Network infrastructure professionals understand that a reliable and secure infrastructure is crucial to enabling business execution. Join the network infrastructure community to interact with thousands of IT professionals. Browse hundreds of on-demand and live webinars and videos to learn about the latest trends in network computing, SDN, WAN optimization and more.
David Simpkins, Anne-Gaëlle Santos, and Maarten Verhaegh from BTRecorded: Feb 20 201924 mins
Cloud adoption is mainstream, but accelerating.
Recent research from the Cloud Industry Forum found that nine in ten organisations (89%) currently use cloud-based services and the vast majority (85)% expect to increase their usage over the next 12 months.
So, it’s a good time to explore the potential challenges, risks and rewards of multi-cloud adoption, so you can identify how to best exploit the benefits, while also avoiding the pitfalls.
In an earlier webinar, we highlighted 3 common challenges that organisations face with multi-cloud adoption:
- traditional infrastructure not supporting cloud transformation
- complexities of multi-cloud management
- attraction and retention of the right skills and tools to manage and secure hybrid cloud
In this live expert panel, we turn our focus on infrastructure and explore in more detail why cloud networking in particular is so critical to your cloud strategy.
Join our experts as they share their in-depth experience and learning and get some valuable tips on how to get your multi-cloud strategy in good shape.
David Simpkins – general manager, managed services and public cloud, BT
Anne-Gaëlle Santos - head of dynamic network services, BT
Maarten Verhaegh - head of cloud strategic alliances, BT
Marc Petrivelli, Consulting Architect, Red Hat, and Benjamin Leung, Consultant, Red HatRecorded: Feb 19 201960 mins
Many organizations are facing a difficult challenge to automate their systems. They worry it will require ample resources to write custom code they think is required.
Fortunately, there is another option. Organizations can use Red Hat® Ansible® Automation to write simple task descriptions that even new team members can understand the first time. Using Ansible Automation saves upfront costs and makes it easier to react to change over time.
In this webinar, we will discuss how to:
> Look at an app and its dependencies to construct a common framework for deployment.
> Deploy multitier applications reliably and consistently, all from a singular common framework.
> Configure services and push application artifacts from a common system.
Rohit Chettiar, Detection & Response Solutions Engineer, Rapid7Recorded: Feb 19 201928 mins
The biggest challenge that security analytics addresses is the volume and diversity of information that can be analyzed at a given point to assist security professionals in detecting, responding to and mitigating cyber threats. But how do you leverage that data to implement security best practices?
InsightIDR is a single solution that provides visibility across your traditional on-premise environment, but also extends monitoring to your remote endpoints and cloud services. Join us to learn how InsightIDR provides visibility into your network and highlight useful metrics to implement security best practices.
In this webcast, we will discuss:
1. How to make security analytics more consumable
2. The data sources you need to collect and analyze
3. How InsightIDR leverages pre-built analytics to detect top attack vectors
Jonathan Lewis, VP of Product MarketingRecorded: Feb 19 201931 mins
Your online services are business-critical, and so is your DNS. Industry analysts agree that having a redundant DNS is a best practice for business continuity; and businesses that have experienced a DNS outage have learned that as well.
That said, 68% percent of enterprises are not using redundant DNS.
In this webinar we’ll discuss:
-The risks associated with single provider DNS
-The different ways you can set up dual provider, redundant DNS
-How NS1 Dedicated DNS makes it easier than ever to have a redundant DNS setup
Webinar attendees will come away with a solid understanding of the benefits of a redundant DNS as a means of securing business.
Paul Stevens / Advantech, Eric vanVliet / Advantech, Purvi Thakkar / IntelRecorded: Feb 19 201955 mins
Workloads are shifting across platforms that span from entry-level to extreme performance.
Finding the right balance of compute, acceleration, networking and storage to cost effectively run an application at any location in the network can be challenging.
More agile solutions are required that meet the challenges of next generation networks with greater elasticity across a scalable range of white box servers.
This webinar will provide you with deeper insights into Intel® Select Solutions for NFVI and uCPE and how they help:
•Simplify Network Evolution using platforms verified as Intel® Select Solutions
•Get on faster, more efficient deployments using tested white box servers
•Build Reliable Infrastructure with verified configurations that take full advantage of virtual network enhancements
Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²Recorded: Feb 19 201946 mins
Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.
In this info-session, you will learn:
- How large is the cybersecurity workforce gap today
- Why you should pursue SSCP
- How to earn the certifications – exam and experience requirements
- The recent updates on membership benefits and policies
- And, ask any question that will support your certification journey
Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.
SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)².
Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to help you throughout your career.
Are you ready to prove yourself? Register and begin your SSCP journey today!
Matt Cauthorn, ExtraHop Networks; Paul Asadoorian. Security Weekly; Matt Alderman, Security WeeklyRecorded: Feb 15 201961 mins
Does your security investigation and incident response workflow "spark joy," or does it just leave you with more questions that are tough to answer? How do you improve your current data collection, tools, and workflows? In this session, ExtraHop’s VP of Cyber Security Engineering, Matt Cauthorn, will provide practical advice for how to identify areas for improvement in your incident response practice. Learn how Network Traffic Analysis can provide the visibility and data access needed to take investigations from many hours to just a few clicks.
As businesses move to cloud services like Office 365, file sharing, email, chat, and collaboration apps make it easy to share information to get work done, however confidential datais now at greater risk.of falling into the wrong hands.(Watch Video Now)
Andy Norton, Director, Threat Intelligence, Lastline and Michael Rico, Senior Intrusion Analyst, SecureworksRecorded: Feb 14 201949 mins
Layered security has been the mantra for many years, but this methodology leaves gaps the adversary can leverage to compromise your organization. Applying high fidelity cyber acumen with innovative Behavioral Intelligence technology can help increase your cybersecurity resilience. With this combination of advanced technology and human expertise you can better identify and remediate malicious web and email activity to improve your security program and close gaps.
What You Will Learn:
- The factors leading to Cyber Global Warming and how you can avoid the pitfalls
- Global threat trends identified via Lastline’s behavioral intelligence
- How to measure your cyber resilience
- Why structured investigations help you get more value from your security tools
- How a managed network sandbox with Secureworks expertise helped an organization identify a real life attack
Sameer Vasanthapuram, Kevin Stultz and Paul HortopRecorded: Feb 14 201942 mins
Snapper, a New Zealand-based company, needed a security solution to protect their customer data in Amazon Simple Storage Service (Amazon S3) from advanced threats and malware. In our upcoming webinar, learn why the flexibility and scalability of Symantec Cloud Workload Protection for Storage (CWP for Storage) made it the right solution for Snapper.
In this webinar, you’ll learn:
- How CWP for Storage protects against the latest threats and malware
- Ways CWP for Storage delivers scalable security that integrates with DevOps workflows
Cherie Martin, Sr. Solutions Marketing Mgr (Aruba), Josh Jaster, Systems Engineer (Aruba)Recorded: Feb 14 201936 mins
Is attracting new customers and increasing sales at the top of your business’s priority list for 2019? You’re not alone. In fact, roughly 70% of SMBs are investing or planning to invest over the next 1-2 years in technology to personalize and improve customer experience. Not only does the network play an important role in supporting new applications, the right network will have tools built-in to enable you to provide amazing customer experiences and keep the conversation going.
Join us as Cherie Martin, Sr. Solutions Marketing Manager, and Josh Jaster, System Engineer, review two core features your network must have to gain insight to your customer base and take engagement to the next level.
Attend and you could qualify for a FREE Access Point and a 90-day trial of Aruba's network cloud-management solution, Aruba Central.
Preventing data breaches and stopping malicious bots has become a top priority for many companies. Cloudflare blocks over 400 million malicious requests each day and from this we know that installing and forgetting a Web Application Firewall is no longer enough. In order to keep up, rules must not only be updated and monitored constantly, but they must also be augmented with other security services to provide an effective solution.
In this webinar you will learn:
- What are the risks of only relying on a WAF
- Why network intelligence matters when blocking the most sophisticated attacks
- Why implementing security services shouldn’t be difficult
- Why improved security doesn’t need to diminish performance
Ashish Shah, Director of Product ManagementRecorded: Feb 14 201940 mins
According to RightScale, 81% of enterprises have a multi-cloud strategy and operate 5 clouds (public and private) on average. So how are businesses handling enterprise-grade load balancing, monitoring, analytics and security of their applications, which are increasingly deployed across on-premises data centers and multi-cloud environments? Avi overcomes the limitations of appliance-based or single-cloud solutions which work only in one environment.
View this webinar to learn how Avi achieves:
Faster time-to-value - get an easy start on consuming application services and enable businesses to focus on provisioning applications instead of managing infrastructure
Operational simplicity - reduce the complexities and cost in maintenance, upgrades and gain faster troubleshooting, proactive fault detection and risk mitigation
Deployment flexibility - deliver the same enterprise features and consistent experience across any environment and with any delivery options SaaS or customer-managed.
Elodie Huang, IoT Embedded Solution Manager, Supermicro & Magnus Almquist, VP Business Development, ZEDEDARecorded: Feb 14 201945 mins
Supermicro and ZEDEDA solutions deliver cloud-managed devices with password-less installation to reduce the costs of deploying and managing geographically widespread edge devices. Join this webinar to learn about:
• New Supermicro Cloud-Managed Gateway solutions designed to enable business' to drop-ship and instantly provision Supermicro devices at thousands of locations.
• One-click mass updates, real-time visibility of every device and disaster recovery at every location, all centrally controlled from the cloud
• Securely adding new services to edge gateways and how they can be as easy to deploy and update as adding an app to your smartphone.
Edward J. Pullin, Product Marketing Manager, Intel, and Mark A. Chambers. Product Marketing Manager, IntelRecorded: Feb 14 201945 mins
Cybersecurity is a conversation without compromise. Our data is an extension of ourselves. Our client’s data is data in our care.
We exist in a paradigm where our business requires a robust security architecture woven into the fabric of our Networks, Storage, Big Data, Enterprise and Cloud configurations.
As the amount of information we manage multiplies exponentially, it is becoming increasingly challenging to ensure our structures are robust enough, processes nimble enough, and data protected enough to stave off cyber-security threats.
Hactivists, Activists and Nation States are well organized and funded around the globe. Their illegal hacking activity is a constant threat to our infrastructure that requires architectures and support to maximize our protection.
Intel® QuickAssist Technology (Intel® QAT) accelerates Crypto Ciphers, Hash, Public Key Cryptography, Key Protection and Compression/Decompression so that your architecture has the protection, performance and latency to secure your information, and provide an agile response to threats.
Jim Meehan, Director of Product MarketingRecorded: Feb 13 201934 mins
With physical network infrastructure moving to the cloud, it’s easy to think that networks are instantly faster, more reliable, limitless, and cheap. However, the reality is that cloud technology can be complex, especially when it comes to networking. Combined with the rapid pace of deployment and lack of visibility into how cloud resources are being utilized, it’s easy to make costly mistakes.
Please Join Jim Meehan, Kentik Product Marketing Director, to discuss five network-related cloud deployment mistakes that you might not be aware of, but can negate the cloud benefits that you’re hoping to achieve.
Mistake #1 - Duplicate services and unknown dependencies
Mistake #2 - Traffic or request hair-pinning
Mistake #3 - Unnecessary inter-region traffic
Mistake #4 - Missing compression
Mistake #5 - Internet traffic delivery
In this webinar, we will also advise how to avoid these top cloud deployment mistakes with pervasive visibility.
Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf NetworksRecorded: Feb 13 201937 mins
Attack surfaces are rapidly changing by the minute, as IT organizations are provisioning new types of endpoints, IoT devices, servers, web-applications and cloud-based services to increase business efficiencies. Due to this dynamically changing asset landscape, it has become increasingly difficult for IT security teams to maintain visibility to which ones need to be patched to reduce the risk from being exploited by hackers.
Narayan Makaram, Sr. Director of Product Marketing, Arctic Wolf Networks, will explore the following, to emphasize the need for regularly running external vulnerability scans to boost your visibility and reduce business risks.
- Trends affecting your attack surface
- Need for vulnerability management program
- What should you look for in an external vulnerability scan report
Philip Kufeldt, Univ. of California, Santa Cruz; Mike Jochimsen, Kaminario; Alex McDonald, NetAppRecorded: Feb 13 201960 mins
Cloud data centers are by definition very dynamic. The need for infrastructure availability in the right place at the right time for the right use case is not as predictable, nor as static, as it has been in traditional data centers. These cloud data centers need to rapidly construct virtual pools of compute, network and storage based on the needs of particular customers or applications, then have those resources dynamically and automatically flex as needs change. To accomplish this, many in the industry espouse composable infrastructure capabilities, which rely on heterogeneous resources with specific capabilities which can be discovered, managed, and automatically provisioned and re-provisioned through data center orchestration tools. The primary benefit of composable infrastructure results in a smaller grained sets of resources that are independently scalable and can be brought together as required. In this webcast, SNIA experts will discuss:
•What prompted the development of composable infrastructure?
•What are the solutions?
•What is composable infrastructure?
•Enabling technologies (not just what’s here, but what’s needed…)
•Status of composable infrastructure standards/products
•What’s on the horizon – 2 years? 5 Years
•What it all means
Daniel Gilfix, Marketing Manager, Storage and Hyperconverged Infrastructure, Red Hat and Sean Murphy, Product Manager, Red HaRecorded: Feb 13 201944 mins
In the public sector and industries like energy, retail, banking, and telecommunications, organizations increasingly rely on business-critical applications that must be deployed with limited space, budgetary constraints, and scarcity of skilled IT staff. They must extend the reach of these applications from datacenter core to edge of the network with reduced complexity on the infrastructure that best meets their IT requirements.
Red Hat’s innovative approach to addressing these issues includes Red Hat® Hyperconverged Infrastructure for Virtualization, which provides flexibility and choice for customers seeking low-density, infrastructure consolidation based on our leading virtualization platform. Red Hat Hyperconverged Infrastructure for Virtualization is streamlined with Red Hat Ansible® Automation and is based entirely on code from the open source community.
During the webinar, we’ll discuss:
> Market dynamics and challenges customers are facing with too much required by too few resources in too short a period.
> The emergence of hyperconverged infrastructure as an alternative to inefficient segregated infrastructure.
> Why hyperconverged infrastructure operational processes are more effective.
> How an open source subscription model can facilitate maximum benefits of infrastructure consolidation.
Shawn Morris, Vice President of Systems, Applications and Software (SAS), Global IP Network, NTT CommunicationsRecorded: Feb 13 201959 mins
What actually makes good routing policies "good"? The telecoms industry has mostly focused on teaching each other how to implement BGP features in their networks, but there has been very little dialogue on how to design robust policies. Many global carriers do not even educate their customers on how to use and take advantage of them. In this webinar, NTT Communications and the Global IP Network will offer a conceptual model to look at routing policies, offer terminology to help discuss them, and analyse routing policy design patterns and best practices.
NTT Communications will also share its experience from creating and deploying large scale complex routing policies in a carrier IP network that you can use to sharpen up your routing policy or even build one from scratch.
ABOUT THE SPEAKER:
Shawn Morris leads a global team that is responsible for all the software and systems that manage and operate the Global IP Network (GIN), a tier-1 backbone that covers the Americas, Europe, Asia and Oceania with a single autonomous system number (AS2914). His responsibilities include the development and testing of staff and facilities, focused on qualifying both hardware and software for the entire network. Shawn also oversees the development team responsible for the GIN configuration tools.
Shawn has more than twenty years of experience in the IP networking industry. He was previously a member of the IP engineering staff at Verio until the acquisition of Verio by NTT Com in August 2000.
Joakim Lialias,Symantec / Sundeep Vijeswarapu, PayPal / Fernando Montenegro, 451 ResearchRecorded: Feb 13 201956 mins
Symantec Unites Superior Protection, Automation and Artificial Intelligence in its most Advanced Endpoint Security Solutions.
As attackers become more sophisticated, advanced protection and hardening are necessary for added layers of security.
Join our webinar for first-hand insights on the newest cloud-delivered endpoint security solutions and hear from Joakim Liallias, Symantec and special guest speakers Sundeep Vijeswarapu from PayPal and top industry analyst Fernando Montenegro, 451 Research as they discuss:
• How to gain a better understanding about the trends that are driving the need for a more comprehensive endpoint security approach.
• How PayPal is using Symantec Endpoint Security to protect their endpoints.
• How Symantec is redefining endpoint security with its new complete cloud-delivered endpoint defense:
- Introducing never seen before innovation to deliver best-in-class prevention
- Hardening Detection and Response to help customers achieve superior threat prevention,
- Quicker identification of attackers and more tightly integrated technology and human expertise lead to better response and faster remediation
- Security professionals and IT teams are strapped for time – streamlined management and automation will reduce significant burden
Don't miss this great opportunity to get the latest information on taking steps towards simplifying Endpoint Security for your organization
Keith Langridge & Hasan Javed from BT, and Jon Howes & Ricardo Belmar from InfovistaFeb 20 20192:00 pmUTC30 mins
The pressure is on to deliver a smarter network for the future. So what’s holding you back? You could be losing around 2.6% of your annual revenues because of slow running applications and downtime.
It’s tricky to get sufficient visibility of your key applications and as you take on board more cloud services or digitise your operations, you may end up with blind-spots and inefficiencies.
In our upcoming live filmed webinar, experts from BT and Infovista will discuss how to get a full end-to-end view across your application and network infrastructure, improve performance and deliver the user experience your customers and employees demand.
You’ll find out more about :
• automated control of the user experience, optimised per user
• how to truly gain the benefits of the cloud in your digital transformation
• some unique ways to work with Microsoft business applications
• application intelligence in the era of SD-WAN
• Keith Langridge - Vice President, Network Services, BT
• Hasan Javed - Senior Product Manager,, Connect Intelligence Infovista, BT
• Jon Howes - Senior Vice President, Global Channels, Infovista
• Ricardo Belmar - Senior Director, Global Enterprise Marketing,, Infovista
Yoni Geva, Product ManagerFeb 20 20193:00 pmUTC60 mins
As cyber threats become more sophisticated, companies of all sizes are struggling to stay secure. Regardless of how many different firewalls you use, it’s merely a matter of time until a threat gets through. To prevent serious breaches, networks must be internally segmented to stop hackers moving freely inside the network and exfiltrating data – but network segmentation must be designed and managed correctly if it’s to be successful. This webinar will examine how to build a micro-segmentation strategy that truly protect your organization’s valuables.
In this webinar, Yoni Geva, Product Manager at AlgoSec will cover:
• Segmentation challenges
• Micro-segmentation explained
• Micro-segmentation strategy benefits
• Micro-segmentation strategy development – first steps
• Implementation Do’s and Don’ts
Patty Driever, IBM; Howard Johnson, Broadcom; Joe Kimpler, ATTO TechnologiesFeb 20 20196:00 pmUTC75 mins
FICON (Fibre Channel Connection) is an upper-level protocol supported by mainframe servers and attached enterprise-class storage controllers that utilizes Fibre Channel as the underlying transport.
The FCIA FICON 101 webcast (on-demand at http://bit.ly/FICON101) described some of the key characteristics of the mainframe and how FICON satisfies the demands placed on mainframes for reliable and efficient access to data. FCIA experts gave a brief introduction into the layers of architecture (system/device and link) that the FICON protocol bridges. Using the FICON 101 session as a springboard, our experts return for FICON 201 where they will delve deeper into the architectural flow of FICON and how it leverages Fibre Channel to be an optimal mainframe transport.
Join this live FCIA webcast where you’ll learn:
- How FICON (FC-SB-x) maps onto the Fibre Channel FC-2 layer
- The evolution of the FICON protocol optimizations
- How FICON adapts to new technologies
Tim Stiller, Senior Incident Response ConsultantFeb 20 20197:00 pmUTC45 mins
Threat intelligence is a core component of any Incident Response engagement or SOC investigation. While threat intel comes in many forms, shapes, and sizes—when used properly—it adds critical context that enables quick and accurate investigation decisions. If you understand the different types of threat intelligence used across your organization, your team can respond quickly to threats, and prioritize a detection strategy to stop future attackers.
In this session, Tim will share:
1. Key types of threat intelligence
2. How each type should be used effectively
3. Recycling: translating investigations into detections
Anuta Networks won the 2019 SD-WAN Implementation Award by TMC. In this presentation, Anuta Networks CEO, Chandu Guntakala shared the latest Anuta ATOM deployment details as well as key learnings from the multi-year IZO SD-WAN project roll-out at Tata Communications.
Rob Allman - SVP Customer Experience, Dimension Data; Dr Harsh Vinayak - SVP of BPO and R&D, NTT DataFeb 21 20192:00 pmUTC60 mins
Robotic process automation is quickly becoming an integral part of the new CX delivery model. Technologies like predictive analytics, machine learning, and cognitive computing are becoming more powerful. But what does this mean for your customer and for your business?
We will be discussing the application of these technologies in a real world CX automation context.
Jeff Laskowski, Security Consulting Director, FireEye MandiantFeb 21 20194:00 pmUTC60 mins
Many breached organizations—of all sizes—believed they had effective security programs and incident response plans. Reality proved otherwise.
Now, executive leaders are far more concerned with incident preparedness. When the Board asks, ‘How ready are we, really?’ your security team must have a defensible response.
In this webinar, Jeff Laskowski, Security Consulting Director of FireEye Mandiant, explains how to achieve effective preparation:
• Test your team’s detection and response capabilities to protect key assets against real-world targeted attacks—without the consequences of a real incident
• Assess your organization’s crisis management capabilities through the lens of an executive team
• Improve your team’s detection and response capabilities in accordance with the latest attacker tactics, techniques, and motivations
Join this webinar today to learn what it takes for your team to know how they would perform under a real threat, before they actually have to.
Eric Adams, Technical Marketing Engineer, Intel CorporationFeb 21 20194:00 pmUTC45 mins
We are pleased to offer a new Webinar, “Securing your containers with Kata,” focusing on financial and other highly-sensitive use cases. Kata Containers offer hardware-rooted isolation between containers, providing an additional layer of security for sensitive applications. The webinar will include a discussion of the motivations behind the Kata Containers project, how it fits into the broader container ecosystem with Kubernetes and Docker interoperability, and the advantages of its small footprint and stronger security. For familiar users, we’ll also review how the project has evolved from version 1.0 to the recent 1.5 release. We will also provide demonstrations of how to get started with Kata Containers and how Kata Containers can mitigate against an existing security exploit. Join us on February 21, 2019, for an informative hour on Kata Containers.
Join this webinar on Thursday 21 February to learn how 5G will transform the way content is created, produced and distributed.
More than just a faster mobile data connection, 5G reinvents connectivity. The technology enables new types of remote productions, and coverage of more live events, news and sports in higher 4K/HDR quality, and will revolutionise the way consumers receive content, combining broadcast, OTT and data to create a seamless experience regardless of network or device.
That's the theory - but how is 5G being deployed in practice? What are the early adopters doing, and what results are they achieving?
This webinar will explore a series of exciting use cases for 5G with hands-on case studies, including:
- Enriching production and storytelling
- Revitalising newsgathering and live event coverage
- Blending broadcast and live data for mobile audiences in the European 5G-Xcast project
- Dr Jordi Gimenez, 5G research engineer & project manager, IRT Germany
- Matt Stagg, Director of mobile strategy, BT Sport
- Marios Nicolaou, 5G and digital transformation senior strategy advisor
Mark Gaydos, CMO, at NlyteFeb 21 20195:00 pmUTC60 mins
Join this webinar where Mark Gaydos, CMO of Nlyte Software, will present the Next Generation of Asset Discovery.
Nlyte Asset Explorer uses agentless technology to scan your network from desktop to data center to cloud to inventory your hardware, software and networking assets. It supports all major protocols, integrates with your CMDB and creates a single source of knowledge of 100’s of data points.
You will learn:
- Security Officers report more than 10% of assets on network are undetected
- Only 10% of IT Operations managers believe that all assets are detectable and monitored
- 6% of Financial Officers feel they have no risk from a vendor software audit
- IT Managers report more than 69% of assets not current with software and patches
- 87% of Organizations believe 10% of assets or more are not in their CMDB
Matt Smith, Chief Architect, Red Hat & Christopher Liljenstolpe, CTO, Solutions, TigeraFeb 21 20196:00 pmUTC60 mins
Join Red Hat Chief Architect, Matt Smith, along with Tigera CTO, Solutions, Christopher Liljenstolpe, as they share their experience and knowledge helping leading enterprises achieve their key business transformation initiatives around moving to secure cloud-based, containerized microservice applications. In this 60 minute webinar, they will cover their top lessons learned on network security and Red Hat OpenShift.
Radical changes in security have dramatic impact on load balancing. SSL/TLS is changing so rapidly that enterprises are forced to do a forklift upgrade of their hardware load balancers. However, with Avi's software load balancer, it’s as simple as a version update.
In this webinar, we will catch you up the latest SSL facts.
- SSL termination can be done with only software. And it has better security, scalability, and lower cost. That’s how Facebook and Google do it. Let’s see how.
- RSA and Elliptic-curve cryptography (ECC) have different implications for perfect forward secrecy (PFS), HTTP/2 and TLS 1.3 support. Let’s compare.
- SSL health score allows you to manage expiring certificates, automated certificate renewals, and notification alerts from a centralized control plane.
Eric Carter, Director of Product Marketing, Sysdig & Shadi Albouyeh, Offering Manager, Developer Services - IBM CloudFeb 21 20196:00 pmUTC45 mins
If you’re involved with developing applications, chances are you’re being tasked with adapting to cloud-native infrastructure and being able to support cloud-native workloads with solutions like containers and Kubernetes. Join this discussion with Sysdig and IBM Cloud, who have recently built a partnership focused on improving monitoring and troubleshooting for your modern DevOps services. Together, IBM and Sysdig have launched a new offering that provides end-to-end monitoring capabilities in the IBM Cloud. You’ll come away with a better understanding of key visibility challenges and solutions that will help you successfully deliver the apps that drive your business.
Todd Thiemann, Director Product Marketing - Arctic Wolf NetworksFeb 21 20197:00 pmUTC39 mins
The evidence is clear: law firms of all sizes need to securely handle sensitive information associated with their clients, investigators, and witnesses. According to the American Bar Association’s 2017 Legal Technology Survey Report, 22 percent of respondents suffered a security breach at their law firms.*
Compromised client information can destroy reputations and lead to decreased billables and lost business. While the need for improved security is evident, IT and security teams struggle to locate, retain and train talent needed to maintain and improve their security posture. So, what are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure?
In this Arctic Wolf webinar, you will:
- Discover why cybersecurity is top of mind in the legal community
- Recognize the IT and Cybersecurity skills shortage and its impact on security
- Understand how SOC-as-a-Service approaches enable law firms to rapidly improve their security posture and provide evidence to satisfy technology audits
Mark Bowker, Senior Analyst, ESG / Richard Diver,Cloud Security Architect. Insight/ Jereme Lee, System Engineer, SymantecFeb 21 20197:00 pmUTC62 mins
Its your job to secure email, sensitive data and apps in Office 365. Now What?
Moving to cloud applications provides the opportunity to get your security right. This is the time to set up optimum data loss prevention, malware and phishing prevention, and access controls on your systems. No matter if you are still planning, have just started, are in the midst, or are fully migrated to Office 365, there are security policies and procedures to implement and optimize.
Join ESG industry analyst Mark Bowker, Insight’s Cloud Security Architect, Richard Diver, and Symantec’s System Engineering Manager, Jereme Lee to learn how to:
- Get the most out of your Office 365 instance by enhancing the security
- Understand what Microsoft offers and how Symantec compliments their security offering
- Enhance your email, app and data security in Microsoft Office 365 which can be used across all your cloud apps
John Masci, Principal Technologist - Cloud SolutionsFeb 21 20197:00 pmUTC60 mins
Today, 77 percent of enterprises have at least one application on the cloud (IDG State of the Enterprise Cloud, 2018). If you are part of that 77 percent, then cloud is now a critical element of your competitiveness. Heading into 2019, the growing pains of cloud will be cost and security: you’ll face the difficult balance between empowering your teams with the newest cloud technologies and ensuring those teams stay within budgets and comply with organization-wide policies.
As you take on this challenge, you need a cloud management platform that provides proactive ways to control and minimize costs, while enforcing governance and security.
In partnership with LiftOff IT, HyperGrid invites you to attend this webinar and demo, highlighting the capabilities we offer to help you optimally manage and benefit from your cloud strategy.
This webinar focuses on the following critical topics:
• How your cost, security & governance challenges will change at different stages of cloud adoption
• Key methods to manage costs including instance optimization, budget tracking, bill analysis and chargebacks
• Mitigating security risks using risk-based policies, and automated threat detection
• Maintaining compliance against internal and external standards corporate when operating in the public cloud
• How the HyperCloud™ platform can simplify all the above
Receive a complimentary copy of Gartner’s 2019 Magic Quadrant for Cloud Management Platform Report
As a webinar participant, you’ll receive a courtesy copy of Gartner’s new landmark overview of the CMP marketplace. Learn why Gartner singled out HyperGrid as the only “visionary” in this category in its Magic Quadrant for Cloud Management Platforms.
Matthew Webster, Senior Security Researcher, Secureworks Counter Threat UnitFeb 21 20197:00 pmUTC61 mins
All too often companies are learning the hard way — during an incident — how they could have been better prepared to stop the threat or reduce the damage. Join us for a one hour webcast, hosted by SC Magazine, featuring the key findings of Secureworks newly-released Incident Response Insights Report 2018: Risks, Remedies, and Best Practices for Defending Against Cyber Threats.
Webcast takeaways will include:
- Threat and attack trends identified by responders in 2017.
- Lessons learned by organizations in a wide variety of incident response (IR) scenarios.
- Key recommendations for IR planning, practices and capabilities that improve security defenses and mitigate business risk.
- Live Q&A with experts from our Counter Threat Unit™ (CTU) and Incident Response team.
In 2017, Secureworks’ team of incident responders helped hundreds of organizations navigate through complex and high-risk security incidents. Now the top insights from those collective engagements will be shared by speakers from the Secureworks Counter Threat Unit and Incident Response practice.
This program offers the support you need to prepare better for emerging threats, understand how you might be vulnerable, and respond more effectively when an incident does occur. Program content is appropriate for cybersecurity leaders, incident responders, CIOs, CTOs, and executives with responsibility for enterprise risk management.
Closed-Loop Automation by Anuta ATOM combines Orchestration, Analytics, and Assurance to ensure the network matches the business intent. Closed-Loop Automation eliminates human errors, generates new business insights and avoids network downtime. For more information, visit https://www.anutanetworks.com/technologies/closed-loop-automation/
Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²Feb 22 20196:00 amUTC60 mins
Earning the globally recognized CSSLP secure software development certification is a proven way to build your career and better incorporate security practices into each phase of the software development lifecycle (SDLC).
In this info-session, you will learn:
- How large is the cybersecurity workforce gap today
- Why you should pursue CCSLP
- How to earn the certifications – exam and experience requirements
- The recent updates on membership benefits and policies
- And, ask any question that will support your certification journey
Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.
CSSLP certification recognizes leading application security skills. It shows employers and peers you have the advanced technical skills and knowledge necessary for authentication, authorization and auditing throughout the SDLC using best practices, policies and procedures established by the cybersecurity experts at (ISC)².
Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.
Are you ready to prove yourself? Register and begin your CSSLP journey today!
Whether you are just exploring moving workloads to the cloud, or are fully cloud-enabled, one thing is certain: security has changed from a purely on-premise environment.
As cybersecurity risks continue to grow with more advanced attackers and more digital surface area, how you think about staying secure without compromising user experience must adapt.
During this talk, you will:
-Hear how global consistency, agile controls, and predictable costs are goals and principles that matter in this new environment
-Be able to evaluate your current plans against a "customer security model"
Bob Liscouski, Juanita Koilpillai and David MorrisFeb 22 20196:00 pmUTC90 mins
How a Digital Risk Framework (an understanding of the differences between cyber security, cyber risk and digital risk) can help identify and mitigate risks to your Cloud Infrastructures.
In this session you will learn what a Digital Risk Framework is, how a Digital Risk Framework can help you comply with the onslaught of privacy regulations (CCPA, GDPR, HIPPA, etc) and its impact on your Cloud Infrastructures, which are most commonly used.
Tim Woods, Vice President of Technology Alliances | Elisa Lippincott, Director of Product MarketingFeb 22 20197:00 pmUTC60 mins
Many enterprises are adopting a cloud-first strategy in efforts to drive business innovation and growth. As cloud deployments grow, security requirements grow with them – leading to a trend of security responsibilities becoming dispersed as traditional security implementations impede the speed to delivery. Distributed responsibilities lead to fragmented security implementations - add to the problem the lack of skilled personnel, misconfiguration errors, overly permissive access, shadowed IT, and a lack of consistency between on-premise and cloud security controls, and you can end up with a recipe for disaster.
Join Tim Woods, VP of Technology Alliances at FireMon and Elisa Lippincott, Director of Product Marketing at FireMon, in this webinar where they will discuss:
• Steps you need to take to gain full visibility and control to secure your hybrid environment
• How to ensure consistency of your security controls within hybrid cloud and multi-cloud environments
• How to manage risk and complexity in your hybrid cloud with a cloud security posture management strategy