Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Live Cloud Masterclass: Why cloud thrives or dies on your infrastructure
    Live Cloud Masterclass: Why cloud thrives or dies on your infrastructure
    David Simpkins, Anne-Gaëlle Santos, and Maarten Verhaegh from BT Recorded: Feb 20 2019 24 mins
    Cloud adoption is mainstream, but accelerating.

    Recent research from the Cloud Industry Forum found that nine in ten organisations (89%) currently use cloud-based services and the vast majority (85)% expect to increase their usage over the next 12 months.

    So, it’s a good time to explore the potential challenges, risks and rewards of multi-cloud adoption, so you can identify how to best exploit the benefits, while also avoiding the pitfalls.

    In an earlier webinar, we highlighted 3 common challenges that organisations face with multi-cloud adoption:
    - traditional infrastructure not supporting cloud transformation
    - complexities of multi-cloud management
    - attraction and retention of the right skills and tools to manage and secure hybrid cloud

    In this live expert panel, we turn our focus on infrastructure and explore in more detail why cloud networking in particular is so critical to your cloud strategy.

    Join our experts as they share their in-depth experience and learning and get some valuable tips on how to get your multi-cloud strategy in good shape.

    Speakers:
    David Simpkins – general manager, managed services and public cloud, BT
    Anne-Gaëlle Santos - head of dynamic network services, BT
    Maarten Verhaegh - head of cloud strategic alliances, BT
  • エンドポイントセキュリティの再定義 -シマンテックの「完全なエンドポイント防御」
    エンドポイントセキュリティの再定義 -シマンテックの「完全なエンドポイント防御」
    世羅 英彦, プリンシパルセールスエンジニア, 株式会社シマンテック Recorded: Feb 20 2019 57 mins
    平素より格別のご高配を賜り厚く御礼申し上げます。

    進化を続ける今日のIT環境においても、攻撃者はより洗練された攻撃手法でネットワークに侵入し続け、エンドポイントへの到達を試みます。サイバー攻撃の対策のため複数のセキュリティ製品を導入、運用するのは困難を極めます。

    このような課題に対処すべくシマンテックは「完全なエンドポイント防御」を実現します。
  • How to Automate Application Stack Deployments
    How to Automate Application Stack Deployments
    Marc Petrivelli, Consulting Architect, Red Hat, and Benjamin Leung, Consultant, Red Hat Recorded: Feb 19 2019 60 mins
    Many organizations are facing a difficult challenge to automate their systems. They worry it will require ample resources to write custom code they think is required.

    Fortunately, there is another option. Organizations can use Red Hat® Ansible® Automation to write simple task descriptions that even new team members can understand the first time. Using Ansible Automation saves upfront costs and makes it easier to react to change over time.

    In this webinar, we will discuss how to:
    > Look at an app and its dependencies to construct a common framework for deployment.
    > Deploy multitier applications reliably and consistently, all from a singular common framework.
    > Configure services and push application artifacts from a common system.
  • Leveraging Your SIEM to Implement Security Best Practices
    Leveraging Your SIEM to Implement Security Best Practices
    Rohit Chettiar, Detection & Response Solutions Engineer, Rapid7 Recorded: Feb 19 2019 28 mins
    The biggest challenge that security analytics addresses is the volume and diversity of information that can be analyzed at a given point to assist security professionals in detecting, responding to and mitigating cyber threats. But how do you leverage that data to implement security best practices?

    InsightIDR is a single solution that provides visibility across your traditional on-premise environment, but also extends monitoring to your remote endpoints and cloud services. Join us to learn how InsightIDR provides visibility into your network and highlight useful metrics to implement security best practices.

    In this webcast, we will discuss:

    1. How to make security analytics more consumable
    2. The data sources you need to collect and analyze
    3. How InsightIDR leverages pre-built analytics to detect top attack vectors
  • Securing Business Continuity with Redundant DNS
    Securing Business Continuity with Redundant DNS
    Jonathan Lewis, VP of Product Marketing Recorded: Feb 19 2019 31 mins
    Your online services are business-critical, and so is your DNS. Industry analysts agree that having a redundant DNS is a best practice for business continuity; and businesses that have experienced a DNS outage have learned that as well.

    That said, 68% percent of enterprises are not using redundant DNS.

    In this webinar we’ll discuss:

    -The risks associated with single provider DNS
    -The different ways you can set up dual provider, redundant DNS
    -How NS1 Dedicated DNS makes it easier than ever to have a redundant DNS setup

    Webinar attendees will come away with a solid understanding of the benefits of a redundant DNS as a means of securing business.
  • Accelerating Virtual Infrastructure Deployment
    Accelerating Virtual Infrastructure Deployment
    Paul Stevens / Advantech, Eric vanVliet / Advantech, Purvi Thakkar / Intel Recorded: Feb 19 2019 55 mins
    Workloads are shifting across platforms that span from entry-level to extreme performance.
    Finding the right balance of compute, acceleration, networking and storage to cost effectively run an application at any location in the network can be challenging.
    More agile solutions are required that meet the challenges of next generation networks with greater elasticity across a scalable range of white box servers.

    This webinar will provide you with deeper insights into Intel® Select Solutions for NFVI and uCPE and how they help:

    •Simplify Network Evolution using platforms verified as Intel® Select Solutions
    •Get on faster, more efficient deployments using tested white box servers
    •Build Reliable Infrastructure with verified configurations that take full advantage of virtual network enhancements
  • (ISC)² Info Session: SSCP -The Premier Security Administrator Certification
    (ISC)² Info Session: SSCP -The Premier Security Administrator Certification
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Recorded: Feb 19 2019 46 mins
    Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue SSCP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================
    SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to help you throughout your career.

    www.isc2.org/sscp

    Are you ready to prove yourself? Register and begin your SSCP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • Rise Above Complex Workflows: Practical Ways to Accelerate Incident Response
    Rise Above Complex Workflows: Practical Ways to Accelerate Incident Response
    Matt Cauthorn, ExtraHop Networks; Paul Asadoorian. Security Weekly; Matt Alderman, Security Weekly Recorded: Feb 15 2019 61 mins
    Does your security investigation and incident response workflow "spark joy," or does it just leave you with more questions that are tough to answer? How do you improve your current data collection, tools, and workflows? In this session, ExtraHop’s VP of Cyber Security Engineering, Matt Cauthorn, will provide practical advice for how to identify areas for improvement in your incident response practice. Learn how Network Traffic Analysis can provide the visibility and data access needed to take investigations from many hours to just a few clicks.
  • You're concerned with Account Takeover on Office 365. Now What?
    You're concerned with Account Takeover on Office 365. Now What?
    Symantec Recorded: Feb 15 2019 2 mins
    You're Concerned with Account Takeover on O365 Now What? (1 min /52 seconds Video)
  • O365 Is Great for Collaboration but Not for Preventing Data Exposure. Now What?
    O365 Is Great for Collaboration but Not for Preventing Data Exposure. Now What?
    Symantec Recorded: Feb 15 2019 2 mins
    As businesses move to cloud services like Office 365, file sharing, email, chat, and collaboration apps make it easy to share information to get work done, however confidential datais now at greater risk.of falling into the wrong hands.(Watch Video Now)
  • Preventing Ransomware Infections via Office 365 is New Territory. Now What?
    Preventing Ransomware Infections via Office 365 is New Territory. Now What?
    Symantec Recorded: Feb 15 2019 2 mins
    The move to cloud applications such as Office 365 has brought many benefits, but has also come with a price Organizations have lost security visibility and control.(1 min 39 sec.video)
  • Cyber Global Warming: Real Life Malscape Insights
    Cyber Global Warming: Real Life Malscape Insights
    Andy Norton, Director, Threat Intelligence, Lastline and Michael Rico, Senior Intrusion Analyst, Secureworks Recorded: Feb 14 2019 49 mins
    Layered security has been the mantra for many years, but this methodology leaves gaps the adversary can leverage to compromise your organization. Applying high fidelity cyber acumen with innovative Behavioral Intelligence technology can help increase your cybersecurity resilience. With this combination of advanced technology and human expertise you can better identify and remediate malicious web and email activity to improve your security program and close gaps.

    What You Will Learn:

    - The factors leading to Cyber Global Warming and how you can avoid the pitfalls
    - Global threat trends identified via Lastline’s behavioral intelligence
    - How to measure your cyber resilience
    - Why structured investigations help you get more value from your security tools
    - How a managed network sandbox with Secureworks expertise helped an organization identify a real life attack
  • How Snapper Further Protects Data in Amazon S3 Using CWP for Storage
    How Snapper Further Protects Data in Amazon S3 Using CWP for Storage
    Sameer Vasanthapuram, Kevin Stultz and Paul Hortop Recorded: Feb 14 2019 42 mins
    Snapper, a New Zealand-based company, needed a security solution to protect their customer data in Amazon Simple Storage Service (Amazon S3) from advanced threats and malware. In our upcoming webinar, learn why the flexibility and scalability of Symantec Cloud Workload Protection for Storage (CWP for Storage) made it the right solution for Snapper.

    In this webinar, you’ll learn:

    - How CWP for Storage protects against the latest threats and malware

    - Ways CWP for Storage delivers scalable security that integrates with DevOps workflows

    Register Today
  • 2019: How Your Network Can Help Build Better Customer Relationships
    2019: How Your Network Can Help Build Better Customer Relationships
    Cherie Martin, Sr. Solutions Marketing Mgr (Aruba), Josh Jaster, Systems Engineer (Aruba) Recorded: Feb 14 2019 36 mins
    Is attracting new customers and increasing sales at the top of your business’s priority list for 2019? You’re not alone. In fact, roughly 70% of SMBs are investing or planning to invest over the next 1-2 years in technology to personalize and improve customer experience. Not only does the network play an important role in supporting new applications, the right network will have tools built-in to enable you to provide amazing customer experiences and keep the conversation going.

    Join us as Cherie Martin, Sr. Solutions Marketing Manager, and Josh Jaster, System Engineer, review two core features your network must have to gain insight to your customer base and take engagement to the next level.

    Attend and you could qualify for a FREE Access Point and a 90-day trial of Aruba's network cloud-management solution, Aruba Central.
  • What You're Missing With Your Current WAF Provider
    What You're Missing With Your Current WAF Provider
    Remy Guerico Recorded: Feb 14 2019 28 mins
    Preventing data breaches and stopping malicious bots has become a top priority for many companies. Cloudflare blocks over 400 million malicious requests each day and from this we know that installing and forgetting a Web Application Firewall is no longer enough. In order to keep up, rules must not only be updated and monitored constantly, but they must also be augmented with other security services to provide an effective solution.

    In this webinar you will learn:

    - What are the risks of only relying on a WAF
    - Why network intelligence matters when blocking the most sophisticated attacks
    - Why implementing security services shouldn’t be difficult
    - Why improved security doesn’t need to diminish performance
  • Easy On-ramp to Multi-Cloud Load Balancing with Industry's First SaaS Solution
    Easy On-ramp to Multi-Cloud Load Balancing with Industry's First SaaS Solution
    Ashish Shah, Director of Product Management Recorded: Feb 14 2019 40 mins
    According to RightScale, 81% of enterprises have a multi-cloud strategy and operate 5 clouds (public and private) on average. So how are businesses handling enterprise-grade load balancing, monitoring, analytics and security of their applications, which are increasingly deployed across on-premises data centers and multi-cloud environments? Avi overcomes the limitations of appliance-based or single-cloud solutions which work only in one environment.

    View this webinar to learn how Avi achieves:

    Faster time-to-value - get an easy start on consuming application services and enable businesses to focus on provisioning applications instead of managing infrastructure
    Operational simplicity - reduce the complexities and cost in maintenance, upgrades and gain faster troubleshooting, proactive fault detection and risk mitigation
    Deployment flexibility - deliver the same enterprise features and consistent experience across any environment and with any delivery options SaaS or customer-managed.
  • ASK THE EXPERT: DESIGN YOUR NETWORK FOR THE CLOUD
    ASK THE EXPERT: DESIGN YOUR NETWORK FOR THE CLOUD
    Erik Thoen, Vice President of Product Management at 128 Technology Recorded: Feb 14 2019 58 mins
    Join Erik Thoen, VP of Product Management at 128 Technology as he discusses important networks considerations for your cloud deployment.
  • Arrival of Cloud-Managed Gateways
    Arrival of Cloud-Managed Gateways
    Elodie Huang, IoT Embedded Solution Manager, Supermicro & Magnus Almquist, VP Business Development, ZEDEDA Recorded: Feb 14 2019 45 mins
    Supermicro and ZEDEDA solutions deliver cloud-managed devices with password-less installation to reduce the costs of deploying and managing geographically widespread edge devices. Join this webinar to learn about:
    • New Supermicro Cloud-Managed Gateway solutions designed to enable business' to drop-ship and instantly provision Supermicro devices at thousands of locations.
    • One-click mass updates, real-time visibility of every device and disaster recovery at every location, all centrally controlled from the cloud
    • Securely adding new services to edge gateways and how they can be as easy to deploy and update as adding an app to your smartphone.
  • Secure your investment with Intel® QuickAssist Technology!
    Secure your investment with Intel® QuickAssist Technology!
    Edward J. Pullin, Product Marketing Manager, Intel, and Mark A. Chambers. Product Marketing Manager, Intel Recorded: Feb 14 2019 45 mins
    Cybersecurity is a conversation without compromise. Our data is an extension of ourselves. Our client’s data is data in our care.
    We exist in a paradigm where our business requires a robust security architecture woven into the fabric of our Networks, Storage, Big Data, Enterprise and Cloud configurations.
    As the amount of information we manage multiplies exponentially, it is becoming increasingly challenging to ensure our structures are robust enough, processes nimble enough, and data protected enough to stave off cyber-security threats.
    Hactivists, Activists and Nation States are well organized and funded around the globe. Their illegal hacking activity is a constant threat to our infrastructure that requires architectures and support to maximize our protection.
    Intel® QuickAssist Technology (Intel® QAT) accelerates Crypto Ciphers, Hash, Public Key Cryptography, Key Protection and Compression/Decompression so that your architecture has the protection, performance and latency to secure your information, and provide an agile response to threats.
  • Five Cloud Deployment Mistakes that Will Cost You
    Five Cloud Deployment Mistakes that Will Cost You
    Jim Meehan, Director of Product Marketing Recorded: Feb 13 2019 34 mins
    With physical network infrastructure moving to the cloud, it’s easy to think that networks are instantly faster, more reliable, limitless, and cheap. However, the reality is that cloud technology can be complex, especially when it comes to networking. Combined with the rapid pace of deployment and lack of visibility into how cloud resources are being utilized, it’s easy to make costly mistakes.

    Please Join Jim Meehan, Kentik Product Marketing Director, to discuss five network-related cloud deployment mistakes that you might not be aware of, but can negate the cloud benefits that you’re hoping to achieve.
    Mistake #1 - Duplicate services and unknown dependencies
    Mistake #2 - Traffic or request hair-pinning
    Mistake #3 - Unnecessary inter-region traffic
    Mistake #4 - Missing compression
    Mistake #5 - Internet traffic delivery

    In this webinar, we will also advise how to avoid these top cloud deployment mistakes with pervasive visibility.
  • Best Practices for Reducing Your Attack Surface with Vulnerability Management
    Best Practices for Reducing Your Attack Surface with Vulnerability Management
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Feb 13 2019 37 mins
    Attack surfaces are rapidly changing by the minute, as IT organizations are provisioning new types of endpoints, IoT devices, servers, web-applications and cloud-based services to increase business efficiencies. Due to this dynamically changing asset landscape, it has become increasingly difficult for IT security teams to maintain visibility to which ones need to be patched to reduce the risk from being exploited by hackers.

    Narayan Makaram, Sr. Director of Product Marketing, Arctic Wolf Networks, will explore the following, to emphasize the need for regularly running external vulnerability scans to boost your visibility and reduce business risks.

    - Trends affecting your attack surface
    - Need for vulnerability management program
    - What should you look for in an external vulnerability scan report

    Register today to hear from this expert!
  • Why Composable Infrastructure?
    Why Composable Infrastructure?
    Philip Kufeldt, Univ. of California, Santa Cruz; Mike Jochimsen, Kaminario; Alex McDonald, NetApp Recorded: Feb 13 2019 60 mins
    Cloud data centers are by definition very dynamic. The need for infrastructure availability in the right place at the right time for the right use case is not as predictable, nor as static, as it has been in traditional data centers. These cloud data centers need to rapidly construct virtual pools of compute, network and storage based on the needs of particular customers or applications, then have those resources dynamically and automatically flex as needs change. To accomplish this, many in the industry espouse composable infrastructure capabilities, which rely on heterogeneous resources with specific capabilities which can be discovered, managed, and automatically provisioned and re-provisioned through data center orchestration tools. The primary benefit of composable infrastructure results in a smaller grained sets of resources that are independently scalable and can be brought together as required. In this webcast, SNIA experts will discuss:

    •What prompted the development of composable infrastructure?
    •What are the solutions?
    •What is composable infrastructure?
    •Enabling technologies (not just what’s here, but what’s needed…)
    •Status of composable infrastructure standards/products
    •What’s on the horizon – 2 years? 5 Years
    •What it all means
  • Optimize Your IT With an Open Hyperconverged Infrastructure
    Optimize Your IT With an Open Hyperconverged Infrastructure
    Daniel Gilfix, Marketing Manager, Storage and Hyperconverged Infrastructure, Red Hat and Sean Murphy, Product Manager, Red Ha Recorded: Feb 13 2019 44 mins
    In the public sector and industries like energy, retail, banking, and telecommunications, organizations increasingly rely on business-critical applications that must be deployed with limited space, budgetary constraints, and scarcity of skilled IT staff. They must extend the reach of these applications from datacenter core to edge of the network with reduced complexity on the infrastructure that best meets their IT requirements.

    Red Hat’s innovative approach to addressing these issues includes Red Hat® Hyperconverged Infrastructure for Virtualization, which provides flexibility and choice for customers seeking low-density, infrastructure consolidation based on our leading virtualization platform. Red Hat Hyperconverged Infrastructure for Virtualization is streamlined with Red Hat Ansible® Automation and is based entirely on code from the open source community.

    During the webinar, we’ll discuss:
    > Market dynamics and challenges customers are facing with too much required by too few resources in too short a period.
    > The emergence of hyperconverged infrastructure as an alternative to inefficient segregated infrastructure.
    > Why hyperconverged infrastructure operational processes are more effective.
    > How an open source subscription model can facilitate maximum benefits of infrastructure consolidation.
  • Best Practices for Architecting Robust BGP Routing Policies – The Global Carrier
    Best Practices for Architecting Robust BGP Routing Policies – The Global Carrier
    Shawn Morris, Vice President of Systems, Applications and Software (SAS), Global IP Network, NTT Communications Recorded: Feb 13 2019 59 mins
    What actually makes good routing policies "good"? The telecoms industry has mostly focused on teaching each other how to implement BGP features in their networks, but there has been very little dialogue on how to design robust policies. Many global carriers do not even educate their customers on how to use and take advantage of them. In this webinar, NTT Communications and the Global IP Network will offer a conceptual model to look at routing policies, offer terminology to help discuss them, and analyse routing policy design patterns and best practices.

    NTT Communications will also share its experience from creating and deploying large scale complex routing policies in a carrier IP network that you can use to sharpen up your routing policy or even build one from scratch.


    ABOUT THE SPEAKER:


    Shawn Morris leads a global team that is responsible for all the software and systems that manage and operate the Global IP Network (GIN), a tier-1 backbone that covers the Americas, Europe, Asia and Oceania with a single autonomous system number (AS2914). His responsibilities include the development and testing of staff and facilities, focused on qualifying both hardware and software for the entire network. Shawn also oversees the development team responsible for the GIN configuration tools.

    Shawn has more than twenty years of experience in the IP networking industry. He was previously a member of the IP engineering staff at Verio until the acquisition of Verio by NTT Com in August 2000.
  • Redefining Endpoint Security - How to Better Secure the Endpoint
    Redefining Endpoint Security - How to Better Secure the Endpoint
    Joakim Lialias,Symantec / Sundeep Vijeswarapu, PayPal / Fernando Montenegro, 451 Research Recorded: Feb 13 2019 56 mins
    Symantec Unites Superior Protection, Automation and Artificial Intelligence in its most Advanced Endpoint Security Solutions.

    As attackers become more sophisticated, advanced protection and hardening are necessary for added layers of security.

    Join our webinar for first-hand insights on the newest cloud-delivered endpoint security solutions and hear from Joakim Liallias, Symantec and special guest speakers Sundeep Vijeswarapu from PayPal and top industry analyst Fernando Montenegro, 451 Research as they discuss:

    • How to gain a better understanding about the trends that are driving the need for a more comprehensive endpoint security approach.

    • How PayPal is using Symantec Endpoint Security to protect their endpoints.

    • How Symantec is redefining endpoint security with its new complete cloud-delivered endpoint defense:

    - Introducing never seen before innovation to deliver best-in-class prevention

    - Hardening Detection and Response to help customers achieve superior threat prevention,

    - Quicker identification of attackers and more tightly integrated technology and human expertise lead to better response and faster remediation

    - Security professionals and IT teams are strapped for time – streamlined management and automation will reduce significant burden

    Don't miss this great opportunity to get the latest information on taking steps towards simplifying Endpoint Security for your organization

    Register Today
  • Live filmed panel:How to Make your Network Smarter with Application Intelligence
    Live filmed panel:How to Make your Network Smarter with Application Intelligence
    Keith Langridge & Hasan Javed from BT, and Jon Howes & Ricardo Belmar from Infovista Feb 20 2019 2:00 pm UTC 30 mins
    The pressure is on to deliver a smarter network for the future. So what’s holding you back? You could be losing around 2.6% of your annual revenues because of slow running applications and downtime.

    It’s tricky to get sufficient visibility of your key applications and as you take on board more cloud services or digitise your operations, you may end up with blind-spots and inefficiencies.

    In our upcoming live filmed webinar, experts from BT and Infovista will discuss how to get a full end-to-end view across your application and network infrastructure, improve performance and deliver the user experience your customers and employees demand.

    You’ll find out more about :
    • automated control of the user experience, optimised per user
    • how to truly gain the benefits of the cloud in your digital transformation
    • some unique ways to work with Microsoft business applications
    • application intelligence in the era of SD-WAN

    Presenters:
    • Keith Langridge - Vice President, Network Services, BT
    • Hasan Javed - Senior Product Manager,, Connect Intelligence Infovista, BT
    • Jon Howes - Senior Vice President, Global Channels, Infovista
    • Ricardo Belmar - Senior Director, Global Enterprise Marketing,, Infovista
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Clarence Hill, David Kennedy Feb 20 2019 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Clarence Hill, Senior Manager, PS Advisory Services
    •David Kennedy, Managing Principal, Open Source Intelligence

    This month's theme: Device Overlays

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Micro-Segmentation based Network Security Strategies
    Micro-Segmentation based Network Security Strategies
    Yoni Geva, Product Manager Feb 20 2019 3:00 pm UTC 60 mins
    As cyber threats become more sophisticated, companies of all sizes are struggling to stay secure. Regardless of how many different firewalls you use, it’s merely a matter of time until a threat gets through. To prevent serious breaches, networks must be internally segmented to stop hackers moving freely inside the network and exfiltrating data – but network segmentation must be designed and managed correctly if it’s to be successful. This webinar will examine how to build a micro-segmentation strategy that truly protect your organization’s valuables.

    In this webinar, Yoni Geva, Product Manager at AlgoSec will cover:

    • Segmentation challenges
    • Micro-segmentation explained
    • Micro-segmentation strategy benefits
    • Micro-segmentation strategy development – first steps
    • Implementation Do’s and Don’ts
  • FICON 201
    FICON 201
    Patty Driever, IBM; Howard Johnson, Broadcom; Joe Kimpler, ATTO Technologies Feb 20 2019 6:00 pm UTC 75 mins
    FICON (Fibre Channel Connection) is an upper-level protocol supported by mainframe servers and attached enterprise-class storage controllers that utilizes Fibre Channel as the underlying transport.

    The FCIA FICON 101 webcast (on-demand at http://bit.ly/FICON101) described some of the key characteristics of the mainframe and how FICON satisfies the demands placed on mainframes for reliable and efficient access to data. FCIA experts gave a brief introduction into the layers of architecture (system/device and link) that the FICON protocol bridges. Using the FICON 101 session as a springboard, our experts return for FICON 201 where they will delve deeper into the architectural flow of FICON and how it leverages Fibre Channel to be an optimal mainframe transport.

    Join this live FCIA webcast where you’ll learn:

    - How FICON (FC-SB-x) maps onto the Fibre Channel FC-2 layer
    - The evolution of the FICON protocol optimizations
    - How FICON adapts to new technologies
  • Threat Intelligence Driven Incident Response
    Threat Intelligence Driven Incident Response
    Tim Stiller, Senior Incident Response Consultant Feb 20 2019 7:00 pm UTC 45 mins
    Threat intelligence is a core component of any Incident Response engagement or SOC investigation. While threat intel comes in many forms, shapes, and sizes—when used properly—it adds critical context that enables quick and accurate investigation decisions. If you understand the different types of threat intelligence used across your organization, your team can respond quickly to threats, and prioritize a detection strategy to stop future attackers.

    In this session, Tim will share:
    1. Key types of threat intelligence
    2. How each type should be used effectively
    3. Recycling: translating investigations into detections
  • Analytics and Closed-Loop Automation for SD-WAN
    Analytics and Closed-Loop Automation for SD-WAN
    Chandu Guntakala Feb 20 2019 7:30 pm UTC 12 mins
    Anuta Networks won the 2019 SD-WAN Implementation Award by TMC. In this presentation, Anuta Networks CEO, Chandu Guntakala shared the latest Anuta ATOM deployment details as well as key learnings from the multi-year IZO SD-WAN project roll-out at Tata Communications.
  • CX Automation and AI: Achieving real world results
    CX Automation and AI: Achieving real world results
    Rob Allman - SVP Customer Experience, Dimension Data; Dr Harsh Vinayak - SVP of BPO and R&D, NTT Data Feb 21 2019 2:00 pm UTC 60 mins
    Robotic process automation is quickly becoming an integral part of the new CX delivery model. Technologies like predictive analytics, machine learning, and cognitive computing are becoming more powerful. But what does this mean for your customer and for your business?
    We will be discussing the application of these technologies in a real world CX automation context.
  • The Best Way to Assess Incident Response Preparedness
    The Best Way to Assess Incident Response Preparedness
    Jeff Laskowski, Security Consulting Director, FireEye Mandiant Feb 21 2019 4:00 pm UTC 60 mins
    Many breached organizations—of all sizes—believed they had effective security programs and incident response plans. Reality proved otherwise.
    Now, executive leaders are far more concerned with incident preparedness. When the Board asks, ‘How ready are we, really?’ your security team must have a defensible response.

    In this webinar, Jeff Laskowski, Security Consulting Director of FireEye Mandiant, explains how to achieve effective preparation:

    • Test your team’s detection and response capabilities to protect key assets against real-world targeted attacks—without the consequences of a real incident
    • Assess your organization’s crisis management capabilities through the lens of an executive team
    • Improve your team’s detection and response capabilities in accordance with the latest attacker tactics, techniques, and motivations

    Join this webinar today to learn what it takes for your team to know how they would perform under a real threat, before they actually have to.
  • Securing your containers with Kata
    Securing your containers with Kata
    Eric Adams, Technical Marketing Engineer, Intel Corporation Feb 21 2019 4:00 pm UTC 45 mins
    We are pleased to offer a new Webinar, “Securing your containers with Kata,” focusing on financial and other highly-sensitive use cases. Kata Containers offer hardware-rooted isolation between containers, providing an additional layer of security for sensitive applications. The webinar will include a discussion of the motivations behind the Kata Containers project, how it fits into the broader container ecosystem with Kubernetes and Docker interoperability, and the advantages of its small footprint and stronger security. For familiar users, we’ll also review how the project has evolved from version 1.0 to the recent 1.5 release. We will also provide demonstrations of how to get started with Kata Containers and how Kata Containers can mitigate against an existing security exploit. Join us on February 21, 2019, for an informative hour on Kata Containers.
  • Transforming production and broadcast with 5G
    Transforming production and broadcast with 5G
    IBC365 | IRT Germany | BT Sport Feb 21 2019 4:00 pm UTC 75 mins
    Join this webinar on Thursday 21 February to learn how 5G will transform the way content is created, produced and distributed.

    More than just a faster mobile data connection, 5G reinvents connectivity. The technology enables new types of remote productions, and coverage of more live events, news and sports in higher 4K/HDR quality, and will revolutionise the way consumers receive content, combining broadcast, OTT and data to create a seamless experience regardless of network or device.

    That's the theory - but how is 5G being deployed in practice? What are the early adopters doing, and what results are they achieving?

    This webinar will explore a series of exciting use cases for 5G with hands-on case studies, including:
    - Enriching production and storytelling
    - Revitalising newsgathering and live event coverage
    - Blending broadcast and live data for mobile audiences in the European 5G-Xcast project

    Speakers:
    - Dr Jordi Gimenez, 5G research engineer & project manager, IRT Germany
    - Matt Stagg, Director of mobile strategy, BT Sport
    - Marios Nicolaou, 5G and digital transformation senior strategy advisor
  • Technology Asset Discovery tools aren’t working. Find out why & fix it.
    Technology Asset Discovery tools aren’t working. Find out why & fix it.
    Mark Gaydos, CMO, at Nlyte Feb 21 2019 5:00 pm UTC 60 mins
    Join this webinar where Mark Gaydos, CMO of Nlyte Software, will present the Next Generation of Asset Discovery.

    Nlyte Asset Explorer uses agentless technology to scan your network from desktop to data center to cloud to inventory your hardware, software and networking assets. It supports all major protocols, integrates with your CMDB and creates a single source of knowledge of 100’s of data points.

    You will learn:

    - Security Officers report more than 10% of assets on network are undetected
    - Only 10% of IT Operations managers believe that all assets are detectable and monitored
    - 6% of Financial Officers feel they have no risk from a vendor software audit
    - IT Managers report more than 69% of assets not current with software and patches
    - 87% of Organizations believe 10% of assets or more are not in their CMDB
  • Top Container Security Lessons from Deploying Kubernetes and Red Hat OpenShift
    Top Container Security Lessons from Deploying Kubernetes and Red Hat OpenShift
    Matt Smith, Chief Architect, Red Hat & Christopher Liljenstolpe, CTO, Solutions, Tigera Feb 21 2019 6:00 pm UTC 60 mins
    Join Red Hat Chief Architect, Matt Smith, along with Tigera CTO, Solutions, Christopher Liljenstolpe, as they share their experience and knowledge helping leading enterprises achieve their key business transformation initiatives around moving to secure cloud-based, containerized microservice applications. In this 60 minute webinar, they will cover their top lessons learned on network security and Red Hat OpenShift.
  • Adopt Modern SSL so You Don’t Get Left Behind
    Adopt Modern SSL so You Don’t Get Left Behind
    Nathan McMahon Feb 21 2019 6:00 pm UTC 48 mins
    Radical changes in security have dramatic impact on load balancing. SSL/TLS is changing so rapidly that enterprises are forced to do a forklift upgrade of their hardware load balancers. However, with Avi's software load balancer, it’s as simple as a version update.

    In this webinar, we will catch you up the latest SSL facts.

    - SSL termination can be done with only software. And it has better security, scalability, and lower cost. That’s how Facebook and Google do it. Let’s see how.
    - RSA and Elliptic-curve cryptography (ECC) have different implications for perfect forward secrecy (PFS), HTTP/2 and TLS 1.3 support. Let’s compare.
    - SSL health score allows you to manage expiring certificates, automated certificate renewals, and notification alerts from a centralized control plane.
  • Monitoring Modern Cloud-Native Workloads
    Monitoring Modern Cloud-Native Workloads
    Eric Carter, Director of Product Marketing, Sysdig & Shadi Albouyeh, Offering Manager, Developer Services - IBM Cloud Feb 21 2019 6:00 pm UTC 45 mins
    If you’re involved with developing applications, chances are you’re being tasked with adapting to cloud-native infrastructure and being able to support cloud-native workloads with solutions like containers and Kubernetes. Join this discussion with Sysdig and IBM Cloud, who have recently built a partnership focused on improving monitoring and troubleshooting for your modern DevOps services. Together, IBM and Sysdig have launched a new offering that provides end-to-end monitoring capabilities in the IBM Cloud. You’ll come away with a better understanding of key visibility challenges and solutions that will help you successfully deliver the apps that drive your business.
  • Overcoming The Cybersecurity Skills Shortage in Law Firms
    Overcoming The Cybersecurity Skills Shortage in Law Firms
    Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Feb 21 2019 7:00 pm UTC 39 mins
    The evidence is clear: law firms of all sizes need to securely handle sensitive information associated with their clients, investigators, and witnesses. According to the American Bar Association’s 2017 Legal Technology Survey Report, 22 percent of respondents suffered a security breach at their law firms.*

    Compromised client information can destroy reputations and lead to decreased billables and lost business. While the need for improved security is evident, IT and security teams struggle to locate, retain and train talent needed to maintain and improve their security posture. So, what are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure?

    In this Arctic Wolf webinar, you will:

    - Discover why cybersecurity is top of mind in the legal community
    - Recognize the IT and Cybersecurity skills shortage and its impact on security
    - Understand how SOC-as-a-Service approaches enable law firms to rapidly improve their security posture and provide evidence to satisfy technology audits

    Save your seat today to learn more!

    *https://www.americanbar.org/groups/law_practice/publications/techreport/2017/security.html
  • Ask the Experts—Securing Data and Email in Office 365
    Ask the Experts—Securing Data and Email in Office 365
    Mark Bowker, Senior Analyst, ESG / Richard Diver,Cloud Security Architect. Insight/ Jereme Lee, System Engineer, Symantec Feb 21 2019 7:00 pm UTC 62 mins
    Its your job to secure email, sensitive data and apps in Office 365. Now What?

    Moving to cloud applications provides the opportunity to get your security right. This is the time to set up optimum data loss prevention, malware and phishing prevention, and access controls on your systems. No matter if you are still planning, have just started, are in the midst, or are fully migrated to Office 365, there are security policies and procedures to implement and optimize.

    Join ESG industry analyst Mark Bowker, Insight’s Cloud Security Architect, Richard Diver, and Symantec’s System Engineering Manager, Jereme Lee to learn how to:

    - Get the most out of your Office 365 instance by enhancing the security

    - Understand what Microsoft offers and how Symantec compliments their security offering

    - Enhance your email, app and data security in Microsoft Office 365 which can be used across all your cloud apps

    Register Today
  • Cloud Success Series: Control Cost and Mitigate Risk in the Cloud, Session 1
    Cloud Success Series: Control Cost and Mitigate Risk in the Cloud, Session 1
    John Masci, Principal Technologist - Cloud Solutions Feb 21 2019 7:00 pm UTC 60 mins
    Today, 77 percent of enterprises have at least one application on the cloud (IDG State of the Enterprise Cloud, 2018). If you are part of that 77 percent, then cloud is now a critical element of your competitiveness. Heading into 2019, the growing pains of cloud will be cost and security: you’ll face the difficult balance between empowering your teams with the newest cloud technologies and ensuring those teams stay within budgets and comply with organization-wide policies.

    As you take on this challenge, you need a cloud management platform that provides proactive ways to control and minimize costs, while enforcing governance and security.

    In partnership with LiftOff IT, HyperGrid invites you to attend this webinar and demo, highlighting the capabilities we offer to help you optimally manage and benefit from your cloud strategy.

    This webinar focuses on the following critical topics:

    • How your cost, security & governance challenges will change at different stages of cloud adoption
    • Key methods to manage costs including instance optimization, budget tracking, bill analysis and chargebacks
    • Mitigating security risks using risk-based policies, and automated threat detection
    • Maintaining compliance against internal and external standards corporate when operating in the public cloud
    • How the HyperCloud™ platform can simplify all the above

    Receive a complimentary copy of Gartner’s 2019 Magic Quadrant for Cloud Management Platform Report
    As a webinar participant, you’ll receive a courtesy copy of Gartner’s new landmark overview of the CMP marketplace. Learn why Gartner singled out HyperGrid as the only “visionary” in this category in its Magic Quadrant for Cloud Management Platforms.
  • Improving Incident Response Outcomes
    Improving Incident Response Outcomes
    Matthew Webster, Senior Security Researcher, Secureworks Counter Threat Unit Feb 21 2019 7:00 pm UTC 61 mins
    All too often companies are learning the hard way — during an incident — how they could have been better prepared to stop the threat or reduce the damage. Join us for a one hour webcast, hosted by SC Magazine, featuring the key findings of Secureworks newly-released Incident Response Insights Report 2018: Risks, Remedies, and Best Practices for Defending Against Cyber Threats.

    Webcast takeaways will include:
    - Threat and attack trends identified by responders in 2017.
    - Lessons learned by organizations in a wide variety of incident response (IR) scenarios.
    - Key recommendations for IR planning, practices and capabilities that improve security defenses and mitigate business risk.
    - Live Q&A with experts from our Counter Threat Unit™ (CTU) and Incident Response team.

    In 2017, Secureworks’ team of incident responders helped hundreds of organizations navigate through complex and high-risk security incidents. Now the top insights from those collective engagements will be shared by speakers from the Secureworks Counter Threat Unit and Incident Response practice.

    This program offers the support you need to prepare better for emerging threats, understand how you might be vulnerable, and respond more effectively when an incident does occur. Program content is appropriate for cybersecurity leaders, incident responders, CIOs, CTOs, and executives with responsibility for enterprise risk management.
  • 1-Minute introduction to Closed Loop Automation from Anuta Networks
    1-Minute introduction to Closed Loop Automation from Anuta Networks
    Anuta Networks Feb 21 2019 7:30 pm UTC 1 min
    Closed-Loop Automation by Anuta ATOM combines Orchestration, Analytics, and Assurance to ensure the network matches the business intent. Closed-Loop Automation eliminates human errors, generates new business insights and avoids network downtime. For more information, visit https://www.anutanetworks.com/technologies/closed-loop-automation/
  • (ISC)² Info Session: CSSLP-The Premier Secure Software Development Certification
    (ISC)² Info Session: CSSLP-The Premier Secure Software Development Certification
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Feb 22 2019 6:00 am UTC 60 mins
    Earning the globally recognized CSSLP secure software development certification is a proven way to build your career and better incorporate security practices into each phase of the software development lifecycle (SDLC).

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue CCSLP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================

    CSSLP certification recognizes leading application security skills. It shows employers and peers you have the advanced technical skills and knowledge necessary for authentication, authorization and auditing throughout the SDLC using best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.

    www.isc2.org/csslp

    Are you ready to prove yourself? Register and begin your CSSLP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • Mitigating Security Risks on Your Cloud Journey
    Mitigating Security Risks on Your Cloud Journey
    Tim Fong, Product Marketing Lead, Security Solutions & Derek Yee, Product Marketing Lead, Performance Solutions @ Cloudflare Feb 22 2019 5:00 pm UTC 45 mins
    Whether you are just exploring moving workloads to the cloud, or are fully cloud-enabled, one thing is certain: security has changed from a purely on-premise environment.

    As cybersecurity risks continue to grow with more advanced attackers and more digital surface area, how you think about staying secure without compromising user experience must adapt.

    During this talk, you will:

    -Hear how global consistency, agile controls, and predictable costs are goals and principles that matter in this new environment
    -Be able to evaluate your current plans against a "customer security model"
  • Utilizing a Digital Risk Management Framework for Securing the Cloud
    Utilizing a Digital Risk Management Framework for Securing the Cloud
    Bob Liscouski, Juanita Koilpillai and David Morris Feb 22 2019 6:00 pm UTC 90 mins
    How a Digital Risk Framework (an understanding of the differences between cyber security, cyber risk and digital risk) can help identify and mitigate risks to your Cloud Infrastructures.

    In this session you will learn what a Digital Risk Framework is, how a Digital Risk Framework can help you comply with the onslaught of privacy regulations (CCPA, GDPR, HIPPA, etc) and its impact on your Cloud Infrastructures, which are most commonly used.
  • Secure Your Journey to the Hybrid Cloud
    Secure Your Journey to the Hybrid Cloud
    Tim Woods, Vice President of Technology Alliances | Elisa Lippincott, Director of Product Marketing Feb 22 2019 7:00 pm UTC 60 mins
    Many enterprises are adopting a cloud-first strategy in efforts to drive business innovation and growth. As cloud deployments grow, security requirements grow with them – leading to a trend of security responsibilities becoming dispersed as traditional security implementations impede the speed to delivery. Distributed responsibilities lead to fragmented security implementations - add to the problem the lack of skilled personnel, misconfiguration errors, overly permissive access, shadowed IT, and a lack of consistency between on-premise and cloud security controls, and you can end up with a recipe for disaster.

    Join Tim Woods, VP of Technology Alliances at FireMon and Elisa Lippincott, Director of Product Marketing at FireMon, in this webinar where they will discuss:

    • Steps you need to take to gain full visibility and control to secure your hybrid environment
    • How to ensure consistency of your security controls within hybrid cloud and multi-cloud environments
    • How to manage risk and complexity in your hybrid cloud with a cloud security posture management strategy