Kindred is the largest diversified post-acute healthcare provider in the US, and has doubled in the last four years.

    Key Results:
    - Application performance improvement from 4x to 10x at Nursing facilities and Home clinics
    - 700% bandwidth increase
    - Estimated 5-year ROI in Millions
    - Solving complex requirements of M&A and new services in efficient and simple way

    SD-WAN Feature Requirements for Healthcare:
    - Policy based, application-aware routing over multiple, diverse connections
    - Intelligent routing based on network health & application requirements
    - Network segmentation & isolation (Multi tenant/Security)
    - Centralized policy administration & device management
    - Ability to selectively route specific traffic through security appliances (Service Chaining)
    - Application aware traffic shaping
    - Centralized provisioning feature, or zero touch methodology
    - Multiple Ethernet, MPLS or LTE connectivity options
  • Hot topics in containers, OpenStack, and Hadoop Hot topics in containers, OpenStack, and Hadoop Krishna Mayuram, Duane DeCapite Recorded: Jan 17 2017 47 mins
    Containers, OpenStack, and Hadoop are three of the most talked about topics in the industry today. This session will highlight some of the hot topics related to the convergence of containers and OpenStack including projects Magnum, Kolla and Calico. Join us and learn about new communities and products including Open Container Initiative (OCI), Cloud Native Computing Foundation (CNCF), Cisco NFVI and Mantl/Shipped. This session will also feature a deep-dive on how Hadoop can be deployed on OpenStack with the Hadoop-as-a-Service (HaaS) Cisco Validated Designs (CVD).
  • A Deep Dive into StorNext 5.4 A Deep Dive into StorNext 5.4 Dave Frederick, Sr. Director of Product Marketing - Quantum and Nick Elvester, Sr. Product Manager Recorded: Jan 17 2017 31 mins
    Quantum's StorNext 5.4 brings new levels of performance, efficiency, flexibility and compatibility to media storage and data management. Enhancements include more tiering options, support for integrated applications, and even faster network connectivity.
  • Learn How the NIST CSF Benefits Small and Medium Businesses Learn How the NIST CSF Benefits Small and Medium Businesses Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Recorded: Jan 17 2017 60 mins
    Small Businesses are increasingly being targeted by cyber criminals. With precious few resources, how can Small Businesses defend against Ransomware, Data Breach, Insider Threat plus more issues.

    Join this webcast to learn how the NIST Cybersecurity Framework (CSF) can be an important resource to help Small Businesses defend against cyber-attacks. We’ll walk you through the recently released NIST Publication “Small Business Information Security: The Fundamentals” and it’s relation to the NIST CSF.

    - A basic understanding of the Cybersecurity Framework.

    -The purpose and scope of the recently released NIST Small Business Information Security Publication.

    -A review of the alignment of Symantec solutions to the Cybersecurity Framework.

    Join this webcast for a review of the latest NIST guidance and how to apply it to assess and manage Cybersecurity Risks to your business.
  • Analyst Keynote: Building the SD-WAN Business Case (Nemertes Research) Analyst Keynote: Building the SD-WAN Business Case (Nemertes Research) John Burke, Principal Analyst and CIO at Nemertes Research Recorded: Jan 17 2017 39 mins
    SD-WAN’s transformational potential is not enough. IT teams have to build a compelling business case for making the transition. Savings from MPLS is not the only avenue by which SD-WAN can drive ROI. By providing cheaper and more transparent and automatic failover when WAN links fail, SD-WAN can reduce branch WAN outages and troubleshooting costs by 90%.

    By working with multiple vendors and enterprises, Nemertes has developed and validated an SD-WAN cost model that enables enterprise users to build that business case base on multiple key factors.

    Join Principal Research Analyst and CIO John Burke of Nemertes Research as he presents his latest research findings. These include:

    - The cost-model applied to three real SD-WAN use cases
    - The process for identifying locations that could benefit from higher bandwidth, lower rates, increased reliability, or all three
    - The cost components of connectivity, capex, troubleshooting and more.
    - The comparison between Overlay SD-WAN and In-Net WAN
  • 2017 Trends in Infrastructure 2017 Trends in Infrastructure Al Sadowski, Research Vice President - Infrastructure Jan 19 2017 4:00 pm UTC 60 mins
    Enterprises and service provider customers have more storage, networking, and cloud technology choices at their disposal than ever before, and aggressive technology adopters will gain a performance and agility edge over their rivals in 2017. All Flash Arrays, Object Storage and Disaster Recovery to Cloud/Disaster Recovery as a Service are key technologies transforming the storage landscape. These new innovations account for a relatively small amount of storage revenue today, but will gradually displace traditional disk based storage systems, ultimately opening up opportunities for new innovators. The pace of change in networking technology provides the speed, capacity and agility demanded by cloud, IoT, social media, content delivery and the fabric that makes digital transformation possible.

    Join Al Sadowski, Research Vice President for Infrastructure, as he dives into what’s accelerating the virtualization of network applications and how traditional vendors will need to transform their “innovation supply chain” to produce product equivalents to highly scalable cloud infrastructure.
  • 5G RAN: A Reality Check 5G RAN: A Reality Check Brian Daly-AT&T, Adam Drobot-OpenTechWorks, Inc.,Steven Glapa-Tarana Wireless Jan 19 2017 4:00 pm UTC 60 mins
    High speed and autonomous transportation, remote surgical procedures, and mixed reality experiences are just a few of the upcoming Internet of Things (IoT) technological game changers that require high speed and low latency communications infrastructure. 5G Radio Access Network (RAN) technologies continue to evolve to meet the complex and continually evolving network requirements of IoT applications.

    This webcast will explore the latest advances in RAN, including:
    • Which technologies will see the earliest deployments?
    • How important will the 3.5 GHz band networks (also known as the Citizen’s Broadband Radio Service (CBRS)) be in future 5G applications?
    • Will mmWave networks change the game in the last mile?
    • How far will the industry advance in real deployments in the next year or two?
    • Where are companies participating in this ecosystem investing their money?
    • Are there concerns for Return on Investment (ROI) that companies are trying to resolve?


    Speakers:
    Brian Daly, Director - Core & Government/Regulatory Standards, AT&T Access Architecture & Devices
    Adam Drobot, Chairman, OpenTechWorks, Inc.
    Steven Glapa, VP of Marketing, Tarana Wireless
  • Addressing Hybrid Network Challenges in Asia Pacific with Software-Defined WAN Addressing Hybrid Network Challenges in Asia Pacific with Software-Defined WAN Hoo Shu Yee, Product Director, Singtel & Ramesh Prabagaran, VP Product Management, Viptela Jan 19 2017 5:00 pm UTC 60 mins
    With APAC’s varying stages of infrastructure development, managing an enterprise Wide Area Network (WAN) in the region can be extremely challenging. This is compounded by different networking standards and service level agreements (SLAs) across countries, as well as disparities in race and culture.

    Furthermore, as more applications move onto the cloud and employees become more mobile, enterprises have to deal with growing risk of cyber attacks with increasingly complex WAN environments that combine multiple private networks and public internet services.

    In this webinar, learn more about managing an enterprise network in APAC. We will touch on how:

    - To address potential challenges with WAN architectures evolving to hybrid networks
    - To optimise and accelerate connectivity to the cloud
    - Software-Defined WAN (SD-WAN) works and helps you manage your hybrid network more effectively
    - Enterprises have leveraged SD-WAN to increase efficiency and reduce cost

    Lastly, find out how Singtel ConnectPlus SD-WAN service powered by Viptela, designed with security in mind, can help to simplify and unify your networks, while providing protection against data breaches and attacks.
  • Using Storage Infrastructure as an Accelerator of DevOps Maturity Using Storage Infrastructure as an Accelerator of DevOps Maturity Josh Atwell, Developer Advocate, NetApp Jan 19 2017 6:00 pm UTC 60 mins
    Most DevOps journeys involve several phases of maturity. Research shows that the inflection point where organizations begin to see maximum value is when they implement tight integration deploying their code to their infrastructure. Success at this level is the last barrier to at-will deployment. Storage is more capable than where we read and write data.

    In this session we’ll discuss the role and value extensible storage infrastructure has in accelerating software development activities, improve code quality, reveal multiple deployment options through automated testing, and support continuous integration efforts. All this will be described using tools common in DevOps organizations.
  • Enabling AWS and Azure Migrations with SD-WAN Enabling AWS and Azure Migrations with SD-WAN Rob McBride, Solutions Marketing, Viptela & Ariful Huq, Product Management, Viptela Jan 19 2017 6:00 pm UTC 45 mins
    Gartner has highlighted that the differences in network services (such as routing, security and application delivery) between internal data centers and IaaS environments cause major issues during cloud migrations. Networking teams face many challenges migrating their workloads to AWS and Azure. These include:

    - Extending secure connectivity from the enterprise to the cloud is operationally complex
    - Cloud traffic flows sub-optimally through the centralized data center/DMZ, instead of directly from the branch or from a regional exit - this affects performance of applications
    - Implementing a unified WAN policy on disparate pieces of cloud infrastructure is difficult

    This webinar will dig deeper into the networking problems of cloud migrations. And how Software-Defined WAN (SD-WAN) technology makes this faster and simpler the networking teams. The following topics will be covered:

    - Extend your WAN seamlessly to AWS and Azure
    - Implement a unified WAN policy across the enterprise and cloud
    - Typical deployment scenarios for AWS and Azure
    - Real customer examples of public cloud migration
  • Current State of Ransomware in State & Local Government Current State of Ransomware in State & Local Government Kevin Haley, Director of Product Management for Symantec Security Technology and Response Jan 19 2017 6:00 pm UTC 60 mins
    Ransomware has become extremely popular with cyber criminals because it’s easy and very profitable. Organizations can defend themselves and lower the risk of ransomware or other common threats costing them time and money.

    Key Learning Objectives:

    - A look at the current state of ransomware

    - Simple and inexpensive steps that can advance state and local government security posture

    - Better understanding of the cyber security landscape

    - Best practices to take in cyber defense

    Join us for a review on simple ways, state and local government can protect themselves against ransomware attacks.

    Register for this free webinar today.
  • Visibility and Security - Two Sides of the Same Coin Visibility and Security - Two Sides of the Same Coin Cricket Liu, Exec VP, Infoblox; Dan York, CISSP, DNS Sec Prog Mgr, Internet Society; Dave Lewis, Global Sec Advocate, Akamai Jan 19 2017 6:00 pm UTC 75 mins
    You can't secure what you can't see and not knowing what's on your network can be damaging. While security is about proactively detecting and mitigating threats before they cause damage, it is also about gaining deep visibility into today's complex networks which may include diverse platforms and architectures. A truly enterprise grade DNS, DHCP and IPAM (DDI) platform can provide that visibility because of where it sits in networks. On the downside, DNS is a top threat vector but it can be used as strategic control points to block malicious activity and data exfiltration. Join Infoblox and (ISC)2 on January 19, 2017 at 1:00PM Eastern for a round table discussion featuring Cricket Liu, a well known authority on the Domain Name System and the co- author of all of O'Reilly & Associates' Nutshell Handbooks on DNS, as we examine how strategic DNS can be used for visibility and security.
  • Skype for Business: Concept to Completion, Part II Skype for Business: Concept to Completion, Part II John Hand - Global Microsoft Alliance Director | Dave Bottomley - Communications Solutions Engineer Jan 19 2017 6:00 pm UTC 60 mins
    This session will follow on from Part I, taking a specific look at how performance management software, like Prognosis, can assist in the successful deployment of Skype for Business.
  • How to Build Engaging Apps on Xamarin with Azure Backend How to Build Engaging Apps on Xamarin with Azure Backend Mahdi Alirezaie, Technical Solutions Professional, Microsoft Corporation Jan 19 2017 7:00 pm UTC 75 mins
    Whether you’re a new mobile developer or an experienced enterprise team lead, Microsoft’s Azure App Service and Xamarin give you everything you need to build engaging Android, iOS, and Windows apps. See how easy it is to create a cloud backend for your mobile app straight from the Azure Portal and add customization to your backend from authentication to special API controllers.

    Join this webcast to learn how to:
    - Deploy your first App Service
    - Understand how the .NET Azure client SDK works
    - Enhance your app with Authentication and Offline sync
  • New Containerization Capabilities for HPE Universal Discovery and CMDB New Containerization Capabilities for HPE Universal Discovery and CMDB Jon Furner, Results Positive and Ron Bocken, HPE Jan 19 2017 7:00 pm UTC 45 mins
    Looking to reduce deployment costs and increase time to value? Don’t miss this opportunity to see and hear about the new container capabilities of HPE Universal Discovery and Universal CMDB solutions. In this webinar, you will receive an overview from Results Positive on how you can utilize the HPE Configuration Management System with new capabilities to discover containers and configuration items in your data center and simplify solution deployment time from days to minutes. Additionally, HPE will provide an overview of the HPE IT Operations Management Suite framework and how containers can be used to benefit overall total cost of ownership (TCO).

    Key takeaways from attending this webinar include:
    • How you can utilize new HPE UD/UCMDB Container capabilities
    • Common use cases for containerization with HPE UD/UCMDB
    • Understand the business benefits of containerization
    • Become aware of HPE ITOM Suite Framework

    Don’t miss out on this opportunity to learn the new containerization capabilities available for HPE UD/UCMDB.
  • Zscaler: Cloud Security with SD-WAN, Case Studies and Best Practices Zscaler: Cloud Security with SD-WAN, Case Studies and Best Practices Sri Subramanian, Sr. Director of Product Management, Zscaler & David Klebanov, Director of Technical Marketing, Viptela Jan 19 2017 7:00 pm UTC 45 mins
    Gartner estimates that by the end of 2019, 30% of enterprises will use SD-WAN technology in all their branches, up from less than 1% today. And as of Nov 2016, Gartner has estimated about 50,000 production SD-WAN deployments. SD-WAN is a transformational approach to simplifying branch office networking.

    However, security is a critical factor for SD-WAN adoption, especially for cloud and Internet applications. With Zscaler and Viptela you can now secure all Internet traffic without having to backhaul it to centralized DMZs. Customers have seen more than 50% WAN cost-savings while keeping their branch offices and employees protected.

    Join Viptela and Zscaler to discuss the best practices for securing your distributed enterprise with cloud security and SD-WAN. They will also cover:

    - Common use case scenarios for SD-WAN and cloud security
    - Real world deployment examples
    - Best practices for improving your security posture with cloud security
    - Zscaler and Viptela technical integration elements
  • General Dynamics IT: Integrating the Cloud into Your Security Program General Dynamics IT: Integrating the Cloud into Your Security Program Sallie Sweeney, Principal Cyber Solutions Architect, General Dynamics IT Jan 19 2017 7:00 pm UTC 60 mins
    As more organizations migrate to the cloud, CISOs are faced with several challenges, such as: How do we securely migrate our mission-critical applications? What tools and methods are offered to secure our cloud? How will migrating to the cloud affect our overall security strategy? Learn how to effectively integrate the cloud into your security program and explore what role FedRAMP should play in your cloud security plan.
  • Taking A Design Approach to Bridge DevOps and Business Automation Taking A Design Approach to Bridge DevOps and Business Automation Justin Holmes Leader, Consulting Business Automation Practice, Red Hat Jan 19 2017 8:00 pm UTC 60 mins
    Custom software development and business automation have historically provided 2 equal but distinct paths to bring high-quality products to market. Each has its own benefits and trade-offs. Business process management (BPM) and business rules management systems (BRMS) provide a lightweight, modular platform that can be tailored for your organizational structure and technical architecture.

    Red Hat® Consulting offers a Business Automation Practice—a design model that combines the rigor and security of software development with the speed and accessibility of business automation technology. The result? Businesses can develop better products, more quickly and fully evolve with DevOps.
  • Anuta: Network Orchestration for Managed Branch Services Anuta: Network Orchestration for Managed Branch Services Kiran Sirupa, Director of Marketing & Praveen Vengalam, Co-Founder and VP of Engineering, Anuta Networks Jan 19 2017 8:00 pm UTC 45 mins
    SD-WAN presents a transformational opportunity for Telcos and MSPs to offer value added services. Anuta NCX orchestrator bridges the multi-vendor legacy and SD-WAN infrastructure for a smoother transition. Join us live to learn about Anuta's SD-WAN and vCPE customer deployments at global Tier-1 MSPs.
  • 5 Highest-Impact CASB Use Cases 5 Highest-Impact CASB Use Cases Bob Gilbert, Chief Evangelist at Netskope​ Jan 19 2017 9:00 pm UTC 60 mins
    Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in ServiceNow, or getting control over shadow IT, information security leaders are exploring how Cloud Access Security Brokers can make an impact in their organizations.

    Join Bob Gilbert, chief evangelist of Netskope, for a session on the top five CASB use cases that have the highest impact on cloud-consuming enterprises.

    Attendees will learn:

    •Industry-specific data that’s foundational to any cloud security business case;

    •The five highest-impact CASB use cases from our customers, demonstrated from the perspective of users and security professionals; and

    •How those use cases translate to “must have” requirements for any CASB evaluation.
  • The move from N3 to HSCN The move from N3 to HSCN Mark Hall, Public Sector Director, Redcentric Jan 20 2017 1:30 pm UTC 90 mins
    Over the course of this presentation Mark Hall discusses some of the key areas surrounding the move from N3 to the new healthcare network HSCN including timescales, benefits and much more. At the end of the presentation Mark will be available to answer any questions or concerns you have about the transition.
  • TFD: Network Engineer Roundtable on Deploying SD-WAN TFD: Network Engineer Roundtable on Deploying SD-WAN Panel of 8 Network Architects, moderated by Tech Field Day Jan 20 2017 5:00 pm UTC 60 mins
    Ten seasoned network engineers will debate on their views and experiences with SD-WAN. This roundtable discussion moderated by Tech Field Day focuses on how network professionals are analyzing and adopting SD-WAN technology, and integrating it into existing network architectures.

    SD-WAN has been the most rapidly deployed SDN technology. But major concerns remain on which features are the most fundamental and differentiating, and the maturity of the technology for large scale deployments. The major discussion topics will include:

    - Maturity of SD-WAN for prime-time deployment
    - Relative importance of features like routing, security, segmentation, vCPE, multi-tenancy, Application steering, SaaS, and Cloud.
    - ROI and the Before/After picture
    - Most typical use-cases across industries
    - Best practices in deploying SD-WAN based on personal experiences
  • LiveAction: Gaining Deep Visibility Into The WAN Overlay LiveAction: Gaining Deep Visibility Into The WAN Overlay David Izumo, Principal Engineer, Technical Marketing, LiveAction & Manan Shah, Director of Product Management, Viptela Jan 20 2017 6:00 pm UTC 45 mins
    Operation teams need to detect and correlate application problems with the real-time events happening on, both, the overlay and underlay networks. They also need capability for retrospective visualization into such problems. SD-WAN introduces new requirements for such advanced monitoring capabilities.

    LiveAction’s LiveNX™ is a robust visualization and analytics engine that integrates the network-generated metadata from Viptela SD-WAN technology to monitor application traffic on an end-to-end basis in real time. The retrospective visualization capability complements the intelligence provided by Viptela’s management solution and thus simplifies SD-WAN planning, monitoring and troubleshooting.

    This webinar will cover the major integration capabilities between LiveAction’s LiveNX and Viptela’s SD-WAN and share existing best practices to effectively manage the entire lifecycle of an SD-WAN deployment. These include:

    • Planning: Selecting pilot sites when planning SD-WAN deployments, identifying unsanctioned applications and end users, and establishing network utilization baselines which are used for right-sizing
    • Deployment: Using LiveNX real-time visualization to verify Viptela SD-WAN policies and assure services are not impacted in the event of brownouts or abnormal events
    • Management: Monitoring bandwidth and visualizing path control so network administrators can ensure application performance and mitigate problems before they affect users. Reporting on business applications to manage and optimize voice and video communications
  • Top 5 Cloud and Mobile Cybersecurity Threats in 2017 Top 5 Cloud and Mobile Cybersecurity Threats in 2017 Doug Splinter & PJ Johnson, Technical Solutions Professionals, Microsoft Jan 20 2017 7:00 pm UTC 60 mins
    Connected cloud and mobile technologies present immense business opportunity, but there is potential for increased risk as organizations increase their exposure to cybersecurity threats. The digital world requires new approaches to protect against, detect and respond to security threats.

    Join this webcast to learn more about:
    - Protecting against identity compromise and identity breaches before they cause damage
    - Ensuring device security while enabling mobile work for your users
    - The unique perspective Microsoft brings to cybersecurity
  • What To Ask Your Vendor on Enterprise SD-WAN Capabilities What To Ask Your Vendor on Enterprise SD-WAN Capabilities Ramesh Prabagaran, VP Product Management, Viptela Jan 20 2017 7:00 pm UTC 45 mins
    What are the absolute essential requirements in an SD-WAN solution? Although Gartner has defined the four key requirements for SD-WAN (see below), there are some more critical features required to meet the enterprise-grade capabilities. For example, network segmentation for different kinds of applications is a widely deployed feature across all major industries, primarily to isolate critical applications and to reduce the attack surface during vulnerabilities.

    This webinar will more broadly cover the essential enterprise SD-WAN features and how they translate to common deployment scenarios in different industries. These features include:

    - Overlay capability over MPLS, Broadband and LTE
    - Unified and centralized management of all WAN infrastructure
    - Network segmentation with per-segment topologies
    - Predictable Application SLA with centralized policies and real-time traffic steering
    - Mature routing capabilities with BGP, OSPF, VRRP, and IGMP
    - Unified and centralized management of all WAN infrastructure
    - Robust-zero trust WAN security including authentication, encryptions, segmentation and service chaining

    As a background, here are Gartner’s four key requirements for SD-WAN:
    - SD-WAN solutions provide a lightweight replacement for traditional WAN routers, and are agnostic to WAN transport technologies (that is, they support MPLS, Internet, Long Term Evolution [LTE], etc.).
    - Based on business and/or application policies, SD-WAN solutions allow for load sharing of traffic across multiple WAN connections in an efficient and dynamic fashion.
    - SD-WAN solutions dramatically simplify the complexity associated with management, configuration and orchestration of WANs.
    - SD-WAN solutions must provide secure VPNs, and have the ability to integrate additional network services and offload Internet-destined traffic closer to the edge of the network.
  • How to Combine Hadoop & Spark with a Converged Data Platform How to Combine Hadoop & Spark with a Converged Data Platform Jack Norris, Senior Vice President of Data and Applications, MapR Jan 20 2017 9:00 pm UTC 60 mins
    MapR provides the industry's only converged data platform that integrates the power of Hadoop and Spark with global event streaming, real-time database capabilities, and enterprise storage, enabling customers to harness the enormous power of their data. A majority of current customers report achieving payback in fewer than 12 months and realizing greater than 5X ROI.

    Join this webcast to learn how to:
    - Quickly and easily deploy a cloud-based, converged big data platform
    - Support hybrid environments and easily keep cloud and on-premises environments in sync
    - Design and deliver enterprise grade, production big data applications in the cloud
    - Help your enterprise achieve 5x ROI and harness the enormous power of your data
  • ATM Threats to the Financial Sector ATM Threats to the Financial Sector Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific & Japan Jan 24 2017 5:00 am UTC 60 mins
    There’s a new threat in town – Jackpotting. It utilises malware directly infected onto ATMs, requiring no card skimmers that can be easily detected, no time needed to steal credentials, and grants access to every single dollar held in the machine.

    ATM machines may not follow the strict patch management regimes that corporate machines do, leaving their operating system potentially much more vulnerable to malware attacks. Beyond the monetary loss, being Jackpotted can also negatively impact the brand, and expose the bank to regulatory action from lack of due diligence in risk management.

    Hear how Symantec Cyber Security Services can help deliver a solution for these types of attacks. Through the combination of Data Center Security (DCS) and Managed Security Services (MSS) monitoring, you will receive prompt validated detection of both pre and post compromise attempts in near real-time, allowing faster responses and remediation.
  • Are Hybrid Clouds in Tune with Future Business Growth? Are Hybrid Clouds in Tune with Future Business Growth? Agatha Poon 451 Research, Rajesh Awasthi Tata Communications Jan 24 2017 6:30 am UTC 60 mins
    Advancements in infrastructure and platform technologies with growing availability of innovative business models has inclined the focus on user-centric service delivery mechanisms by redefining the very nature of IT strategy within a business organization. Companies that wish to pave the way for a successful digital transformation journey must shed conventional thinking and embrace towards an agile approach to IT operations and have a reliable and intelligent Ecosystem. So, to start with, we ask ourselves How and What should we look for in a partner?