Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Upgrade Your Website Performance and Security: Migrate from Akamai to Incapsula
    Upgrade Your Website Performance and Security: Migrate from Akamai to Incapsula Dvir Shapira, Director of Product Management & Robert Hamilton, Director of Product Marketing, Imperva Incapsula Aug 24 2017 4:00 pm UTC 45 mins
    If your Akamai cloud-based platform is no longer meeting your company’s need for security and application delivery, consider a switch to Imperva Incapsula.

    The Incapsula cloud service helps you deliver applications securely and efficiently. With a single interface that integrates content delivery, website security, DDoS protection, and load balancing, you can accelerate the delivery of your web content and protect your site from external threats.

    Here's just some of what you'll learn during this webinar:

    •The differences in functionality between the two platforms
    •Operational advantages and cost savings from a switch to Incapsula
    •How to plan and execute a successful migration from Akamai to Incapsula

    And just for attending this live webinar, you’ll get a free migration guide to help you transition easily from Akamai to Incapsula.

    With PCI compliance, a robust engine with customizable security rule setting, 24/7 support, and significant cost savings, why wouldn’t you consider a switch to Incapsula? Find out if the Incapsula cloud security platform is right for you.
  • Shoring up Your Defenses by Leveraging Analytics and Machine Learning
    Shoring up Your Defenses by Leveraging Analytics and Machine Learning Mark McGovern, VP, Product Mgmt., CA; John Carnes, Infosecurity Senior Adviser, Anthem; Erik Von Geldern, FXCM Aug 24 2017 5:00 pm UTC 75 mins
    Attackers are getting quicker and more sophisticated. Today's enterprise defenders aren’t able to withstand the pace and complexities of the threats they face. Automated tools and intelligence are being deployed to breach your IT infrastructure and access your priceless data by targeting privileged accounts. In playing defense, security teams must become proactive, not reactive and use data and analytics in a meaningful way, being more effective and agile in detecting attackers and quickly thwarting them. Join CA Technologies and (ISC)2 on August 24, 2017 at 1:00PM Eastern for a discussion on emergence of machine learning and security analytics as tools that organizations can leverage to defend their data and some practical ways it can be used to protect key assets such as privileged accounts.
  • Modeling and Pricing Cloud Migration Scenarios
    Modeling and Pricing Cloud Migration Scenarios Chris Grossmeier, Senior Director of Product, CloudPhysics Aug 24 2017 5:00 pm UTC 45 mins
    Learn how to appropriately model your future state environment for both instance and cluster-based cloud hosting. Learn how outliers and dependencies make major impacts on capacity and costing your future environment. Look at groupings, clusters, and dependencies to ensure all workloads move together to avoid ingress/egress charges for large IO resources.
  • VMware vRealize Operations: Installation, Sizing & Day 1 in the Cloud
    VMware vRealize Operations: Installation, Sizing & Day 1 in the Cloud Mike Eisenberg Aug 24 2017 6:00 pm UTC 90 mins
    During this session a VMware Cloud Specialist Engineer will show you how to install and configure vRealize Operations (vROps) to quickly make it functional within your environment. We will begin with a brief review of the vRealize Operations Architecture and its different server configuration options.

    This session will also cover:
    -Sizing considerations and guidelines for pre-installation planning
    -Installation wizard walk through including setup options and their effect on the environment
    -Connection options of vROps to a vCenter(s) and the process of discovering and collecting data
    -Steps to verify the system is collecting data once installation is complete

    To wrap things up we will review the user environment and how to start using vROps to proactively manage your environment.
  • Success Factors in Threat Intelligence: Part 4 - Connecting the Dots
    Success Factors in Threat Intelligence: Part 4 - Connecting the Dots Allan Thomson, Chief Technical Officer Aug 24 2017 6:00 pm UTC 45 mins
    This series describes a comprehensive “business technical approach” to the justification, definition, design and execution of Threat Intelligence Programs.

    What do we mean by “business technical approach’ to Threat Intelligence?

    Much in the industry is focused solely on one technical aspect or another of threat intelligence data that indicates information about a specific malware family, a set of indicators that can be used to block malicious sites, campaign information that highlights a threat actors profile, their tactic, techniques and procedures. But much of the technically focused content do not discuss how organizations can gather or construct that information themselves, and even more so, how an organization would organize themselves to respond to such data. Much of the output of the industry is providing the fish to organizations rather than teaching the organizations how to fish themselves.

    A ‘business technical approach’ is one where we define an approach focused on the business needs, the organization personnel, organizational roles & responsibilities, team structure and those elements’ interaction with technology to address the challenge of successful threat intelligence operations. Our goal is to help organizations build effective Threat Intelligence programs.

    In this final part of the CSO Series, we will describe how successful TI Programs can fully deliver on reducing risk in organizations. What does success look like for an effective TI Program when it is fully integrated into organizations security framework.
  • IoT is Wildly Insecure – Who is watching over your wall?
    IoT is Wildly Insecure – Who is watching over your wall? Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Aug 24 2017 6:00 pm UTC 45 mins
    In today’s interconnected world of IoT devices, security is the #1 challenge. Between self-driving cars, Nest thermostats, and talking refrigerators, the Internet of Things has grown at a staggering rate. It’s estimated that there will be an 50B IoT devices in use by 2020, most of which will have exploitable vulnerabilities.

    Manufacturing, healthcare, and information sectors have all embraced IoT devices because of their increased functionality, but at what cost to network hygiene? As your organization begins to incorporate more connected devices, how do you protect your network?

    Attend this webinar to learn about:
    1)  Top 5 IoT Security Challenges
    2)  Disconnect between Operations and Information Technology
    3)  Cyber security best practices that includes IoT security

    You are the shield that guards your realm. Don’t let IoT penetrate your wall.
  • Six foresights for the SDN – ensuring security, connectivity, and compliance
    Six foresights for the SDN – ensuring security, connectivity, and compliance Amnon Even Zohar Director of Cloud Product Management, Tufin & Dan Rheault, Sr. Product Marketing Manager, Tufin Aug 29 2017 3:00 pm UTC 45 mins
    Despite the rampant adoption of cloud computing, some companies are hesitant to move entirely to the public cloud. Instead, they rely on the higher degree of control of the SDN in the private cloud, or utilize a hybrid approach. While the private cloud offers more control and manageability, ensuring that applications are deployed successfully, securely, and within the parameters of compliance can pose challenges without proper visibility and the foresight for auditability.

    Organizations that are using a SDN need to employ best practices at the start to ensure that they are successful in the future.

    Please join members of Tufin cloud team for an informal product-agnostic discussion on how network security policy management (NSPM) solutions can ingrain best practices in deploying and managing applications in the SDN, ensure connectivity, and enforce security. Topics for discussion include how to:
    •Build a zero-trust policy in the private cloud
    •Ensure compliance across all access changes
    •Design and deploy network segmentation efficiently
    •Deploy business applications with access continuity
    •Ingrain preparedness for audits
  • Modern Data Center Virtualization for Securing Tomorrow's Cloud Applications
    Modern Data Center Virtualization for Securing Tomorrow's Cloud Applications Jon Benedict, technical product marketing manager, Red Hat Virtualization Aug 29 2017 4:00 pm UTC 105 mins
    Even with the advent of cloud and containers, virtualization will continue to be key to the efficient data center. But is your virtualization technology able to handle today’s demands for hybrid, modern applications?

    Red Hat® Virtualization provides the performance, security, and scale required for virtualized workloads that pave the way for streamlined operations, increased productivity, and ultimately more modern applications. Learn about approaches for consolidating, upgrading, or migrating virtualization resources and unifying and automating management of heterogeneous environments.

    The OpenStack® Word Mark and OpenStack Logo are either registered trademarks / service marks or trademarks / service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation or the OpenStack community.
  • Acceleration with the Universal Data Plane - FD.io
    Acceleration with the Universal Data Plane - FD.io Ed Warnicke, FD.io Technical Steering Committee chair, Cisco & John DiGiglio, FD.io Marketing Committee, Intel Aug 29 2017 4:00 pm UTC 60 mins
    The Fast Data Project, FD.io, is relentlessly focused on data IO speed and efficiency for more flexible and scalable networks and storage. As the universal data plane, FD.io is helping enable the developer community achieve the highest performance, throughput, and resource efficiency in cloud networking, container networking, NFVI, bare metal networking, and SmartNic acceleration. Recently FD.io extended its lead as the fastest most scalable software data plane on earth by demonstrating terabit throughput levels with multi-million fib table entries on standard high-volume server platforms utilizing the new Intel® Xeon® Scalable Processor. Hear from host Ed Warnicke (Technical Steering Committee chair and Distinguished Engineer at Cisco) on the benefits of FD.io, including key functionality offered in the latest release (17.07), providing key features to enable commercial-ready solutions for software-defined infrastructures. Also hear from host John DiGiglio (Packet Processing SW Product Manager at Intel) on how recent architectural improvements in Intel’s newest platform have doubled performance without modification to the FD.io software.
  • Dive Deep into NVMe over Fibre Channel (FC-NVMe)
    Dive Deep into NVMe over Fibre Channel (FC-NVMe) Curt Beckmann, Brocade, Craig Carlson, Cavium, J Metz, Cisco Aug 29 2017 5:00 pm UTC 60 mins
    As FC-NVMe (NVMe over Fibre Channel) is preparing for it’s official launch, there have been numerous questions about how the technology works, how it gets implemented, and what makes it special when compared to traditional, SCSI-based Fibre Channel.

    When we did our first webinar on FC-NVMe [link], we got lots of questions about more details, more technical aspects, and more thorough explanations. So here we are!

    This presentation is going to be a more thorough analysis of the bits and bytes of FC-NVMe, where you will learn:

    •What are the key differences and similarities between NVMe and SCSI Fibre Channel structures
    •What are the main architectural differences between NVMe and SCSI deployments
    •Impact on Queue Depth
    •How to cross-connect legacy and future flash arrays with FC-NVMe

    Please join us on August 29th for this advanced, deep dive on FC-NVMe.
  • Getting Started with IT Automation and Self Service Provisioning
    Getting Started with IT Automation and Self Service Provisioning Ryan Kelly, Staff Systems Engineer, Cloud Management BU, VMware Aug 29 2017 6:00 pm UTC 90 mins
    We all know how important automation is for the delivery of IT services. And a self-service provisioning, the key feature of the cloud, comes hand in hand with automation. But many customers, even those who already have vRealize Automation in their environment, don’t know where to start or how to move forward in the most effective way. If you are one of them, this webcast is for you.

    Through practical demonstrations, whiteboards, and technical tutorial, we will show you how to quickly become the automation guru in your team!

    In this technical, hands-on webinar we will cover the following topics:
    -Overview of vRealize Automation setup and configuration
    -Identifying and catering to your end users
    -Blueprint design (Machine Lifecycle Whiteboard session)
    -Overview of vRealize Automation extensibility
    -Tying it all together
  • Executive Cyber Protection
    Executive Cyber Protection Chris Bullock, SecureWorks Managing Principal Aug 29 2017 6:00 pm UTC 60 mins
    In a world where physical attack vectors are no longer the preferred way to attack a person of notoriety or a chief executive sta¬tus individual, the need for cyber executive protection to enhance existing cybersecurity programs and traditional executive protection has become greater than ever. With expanded use of information sharing through social media and use of technologies such as home automation, Executive’s habits, families and close personnel staff are being monitored, targeted and shared via the dark web for a number of reasons such as disruption of business, personal or brand embarrassment and financial gain just to name a few.

    In this webcast, Chris Bullock, SecureWorks Managing Principal, will cover a new approach to mitigating risk to this emerging threat that encompasses:

    • Analyzing ten domains of risk to an Executive, their family and close staff
    • How to assess potential risk and exposure to the brand or reputational damage
    • Guidance on which specific risk factors to monitor regularly to ensure preparedness
    • How to implement the most effective and appropriate safeguards
  • The Profound Effect Wireless will Have on Your Network Infrastructure
    The Profound Effect Wireless will Have on Your Network Infrastructure Jim Frey, Director of Marketing Aug 30 2017 3:00 pm UTC 30 mins
    Explosive growth in the number of wireless devices being used, combined with advancing wireless technology, will eventually lead to big changes to your network infrastructure. This 30-minute webinar will review the evolution of network technology and the associated bandwidth requirements of each new generation. It will also discuss how next generation WAPs (only a few years away) will affect your horizontal network infrastructure, and eventually, your fiber backbone too. The webinar will close with some recommended network infrastructure solutions you should consider for your next WiFi project.

    You should attend this webinar if you want to:
    - Minimize the total cost of ownership (TCO) for your next WiFi project
    - Learn how wireless technology is advancing
    - Be prepared for the next generation of wireless will be here in just a few years
  • Comprehensive Protection and Visibility into Advanced Email Attacks
    Comprehensive Protection and Visibility into Advanced Email Attacks Nirav Shah, Product Mktg Mgr for Email Security.Cloud, Symantec & Naveen Palavalli, Director Product Mktg., Symantec Aug 30 2017 5:00 pm UTC 60 mins
    The latest version of the Symantec Cloud Email Security solution provides the strongest protection against Business Email Compromise with new, automated impersonation controls.

    In addition, this release offers the deepest visibility into targeted & advanced attacks with advanced email security analytics that now includes insights into both clean and malicious emails with 60+ data points on each email.

    Join this webcast to learn more about these new capabilities in and see them in action! Find out how Symantec Cloud Email Security can help you:

    • Defend your business from Business Email Compromise, spear phishing, spoofing attacks, and other scams

    • Accelerate response to targeted and advanced email attacks with more visibility than ever into email threats

    • Quickly correlate and respond to threats by exporting advanced email security analytics to your Security Operations Center
  • Have Your Cake and Eat It Too With R, Python + SAS®
    Have Your Cake and Eat It Too With R, Python + SAS® Wendy McHenry, SAS; Rachel Hawley, SAS; Jesse Luebbert, SAS Aug 30 2017 6:00 pm UTC 60 mins
    R and Python are used by many data scientists, often bringing together teams with varied backgrounds and experiences to solve complex problems in new ways. But R and Python often lack the scalability, governance and support needed for enterprise analytics deployment. In this webinar, you'll see a demo on how SAS integrates with R and Python to increase productivity, value, maturity, and scalability of your data science efforts. Key takeaways:

    • How to use R and Python with SAS while meeting statistical analysis requirements within your organization and with external regulatory agencies.
    • How SAS offers the scalability, governance and support organizations require for production and operational analytics.
    • When and how SAS is used with R and Python.
  • Getting Sign-off for Your SD-WAN Business Case
    Getting Sign-off for Your SD-WAN Business Case Tim Sullivan, CEO, Coevolve & Sasha Emmerling, Sr. Director of Marketing, VeloCloud Aug 31 2017 1:00 am UTC 60 mins
    Coevolve and VeloCloud had a great response to our Webinar: “Building an SD-WAN Business Case – Part 1”. Now it is time to expand on that information about building a compelling business case to adopt SD-WAN and share a next level of experience.

    In“Part 2 – Getting sign off for your SD-WAN Business Case” Tim Sullivan, CEO of Coevolve and Sasha Nunke, Sr. Director of Marketing, VeloCloud will discuss details on the following:

    - The SD-WAN business case headlines required for C-level approval
    - What commercial due diligence is required and how do you evaluate it?
    - What are the most persuasive operational benefits of SD-WAN?
    - What TCO and rate of return metrics typically achieved by other enterprise SD-WAN achieving?
  • Making the Transition From Physical to Virtual Networks - Challenges & Solutions
    Making the Transition From Physical to Virtual Networks - Challenges & Solutions Bruce Katzel, VP of Sales for North America, Dimetis Kai Bechtold, VP of Sales for the D-A-CH region Aug 31 2017 4:00 pm UTC 60 mins
    What are the top issues to address when a CSP is making a transition from physical networks to virtual networks? In this webinar, we will address the operations challenges, tools, planning/implementation, PNF/VNF inventory, automation and orchestration required to move the service providers business from physical networks to hybrid, then fully virtualized.
  • Security Briefings Part 1: GDPR - Using Technology for Compliance
    Security Briefings Part 1: GDPR - Using Technology for Compliance Jacob Serpa, Product Marketing Manager, Bitglass; Brandon Dunlap, Moderator Aug 31 2017 5:00 pm UTC 75 mins
    The General Data Protection Regulation (GDPR) is designed to ensure the privacy and security of European citizens’ personal data. The regulation takes a comprehensive approach to guaranteeing that organizations protect personal data completely and consistently as it is collected, stored, and used. As GDPR comes into effect May 2018, organizations are scrambling to reach compliance with its many requirements - particularly as they relate to the cloud. Fortunately, there are technology solutions that can address a breadth of GDPR-related concerns. Join Bitglass and (ISC)2 on August 31, 2017 at 1:00PM Eastern for the first in a three part Security Briefings series where we will discuss how the components of a cloud access security broker (CASB) can help organizations meet the regulation’s various requirements.
  • Smart Governance: Defining Your IT Strategy
    Smart Governance: Defining Your IT Strategy Route Fifty | Underwritten by: Symantec Aug 31 2017 6:00 pm UTC 60 mins
    Now more than ever, IT leaders are dealing with changing policies, new and varying risks, increasing demands and restricted budgets, but they must continue to operate their information technology services responsibly and with transparency. Strong IT governance is an integral component for state governments across the country in tackling today’s challenges while also innovating for the future.

    During this digital viewcast, we’ll speak with state technology officials about how to build and execute a strategic IT governance framework that allows for agility, provides secure and efficient services, modernizes processes and technologies, optimizes resources and ultimately ensures mission success.

    Click "Attend" to confirm your registration.
  • Worried about security breaches: Discover why endpoint visibility is not enough
    Worried about security breaches: Discover why endpoint visibility is not enough Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Aug 31 2017 6:00 pm UTC 45 mins
    Traditional Endpoint Protection (EPP) products have failed to detect advanced malware that easily evade signature-based antivirus solutions. To counteract this problem, Gartner reports that 100% of EPP solutions will incorporate Endpoint Detection and Response (EDR) capabilities, focused heavily on security analytics and incident response.

    Even so, customers are realizing that protecting endpoints alone is not enough to prevent security breaches. That’s where a managed detection and response (MDR) service comes into play. MDR provides 360-degree visibility into endpoints and security devices, and offers 24/7 network monitoring.

    In this webinar, you will learn:
    - What EDR vendors offer beyond EPP solutions
    - Why Endpoint Detection and Response alone is not enough
    - How Managed Detection and Response (MDR) makes up for EDR shortcomings
  • Adapter votre SI pour saisir de nouvelles opportunités business
    Adapter votre SI pour saisir de nouvelles opportunités business Franck Jaffre (Business Technology Architect), Florent Martin (Expert Cyber sécurité), Philippe Cuvecle (Architecte) Sep 5 2017 9:30 am UTC 45 mins
    Dans un monde de plus en plus connecté, il est primordial pour les entreprises performantes de capter les opportunités en provenance de l’ensemble des canaux numériques : web et mobile. Dans ce contexte, les entreprises doivent adapter leur processus et leur système d’information (SI). Au travers de ce webinar, CA Technologies et ELCA vous présentent le rôle des architectures micro-services et des solutions d’API Management dans ce processus de transformation.
  • Virtualization: Impacts on Performance Assurance and Business Models
    Virtualization: Impacts on Performance Assurance and Business Models Moderated by Limor Schafman, TIA Sep 6 2017 3:00 pm UTC 60 mins
    The push to virtualize communication networks, control centers, and data centers through NFV and SDN technologies offers both great opportunity for management, speed to market, scale and business, and also brings many challenges. Efficiency, cost management, ensuring SLAs, managing OPED and CAPEX, reducing product production costs are all business concerns faced by communications providers as they convert their networks to be increasingly software driven. What are the new business models that software enables? What are the customer expectations for new service deliverables? How can service providers, data centers and others guarantee quality of service? What tests are being conducted and what industry practices are being established? This webcast will review how companies are meeting the challenge of operating with new processes and with new requirements.
  • In-Vehicle Network Solutions Overview
    In-Vehicle Network Solutions Overview Todd Kelly, VP Solutions Engineering, Cradlepoint Sep 6 2017 4:00 pm UTC 60 mins
    As the digital transformation in IT continues to create the need for an Elastic EdgeSM, traditional tethers to the central office have all but vanished. Physical boundaries continue to decrease in importance, and organizations of all types require constant and dependable in-vehicle connectivity to keep up with changing business imperatives.

    Dependable mobile connectivity keeps vehicles on the road longer, helps enterprises better manage their fleets, and allows businesses and organizations to better serve their customers. Forward thinking IT and fleet managers in nearly every industry are implementing in-vehicle networks at a fraction of the cost and with less complexity. By taking advantage of cloud-managed, software-defined solutions, IT teams are evolving enterprise networks to reach improved productivity, reduce costs, and create operational efficiencies.

    Join Cradlepoint for a live webinar on Wednesday, September 6, 2017, at 9 am PT / 12 pm ET to learn how networks on the move are staying always connected and protected.

    Attendees will learn how:

    •Reliable 4G LTE network solutions keep fleets connected

    •To cut costs & create operational efficiencies

    •Cloud management and software-defined technologies enables always-on networks

    •To choose the best solution for networks on the move
  • Hybrid & Multi-cloud environments: Strategies for migration & app modernization
    Hybrid & Multi-cloud environments: Strategies for migration & app modernization Jay Lyman, Principal Analyst, 451 Research with Shashi Kiran, CMO, Quali Sep 6 2017 5:00 pm UTC 60 mins
    Hybrid clouds are important for enterprises having on-premise deployments as well as legacy applications. Likewise, multi-cloud scenarios appeal to organizations that want the flexibility to move between different clouds and not get locked-in into either one public or private clouds architecture. While over 70% of enterprises have expressed a need to deploy hybrid and/or multi-cloud architectures, as they modernize their application architectures the rollouts are complex and time consuming causing budget overruns and delays. The complexity is largely associated with the lack of common tooling, mismatched cloud architectures and expertise. These can be significantly overcome by providing access to on-demand, self-service IT environments (on-premise as well as public cloud, or a combination thereof), that would allow for more predictable application performance and security, thereby allowing for faster cloud migration and rollout, with reduced cost and risk.

    Join this webinar with 451 research and Quali to learn:
    •Current trends in hybrid and multi-cloud deployments and enterprise requirements
    •How incorporating sandboxes and self-service environments in the workflow can smoothen cloud migration, hybrid deployments and the flexibility of multi-cloud deployment. Demo included.
    •Sample case study of an enterprise undergoing cloud migration with best practice recommendations