Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Minimizing Total Installed Cost of Field Installed Fiber Connectors
    Minimizing Total Installed Cost of Field Installed Fiber Connectors Robert Reid & Seamus Hamrin, Panduit Recorded: Jun 21 2018 42 mins
    This webinar will focus on the issues surrounding the “Total Installed Cost” (TIC) of Backbone/Riser fiber cabling. We will explore the contributing factors to variability of TIC, focusing on field termination skill and the impact of permanent link testing on the individual connector PASS/FAIL decision making process (via a mathematical model).

    We will also review the development of new tools and novel methods to mitigate errors that estimate Insertion Loss (IL) in field terminated connectors, including new “expert system” technology deployed to test connector IL during the termination sequence.
  • Network considerations for hybrid cloud
    Network considerations for hybrid cloud Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Recorded: Jun 21 2018 43 mins
    Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.

    Learn how Citrix networking solutions for hybrid cloud can deliver:

    •Contextual and secure access to applications
    •Website and application protection from internal and external threats
    •Application and network visibility and intelligent analytics
    •Flexibility and performance
  • Ask The Experts: Part 1 Using Automation to fight automation
    Ask The Experts: Part 1 Using Automation to fight automation Laurence Pitt, Global Security Strategy Director at Juniper Networks Lee Fisher Recorded: Jun 21 2018 3 mins
    Laurence Pitt, Security Strategy Director at Juniper Networks discuss how cyber criminals are using automation to stay ahead of security experts preventative measures. They're using automation to create malware, resulting in an increasingly regular number of security breaches. Laurence also discusses the need for businesses to automate the simpler aspects of their security processes, to free up time for human intelligence to spot behavioral abnormalities.
  • 『2018 年インターネットセキュリティ脅威レポート』より、脅威の最新動向についてご説明します。
    『2018 年インターネットセキュリティ脅威レポート』より、脅威の最新動向についてご説明します。 髙岡 隆佳, エバンジェリスト, Symantec Japan Recorded: Jun 21 2018 63 mins
    2017 年には、WannaCry と Petya/NotPetya の爆発的な流行や、コインマイナーの急激な増加などが見られました。デジタル世界のセキュリティ脅威は予想もしない新たなところから出現し、それに対する警戒が必要という状況は変わっていません。量的に増えているだけでなく、脅威を取り巻く世界はますます多様化しています。攻撃者は、新しい攻撃の経路を見いだすことにも、攻撃しつつその痕跡を隠すことにも、さらに懸命になってきました。

    シマンテックのエバンジェリストである髙岡 隆佳が、『2018 年インターネットセキュリティ脅威レポート(ISTR)』についての所見をお伝えします。主な内容は、次のとおりです。

    - コインマイニングのゴールドラッシュ到来
    - ランサムウェアの傾向が変化
    - 
数字で見る標的型攻撃
    - 
ソフトウェアサプライチェーンの感染
    - モバイル脅威の急増

    今すぐ登録
  • Creating Collaborative Huddle Rooms—How to Select the Right Tools and Technology
    Creating Collaborative Huddle Rooms—How to Select the Right Tools and Technology Brian Fichter, Director, Video Collaboration, Carousel Industries & Chris Thorson, Sr. Director, Polycom Recorded: Jun 20 2018 46 mins
    While traditional video conference rooms remain an anchor in most organizations, today’s accessible video technology means any space can be turned into a video collaboration space. In fact, With the growth in remote workers, the need for collaborative meeting spaces is on the rise to connect on and offsite workforces.
    Regardless of what solutions you are using today — Polycom, Microsoft, WebEx or GoToMeeting, to keep up with the demands of the modern workforce, you should be able to easily integrate legacy functionality with new capabilities.

    During this webinar, collaboration technology experts from Carousel and Polycom will discuss how you can:

    • Maximize capabilities within multi-vendor platforms for investment protection
    • Design collaborative workspaces with high quality audio, HD content and business-class video
    • Drive adoption with easy to use technology that doesn’t scare people away
  • Webinar: Accelerate Technical Sales through Self-Service Demos
    Webinar: Accelerate Technical Sales through Self-Service Demos Pascal Joly, Dir Techology Partnerships, Quali, Matt Branche, Services Lab Engineer, Broadcom Recorded: Jun 20 2018 37 mins
    Featuring: Industry Experts from Broadcom and Quali
    Are you spending too much time prepping demos? Not enough time running killer customer demos? That’s the challenge with demoing complex technology products: they’re hard to setup.

    Join us with industry experts from Broadcom and learn how to create a self-service catalog of demo environments that can serve your sales team effectively, how these environments can be deployed in minutes with built in orchestration, and how to expose "one-click" commands in the sandbox for demoing complex technology products. To be sure, there will also be a live demo :)
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation
    When the Walls Come Tumbling Down – Network Security for the Cloud Generation Mike Chen, Director of Product Marketing, Symantec and Tim Murphy, Sr. Manager Network Product Marketing, Symantec Recorded: Jun 20 2018 60 mins
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:

    - Why you should embrace cloud-based network security

    - The tools you need to provide protection against a variety of attacks

    - Why a proxy belongs at the center of your cloud service

    - Cloud migration strategies

    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today
  • Learn to Fight Cloud Sprawl and Eliminate Service Outages
    Learn to Fight Cloud Sprawl and Eliminate Service Outages Vid Sista, Director of Technology Solutions Recorded: Jun 20 2018 15 mins
    Adding automation to your IT environment is one of the best ways to fight cloud sprawl and help eliminate service outages. In this 15-minute webinar, Accudata’s Director of Technology Solutions Vid Sista will explain:

    How automation solutions enable you to proactively identify service issues
    Why cloud sprawl is a major threat to IT security – and how you can stop it
    What businesses can do to automate their IT services lifecycle
  • [Ep.17] Ask the Expert: Data Migration and Third Party Maintenance
    [Ep.17] Ask the Expert: Data Migration and Third Party Maintenance Chris Crotteau, Director of Strategic Product Development & Glenn Fassett, GM - EMEA, Curvature Recorded: Jun 20 2018 61 mins
    How easy is it to move data?

    Between traditional, on-premises data centers, hosted/collocated data centers, and infrastructure as a service (IaaS) through the large cloud providers, where to store your data and run your business critical applications is now a source of significant complexity in the IT world. Understanding your application set and business needs, then determining where best to run those applications and store their data presents a host of challenges both old and new.

    So where does Third Party Maintenance fit into all of this? Or better yet….what IS Third Party Maintenance?

    Join us for an engaging discussion with Curvature’s IT infrastructure experts to learn:

    •What Third Party Maintenance (TPM) is and how it has become a vital market segment focused first and foremost on the client’s needs
    •How TPM can cost-effectively extend the life of IT assets and align the lifetime of those assets to your application and software lifecycles
    •How TPM can enable you to manage major IT infrastructure transitions in a much more cost effective manner

    About the experts:

    Chris primarily works in the Services department as a Solutions Architect developing technological solutions and strategies for clients. As a technology expert, Chris leads a team of technical engineers to develop new tactics and processes for clients from development to design. Chris was named Employee of the Year in 2005 and 2009.

    Glenn is responsible for the strategic growth and expansion throughout Europe. Previously, Glenn managed Curvature’s international operations and led the company’s entry into Europe in 2002, successfully launching Curvature’s Asia-Pacific division in 2007. Prior to leading this international expansion, Glenn managed enterprise accounts as a distinguished member of Curvature’s U.S. sales organization beginning in 1996.
  • Secure Datacenters in Space
    Secure Datacenters in Space Dennis Gatens, Jeff Snyder, Alex Pezold,David Morris Recorded: Jun 20 2018 81 mins
    While everyone is talking about Cloud based data centers, the real migration is to outer space, where satellites continuously orbit the Earth. How will this work and what are the security implications. The Goddard Space Flight Center's lists 2,271 satellites currently in orbit.

    Join this panel of experts as we cover:
    •The migration of data centers to satellites
    •The benefits, risks, vulnerabilities and threats posed to a satellite based datacenters

    Dennis R. Gatens: VP Channel Management & Marketing at Cloud Constellation Corporation

    Jeff Snyder: CTO at Cloud Constellation Corporation

    Alex Perzold:Co-Founder and CEO at TokenEx
  • Data-Driven IT in Travel & Tourism: How to Maintain a Competitive Advantage
    Data-Driven IT in Travel & Tourism: How to Maintain a Competitive Advantage Tyson Supasatit, PMM at ExtraHop and Jon Randall, Senior Solutions Architect, EMEA at ExtraHop Recorded: Jun 20 2018 33 mins
    The tourism industry is a highly competitive space; be it for airline operators, hotel booking sites, or travel fare aggregators. It is an industry that has been heavily digitised and in which a 2% profit is considered a good year. In this environment, IT teams in travel & tourism are constantly being asked to provide better, more secure digital experiences at less cost. The key to greater efficiency and performances is visibility into complex IT environments, where a single business transaction could involve 30 different hops across Citrix, Sabre applications, and third-party API calls.


    In this webinar, we'll be looking at real-life examples of how IT teams can leverage enterprise-scale IT analytics backed by AI to:

    - Improve application performance in highly complex IT estates
    - Reveal suspicious activity on their network
    - Provide business intelligence for reducing costs and improving profitability
  • The Time for vCPE is NOW!
    The Time for vCPE is NOW! Eyal Aloni & Philip Jerichower, RAD Recorded: Jun 20 2018 43 mins
    White boxes may be general purpose, low-cost and easy to commoditize, but they lack many OAM functions and connectivity options that cannot always be virtualized, yet are still required by operators. In this webinar, we will explain how to bridge these gaps by supplementing universal CPEs (uCPEs) with universal access, enhanced performance monitoring and diagnostics, legacy TDM service support, and 1588 timing synchronization. We will also share typical use cases based on real-live experience of tier 1 operators using white boxes for virtualized business services today.

    Eyal Aloni Head of Service Provider Line of Business - RAD
    Philip Jerichower, Director of International Training, RAD
  • Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting
    Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Jun 20 2018 77 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Cyber-Espionage and Threat Hunting

    Our Verizon Threat Research Advisory Center presenters will be:
    •Chris Novak, Director, Investigative Response
    •Jihana Clemetson, Senior Analyst, Threat Intelligence
    •Marcus Cymerman, Senior Analyst, Network Forensics
    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas

    For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.

    Following the cyber-espionage insights, we'll cover the following topics:

    •Current Intelligence
    •Attacks & Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Parallel Wireless Public Safety LTE
    Parallel Wireless Public Safety LTE Zahid Ghadialy, David Cullerot and Amir Lugasi Recorded: Jun 20 2018 39 mins
    Public safety is moving from outdated communication systems to 4G LTE to meet the need for data in daily operations and emergency situations. However, public safety cannot move to public safety LTE with current commercial LTE architectures because commercial LTE has coverage gaps in areas that may not be commercially viable.

    Parallel Wireless Public Safety LTE communication solution provides a unified resilient LTE network for police, fire, ambulance, and armed forces in tactical operations, emergencies, and day-to-day communication – all at much lower cost. It can even be deployed instantly in ad hoc scenarios as a deployable/man portable solution!

    Please join us on June 20 at 9:00am EDT for a not-to-be-missed webinar where we will discuss our public safety LTE solution which has been installed in 25+ global military, police, and fire deployments and has been selected by a public safety LTE network in Europe.

    In this webinar, you will learn how Parallel Wireless innovative Public Safety LTE architecture addresses the needs of network control, coverage everywhere, and resilience while allowing graceful and cost-effective migration to LTE.
  • Does BYOD Mean Bring Your Own Dissatisfaction?
    Does BYOD Mean Bring Your Own Dissatisfaction? Mike Marks, Riverbed Product Evangelist Recorded: Jun 20 2018 41 mins
    Improve IT performance across all mobile devices and business-critical apps for complete end-user satisfaction.

    Your workforce is mobile. They need fast, reliable and secure access to corporate resources from their smartphones and tablets to be productive no matter where business takes them.

    Enabling a mobile workforce is a business necessity. But, BYOD and the ever-growing number and types of apps and devices complicate matters. While mobile workspaces provide some level of control, enterprises still struggle to deliver 5-star digital experiences to their mobile end users.

    Attend this webinar to:

    Explore key requirements for mobile application and end-user experience monitoring
    See a demo of how SteelCentral delivers real-time performance analytics from the user’s device to back-end infrastructure
    Move beyond access and control to actually measuring and improving end-user experience
  • Four IT Challenges of Software Development Teams & How to Manage Them
    Four IT Challenges of Software Development Teams & How to Manage Them Ofir Agasi, Director of Product Marketing, Cato Networks Recorded: Jun 20 2018 53 mins
    From India to Belarus, organizations are tapping software development talent in emerging markets. These developers often work outside of company offices, leading to four IT challenges that can undermine developer productivity, render cloud-based versioning systems and repositories unusable, complicate onboarding new developers, and increase risk.

    Learn from the experiences of three IT pros supporting distributed development teams, and how Cato Cloud solves those challenges.
  • Dell EMC PowerMax – Tier-0 хранилище на NVMe
    Dell EMC PowerMax – Tier-0 хранилище на NVMe Игорь Виноградов, старший системный инженер Dell EMC Recorded: Jun 20 2018 60 mins
    На вебинаре мы рассмотрим новую СХД от Dell EMC – PowerMax, объявленную на Dell Technologies World. Основное внимание будет уделено архитектурным особенностям PowerMax и выгоде, которую они дают, основным отличиям от предыдущих моделей СХД, а так же рассмотрены текущие тренды в хранении данных. Вебинар проводится при поддержке компании Intel®
  • Digging In: Preparing for IoT in Mining
    Digging In: Preparing for IoT in Mining Peter Klement, XMPro and Mikey Kalis, Unearthed Recorded: Jun 19 2018 61 mins
    Explore the role of the IoT in the mining industry. From big industry to incubators and startups -- many organizations are engaging globally via innovative ecosystems, testbeds and tech hubs for education, awareness, and best practices.
  • Cloud Security: Lessons from the Trenches
    Cloud Security: Lessons from the Trenches Brian Talbert, Alaska AIrlines; Enrique Salem, Bain Capital; Ami Hofman, Dimension Data; John Parker, ShieldX Recorded: Jun 19 2018 46 mins
    According to ESG, 25 percent of organizations say maintaining strong and consistent security across their own data center and multiple public cloud environments with a centralized command-and-control a top CISO concern. So how do you do it?

    Join Alaska Airlines Director of Network and Connectivity Solutions Brian Talbert, former Symantec CEO Enrique Salem and ShieldX VP of Products John Parker for a discussion on best practices for secure cloud migration. This panel will discuss:
    - How security can help your company adopt a cloud first strategy
    - Key threats security teams should expect.
    - Why micro-segmentation becomes a critical control when your perimeter defenses are defeated
    - How to gain visibility into your data center and cloud environments
    - Overcoming common objections encountered during migration
  • Best Practices for Outsourcing Your IT Security
    Best Practices for Outsourcing Your IT Security Ryan LaSalle, Global Managing Director, Growth & Strategy - Accenture Security, Narayan Makaram - Arctic Wolf Recorded: Jun 19 2018 62 mins
    With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

    By attending, you’ll:

    - Understand best practices for working most effectively with third party providers
    - Discover what security functions can be handled by third parties and what should be kept in-house
    - Recognize how to avoid common pitfalls of working with third parties
    - Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it

    Save your seat now to learn more!
  • FICON 101
    FICON 101 Patty Driever, IBM; Howard Johnson, Broadcom; J Metz, Cisco Recorded: Jun 19 2018 62 mins
    FICON (Fibre Channel Connection) is an upper-level protocol supported by mainframe servers and attached enterprise-class storage controllers that utilize Fibre Channel as the underlying transport. Mainframes are built to provide a robust and resilient IT infrastructure, and FICON is a key element of their ability to meet the increasing demands placed on reliable and efficient access to data. What are some of the key objectives and benefits of the FICON protocol? And what are the characteristics that make FICON relevant in today’s data centers for mission-critical workloads?

    Join us in this live FCIA webcast where you’ll learn:

    • Basic mainframe I/O terminology
    • The characteristics of mainframe I/O and FICON architecture
    • Key features and benefits of FICON
  • HCL NFV Cognitive troubleshooting framework
    HCL NFV Cognitive troubleshooting framework Ramesh Sriraman, GM, HCLTech Recorded: Jun 19 2018 54 mins
    Complexity of troubleshooting NFV stack is manifold because of multiple layers of telemetry data. With such large data, SME driven exploratory analysis can be time-consuming and is not scalable. Cognitive Troubleshooting Framework augments exploratory analysis, reduces the time taken to find needle out of haystack by applying AI (ML/DL) algorithms based on model arrived at and help understand the behavior of the overall system and identify bottleneck regions that need be optimized.
  • IT Complexity and the New Monitoring Landscape
    IT Complexity and the New Monitoring Landscape Nancy Gohring of 451 Research and cPacket Recorded: Jun 19 2018 46 mins
    Businesses across sectors are adopting a host of new technologies – containers, SDN, IoT and many others -- as digital transformation disrupts practically every industry. The result is a significantly more complex IT environment than ever before. These environments present new challenges for professionals tasked with ensuring applications perform perfectly, leading to a re-examination of a once widely accepted monitoring toolset.

    Join as we discuss:
    •Why monitoring has become a big data problem
    •The morphing monitoring tools landscape
    •The value network monitoring tools can bring to APM and security
  • How do enterprises use containers? A discussion of 2018 Docker usage.
    How do enterprises use containers? A discussion of 2018 Docker usage. Eric Carter Jun 21 2018 5:00 pm UTC 60 mins
    What are the top application components running in containers? What is the lifespan of containers, container images, and services? How is orchestrator adoption changing? What keeps container developers and administrators up at night?

    Join us for a discussion of these topics and more in our review of the 2018 Docker Usage Report - based on a sample of 90,000 containers in real-world deployments.
  • FCoE vs. iSCSI vs. iSER
    FCoE vs. iSCSI vs. iSER J Metz, Cisco; Saqib Jang, Chelsio; Rob Davis, Mellanox; Tim Lustig, Mellanox Jun 21 2018 5:00 pm UTC 75 mins
    The “Great Storage Debates” webcast series continues, this time on FCoE vs. iSCSI vs. iSER. Like past “Great Storage Debates,” the goal of this presentation is not to have a winner emerge, but rather provide vendor-neutral education on the capabilities and use cases of these technologies so that attendees can become more informed and make educated decisions.

    One of the features of modern data centers is the ubiquitous use of Ethernet. Although many data centers run multiple separate networks (Ethernet and Fibre Channel (FC)), these parallel infrastructures require separate switches, network adapters, management utilities and staff, which may not be cost effective.

    Multiple options for Ethernet-based SANs enable network convergence, including FCoE (Fibre Channel over Ethernet) which allows FC protocols over Ethernet and Internet Small Computer System Interface (iSCSI) for transport of SCSI commands over TCP/IP-Ethernet networks. There are also new Ethernet technologies that reduce the amount of CPU overhead in transferring data from server to client by using Remote Direct Memory Access (RDMA), which is leveraged by iSER (iSCSI Extensions for RDMA) to avoid unnecessary data copying.

    That leads to several questions about FCoE, iSCSI and iSER:

    •If we can run various network storage protocols over Ethernet, what
    differentiates them?
    •What are the advantages and disadvantages of FCoE, iSCSI and iSER?
    •How are they structured?
    •What software and hardware do they require?
    •How are they implemented, configured and managed?
    •Do they perform differently?
    •What do you need to do to take advantage of them in the data center?
    •What are the best use cases for each?

    Join our SNIA experts as they answer all these questions and more on the next Great Storage Debate.
  • Building for a Better Future: Using SD-WAN to Rebuild a Business Network
    Building for a Better Future: Using SD-WAN to Rebuild a Business Network Rick Rader, IT Director with Myron Steves & Scott Turner and David Turner with Meriplex & Rosa Lear with VeloCloud Jun 21 2018 5:00 pm UTC 60 mins
    In today’s world, undisrupted network connectivity is critical to ensuring business continuity. As the adoption of virtual instances and cloud migration accelerates, dependence on high quality, high speed, high bandwidth connections becomes a necessity. Outages have far reaching implications and can be detrimental to a business as the networks of yesterday are ill-prepared for the business of today and the future. SD-WAN is changing this scenario. In this webinar, Myron Steves discusses how its implementation of SD-WAN transformed their entire network and prepares them for future growth.

    Presenters:
    Rick Rader, IT Director with Myron F Steves
    Scott Turner, Director of Sales with Meriplex Communications
    David Turner, Principal Technologist with Meriplex Communications
    Rosa Lear, Senior Marketing Manager with VeloCloud now part of VMware
  • A New Era in Data Storage for Machine Learning and AI Ecosystems
    A New Era in Data Storage for Machine Learning and AI Ecosystems Ashish Gupta Jun 21 2018 5:00 pm UTC 60 mins
    As enterprises transition their Business Intelligence and Analytics environments to Machine Learning and Artificial Intelligence driven ecosystems, their core data infrastructure has to scale. Focusing only on the compute layers, creates a highly inefficient infrastructure. Vexata with its VX-OS version 3.5 release brings to market transformative economics and breakthrough performance to power these next-generation workloads at scale.e.

    You will learn about:
    • How to scale core data infrastructures for the transition to Machine Learning and Artificial Intelligence workloads
    • What are the key considerations before creating an AI/ML-centric storage infrastructure
    • How Vexata's new VX-OS version 3.5 release addresses these challenges
  • What to expect when Ansible meets your organization - what we wish we'd known
    What to expect when Ansible meets your organization - what we wish we'd known Ryan Bontreger, associate platform consultant, Red Hat Scott Knauss, architect, Red Hat Jun 21 2018 6:00 pm UTC 60 mins
    Thinking about automation in your massive enterprise environment? Ansible® is the wave of the future, but is it right for what you need it to do?

    Join this webinar to hear:
    > About the ins and outs of planning for Ansible in your organization.
    > How to integrate Ansible within your workflow.
    > What not to do with Ansible.
  • Network considerations for hybrid cloud
    Network considerations for hybrid cloud Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Jun 21 2018 6:00 pm UTC 60 mins
    Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.

    Learn how Citrix networking solutions for hybrid cloud can deliver:

    •Contextual and secure access to applications
    •Website and application protection from internal and external threats
    •Application and network visibility and intelligent analytics
    •Flexibility and performance
  • The Cyber Threat Landscape in K-12 Schools from the FBI’s Perspective
    The Cyber Threat Landscape in K-12 Schools from the FBI’s Perspective Special Agent Michael Morgan, FBI Jun 21 2018 8:00 pm UTC 60 mins
    While cyber threats are exponentially increasing in volume, diversity and sophistication, they are rapidly outstripping our ability to safeguard critical data, applications and systems. Join this webinar to hear SA Morgan explain how the FBI addresses the cyber threat, discuss the cyber threat landscape in K-12, and provide prevention and mitigation techniques that you can implement on your campus.
  • Webinarreihe Lean Agile Enterprise: 2 - Agile Softwareentwicklung als Basis
    Webinarreihe Lean Agile Enterprise: 2 - Agile Softwareentwicklung als Basis Katja Gibbels. Presales Technical Consultant, Micro Focus Jun 22 2018 8:00 am UTC 60 mins
    Live-Webinarreihe:
    Lean Agile Enterprise - erfolgreiche Umsetzung mit dem Scaled Agile Framework SAFe®

    Um die digitale Transformation erfolgreich zu meistern, müssen Organisationen die Fähigkeit haben, den schnellen Wandel und die Veränderungen des Marktes zu antizipieren und für sich zu nutzen. Immer mehr Unternehmen setzen dabei auf agile Vorgehensweise und führen deshalb die weltweit führende Skalierungsmethode zur Agilität, Scaled Agile Framework (SAFe®), ein.
    Erfahren Sie in dieser kostenfreien Webinarreihe, mit welchen Lösungen und Tools wir Sie dabei unterstützen, SAFe® in Ihrem Unternehmen umzusetzen, um damit dauerhaft wettbewerbsfähig und erfolgreich im Markt bestehen zu bleiben.

    Webinar 2: Agile Softwareentwicklung als Basis für Lean Agile Enterprise
    22. Juni 2018 I 10:00 - 11:00 Uhr

    Erfahren Sie in diesem Webinar, wie Sie Lean Agile Enterprise und die agilen Prinzipien in der Softwareentwicklung umsetzen können. Das Scaled Agile Framework (SAFe®) nutzt dabei SCRUM- und Kanban Methoden, die bereits von vielen Entwicklungsteams angewendet werden, als Basis und ermöglicht somit, die Entwicklung zu Lean Agile Enterprise zu optimieren. Das zweite Webinar dieser Reihe wird Ihnen eine tiefere Sicht darauf geben und stellt vor, wie ALM Octane einen Lean Agile Entwicklungsprozess unterstützen kann.
  • What's the True ROI of SD-WAN vs MPLS?
    What's the True ROI of SD-WAN vs MPLS? Shamus McGillicuddy, EMA; Randy Taylor, GHD; Joshua Dobies, Riverbed Jun 26 2018 8:00 am UTC 60 mins
    Tired of all the SD-WAN hype? Ready to see real data on ROI, payback, and operational savings? In a new ROI study, Enterprise Management Associates (EMA) quantifies the business benefits of deploying Riverbed SD-WAN. It’s the data you need to build your business case for next-generation cloud networking.


    Join EMA, customer GHD, and Riverbed to learn:

    Key ROI contributors, including connectivity costs, CAPEX savings, and employee productivity gains
    TCO of SD-WAN vs traditional dual MPLS
    Actual ROI achieved at GHD
  • Intent-based Networking. Is it real? Are you ready?
    Intent-based Networking. Is it real? Are you ready? Gary Kinghorn Jun 26 2018 4:00 pm UTC 30 mins
    Intent-based networking is generating interest as a next-generation method for automating network changes and validating network policies. What's really feasible today, what benefits does it offer and where can it be deployed? We will show how it can be used to verify network designs and configurations in a fraction of the time. And it's easily deployed today.
  • The Buzz Around Cognitive Computing in Energy & Utilities
    The Buzz Around Cognitive Computing in Energy & Utilities Jeffrey S. Katz Head of Grid Technology Energy, Environment and Utilities industry, IBM Jun 26 2018 4:00 pm UTC 60 mins
    Cognitive systems solve problems the way humans solve problems, by thinking, understanding, reasoning, reacting and interacting. Through simulation of human thought processes, the goal of cognitive computing is to create automated IT systems that are capable of solving problems without requiring human assistance.

    This webinar will explore the application of cognitive computing techniques within the energy sector: increasing the accuracy of outage predictions, optimizing uptime, and enabling customers to monitor and control their monthly energy consumption.
  • How to Build a Global Internet of Things (IoT) Application
    How to Build a Global Internet of Things (IoT) Application Evan Cummack and Mehdi Medjaoui Jun 26 2018 4:00 pm UTC 45 mins
    Everyone is excited about the vision and promise of IoT. In reality, it's prohibitively difficult for most of us to design, build, deploy and manage an IoT solution.

    When compared with software, IoT tools and platforms are fragmented, manufacturing costs are high, and iteration cycles are long. From a go-to-market and wireless connectivity perspective, it's difficult to build once and deploy globally.

    Once an IoT app is deployed, security vulnerabilities and monitoring challenges can quickly derail an entire project.

    ---
    *A Better Way to Build for IoT *

    2018 represents an inflection point for 'wide area' IoT connectivity, with operators around the world embracing 3GPP standards for low power IoT devices.

    IoT app developers can now take control of how their software connects around the world, from a central management location.

    Utilizing these tools along with a development process that emphasizes security, identity, and global coverage is the way to build a successful IoT app in 2018.

    Join Evan Cummack, Principal Product Manager at Twilio, for an immersive demonstration moderated by Mehdi Medjaoui, ReadWrite API expert and founder of the APIDays Conference.

    ---
    *What’s in it for you?*

    In this immersive webinar, you will learn:
    - How to ensure your app has global coverage
    - How to embed voice, messaging, video, and authentication capabilities into your applications via simple-to-use APIs
    - How to route around provider outages or service disruptions before they ever impact your customers
  • Session 1: Automating security and compliance for hybrid environments
    Session 1: Automating security and compliance for hybrid environments Lucy Kerner, Global security technical strategist, evangelist, Red Hat Jun 26 2018 5:00 pm UTC 25 mins
    Visibility, control, security, governance, and compliance are paramount to your IT infrastructure.
    Those can be even more challenging in a hybrid infrastructure consisting of physical, virtual,
    cloud, and container environments. You can ease these challenges by automating security and
    compliance using a combination of Red Hat® CloudForms®, Red Hat Satellite, Red Hat Insights,
    Red Hat Ansible® Automation, and OpenSCAP. In this session, learn how to easily provision a
    security-compliant host, how to quickly detect and remediate security and compliance issues,
    how to ensure governance and control, how to do proactive security and automated risk
    management, how to perform audit scans and remediations on your systems, and how to
    automate security to ensure compliance against regulatory or custom profiles.
  • What and Where Were the Top IoT Cyber-Threats in 2017?
    What and Where Were the Top IoT Cyber-Threats in 2017? Xiaobing Sun, Principal Security Researcher Jun 26 2018 5:00 pm UTC 60 mins
    In the past few years, with the proliferation of IoT devices, IoT security becomes a hot topic. Earlier this year, researchers at NSFocus put together a “2017 Annual IoT Cybersecurity Report”, surveying the IoT landscape and the new threats from them. In this webinar, we will highlight the important findings and opinions in this report. Topics include:
    •Survey of the exposed IoT devices.
    •Various vulnerabilities in these IoT devices.
    •Threat analysis from these IoT devices.
    •How to protect the IoT devices.
  • Architecture Matters: 7 Questions to Ask when Evaluating SD-WAN Solutions
    Architecture Matters: 7 Questions to Ask when Evaluating SD-WAN Solutions Jim Metzler, Analyst, Researcher and Founder at Ashton, Metzler & Associates Jun 26 2018 5:00 pm UTC 60 mins
    The SD-WAN market has been flooded with a range of vendors offering varying types of SD-WAN solutions. While having differing types of solutions provided by numerous suppliers is potentially beneficial, it also creates confusion that complicates the task of evaluating alternative SD-WAN solutions.

    Join us as Jim Metzler, analyst, researcher and founder at Ashton, Metzler & Associates, cuts through the confusion in the market by identifying seven key questions that network organizations should ask themselves as part of evaluating SD-WAN solutions.
  • Surgical Threat Mitigation: Sharpen Your Response
    Surgical Threat Mitigation: Sharpen Your Response Paul Roberts, Security Ledger & Brandon Dobrec, LookingGlass Cyber Solutions Jun 26 2018 5:00 pm UTC 60 mins
    Cyber threat intelligence – when properly gathered, refined, and applied – can help organizations identify business risks and target both protections and mitigations. But what distinguishes high-quality and actionable threat intelligence from low-quality security "noise"? How are cutting edge CISOs and IT security teams applying threat intelligence to respond to incidents and slam shut windows of compromise?

    Find out in this webinar moderated by Paul Roberts, the Editor in Chief at The Security Ledger. Paul will be joined by LookingGlass’ Brandon Dobrec, and an industry speaker. Together they will review the value of threat intelligence to organizations, discuss how cutting edge firms are using threat intelligence to their advantage, and review how to orchestrate threat intelligence to automate mitigation and combat third party risk.

    Tune in on Tuesday, June 26 @ 1PM ET!!
  • VMware Cloud on AWS
    VMware Cloud on AWS Mark Vaughn, Presidio and Samir Kadoo, AWS Jun 26 2018 5:00 pm UTC 60 mins
    In this upcoming webinar you will learn how VMware Cloud on AWS can help your organization simplify operations in a hybrid cloud environment. VMware Cloud on AWS seamlessly integrates VMware compute, storage, and network virtualization capabilities with the full breadth and depth of services and global infrastructure footprint of AWS.

    This offering enables your organization to seamlessly migrate and extend your on-premises VMware vSphere-based environments to AWS, so you can realize the value of a hybrid cloud environment.
  • Kubernetes Run-Time Security, an Example of Blocking an Application Attack
    Kubernetes Run-Time Security, an Example of Blocking an Application Attack Knox Anderson Jun 26 2018 5:00 pm UTC 30 mins
    Join us for an online demo of blocking an application attack in your Kubernetes cluster.
  • The Four Keys to Unlocking Application Identity for Security
    The Four Keys to Unlocking Application Identity for Security John O'Neil, Pete Nahas, Adam Sell Jun 26 2018 5:30 pm UTC 60 mins
    Join Edgewise Chief Data Scientist John O’Neil, Agent Developer Pete Nahas, and Director of Marketing Operations Adam Sell for a conversation on how to enable a zero trust project by establishing secure identities for applications in your cloud or data center.
  • Going the Distance: Innovative Ways to Extend Your Network
    Going the Distance: Innovative Ways to Extend Your Network Teresa Hoffman, Fiber Product Business Manager Jun 26 2018 6:00 pm UTC 30 mins
    According to the Cisco VNI forecast, global IP traffic is expected to nearly triple between the years 2015 and 2020. Advancements in wireless and A/V technologies are also driving up the demand for bandwidth. As buildings become more connected and more intelligent, the amount of data flowing through your network will continue to increase exponentially. Installing Cat 6A solves the bandwidth challenge in the horizontal. But what about the fiber backbone that needs to support all of those additional 10Gbps drops? And how about wireless access points or security cameras that you need to connect and power out in the parking garage that far exceed the 100 meter distance limitation? This 30-minute webinar will present several solutions for maintaining the reach you need for maximum performance while supporting an ever-increasing amount of bandwidth over your network.

    Attend this webinar if you want to learn about:
    - The evolution of the fiber backbone
    - Wireless requirements for up to 40G in new construction
    - The distances you can reach with different multimode fibers
    - A unique Berk-Tek solution for indoor/outdoor applications
  • Achieve Your Security Goals with Inline Prevention Tools
    Achieve Your Security Goals with Inline Prevention Tools Ian Farquhar, Distinguished Engineer, Security, Gigamon Jun 27 2018 4:00 am UTC 60 mins
    Inline security tools operate by actively preventing threats in your network, but deploying and optimizing these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade. The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges. Join Gigamon and (ISC)² on Jun 27, 2018 (Wed) at 12:00 noon (Singapore Time) to examine how inline bypass can overcome physical deployment obstacles, maximize network availability, increase the scale of inspection and reduce the impact to network performance.
  • Why Visibility is Key to GDPR
    Why Visibility is Key to GDPR Adrian Rowley, EMEA Technical Director at Gigamon Jun 27 2018 8:00 am UTC 45 mins
    The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.

    Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.

    In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:

    - Eliminate monitoring blind spots
    - Vastly improve the accuracy and precision of data risk detection
    - Help organisations meet the GDPR challenge

    About the Presenter

    Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
  • Legacy Modernisation: Overcoming the Transformation Barriers
    Legacy Modernisation: Overcoming the Transformation Barriers Simon Ratcliffe, Principal Consultant, Ensono, Kevin Stoodley, CTO, IBM Z Series, & Alex Hilton, CEO, CIF Jun 27 2018 12:00 pm UTC 60 mins
    A recent survey conducted by Ensono, in partnership with the Cloud Industry Forum, showed that 89% of respondents believed that legacy technology was a barrier to effective digital transformation. Given that many organisations operate a complex technology landscape often with elements in different locations, and with core components that are regarded as ‘legacy but critical’, there needs to be a clear and simple approach to overcoming these obstacles.

    Breaking down the barriers requires effective change in people, process and technology to attain a viable level velocity that will enable transformation without being held back by perceptions of legacy issues.

    Examining these issues, this webinar will provide insight and thought provoking approaches for organisations seeking to transform their operations against this backdrop.
  • [PORTUGUESE WEBINAR] Application Delivery Controllers em ambientes Multi-Cloud
    [PORTUGUESE WEBINAR] Application Delivery Controllers em ambientes Multi-Cloud Thiago de Lima, System Engineer Brazil at A10 Jun 27 2018 1:00 pm UTC 60 mins
    A grande maioria das empresas está acelerando sua migração para plataformas de software e virtualização. Globalmente, mais de 70% das empresas já estão usando ambientes híbridos para a distribuição de seu conteúdo e espera-se que mais da metade dos aplicativos sejam totalmente virtualizados até 2020. Essas mudanças impõem uma série de desafios para as empresas, sobre como gerenciar seu conteúdo em ambientes com várias nuvens e como otimizar a experiência de seus usuários e clientes.

    Neste webinar, a A10 Networks apresentará informações sobre o estado atual do setor de distribuição de aplicativos e conteúdo, bem como nossa visão sobre como implementar uma solução altamente eficiente e eficaz para o mercado empresarial.

    Agenda:
    * Situação do mercado de virtualização y multi-cloud para empresas
    * Desafios de migrar e operar um ambiente multi-cloud
    * Soluções A10 para automatizar a migração e operação de ambientes multi-cloud
  • [SPANISH WEBINAR] Application Delivery Controllers en ambientes Multi-Cloud
    [SPANISH WEBINAR] Application Delivery Controllers en ambientes Multi-Cloud Jose de Abreu, Manager, Systems Engineering at A10 Jun 27 2018 3:00 pm UTC 60 mins
    La gran mayoría de las empresas están acelerando su migración a plataformas de software y virtualización. A nivel global más del 70% de las empresas ya están usando ambientes híbridos para la distribución de su contenido y se espera que más de la mitad de aplicaciones sean completamente virtualizadas en 2020. Estos cambios imponen una serie de retos a las empresas, sobre cómo administrar su contenido en ambientes multi-cloud, y como optimizar la experiencia de sus usuarios y clientes.

    En este webinar A10 Networks presentara información sobre el estado actual de la industria de distribución de aplicaciones y contenido, así como también nuestra visión sobre cómo implementar una solución altamente eficiente y eficaz para el mercado empresarial.

    Agenda:
    * Estado del mercado de virtualización y multi-cloud para empresas
    * Retos de migrar y operar un ambiente multi-cloud
    * Soluciones de A10 para automatizar la migración y operación de ambientes multi-cloud