Hi [[ session.user.profile.firstName ]]

Data Center Management

  • Introduction to Anuta ATOM Network Workflow Automation
    Introduction to Anuta ATOM Network Workflow Automation
    Anuta Networks Recorded: Apr 18 2019 1 min
    Introduces a graphical designer to automate network provisioning and maintenance activities using low-code automation.

    ATOM Network Workflow Automation eliminates human errors and empowers network administrators to focus on strategic business outcomes rather than mundane daily tasks.
  • A 360-Degree View of  the Latest APT Groups
    A 360-Degree View of the Latest APT Groups
    Fred Plan, Sr. Threat Intel Analyst, FireEye Recorded: Apr 18 2019 58 mins
    FireEye analysts work to identify cyber espionage trends and gather the evidence needed to name APT groups.

    The most recently named groups—APT38, APT39, APT40—exemplify the variety of state-sponsored threats that network defenders face today: a North Korean operator specializing in bank heists, an Iranian group tracking personal data and specific individuals and a long-established Chinese actor shifting its targeting to reflect changing geopolitics.

    In this webinar, Fred Plan, Sr. Threat Intelligence Analyst at FireEye provides:

    • A high-level overview on how nation-state interests are driving APT activity
    • Insight into the most recent APT groups investigated by FireEye
    • The latest adversary tactics, techniques and procedures (TTPs) these groups use

    Register NOW for the live webinar
  • Train Your Model and Inference with Supermicro Server Platforms
    Train Your Model and Inference with Supermicro Server Platforms
    Carlos Weissenberg, Supermicro & Shar Narasimhan, NVIDIA Recorded: Apr 18 2019 60 mins
    The second installment of Supermicro & NVIDIA's three-part webinar series will deep dive into how GPU technologies accelerate training your model and inferencing within AI and Deep Learning applications.
  • The Practitioner’s Guide to Security Monitoring in the Cloud
    The Practitioner’s Guide to Security Monitoring in the Cloud
    Danielle Russell Group Product Marketing Manager, Brian Bledsoe Sr. Technical Manager, Sales Enablement for North America Recorded: Apr 18 2019 58 mins
    Cloud computing continues to transform the way organizations use, store, and share data, applications, and workloads, but has also introduced a host of new security threats and challenges. With so much data going into the cloud—and into public cloud services in particular—these resources become natural targets for bad actors. And, contrary to what you may think, the primary responsibility for protecting corporate data in the cloud lies with the cloud customer, not with the service provider.

    AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. Whether you are looking to secure your AWS & Azure cloud environments, cloud applications like Office 365 and G Suite or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.

    Join this webcast to learn more about cloud security challenges and how to address them with USM Anywhere. You'll learn:

    - What the shared responsibility model means for the security of your cloud assets
    - Challenges with trying to use traditional on-prem security monitoring tools in your cloud environments
    - How USM Anywhere gives you visibility into all assets across your cloud and on-premises environments
    - Benefits of an all-in-one security solution for threat detection, incident response and compliance management
  • Live Optics in 10 Minutes with Dell EMC
    Live Optics in 10 Minutes with Dell EMC
    Brian Summers, Dell EMC Recorded: Apr 18 2019 50 mins
    In this webinar, we will address the most common customer concerns and challenges around Live Optics. Live Optics is free, online software you can use to collect, visualize and share data about your IT environment and workloads. Live Optics provides data analysis to help you understand your workload performance, so that buyers and IT providers can simplify discovery and have a mutual understanding of project requirements.

    Presented by: Brian Summers, Dell EMC
  • Model-based Testing & BDD
    Model-based Testing & BDD
    Alexander Page Recorded: Apr 18 2019 52 mins
    The Behavior-driven Development (BDD) paradigm has changed the software testing landscape by combining business language (requirements) with functional application test cases; it gives us the ability to create low-jargon, self-documenting tests that all stakeholders understand and agree on to truly enable Acceptance Test-driven Development (ATDD). How do we combine these benefits with the power of Model-based Testing (MBT) to achieve maximum testing coverage and efficiency?

    Join BDD/MBT expert Alexander Page as he dives into a fully integrated End-to-End BDD testing framework/pipeline for rapidly testing a live MVC Webapp by utilizing a powerful MBT test generation solution to go from requirements to executable Gherkin/Cucumber BDD tests to enriched ATDD-focused reporting with Serenity.

    You'll learn:
    Automate test design/creation with Model-based Testing tool Agile Requirements Designer (ARD)
    Creating Gherkin BDD tests utilizing ARD and executing with Cucumber
    How to quickly generate a Gherkin step definition layer in Eclipse
    Tying in the Selenium UI testing framework with the Gherkin step definition layer
    How to use Serenity BDD framework to generate enriched ATDD test result reports

    The presentation will be followed by a Q&A session
  • Enhancing your threat prevention, detection and remediation strategy
    Enhancing your threat prevention, detection and remediation strategy
    Sean Towns, Senior Systems Engineer Recorded: Apr 18 2019 39 mins
    Cyber criminals are continuously shifting their attack techniques to better target endpoints. As more than one-third of cyber-attacks are now non-malware based, adversaries can exploit gaps in traditional antimalware solutions used in isolation.

    Many businesses are injecting ineffective security tools into their environments, ultimately adding complexity without directly addressing the problem. These disconnected solutions require ongoing diligence and expert resources to analyze a multitude of security alerts and identify compromised devices. Yet, with the growing cybersecurity skills gap, businesses don’t have the resources needed to manage their security infrastructure effectively.

    Dell SafeGuard and Response helps organisations address these challenges. It is a portfolio of next-generation endpoint security solutions that combines the managed security, incident response expertise and threat behavioral analytics of Secureworks® with the unified endpoint protection platform from CrowdStrike. Dell’s modern and effective approach designed to prevent, detect and respond to the shifting threat landscape makes it easy for organizations to protect their data with the industry’s most secure commercial PCs.
    Join this 45-minute webinar to learn how Dell SafeGuard and Response provides organisations with the essential capabilities they need to protect their PCs and data
  • How to Gain Visibility into Encrypted Threats
    How to Gain Visibility into Encrypted Threats
    Jay Kelley, Principal Product Marketing Manager - F5 Networks Peter Silva, Security Solutions Marketing Manager - F5 Networks Recorded: Apr 17 2019 39 mins
    Driven by built-in web browser warnings, the EU GDPR, and general security and privacy awareness, encrypting data-in-transit with SSL/TLS is now a standard practice among many organizations. This is a great win for security overall to help prevent data breaches, however cyber criminals are using these encrypted channels to propagate malware and exfiltrate data knowing they can bypass traditional security inspection solutions that don’t decrypt traffic.

    Join this webinar to learn more about:

    - Challenges with encrypted traffic and risks to your business
    - How to efficiently decrypt and orchestrate traffic to reduce latency
    - How to intelligently manage decryption and re-encryption across all of your security inspection solutions (IDS/IPS, NGFW, Malware Sandbox, etc.)
  • Understanding Hybrid Resiliency for Business Service Delivery
    Understanding Hybrid Resiliency for Business Service Delivery
    Vincent Rais, Director of Resiliency Services, Uptime Institute Recorded: Apr 17 2019 56 mins
    Understand the critical areas required to provide resilient applications and data across a multi-site hybrid environment.
  • ILTA Webcast: Mobile Device Forensics and Beyond: The New Frontier
    ILTA Webcast: Mobile Device Forensics and Beyond: The New Frontier
    Michael Sarlo - EnCE, CBE, CCLO, RCA, CCPA Recorded: Apr 17 2019 70 mins
    With mobile phones and tablets now ubiquitous in the modern workplace, attorneys and litigation support professionals need to be prepared to forensically preserve these robust digital repositories, extract information from them and produce extracted information in a way that displays evidence true to its original format. This expert presentation will cover best practices for handling a mobile device at the outset of a matter, provide a framework for working with custodians to ensure a smooth forensic collection process and highlight the differences between different forensic extraction types and how they affect data retrieval.

    In this webinar we’ll cover topics including:

    + New matter intake questions and considerations
    + Tracking devices and users
    + Data types and forensic extractions
    + Android and iOS considerations
    + Challenges and solutions – review, production and PII
    +Cellebrite Relativity Integrator

    Expert Speaker

    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA

    Michael is a Partner and Executive Vice President of eDiscovery and Digital Forensics for HaystackID. In this role, Michael facilitates all operations related to electronic discovery, digital forensics, and litigation strategy both in the US and abroad.

    The webcast is sponsored by HaystackID and conducted by ILTA as part of ILTA’s program of industry educational events.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Ashish Thapar Recorded: Apr 17 2019 79 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the Mobile Security Index and the current cybersecurity threat landscape.

    This Month's Theme: Mobile Security Index

    Our Verizon Threat Research Advisory Center presenters will be:

    •Ashish Thapar, Managing Principal - VTRAC
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    - The breadth and degree of the mobile security problem
    - Steps organizations are taking and why they aren't doing more
    - Impact of regulation, public Wi-Fi networks and future 5G networks

    And then we'll turn things over to David Kennedy to cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Boosting Network Security with ChatOps
    Boosting Network Security with ChatOps
    Dania Ben Peretz, Product Manager (AlgoSec) Recorded: Apr 17 2019 30 mins
    The way we consume content has greatly evolved throughout the years - from text-only collateral to using applications that centralize the content and make it easier to access. However, the number of business applications is rapidly growing, ultimately causing organizations to suffer from “app fatigue”.

    Network security stakeholders can benefit from such a shift in content consumption by taking a conversational approach with ChatOps.

    In this webinar, Dania Ben Peretz, Product Manager at AlgoSec covers how ChatOps helps network security and operational staff to:
    • Shorten resolution time of critical security incidents
    • Manage security more efficiently through collaboration and transparency between IT, Security, Network and DevOps teams
    • Ensure ongoing security and compliance
  • Secure and Agile Orchestration for Docker Containers
    Secure and Agile Orchestration for Docker Containers
    Avi Miller Product Management Director, Oracle Linux and Virtualization Recorded: Apr 17 2019 38 mins
    The goal of orchestration is to streamline and optimize frequent, repeatable processes to ensure accurate, rapid deployment of software–because companies need shorter time-to-market to be successful. Watch this webinar:

    To understand how to build a secure and agile production environment by leveraging Docker containers and Kubernetes orchestration.
    Learn about Oracle Container Services for use with Kubernetes which provides a comprehensive container and orchestration environment for the delivery of microservices and next generation application development.

    Watch a demonstration of how to use Vagrant and VirtualBox to automatically deploy a Kubernetes cluster.
  • Code Triage: Why Healthcare is Facing More Cyber Attacks...
    Code Triage: Why Healthcare is Facing More Cyber Attacks...
    Christopher Porter, Chief Intelligence Strategist, FireEye & Darrell Keeling, VP IT, PVH Recorded: Apr 16 2019 53 mins
    Code Triage: Why Healthcare is Facing More Cyber Attacks and How to Protect Your Organization

    Healthcare organizations face a number of unique security concerns, including the increasingly interconnected systems between doctors’ offices, hospitals, insurance companies, suppliers, etc. As such, healthcare is being targeted by multiple types of attackers: nuisance attackers (such as the creators of commodity malware), advanced persistent threat (APT) attackers, and cyber criminals. To battle such attackers, healthcare security teams need to understand:

    -Why healthcare is at risk / what threat actors are seeking / how they are doing it
    -Why email is the #1 threat vector in Healthcare and how to defend against it
    -Best practices and action items for a more robust security program
  • Fight the good fight against the bad bots!
    Fight the good fight against the bad bots!
    Brian McHenry and Graham Alderson Recorded: Apr 16 2019 36 mins
    Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organisations developing a sustainable security strategy.

    Join us for this webinar to learn:
    - How bots infect, propagate, and attack applications
    - What types of application attacks are commonly performed by bots
    - How you can defend against bad bots without disrupting the good ones
  • Live Demo: Configure NetFlow/IPFIX.  Gain Insights. Take Action.
    Live Demo: Configure NetFlow/IPFIX. Gain Insights. Take Action.
    Andy Hutchison, Sales Engineer Gigamon Recorded: Apr 16 2019 44 mins
    Lack of visibility into network traffic, coupled with an inability to ingest large amounts of packet data, leads to network blind spots. The good news is that NetFlow IPFIX metadata generation allows for richer metadata than standard NetFlow, with more flexibility when sending to a tool such as a SIEM.

    Register for this live demo webinar to:

    - Understand NetFlow concepts, and how they apply to security and other use cases.
    - See how Gigamon helps strengthen your existing infrastructure and tools.
    - Learn factors to consider when planning to use network metadata.

    Attendees will learn how to gain insight into metadata without an extensive investment in new tools.
  • Eliminate test environment dependencies in your CI/CD pipeline
    Eliminate test environment dependencies in your CI/CD pipeline
    Koustubh Warty and Petr Vlasek Recorded: Apr 16 2019 61 mins
    Enormous savings and quality benefits are possible from shifting testing left to development, but dependencies can make that goal difficult to achieve. Often, services you need to test against are either still in development, cost money to hit (3rd party services) or are simply not available. Sure, you can write a simple mock, but the inherent limitations in types of services you can cover and responses that can be returned often leads to inadequate tests and potential escaped defects.

    Now, you can create ephemeral test environments, complete with robust virtual services. Shift unit testing left by eliminating dependencies on unavailable services, services still in development, or unavailable services right from your IDE. In this webinar we’ll discuss:

    - Best practices for creating robust virtual services for developer use cases
    - How to easily share those services throughout the organization
    - Where to get started today, for free
  • Harnessing Machine Learning and Automation Against Advanced Threats
    Harnessing Machine Learning and Automation Against Advanced Threats
    Frank Jas, Distinguished Engineer Recorded: Apr 16 2019 48 mins
    So, you've finally taken the mantra "Assume breach" to heart and deployed a security solution that detects the advanced threats that slip past your perimeter. Now what? In this session, we describe how advanced threat detection solutions impact incident response and how to deploy security automation to reduce that impact with an eye to time and cost savings relative to your unique SOC workflow.
  • Elevate Your Infrastructure Using Airship
    Elevate Your Infrastructure Using Airship
    Matt McEuen, Technical Architect at AT&T and Evgeny Li, Sr. Software Engineer at Mirantis Recorded: Apr 16 2019 60 mins
    As infrastructure becomes more integrated into services for companies large and small, it also becomes more complex. This is particularly true for telcos such as AT&T, which is why the company founded the Airship project to help cleanly manage infrastructure. In this webinar, Matt McEuen of AT&T and Evgeny Li of Mirantis will explain how this open source project works to streamline deployment of tools such as OpenStack and Kubernetes, demonstrating how it works in both local development and production multinode bare metal environments.

    Attendees will learn:

    •How the architecture of Airship simplifies complex deployment
    •The differences between a bare metal and virtual environment
    •How to deploy a local production environment
    •How to create and trigger a job to perform everyday tasks repeatably and reliably
  • Global Data Protection Index. Are you Protected?
    Global Data Protection Index. Are you Protected?
    Charlie Wood - Project Manager at Vanson Bourne & Mark Galpin, Dell EMC Pre Sales Manager – UKI Enterprise Recorded: Apr 16 2019 36 mins
    Are you confident your business critical data is protected? According to the recent market research Global Data Protection Index conducted by Vanson Bourne, the volume of data being managed is growing at a phenomenal rate from 1.53PB in 2016 to 9.47PB in 2018 in EMEA - but organizations are struggling with protecting new workloads like AI, cloud-native apps and IoT. In fact, 86% of organizations in EMEA think their current data protection solution will not enable them to meet all future business challenges. Join our live webinar to learn more about the state of Data Protection Maturity in EMEA.
  • No More Silos: Integrating Databases into Apache Kafka®
    No More Silos: Integrating Databases into Apache Kafka®
    Robin Moffatt, Developer Advocate, Confluent Recorded: Apr 11 2019 57 mins
    Companies new and old are all recognizing the importance of a low-latency, scalable, fault-tolerant data backbone, in the form of the Apache Kafka® streaming platform. With Apache Kafka, developers can integrate multiple sources and systems, which enables low latency analytics, event-driven architectures and the population of multiple downstream systems.

    In this talk, we’ll look at one of the most common integration requirements – connecting databases to Apache Kafka. We’ll consider the concept that all data is a stream of events, including that residing within a database. We’ll look at why we’d want to stream data from a database, including driving applications in Apache Kafka from events upstream. We’ll discuss the different methods for connecting databases to Apache Kafka, and the pros and cons of each. Techniques including Change-Data-Capture (CDC) and Apache Kafka Connect will be covered, as well as an exploration of the power of KSQL, streaming SQL for Apache Kafka, for performing transformations such as joins on the inbound data.

    Register now to learn:
    •Why databases are just a materialized view of a stream of events
    •The best ways to integrate databases with Apache Kafka
    •Anti-patterns to be aware of
    •The power of KSQL for transforming streams of data in Apache Kafka
  • Modernize your Data Center with VMware Hyper-Converged Solutions
    Modernize your Data Center with VMware Hyper-Converged Solutions
    Tyson Taylor, Vmware Recorded: Apr 11 2019 38 mins
    In the world of Multi-Could environments the importance of having an agile and resilient infrastructure is essential to keep up with the demands of business. This webinar will showcase the flexibility and choice VMware offers to help customers build a Cloud ready environment with HCI.

    April 11th, 2019 - 1:00 pm CDT

    Presented By - Tyson Taylor, Vmware
  • AI, Automation, & its impact on IT
    AI, Automation, & its impact on IT
    Kevin Surace, CEO & CTO of Appvance.ai Recorded: Apr 11 2019 63 mins
    Artificial Intelligence has arrived in the workplace. As an emerging software technology, IT will most likely own the AI and robotic process automation rollouts across their companies. Tune in to hear Kevin Surace, CEO & CTO of Appvance.ai, discuss the very latest insights and gossip around AI and automation including what you need to know to be successful, which fields are showing success with AI and automation, and how you can guarantee a win.

    Presenter Information
    Kevin Surace is a Silicon Valley innovator, serial entrepreneur, and CEO. Kevin has been featured by Businessweek, Time, Fortune, Forbes, CNN, ABC, MSNBC, FOX News, and has keynoted hundreds of events, from INC5000 to TED to the US Congress. He was INC Magazines’ Entrepreneur of the Year, a CNBC top Innovator of the Decade, World Economic Forum Tech Pioneer, Chair of Silicon Valley Forum, Planet Forward Innovator of the Yearnominee, featured for 5 years on TechTV’s Silicon Spin, and inducted into RIT’s Innovation Hall of Fame.

    Mr. Surace led pioneering work on the first cellular data smartphone (AirCommunicator), the first plastic multichip semiconductor packages, the first human-like AI virtual assistant (Portico), soundproof drywall, high R-value windows, AI-driven building management technology, AI-driven QA automation, and the window/energy retrofits of the Empire State Building and NY Stock Exchange. Kevin is CEO of Appvance.ai, sits on 7 boards and has been awarded 28 US patents.
  • Protocol Analysis 201 for High-Speed Fibre Channel Fabrics
    Protocol Analysis 201 for High-Speed Fibre Channel Fabrics
    Yamini Shastry, Viavi Solutions; David Rodgers, Teledyne LeCroy; Joe Kimpler, ATTO Technology Recorded: Apr 11 2019 63 mins
    In the FCIA webcast “Protocol Analysis for High-Speed Fibre Channel Fabrics” experts covered the basics on protocol analysis tools and how to incorporate them into the “best practices” application of SAN problem solving.
    Our experts return for this 201 course which will provide a deeper dive into how to interpret the output and results from the protocol analyzers. We will also share insight into using signal jammers and how to use them to correlate error conditions to be able to formulate real time solutions.

    Root cause analysis requirements now encompass all layers of the fabric architecture, and new storage protocols that usurp the traditional network stack (i.e. FCoE, iWARP, NVMe over Fabrics, etc.) complicate analysis, so a well-constructed “collage” of best practices and effective and efficient analysis tools must be developed. In addition, in-depth knowledge of how to decipher the analytical results and then determine potential solutions is critical.

    Join us for a deeper dive into Protocol Analysis tools and how to interpret the analytical output from them. We will review:
    •Inter switch links (ISL) – How to measure and minimize fabric congestion
    •Post-capture analysis – Graphing, Trace reading, Performance metrics
    •Benefits of purposeful error injection
    •More Layer 2-3 and translation layers debug
    •Link Services and Extended Link Services - LRR Link Ready Rests

    You can watch the 1st webcast on this topic on-demand at http://bit.ly/2MxsWR7
  • vRouter Solutions for Internet Service Providers: Border Router, BNG and CG-NAT
    vRouter Solutions for Internet Service Providers: Border Router, BNG and CG-NAT
    Kelly LeBlanc, 6WIND VP of Marketing & Yann Rapaport, 6WIND VP of Product Management Apr 23 2019 3:00 pm UTC 60 mins
    Internet Service Providers are replacing hardware routers with virtual routers (vRouters) on x86 servers for Border Router, BNG and CG-NAT use cases. 6WIND recently announced ISP customers such as Excitel Broadband, Grape, JHComp and Minorisa are now deployed with 6WIND vRouters for use cases that service up to 200,000 users on Intel servers.

    This Webinar contains information that helps Network Architects, Engineers and Managers at Internet Service Providers, Universities and educational institutions that serve as ISPs, and Integrators to increase performance while reducing costs by replacing hardware routers with vRouters on Intel servers. Customer success stories will be included.
  • ESG Research: The Hybrid Cloud Tipping Point
    ESG Research: The Hybrid Cloud Tipping Point
    Scott Sinclair, ESG; Michelle Tidwell, IBM, Mike Jochimsen, Kaminario; Eric Lakin, Univ. of Michigan; Alex McDonald, NetApp Apr 23 2019 5:00 pm UTC 75 mins
    Has hybrid cloud reached a tipping point? According to research from the Enterprise Strategy Group (ESG), IT organizations today are struggling to strike the right balance between public cloud and their on-premises infrastructure. In this SNIA webcast, ESG senior analyst, Scott Sinclair, will share research on current cloud trends, covering:

    •Key drivers behind IT complexity
    •IT spending priorities
    •Multi-cloud & hybrid cloud adoption drivers
    •When businesses are moving workloads from the cloud back on-premises
    •Top security and cost challenges
    •Future cloud projections

    The research will be followed by a panel discussion with Scott Sinclair and SNIA cloud experts Alex McDonald, Michelle Tidwell, Mike Jochimsen and Eric Lakin.
  • ServiceNow Knowledge19 Sneak Peek: How to Conquer the Conference
    ServiceNow Knowledge19 Sneak Peek: How to Conquer the Conference
    Ellen Daley, Grant Pulver, Dana Canavan, James Hamilton, Ryan Dinwiddie, Meghan Lockwood Apr 23 2019 5:00 pm UTC 60 mins
    Learn how to maximize your ServiceNow Knowledge 2019 experience. This team of ServiceNow experts (and Knowledge veterans) will cover everything A-Z K19. Join this webinar to...

    - Learn tips to maximize your experience
    - Uncover the questions our clients ask us the most
    - Find out the three things you absolutely must do to ensure it's the most successful Knowledge conference yet
    - Get a preview of two of Acorio's Presentations at K19
  • Optimize Workspace Performance for the Modern WAN
    Optimize Workspace Performance for the Modern WAN
    Valerie DiMartino, Senior Product Marketing Manager at Citrix & Joshua Thompson, Product Marketing Manager at Citrix Apr 23 2019 6:00 pm UTC 50 mins
    Users in remote and branch locations rely on an optimized network for a superb Workspace experience and high productivity. If your traditional WAN can’t keep up with the bandwidth demands of rich media, high-resolution monitors, virtual, web, and SaaS apps, virtual desktops, and file sync, the user experience — and ultimately the business — will suffer. This webinar explores how Citrix SD-WAN is application aware, allows you to better utilize your existing bandwidth, optimizes the performance of virtual, web, and SaaS apps like Office 365, plus other bandwidth-intensive apps such as VoIP, and ensures always-on connections.

    Learn why your existing WAN may not be able to handle future demands and how to avoid common pitfalls when choosing an SD-WAN solution.

    In this webinar you will learn how to:
    •Enable Internet and SaaS breakout from the branch
    •Increase bandwidth while eliminating outages and interrupted sessions
    •Get deep visibility into the WAN to help you understand the quality of experience
  • Tech Tuesday: Measuring Performance of Object Storage
    Tech Tuesday: Measuring Performance of Object Storage
    Ryan Meek, Principal Solution Architect & Michael "Q" Brame, Quality Engineering Lead Apr 23 2019 6:00 pm UTC 60 mins
    Object protocols and file translations present performance testing challenges that are different from standard file systems. In this webinar, we will identify the relevant performance benchmarks for object storage software testing and discuss best practices for measuring and evaluating performance in object storage systems.
  • Proactive Preparation: Disaster-Proofing your Data
    Proactive Preparation: Disaster-Proofing your Data
    Seyi Verma, Director of Product Marketing, Druva Apr 24 2019 12:00 pm UTC 56 mins
    Imagine that you're responsible for a massive construction project and you just lost your data due to a disaster. Blueprints? Gone. Timelines? Gone. Drinks? Might be time for one!

    Losing your data is a reality that every company faces—construction is no exception. That's why Egan Company—a leading specialty trades contractor in Minnesota, unsatisfied with their previous backup products)—turned to Druva Phoenix to ensure their critical data was backed up and fully accessible in the event of a disaster.

    Join this informative webinar with experts from Egan Company and Druva, and learn about:

    - The flexibility, security and value of data protection delivered as-a-service in the cloud
    - How Egan Company enjoys fast, reliable restores, including large-scale VM volumes
    - How Druva Phoenix offers the go-to solution for backup, archival, and disaster recovery
  • The 5 Ws of Office 365 Backup and Recovery
    The 5 Ws of Office 365 Backup and Recovery
    Penny Gralewski and Mary Ellen Cavanaugh - Commvault Apr 24 2019 2:00 pm UTC 232 mins
    You have questions about Office 365 backup and recovery – we have answers. Learn what you need to know about Office 365 data protection.

    One big question: do I need Office 365 backup and restore? Answer: yes, yes you do.

    We’ll explain the details and provide tips to help your Office 365 data strategy.

    Learn the answers to these common questions:

    Who is responsible for Office 365 data protection?
    What should I know about Exchange Online backup and restore?
    Where can I store SharePoint Online backups?
    When should I plan OneDrive for Business backups?
    Why is backup important for Office 365 data migration?
    Join Commvault for this new and informative webinar.
  • Firewall Rule Recertification with Application Connectivity
    Firewall Rule Recertification with Application Connectivity
    Asher Benbenisty, Director of Product Marketing Apr 24 2019 2:00 pm UTC 20 mins
    Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.

    However, manual firewall rule recertification is complex, time-consuming and prone to errors.

    Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.

    In this webinar Asher will cover:
    • Why it is important to regularly review and recertify your firewall rules
    • How to use application connectivity for firewall rule recertification
    • How to automatically manage the rule-recertification process
  • Can AIOps cure your service desk problems?
    Can AIOps cure your service desk problems?
    Mohan Kompella, Senior Director, Product Marketing @BigPanda Apr 24 2019 4:00 pm UTC 30 mins
    If you use ServiceNow, JIRA or another service desk system, your helpdesk and ITSM teams have probably run into some of these issues:

    A single outage or disruption creating hundreds of tickets
    Critical contextual information missing from these tickets
    Duplicate and wasted efforts because your service desk and your monitoring tools are not connected through a bi-directional integration

    What's the cure? AIOps.

    When you adopt AIOps with BigPanda, in about 8-12 weeks, you can reduce your ticket volume by up to 99%, use information from your CMDB, inventory databases, spreadsheets and excel files to add critical context to your tickets, and unify workflows between your IT Ops, helpdesk and ITSM teams.
  • Cloud Migration: Opportunities and Risks for the Business Unit
    Cloud Migration: Opportunities and Risks for the Business Unit
    John Armstrong, Head of Product Marketing Apr 24 2019 5:00 pm UTC 30 mins
    The business case for cloud migration is compelling: cost reductions, ease of growth and
    expansion, outsourcing of infrastructure and maintenance, and improved access to the latest
    technologies. However, many organizations that are migrating to the cloud focus on technical factors and overlook the broader business implications of their projects. As a best practice, assessing the opportunities and risks for the organization should be a joint effort led by the IT and business unit teams. At the highest level, a business justification focuses on the return on investment (ROI) associated with a proposed technical change. However, many supporting data points are required to populate the formula and achieve a realistic calculation.

    In this webinar, we will address these and other critical questions:

    What are the key business expectations associated with a cloud migration?
    What are the implications if the cloud migration doesn’t go as planned?
    What business considerations should be included in any cloud migration plan?

    And always, this webinar will be followed by a short Q and A session with the audience. Please join us!
  • Fight the good fight against the bad bots!
    Fight the good fight against the bad bots!
    Brian McHenry and Graham Alderson Apr 24 2019 5:00 pm UTC 35 mins
    Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organisations developing a sustainable security strategy.

    Join us for this webinar to learn:
    - How bots infect, propagate, and attack applications
    - What types of application attacks are commonly performed by bots
    - How you can defend against bad bots without disrupting the good ones
  • Deliver Azure Services from Your On-Premises Data Center
    Deliver Azure Services from Your On-Premises Data Center
    Lakshmi Kanthan, International Product Mktg, Fujitsu; Christophe Le Roux, Azure Stack Partner Lead EMEA, Microsoft Apr 25 2019 3:00 pm UTC 60 mins
    Microsoft Azure Stack enables you to deliver Azure Cloud Services from your on-premises data center, ensuring consistent service delivery across on-premises and public cloud. Fujitsu developed PRIMEFLEX for Microsoft Azure Stack which is an integrated system that includes all the hardware, software and support to simplify procurement, deployment, operation and maintenance of your Microsoft-based hybrid cloud infrastructure. Join us to learn more!
  • Model-based API Testing
    Model-based API Testing
    Ben Johnson Ward Apr 25 2019 3:00 pm UTC 60 mins
    Traditional API Testing offers well-known benefits like speed, robustness, and ease of automation as compared to testing via the UI. While testing an API as exhaustively as possible is often the most effective way to know if each component is behaving the way it should, this is still dependent on the extent of test coverage provided.

    Shackled by slow incomplete manual test designs, API Testing is missing key metrics to help optimize test plans. Testers have difficulty prioritizing what needs to be tested, while developers are unable to shorten test runs and fail fast for more immediate feedback. So how do we compliment API Testing with the power of Model-based Testing (MBT) for maximum testing coverage and efficiency by optimizing our test design?

    Join MBT expert Ben Johnson Ward as he dives into a fully integrated end-to-end API testing framework/pipeline to rapidly test a live webservice. Using a powerful MBT test generation solution, he will show how to generate executable REST-assured API tests with enriched reporting, as well as manage requirements changes in the application and their impact on testing.

    You'll learn:
    - Automate test design/creation with Model-based Testing tool Agile Requirements Designer (ARD)
    - Creating REST-assured API tests utilizing ARD and executing with Java
    - How to quickly generate tests for any scenario or coverage goal
    - How to react efficiently to changing requirements to keep our automated testing in-sprint
    - How to generate enriched test result reports

    The presentation will be followed by a Q&A session
  • Field Testing and Troubleshooting of PON LAN Networks per IEC 61280-4-3
    Field Testing and Troubleshooting of PON LAN Networks per IEC 61280-4-3
    Jim Davis, Fluke Networks Apr 25 2019 3:00 pm UTC 75 mins
    This webinar address field testing and troubleshooting PON Networks per IEC 61280-4. Topics include inspection and cleaning (APC vs. UPC), PON Basics, understanding loss budgets, setting a reference, troubleshooting using an OTDR and Power Meter, and how to document results. Attendees will earn one BICSI CEC.
  • Managing Colo to Cloud and Beyond in the TierPoint Portal
    Managing Colo to Cloud and Beyond in the TierPoint Portal
    Dale Levesque, Director – Product Management | TierPoint Apr 25 2019 4:00 pm UTC 60 mins
    More organizations are adopting a hybrid approach to IT and are seeking a partner to help integrate both outsourced and in-house IT services, ideally managed through a single interface.

    Designed to meet the needs of our customers, the TierPoint Portal is a streamlined console that provides a comprehensive user-friendly dashboard of critical information immediately upon logging in.

    From data center and managed services performance dashboards to trouble ticketing support, the TierPoint Portal is your dependable, always-on visibility tool to help manage your TierPoint IT infrastructure environment.

    Join us to learn how the TierPoint Portal makes it easy to view, protect and access management tools for all facets of your environment.
  • Dissecting an OEM Maintenance Contract: What Services are Actually Included?
    Dissecting an OEM Maintenance Contract: What Services are Actually Included?
    Ed Ismail, VP Maintenance; Jordan Bischof, Global Dir., Storage; Joel Coviello, Dir. Enterprise Storage Apr 25 2019 4:00 pm UTC 60 mins
    Understanding the number of services and features included in an OEM maintenance contract can be confusing and knowing which platforms these services will benefit is equally challenging.

    Join this presentation to better understand:
    •The services often “bundled” in an OEM support agreement
    •How the link between hardware maintenance and software licensing affects buying decisions
    •Variables to consider when determining which portions of your data center do and do not require premium services
    •Case-studies highlighting the operational and financial impacts of these practices
  • Hot vs Cold Data: Its Influence On Data Placement Decision & What to Do About It
    Hot vs Cold Data: Its Influence On Data Placement Decision & What to Do About It
    Augie Gonzalez, Director of Product Marketing, DataCore Software Apr 25 2019 6:00 pm UTC 60 mins
    The short half-life of data, quickly decaying from hot to warm to cold, governs how much you should spend on it throughout its stages.

    Humans are poorly equipped to track the rapid temperature changes, much less capable of reacting to it. Consequently, largely dormant data consumes precious space on expensive storage, blowing up disk capacity and spiraling up costs.

    In this webinar you’ll become acquainted with:
    •Machine learning (ML) techniques that sense data temperature variations in real-time
    •Artificial intelligence (AI) methods used to dynamically migrate data accordingly, between primary, secondary and cloud storage from different suppliers
    •Relative distribution of storage tiers necessary for optimum savings
  • What's New with Dell EMC Storage Resource Manager (SRM)
    What's New with Dell EMC Storage Resource Manager (SRM)
    Ravi Prakash Reddy, Dell EMC Apr 26 2019 12:30 pm UTC 60 mins
    This webinar starts with an overview of Dell EMC Storage Resource Manager and then covers ease of use enhancements, expanded feature coverage, enhanced platform support and serviceability enhancements.

    Presented by: Ravi Prakash Reddy
  • Want Better Network Visibility with Less Complexity? Here's How!
    Want Better Network Visibility with Less Complexity? Here's How!
    Bob Laliberte, Senior Analyst, ESG and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Apr 29 2019 8:00 am UTC 53 mins
    Enable IT Collaboration with a Common Distributed Data Services Layer.

    The IT environment is rapidly changing, becoming more distributed and complex as organizations transform themselves to provide better digital experiences. Because these improved experiences will be more dependent on the network, it’s imperative for organizations to properly plan and prepare now to eliminate security blind spots. The bottom line is that companies need complete visibility into their physical, virtual and cloud infrastructure to detect and contain data breaches and mitigate risk.

    To accomplish this, successful organizations resist the legacy mentality that relies on more people and more tools at every location. Instead, they are turning to a new architectural approach that disaggregates the speed of the network from the speed of the tools inspecting traffic on that network. This innovative approach allows enterprises to absorb change in network speed and technology without compromising security.

    ESG believes the foundational step in this approach is to ensure comprehensive infrastructure visibility across data centers and distributed edge and cloud environments. To do this, organizations must have a common distributed data services layer that can collect, process and distribute the right information to the right tools at the right time.

    Join us to learn how a consolidated network architecture that includes security delivers better visibility, reduces complexity and increases tool efficiency.
  • What's New in Test Data Manager (TDM) 4.8?
    What's New in Test Data Manager (TDM) 4.8?
    Jeff Hughes and Keith Puzey Apr 29 2019 5:00 pm UTC 60 mins
    CA Test Data Manager has just released version 4.8 with exciting new features including Portal Masking which includes an independent masking engine and Docker-Based masking. These new features, along with others, will help your testing teams speed up the process of finding and delivering test data when it's needed. Join Jeff Hughes and Keith Puzey for a complete discussion and demonstration of the latest features in TDM 4.8
  • Leading with threat intelligence – How to select the right security provider
    Leading with threat intelligence – How to select the right security provider
    Shantanu Mahajan, Regional Security Architect at FireEye Apr 30 2019 5:30 am UTC 60 mins
    Today’s sophisticated attackers often hide within the noise of abundant alerts generated by a myriad of security products. Limited budgets, a shortage of skilled security staff, and rigid regulatory requirements make it difficult for organizations to effectively identify and understand these threats—negatively affecting risk-based decision making and asset protection.

    Effective cyber security requires an understanding of who is likely to target you, and how they operate.

    As security leaders and executives turn to service providers to evaluate their security maturity, manage business risks and build sustainable security programs, they often ask ‘how do I select the right security partner for my organization?’

    Join Shantanu Mahajan, Regional Security Architect at FireEye, as he shares insights on:

    • Selecting the right service provider for your organization
    • Realizing limitations of providers who apply traditional and compliance-focused approaches
    • Working with providers who intimately monitor attackers across the evolving threat landscape
    • Understanding the role of cyber threat intelligence in effective cyber security services
    • Asking the right questions of your security providers to enable critical business decisions
  • Are Your Containers Secure?
    Are Your Containers Secure?
    Wim Coekaerts Senior Vice President, Operating Systems & Virtualization Engineering, Oracle Apr 30 2019 9:00 am UTC 45 mins
    Cloud-native applications are on a rapid rise, which brings a proliferation of serverless environments and containers. While this can help you deliver innovations faster, is there a downside?

    Whatever your deployment model is, when it comes to securing your infrastructure, being proactive rather than reactive is a must for technology-related priorities to stay on track.
  • What's new in G-Cloud 11?
    What's new in G-Cloud 11?
    Nicky Stewart, Commercial Director at UKCloud Apr 30 2019 10:00 am UTC 60 mins
    Join our Commercial Director Nicky Stewart as she guides you through :
    - What's new in G-Cloud
    - Important G-Cloud Rules, Guidelines, Dates and Deadlines


    and much more..

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Don’t Let Digital Transformation Wreak Havoc on Your Network!
    Don’t Let Digital Transformation Wreak Havoc on Your Network!
    Sam Kumarsamy, Sr. Product Marketing Manager Gigamon Apr 30 2019 5:00 pm UTC 60 mins
    Organizations adopting digital apps must deliver an engaging user experiences at the enterprise level to be successful. Unfortunately, the road to great digital experiences is paved with speed bumps: they can cause networks to become even more complex as they groan under the weight of accommodating more users, increased data volume and higher speeds.

    Yes, digital apps are hyper-agile, but they are also very complex: components are often outsourced, apps are usually mega-tiered and are deployed across physical, virtual and cloud networks, making it difficult to get visibility into traffic. And without that visibility, how can you truly ensure a great experience?

    Help is at hand. During this webinar, you will learn how to build an efficient network architecture to provide an engaging digital experience.

    Attendees will learn how to:
    • Utilize tools efficiently by preventing packet duplication and optimizing traffic
    • Enhance security by collecting and distributing NetFlow metadata to tools more effectively
    • Identify, categorize and visualize more than 3,000 applications automatically

    See how a next-generation network packet broker increases visibility, improves security and enables companies to maximize their investment in tools to exceed user expectations.
  • Lessons from the Trenches:  Implementing Zero Trust in Reality
    Lessons from the Trenches: Implementing Zero Trust in Reality
    Brian Talbert, Alaska Airlines and Chase Cunningham, Forrester Apr 30 2019 7:00 pm UTC 60 mins
    Zero Trust is a major initiative for many security teams globally. But how do you get started? What pitfalls should be avoided?

    Forrester has published a lot on Zero Trust. In this webinar, Forrester Zero Trust analyst Chase Cunningham interview Brian Talbert from Alaska Airlines to chronicle their lessons and best practices in implementing Zero Trust as they moved to a cloud-based architecture. We’ll discuss implementing Zero Trust in the cloud where many of your old security tools don’t work and dive deep into:
    -Architectural considerations
    -Products and technologies
    -Organizational factors