Create Your Next-Gen Network with Citrix NetScaler

Mark DeFreitas, Principal Networking Consultant at IT Weapons & David Cooper, Senior Citrix Sales Engineer at Citrix Systems
For this webcast, we’re taking an inside look at the latest networking, application access, and security features baked into the 2012 Citrix NetScaler 10 technology. Join IT Weapons and Senior Citrix Sales Engineer, David Cooper, for this technical tour of the industry’s most advanced cloud network platform; Citrix NetScaler.

Citrix NetScaler 10 enables the data centre network to become an end-to-end service delivery fabric to optimize the delivery of all web applications, cloud-based services, virtual desktops, enterprise business apps and mobile services. It ensures the performance, availability and security SLAs for any service to any user, anywhere.

During our webcast we’ll explore the following NetScaler 10 features:
• Advanced load balancing for high availability
• Citrix TriScale technology
• Application visibility and simple policy management
• Enhanced security features
Jun 12 2012
59 mins
Create Your Next-Gen Network with Citrix NetScaler
More from this community:

IT Security

  • Live and recorded (5260)
  • Upcoming (140)
  • Date
  • Rating
  • Views
  • Join Tom Kellerman, Chief Cyber Security Officer for Trend Micro, in an informative webinar specifically tailored for corporate executives and directors who need to develop and implement a comprehensive cyber security strategy. Tom will highlight critical information including 2015 cyber threat trends and how risk management strategies have changed.

    During this live webinar, you’ll learn:
    • How to identify, classify, and protect your valuable data assets
    • How to assess your organization’s vulnerability to attack
    • How to measure and mitigate cyber risks cost-effectively
    • And more...
  • A new category of threat is emerging – a threat designed to evade traditional signature-based technologies such as Anti-Virus and Intrusion Detection. Attempting to meet the challenge is a new class of technology, “Advanced Malware Protection” or “AMP,” which is an industry term for technology designed to continuously monitor for, offload and detonate files in a sandbox - safely away from the main environment - to observe and detect malicious objects.

    If a security device produces an alert in the forest, who’s there to hear it?

    The challenge is these next generation advanced malware detection solutions produce so much detail about the suspicious activity that most organizations do not have the resources to thoroughly investigate/analyze. The best technology means nothing if you don’t have the right expertise to react to the alert, quickly decipher complex reports, investigate the threat, and determine the right response. And meanwhile, the threat actors aren’t standing still – they’re developing measures to circumvent controls in some traditional sandbox environments.

    You will learn:
    1.How the threat is evolving and how actors are employing evasive practices to overcome traditional and even some more sophisticated security defenses
    2.Why next generation sandboxing and full-system emulation are the keys to combatting evasive malware threats
    3.The expertise needed to accurately identify and diagnose the threat once the alert is received
    4.How to ensure your organization has the ability to respond effectively to the incident and close all the backdoors a threat actor may have opened
  • 2014 could have easily been called, “The year of the biggest security breaches since the beginning of forever.” But given current security practices and technologies, many of the breaches could have been prevented. So why weren’t they?

    Many of the affected companies fell into a very common trap, thinking that if a company goes to the trouble to be legally compliant then it will be effectively “secure.” Unfortunately, as with many kinds of regulations, legal compliance really represents the absolute least amount of effort required. If companies want to give themselves the best chance to avoid the very severe consequences that come with a major breach, there are five practices they need to put in place now.

    Join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage, on this webinar to learn
    · Possible gaps left by the compliance-first approach to security
    · How to limit vulnerabilities across traditional, virtual and cloud infrastructures
    · Five best practices to avoid a major security breach in 2015
  • The bring-your-own-device (BYOD) movement has been a huge boon for businesses that put a premium on productivity. File sync and share solutions have emerged to help employees work from anywhere, at any time, on any device. In this BrightTALK exclusive, eFolder explores the top seven features that business should consider when adopting a file sync and share solution. Learn what is required for a file sync and share solution to improve collaboration, maximize productivity, and ensure security.
  • Join Tom Kellermann, Chief Cyber Security Officer for Trend Micro, in an informative webinar specifically tailored for corporate executives and directors who are ready to take the reins of a real and effective plan to secure their organization, their data, and their careers against targeted attacks.

    During this live webinar, you’ll learn:
    • How to identify, classify, and protect your valuable data assets
    • How to assess your organization’s vulnerability to attack
    • How to measure and mitigate cyber risks cost-effectively
  • The Internet of Things (the new buzzword for the tech industry) is increasing the connectedness of people and things on a scale that was once beyond imagination. Connected devices outnumber the world's population by 1.5 to 1.It is expected to eventually touch some 200 billion cars, appliances, machinery and devices globally, handling things like remote operation, monitoring and interaction among Internet-connected products.

    In combination with the fact that there are almost as many cell-phone subscriptions (6.8 billion) as there are people on this earth (seven billion), we have all the ingredients for a Perfect Cyber Storm.

    Join me for an informal discussion of the challenges for our profession, and some possible solutions.
  • Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources.

    In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

    In this practical session, Joe will cover:
    - How to work around the limitations of a small (or one person) team
    - Tips for establishing a daily routine
    - Strategies to effectively prioritize daily tasks
    - Benefits of threat intelligence sharing
    - Critical investigation & response steps when the inevitable incident occurs
  • Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources.

    In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

    In this practical session, Joe will cover:
    - How to work around the limitations of a small (or one person) team
    - Tips for establishing a daily routine
    - Strategies to effectively prioritize daily tasks
    - Benefits of threat intelligence sharing
    - Critical investigation & response steps when the inevitable incident occurs
  • Cutting down on the time taken to complete complex document review cycles allows the modern lawyer to operate at the pace required by their industry.

    Join our webinar to learn top tips for shortening these review cycles without losing document integrity and risking corruption. We’ll also cover what technologies are available to provide a quick and accurate way to improve document review efficiency.
  • FireEye recently released a new report that documents how and why governments around the world are turning to the cyber domain as a cost-effective way to spy on other countries, steal technology, and even wage war.

    Whether it’s sensitive military, diplomatic, or economic information, governments depend on the integrity of their data. If that data falls into the wrong hands, the consequences could be severe.

    In the wake of two apparent state- and government-sponsored attacks, APT1 and APT28, government agencies must understand why they are in attackers’ crosshairs, what attackers might be seeking, and how they can protect themselves.

    Join us for a dynamic discussion with subject matter experts where you will learn:

    •What makes your government-related organization an appealing target – whether you’re a political opponent, business, agency or vendor
    •Why it’s important to determine who could be planning an attack, their motives, and how they might carry out their goals
    •How to assess your level of preparedness and how to protect yourself if you are not ready for this new era of cyber warfare
  • Channel
  • Channel profile
  • Mobility and Workshifting with Citrix! Recorded: Dec 20 2012 61 mins
    Gone are the days of physical offices, desktop computers, and traditional work hours. A workshifting strategy must address two issues to succeed:

    Employees must have access to desktops, apps, files and collaboration just like they would in the office and IT Security must control and secure business information.

    Workshifting allows companies to:

    1) Give employees the flexibility of a mobile workplace to choose the ideal time, place and device for their work
    2) Provide employees uninterrupted access to desktops and apps during business disruptions of any kind
    3) Reduce travel, labor, and real estate costs through flew-work, telework, and alternative workplace strategies.
    4) Attract and retain the best experienced people wherever you fine them!
  • Extend the Value of Citrix XenApp with AppSense Recorded: Nov 28 2012 60 mins
    Virtualization is a top priority to reduce costs and improve business efficiency for most of the world’s leading strategic IT teams. Citrix XenApp provides a delivery infrastructure that makes it easy to deliver any application to any user with high performance and security at low cost. AppSense helps you get more out of your existing Citrix XenApp infrastructure by providing additional levels of policy and personalization management, together with managing application access and system resource allocation - all in one solution.

    Join AppSense and IT Weaons to learn new approaches to:
    • Extend contextual personalization and policy management capabilities
    • Ensure optimal allocation of system resources to increase users and applications density
    • Manage application and network entitlement to a granular level
    • Control application usage and enforce Microsoft software licensing

    Register today to hear best practices and real-life success stories to extend the value of your application virtualization investments.
  • Security Myths: Separating Facts from Fiction Recorded: Nov 22 2012 45 mins
    Today's IT environments have become a security management nightmare. With the growing complexity of products, and common misconceptions of misguided marketing campaigns and misunderstandings of deployed technologies, organizations are faced with significant challenges to managing their security environments. Did you know that most security breaches today are fundamentally caused by relying on technologies to solve problems they weren’t designed to solve? The nature of the majority of attacks are opportunistic so improperly deployed access controls end up leaving organizations with a false sense of security and are vulnerable to attacks.

    In this webcast we will highlight:
    • How today’s market misunderstands the role of SSL, anti-virus and firewalls technologies
    • How to apply "defense in depth" when properly securing your infrastructure
  • Managed Services That Make Sense: Do What’s Right and Keep Your Business Safe. Recorded: Sep 6 2012 53 mins
    Does it make sense to move some of your applications and data to a cloud or data centre provider? How important are DR considerations to your lines of business? Most importantly, what should you look for in a managed services, cloud, or data centre provider?

    Today’s IT marketplace is flooded with choices; from break-fix IT support and traditional managed services to tomorrow’s Infrastructure-as-a-Service. Join IT Weapons for a no-nonsense look at today’s Data Centre and Cloud marketplace. In this webcast we’ll give you the straight talk on what to consider when you think about Canadian private cloud and data centre services for your business.
  • Create Your Next-Gen Network with Citrix NetScaler Recorded: Jun 12 2012 59 mins
    For this webcast, we’re taking an inside look at the latest networking, application access, and security features baked into the 2012 Citrix NetScaler 10 technology. Join IT Weapons and Senior Citrix Sales Engineer, David Cooper, for this technical tour of the industry’s most advanced cloud network platform; Citrix NetScaler.

    Citrix NetScaler 10 enables the data centre network to become an end-to-end service delivery fabric to optimize the delivery of all web applications, cloud-based services, virtual desktops, enterprise business apps and mobile services. It ensures the performance, availability and security SLAs for any service to any user, anywhere.

    During our webcast we’ll explore the following NetScaler 10 features:
    • Advanced load balancing for high availability
    • Citrix TriScale technology
    • Application visibility and simple policy management
    • Enhanced security features
  • 3 Tech Challenges of 2012: Mobile Device Management, DR and Security Recorded: Apr 25 2012 46 mins
    Studies show that nearly 50% of North American businesses will incorporate tablets and other new mobile platforms (iPhones, Android, Windows 8) into their corporate networks this year. Are you ready for the challenge this new technology presents for system support, management, and security?

    Join IT Weapons CEO, Ted Garner, for a candid look at the trends that are impacting today's IT leaders and the innovative strategies and tools available to help you meet those challenges head-on. In this exciting and interactive webcast we'll explore the intersecting issues around Security and Compliance, Mobile Device Management, and Disaster Recovery planning. We’ll share the insight you need to keep your business agile and resilient.
  • Improve Your Disaster Recovery Preparedness Recorded: Mar 21 2012 57 mins
    Do you worry about the business impact of data loss if disaster strikes? Does your DR plan depend on complicated, error-prone run books and manual processes? Do you refrain from testing your DR plan because it's expensive and difficult? If you've answered yes to these questions, then you're not prepared, and your business may be at risk.

    True business resilience requires investment, and monetary cost is only a portion of this investment. Developing the right disaster recovery strategy for your organization takes time and planning. Join IT Weapons and VMware for this webcast to see strategies and solutions that will improve the disaster recovery preparedness for your business.

    Attend this webcast to learn:
    •The 3 key phases to providing robust Disaster Recovery services
    •How automating processes with VMware Site Recovery Manager 5 can simplify management and ensure fast and reliable recovery
    •How IT Weapons Data Protection Services can help your organization
  • My Infrastructure is Cloud Enabled, Now What? Recorded: Feb 28 2012 50 mins
    Odds are you've already virtualized much of your server and storage infrastructure. Now you are wondering how to leverage the Cloud and realize its true benefits. All the choices available can leave you confused. When it comes to the Cloud, the direction you choose for your business can impact performance, availability, backup and disaster recovery.

    Join us for another exciting webcast where we'll explore the Cloud landscape and help you see the real differences between Public, Private, and Hybrid models. You'll leave this session understanding the tools and services available to turn today's virtual servers and storage into tomorrow's high-performance Cloud infrastructure.
  • Securing The Human Element: Get the Facts about Phishing Recorded: Feb 1 2012 41 mins
    Even with the most comprehensive security appliances at work, your people can still create security holes. The actions a user takes during their day-to-day work can leave your company exposed to security breaches and allow unauthorized entry into the corporate infrastructure. Well meaning and loyal employees can inadvertently create vulnerabilities in your environment.

    This webcast will highlight some employee behaviours and actions that can potentially compromise your corporate assets. We will also discuss some key ways you can better protect your organization and educate your users.
Live monthly webcasts for technology professionals.
Our monthly webcasts showcase an array of technology topics to keep your business feeling safe. Our goal is to deliver quick updates on what's new with IT Weapons and the IT industry at the convenience of your own schedule.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Create Your Next-Gen Network with Citrix NetScaler
  • Live at: Jun 12 2012 3:00 pm
  • Presented by: Mark DeFreitas, Principal Networking Consultant at IT Weapons & David Cooper, Senior Citrix Sales Engineer at Citrix Systems
  • From:
Your email has been sent.
or close
You must be logged in to email this