Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Three Secrets to SD-WAN Success
    Three Secrets to SD-WAN Success
    Dan Shelton, Director Product Management at Zscaler Recorded: Aug 20 2019 39 mins
    Will 2019 be the year of SD-WAN?
    With more than 60% of branch traffic bound for the internet, organisations are turning to SD-WAN to provide intelligent routing and to directly, quickly, and securely connect branch users to the internet and the cloud applications they need to do their jobs.

    But, navigating the journey to secure SD-WAN can present challenges. How do you prepare for your SD-WAN deployment and ensure you can achieve your intended outcomes? Join this webinar to learn from a real-world example:

    - What is driving SD-WAN and the core issues impeding deployments
    - How to get the most out of your SD-WAN deployment
    - Why it is critical to address security before you begin your SD-WAN journey

    About the Speaker:
    Dan Shelton is an IT Executive and Change Agent with over 20 years experience in managing large multi-faceted global IT organisations. Prior to joining Zscaler, Dan served as the Senior Director for Global Networks & Telecom at Kelly Services where he led a large-scale, multi-phased Digital Transformation Program that leveraged several cloud-based infrastructure and security services to positively impact business operations across 900 locations in 22 countries.
  • Platform of the Future - Network as a Sensor (Part 4)
    Platform of the Future - Network as a Sensor (Part 4)
    Fady Sharobeem, Systems Engineer, Cisco Meraki Recorded: Aug 20 2019 28 mins
    IT can be a complex topic for all businesses. In this 5 part video series, we’ll cover how Meraki is changing the industry and simplifying IT with modern technology.

    Learn how to build a full Meraki stack from scratch as well as taking advantage of APIs for variety of use cases.
  • Juniper's Multicloud Container Platform - Juke 2.2 Preview
    Juniper's Multicloud Container Platform - Juke 2.2 Preview
    Brian Gladden, Sales Director at Juniper Networks, Chuck Piercey, PLM Director at Juniper Networks Recorded: Aug 19 2019 21 mins
    Imagine being able to easily manage core storage objects and create multiple nodes in a single Kubernetes cluster.

    In this webinar, you’ll learn:

    •What Juke is all about
    •Demos
    •Volume snapshots and clone management to boost reliability and enable mobility
    •Kubernetes cluster scale out with compute and storage nodes that can now span clouds and sites or stay local to one cluster availability zone .
  • [PANEL] Beyond Perimeter-Based Security
    [PANEL] Beyond Perimeter-Based Security
    Jo Peterson (Clarify360) | Tina Gravel (Cyxtera) | Adrian Taylor (ITC) | Josh Frantz (Rapid7) Recorded: Aug 19 2019 48 mins
    For years organisations have relied on perimeter-based security strategies to protect and secure their networks. As the workplace becomes increasingly fluid, it is clear that relying solely on perimeter-based security is no longer suitable.

    Join this exclusive panel of industry experts as they discuss:
    • Where traditional perimeter-based security models fall short
    • Notable cyber attack methods and how to protect against them
    • Strategies for improved network security and how to implement them

    Speakers:
    - Jo Peterson, VP Cloud Services, Clarify360 (moderator)
    - Tina Gravel, SVP Global Channels, Cyxtera
    - Adrian Taylor, CTO, ITC Secure
    - Josh Frantz, Lead Security Consultant, Rapid7
  • How to save +80% in data center costs migrating to Google Cloud Platform (GCP)
    How to save +80% in data center costs migrating to Google Cloud Platform (GCP)
    Jamie Sidey, Chief of Staff for Optiva and Keith Millar, SVP Services Business at Pythian Recorded: Aug 16 2019 35 mins
    Optiva, a Canada-based company that develops software for communications service providers, already had plans to migrate to Google Cloud Platform (GCP) to become more agile and reduce costs. But when it acquired another company, it suddenly found itself in possession of many outdated assets located in data centers all over the world—complicating its goal of quickly and easily moving all of its assets to the cloud. Facing a complex and daunting task, the client turned to Google, and partner Pythian.

    In 35 minutes you will hear
    1. How Optiva and Pythian moved 10 data centers to GCP
    2. Learn about the lift & shift with a double-bubble
    3. Challenges Optiva and Pythian encountered during migration
  • X by Orange: How to Build a Telco Operator from Scratch in Less Than 1 Year
    X by Orange: How to Build a Telco Operator from Scratch in Less Than 1 Year
    Ignacio Verona and David Sastre Medina, Red Hat Recorded: Aug 15 2019 44 mins
    X by Orange committed to launch a new, fully software-defined telco operator in Spain - from scratch. They wanted to “Uberize” the telco business by being completely cloud based and not owning a single piece of hardware. The goal was clear, but not easy: Streamline how a communications service provider works to launch new services in less than 90 days, provide an extremely simple user experience, and redefine the telco market. Also, the whole project, including hiring more than 120 people, developing the IT backend, and creating a sales, marketing, and go-to-market strategy, needed to be accomplished in 1 year. And they made it.

    In this session recorded at Red Hat Summit, Ignacio Verona and David Sastre Medina, Red Hat, discuss how X by Orange created its infrastructure using Red Hat OpenShift with an “everything is automated” deployment policy. Also, they show how Red Hat Consulting helped the company's goals become reality through extensive involvement - during the initial phases and on site.
  • Deliver a Better Digital Workspace Experience featuring Forrester
    Deliver a Better Digital Workspace Experience featuring Forrester
    Calvin Hsu, VP of Product Marketing at Citrix, Andrew Hewitt, Analyst Serving Infrastructure & Ops Professionals at Forrester Recorded: Aug 15 2019 65 mins
    As your enterprise looks for better ways to drive employee productivity through a better technology experience, the infusion of intelligence, automation, and personalization into the digital workspace offers exciting potential. In this webinar, digital workspace thought leaders Andrew Hewitt (Forrester Analyst/Guest speaker) and Calvin Hsu (Citrix VP of Product Marketing) will explore the impact of digital workspaces powered by intelligence and automation.

    Attendees of the webinar will learn:
    -The top challenges organizations face in creating a technology experience that enables productivity
    -The evolution of digital workspace technology, and particularly the impact of intelligence and automation within the workspace
    -A day-in-the-life scenario of a digital workspace end user that shows specific processes and advantages
  • Episode Two: Navigating the E-rate program
    Episode Two: Navigating the E-rate program
    Holly Davis, CEO Komplement Business Development Consulting Recorded: Aug 15 2019 4 mins
    Key elements of the E-rate program.
    The E-rate program is a complex and critical process for many K-12 organizations and institutions.
    E-rate expert Holly Davis highlights key elements of the E-rate program to help you navigate the process.

    In this second episode of our E-rate series, you will learn about:

    •Filling cycle
    •Eligible Services List (ESL)
    •470 and 471 forms
    •Rules of the program

    Watch the entire video series for valuable insights to help you confidently approach E-rate funding.
  • Scaling DevOps Episode 2: Scaling CI Environments
    Scaling DevOps Episode 2: Scaling CI Environments
    Roni Dover, Director of Sales Innovation & Meni Besso, Product Manager Recorded: Aug 15 2019 16 mins
    It can be easy to do cutting edge DevOps for small teams working on small-scale projects. However, different problems start to emerge when scaling DevOps processes and operations to multiple (sometimes distributed) teams, complex deployments, multiple technologies (Kubernetes, instances, and serverless functions), and critical production systems with millions of users being affected by each change.

    In the second episode in the series, we will discuss the specific challenges DevOps engineers and developers face in scaling cloud environments for continuous integration and CI tools such as Jenkins or Teamcity. We will discuss how we view the 'shift left' movement and how it impacts the complexity of developing scalable end-to-end automation for your cloud environments.
  • Exploring the Top Requirements for a Network Edge Platform
    Exploring the Top Requirements for a Network Edge Platform
    Bob Laliberte, Senior Analyst at ESG, Inc. Recorded: Aug 15 2019 41 mins
    Organizations are evolving their IT landscape at a rapid pace to ensure the business can successfully execute against key initiatives and technologies. Given the increasing importance of digital transformation, cloud services, IoT, distributed computing, and the enhanced connectivity they require, it is clear a new network architecture is required. From a network architecture perspective, to enable the aforementioned business initiatives, organizations need to focus on the services delivered at the network edge. SD-WAN technology will be the key requirement, but what else should a network edge platform look like? Join us to learn about the challenges with legacy architectures and learn about best practices for creating a scalable network edge platform.
  • Modernize Cybersecurity Threat Detection
    Modernize Cybersecurity Threat Detection
    Nathan Necaise - VP of Data Sciences Emerging Services - Optiv Recorded: Aug 15 2019 55 mins
    The convergence of streaming data platforms with cyber security solutions presents real opportunity for combating and predicting future threats. Join StreamSets and Optiv as we discuss common use cases and architectural patterns used by leading Fortune 500 organizations to modernize their cyber architecture.

    During this webinar, we will discuss:

    -Common challenges facing today’s SIEM’s and how to effectively augment them with streaming data platforms
    -Show customer examples and demonstrate how they are leading to transformative effects
    -How to optimize security architectures that use technologies like Splunk using StreamSets
  • How to Effectively Secure Hundreds of Thousands of Mobile Devices
    How to Effectively Secure Hundreds of Thousands of Mobile Devices
    Brian Duckering, Sr. Mobile Security Specialist, Symantec Recorded: Aug 15 2019 57 mins
    Join us as we cover ways to effectively and efficiently secure mobile devices across a broad range of industries.

    As more enterprises are recognizing the need for greater visibility into mobile threats and the desire to protect their organizations from such threats, primary concerns still seem to be focused around what threats a solution can identify – malware, phishing, network attacks and much more.

    While this is a starting point, there are other elements, characteristics, and abilities that have a far greater impact on the protection of an organization’s sensitive assets, information, and data that are not discussed often enough.

    This webinar will explore the less-discussed topics of a mobile security strategy that everyone should understand – before it’s too late.

    • Focus on high user acceptance rates - poor adoption rates can make a good solution worthless.

    • Provide security on managed & unmanaged devices - equally effective security should be available for mobile devices and use cases.

    • Protection of sensitive data and systems should take place in real time - relying on third-party solutions or human intervention could be too late.

    • Resource demand should be minimal - maintaining and updating the solution should be efficient and require minimal resources.

    Participants should leave this webinar with knowledge and considerations to help them evaluate mobile security solutions and plan an effective deployment and execution in their own environment.

    Register Today
  • The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together
    The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together
    Jason Bevis, VP Global Threat Hunting, Cylance; Alex Holden, CISO/Pres, Hold Security, Chip Wagner, Sec Analytics, IBM Recorded: Aug 15 2019 59 mins
    Many organizations are so busy responding to and remediating indents that they don’t have the time, resources or framework for being proactive and searching for these threats. Automation (artificial intelligence or machine learning) can provide actionable intelligence quickly without being a resource drain. Pairing automation with a threat hunting framework like the MITRE ATT&CK can help to build an overarching strategy for addressing this critical area. Join BlackBerry Cylance and (ISC)² on August 15, 2019 at 1:00PM Eastern for a discussion on how to better and more quickly identify malicious behaviors and how a model of continuous improvement can benefit an organization.
  • Is Data Still the New Currency?
    Is Data Still the New Currency?
    Primitive Logic CEO Jill Reber & President Kevin Moos Recorded: Aug 15 2019 36 mins
    Getting your company ready for GDPR, CCPA, and other data privacy laws isn’t about putting a few new processes in place — it’s about rethinking your entire approach to personal data, including how to get value from it. For decades, companies have collected and stored all kinds of personal information “just in case” they ever needed it.

    Today's data privacy regulations require a different approach. You need to be proactive in thinking about how to get value from your data, and you need to understand exactly what your company is doing with personal data and why.

    Join Jill Reber and Kevin Moos of Primitive Logic to learn:
    - How to work with third parties who process personal data on your behalf
    - How preparing for data privacy laws helps you understand your data on a whole new level (and why that’s a good thing)
  • Learn How to Replace EqualLogic with Datrium's State-of-the-Art Solutions
    Learn How to Replace EqualLogic with Datrium's State-of-the-Art Solutions
    Cameron Joyce, Principal Solutions Architect at Datrium Recorded: Aug 15 2019 56 mins
    Many enterprises have chosen Datrium’s next-generation disaggregated HCI solutions. Do your systems need a refresh? Fortunately, EqualLogic customers can take advantage of Datrium Automatrix and get primary storage, backup, disaster recovery, mobility, and encryption in a single data management platform. Join us for our upcoming webinar where you will learn how to:

    - Get zero storage management overhead with a simple VM-centric approach and no LUNs or volumes
    - Independently scale performance and capacity for maximum flexibility and no disruption to production systems
    - Protect your data with built-in backup, blanket encryption, and erasure coding
    - Take advantage of optional disaster recovery orchestration, including runbook automation, and recover from ransomware instantly with low RTO data mitigation plans
    - Use industry-leading snapshot and replication capabilities
  • Network Trends: Navigating the Modern Network
    Network Trends: Navigating the Modern Network
    Dr. Ritesh Mukherjee, Vice President of Product Management at 128 Technology Recorded: Aug 15 2019 60 mins
    Our dependence on networks finding faster routes and services on-demand has increased with emergence of IoT, cloud, and 5G. The network is a necessary utility to deliver services, creating a requirement for a navigation system similar to the navigation apps that guide us to our destinations. Imagine a network where routers are able to guide packets along pathways based on network congestion and performance requirements!
  • Getting started with Cisco SD-WAN Ansible Pipeline
    Getting started with Cisco SD-WAN Ansible Pipeline
    Stuart Clark, Developer Advocate, Cisco DevNet Recorded: Aug 15 2019 33 mins
    Learn how to apply modern agile methods and tools to the deployment of Cisco SD-WAN topologies. Take a step towards NetDevOps by using Ansible and VIRL to build test environments, create infrastructure-as-code, and automate Day 0, Day 1 and Day 2 configurations.
  • Interview by Chuck Harold from Security Guy TV on Awake Security
    Interview by Chuck Harold from Security Guy TV on Awake Security
    Chuck Harold, Security Guy TV & Rudolph Araujo, VP, Awake Security Recorded: Aug 14 2019 9 mins
    The average customer only knows of about 30-40% of what’s on their network – but we aim to change that.

    In this on-demand live stream from Black Hat USA, Awake’s Rudolph Araujo, VP Marketing, chats with Security Guy TV’s Chuck Harold about the need for NTA solutions like Awake. Don’t miss out!
  • VMware SD-WAN and AT&T: The Best of Both Worlds, Together
    VMware SD-WAN and AT&T: The Best of Both Worlds, Together
    Joseph Chung, Director of SD-WAN Sales of AT&T at VMware and Jonathan Biggs, Lead Product Marketing Manager from AT&T Recorded: Aug 14 2019 58 mins
    SD-WAN has emerged as a growth technology that offers significant advantages to organizations and service providers, including: simplification of branch networks, improved WAN performance, reduction in expenses, and centralized WAN management. AT&T is a strategic partner of VeloCloud, now part of VMware, which was named a Leader in the Gartner Magic Quadrant for WAN Edge Infrastructure. Together, they help businesses get the most out of their investment in SD-WAN and 5G.

    In this webinar with AT&T and VMware, hear from these long-term partners about the unique benefits of SD-WAN and what it means for AT&T solutions and customers. VMware SD-WAN by VeloCloud helps deliver the vision of the Network Edge, working with AT&T to enable the foundation for additional services and enterprise customers.

    Join this webinar to learn about:

    • Secure and seamless authentication engines
    • Integration with cloud providers, data centers
    • Support for more protocols, 5G, MPLS, Internet
    • The advantage of federated gateways
    • Work we’re doing with 5G and IoT
  • ITM Master Class June 2019
    ITM Master Class June 2019
    Jason Poole Recorded: Aug 14 2019 69 mins
    Join us as we take a look at Citrix Intelligent Traffic Management (ITM) technologies and how they can help your business.

    Citrix ITM delivers visibility into internet conditions and can act upon the anomalies it discovers with granular traffic steering to help you ensure your sites are available and your content finds its way to the user in the most efficient and cost-effective manner possible.
  • ITM Master Class May 2019
    ITM Master Class May 2019
    Jason Poole Recorded: Aug 14 2019 63 mins
    Join us as we take a look at Citrix Intelligent Traffic Management (ITM) technologies and how they can help your business.

    Citrix ITM delivers visibility into internet conditions and can act upon the anomalies it discovers with granular traffic steering to help you ensure your sites are available and your content finds its way to the user in the most efficient and cost-effective manner possible.
  • FREE WEBINAR: Make Your Mark – Bridging the Gender Gap in Telecoms & Tech
    FREE WEBINAR: Make Your Mark – Bridging the Gender Gap in Telecoms & Tech
    Funke Opeke, MainOne | Amy Marks, XSite Modular | Katia Gonzalez Gutiérrez, BICS | Sarah Calveley, AWS Recorded: Aug 14 2019 54 mins
    In celebration of the first inaugural Global Women in Telco & Tech Awards and Summit, Capacity speaks to leading female executives from across the wider telecoms and technology sector about how we close the gender diversity gap in our market, and bring about meaningful change.

    Key takeaways include:
    1) Explore ways to best navigate and manage day-to-day challenges
    2) How can the industry at large best engage with female talent and improve retention
    3) The importance of mentors and sponsors in the advancement of women

    Speakers:

    Funke Opeke
    Funke Opeke, is founder and CEO of MainOne, a broadband infrastructure services provider that built West Africa’s first privately owned, open-access submarine cable system interconnecting Lagos, Nigeria; Accra, Ghana; and Seixal, Portugal in 2010.

    Amy Marks
    As CEO of XSite Modular, Marks has become the preeminent prefabrication consultant and design-builder of Critical Infrastructure Buildings, worldwide.

    Katia Gonzalez Gutiérrez
    Katia is Head of Fraud Prevention Operations and Services at BICS, a leading global wholesale carrier in the Telecom industry. With more than 14 years of experience in the Mobile and Wholesale Telecom industry, Katia also chairs the i3Forum Fraud Group.

    Sarah Calveley
    Sarah Calveley is a Senior Business Manager for the UK and Ireland at Amazon Web Services (AWS) where she is responsible for leading a team and driving strategy to help customers adopt the cloud and digitally transform their business.
  • Citrix Intelligent Traffic Management - Master Class 2019 April
    Citrix Intelligent Traffic Management - Master Class 2019 April
    Jason Poole Recorded: Aug 14 2019 50 mins
    Join us as we take a look at Citrix Intelligent Traffic Management (ITM) technologies and how they can help your business. Citrix ITM delivers visibility into internet conditions and can act upon the anomalies it discovers with granular traffic steering to help you ensure your sites are available and your content finds its way to the user in the most efficient and cost-effective manner possible.
  • 数据泄露事件及对中国企业的启示
    数据泄露事件及对中国企业的启示
    李岳霖, 技术顾问, Akamai Technologies; 郑伟, 大中华区产品市场部经理, Akamai Technologies Recorded: Aug 14 2019 63 mins
    2018年5月25日,《欧盟数据保护通用条例》(General Data Protection Regulation,简称“GDPR”)正式生效。但条例生效后的1年多,欧洲各国监管机构尚未对违规企业作出巨额罚款。终于,在2019年7月8日与9日,英国信息监管局(Information Commissioner’s Office,简称“ICO”)先后对英国某航空公司和某知名连锁酒店开出1.83亿英镑和9920万英镑的巨额罚单,拉开GDPR强硬执法的序幕。

    • 航空公司和酒店的数据泄露事件,公司网站被劫持,谁该负责?
    • 对中国企业,特别是有出海业务的国内企业有什么启示?

    参加Akamai Technologies和 (ISC)² 在8月14日下午2:00至3:00的在线研讨会,此次演讲将为您带来对这些问题的解答,敬请期待!

    演讲人: 李岳霖, 技术顾问, Akamai Technologies
    演讲人: 郑伟, 大中华区产品市场部经理, Akamai Technologies
    主持人: 丁斐, CISSP, (ISC)² 南京准分会会长

    *本次在线研讨会将以普通话进行
  • Design, Implement, Operate, Automate: Getting from Automation to Automated
    Design, Implement, Operate, Automate: Getting from Automation to Automated
    Steven Veneman, Director of Marketing, Juniper Networks, Javier Antich Romaguera, Product Line Manager, Juniper Networks Recorded: Aug 13 2019 60 mins
    Automation has been a buzzword in our industry for well over a decade as service providers and vendors have developed technology to simplify networks, including network programmability, SDN, NFV, APIs, and other tools. While progress is certainly being made, these solutions are still prescriptive in nature, falling short of the true intent of network automation. Making the pivot to a fully automated network will require a pivot from a prescriptive to a more autonomous, intent-based network management approach. The business benefit of doing so, is the simplification of the network management lifecycle, from design, through implementation, and ongoing operations. More importantly, with the right partner and solutions, you can simplify your adoption by taking an incremental approach, adopting and deployment solutions where they provide immediate value first and then moving along to the next stage.

    In this webinar, we will demystify automation by exploring five steps service providers should take to implement automation into their network environment and move toward the realization of a network that is driven by desired engineering outcomes. As we step through the journey, we will discuss solutions available in the market today, that will help you progress from each step to the next.
  • Digital Transformation and SD-WAN Architecture: a CIO Perspective
    Digital Transformation and SD-WAN Architecture: a CIO Perspective
    Steve Woo, Co-Founder and Senior Director of Product Management at VeloCloud, now part of VMware Aug 20 2019 8:00 am UTC 50 mins
    Digital transformation has fundamentally changed how organizations across the globe conduct business. The success of an enterprise’s digital transformation will ultimately determine the rise or fall of that organization.

    While IT transformation—the enabler of digital transformation—is easily identifiable in enterprise data centers, branch offices have started to catch up. SD-WAN is the platform that leads enterprise edge transformation — the next frontier of IT transformation.

    What are the top concerns of CIOs when it comes to the edge transformation? What are the tools and best practices available from a CIO perspective? Join this webinar to hear Steve Woo, co-founder of VeloCloud, now part of VMware, discuss SD-WAN architecture, deployment models, and emerging features, and how SD-WAN is a transformative tool that helps organizations add customer value, improve economics, and mitigate risks while reducing costs.
  • Simple Network Misconfigurations Equals Big Vulnerabilities - How to Avoid It
    Simple Network Misconfigurations Equals Big Vulnerabilities - How to Avoid It
    Avivi Siman-Tov, Director of Product, AlgoSec Aug 20 2019 9:00 am UTC 60 mins
    Misconfigurations aren’t simply inconvenient errors but serious security threats. According to Gartner, 99% of all firewall breaches will be caused by misconfigurations by 2020 and misconfigurations made OWASP’s latest list of Top 10 most critical web application security risks.

    A single change to a network device can have far-reaching effects on your business and create security holes for cybercriminals, impact your regulatory audit, and even cause costly outages that bring your business to a standstill! This is true whether on-premise or in the cloud.

    In this webinar, Avivi will present several examples of common misconfigurations, including device changes, business application connectivity changes, and data center migrations. He will also reveal specific techniques to help you avoid misconfigurations.

    Watch the webinar to learn how to:

    •Monitor cloud services to take a proactive stance against misconfigurations
    •Understand and map your entire network before you make a change
    •Understand the impact of changes to your entire hybrid network
    •Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole
    •Use network management automation to avoid common misconfigurations
    •Avoid common mistakes when making changes to your network security devices
  • Getting more from Azure Part 3: SQL Database
    Getting more from Azure Part 3: SQL Database
    John Noakes and James Wilson Aug 20 2019 10:00 am UTC 18 mins
    Microsoft Azure – which offers an open, flexible, enterprise-grade cloud computing platform is helping our clients do just that; helping them increase agility, do more and control costs with IaaS and PaaS.

    Whether you’ve already migrated some of your workloads or you’re considering migrating to Azure, this webinar shares best practice for operating, managing and securing SQL Database through the Azure platform.
  • NTT 2019 Digital Means Business Benchmarking Report
    NTT 2019 Digital Means Business Benchmarking Report
    Wayne Speechly -VP: Advanced Competencies – NTT Ltd. Aug 20 2019 2:00 pm UTC 60 mins
    Key highlights from the NTT 2019 Digital Means Business Benchmarking Report which provides insights and analysis from surveying more than 1,150 executives across five regions, 15 countries, and 11 industry verticals.

    Digital is starting to gain meaningful traction in organizations. They’re focusing internally to see quick wins but are still grappling with prioritization and organization-wide execution of digital transformation.
  • Create a Foundation for Agency Innovation with Dell Technologies
    Create a Foundation for Agency Innovation with Dell Technologies
    Ryan Vance, John Abrams and Al Ford, Dell Technologies Aug 20 2019 2:00 pm UTC 60 mins
    We empower U.S. government agencies with the people, process and technology to protect our nation’s digital future. Come learn how our data center solutions can fit any agency’s need for transformation from the edge to core to cloud. In addition, we will also discuss how data analytics provides you with the opportunity to increase your speed to decision as well as accuracy to decision. Our speaker will also share examples in which an intelligence layer is being added to the data or data analytics capabilities, which include: cyber, RPA, inferencing and multi-INT.

    Register for this webinar today to learn more!

    Go to the URL below to test your system.
    https://www.brighttalk.com/webcast/16007/279983/test-your-system
  • Micro Detail.  Macro Intelligence.
    Micro Detail. Macro Intelligence.
    Tom Foottit, Senior Director, Product Management, Accedian Aug 20 2019 3:00 pm UTC 60 mins
    Why granular, high quality data is critical for optimal end-user experience in the 5G era.
  • Level Up with Dell Technologies
    Level Up with Dell Technologies
    Paul Zonfrillo and Mark Green, Strategic Pathways and Neil Swoyer, Dell EMC Aug 20 2019 4:00 pm UTC 60 mins
    Are you an IT professional looking to get more of your initiatives funded?
    •Level Up teaches attendees how to connect your technology strategy to business outcomes.
    •Learn how to craft and deliver an effective pitch to business executives
    • Elevate the perception of IT within the business
  • Driving Increased Productivity with Your Vulnerability Management Program
    Driving Increased Productivity with Your Vulnerability Management Program
    Tori Sitcawich, Product Marketing Manager, Rapid7 Aug 20 2019 4:00 pm UTC 60 mins
    In today’s world, security teams are faced with challenges that can oftentimes hinder the productivity of their vulnerability management programs. These challenges include working with operations teams, demonstrating ROI to leadership, and finding ways to accelerate remediation. In this session with Rapid7, learn about best practices to overcome these challenges and improve collaboration, communication, and overall productivity.

    We’ll cover:
    1. How to break down organizational silos
    2. How to track meaningful progress and build effective reports for leadership
    3. How to effectively make automation a part of your day-to-day remediation workflow
  • Modern Streaming Data Stack with Kinetica & StreamSets
    Modern Streaming Data Stack with Kinetica & StreamSets
    Matt Hawkins - Principal Solutions Architect - Kinetica | Mark Brooks - Solutions Architect - StreamSets Aug 20 2019 5:00 pm UTC 60 mins
    Enterprises are now faced with wrangling massive volumes of complex, streaming data from a variety of different sources, a new paradigm known as extreme data. However, the traditional data integration model that’s based on structured batch data and stable data movement patterns makes it difficult to analyze extreme data in real-time.

    Join Matt Hawkins, Principal Solutions Architect at Kinetica and Mark Brooks, Solution Engineer at StreamSets as they share how innovative organizations are modernizing their data stacks with StreamSets and Kinetica to enable faster data movement and analysis.

    During this webinar, we will discuss:

    -The modern data architecture required for dealing with extreme data
    -How StreamSets enables continuous data movement and transformation across the enterprise
    -How Kinetica harnesses the power of GPUs to accelerate analytics on streaming data
    -A live demo of StreamSets and Kinetica connector to enable high speed data ingestion, queries and data visualization
  • Increase Network Resilience and Optimize Uptime with Inline Bypass
    Increase Network Resilience and Optimize Uptime with Inline Bypass
    John Lehane Senior Product Marketing Manager, Gigamon, Haider Jarral Technical Marketing Engineer, Gigamon Aug 20 2019 5:00 pm UTC 37 mins
    IT teams are adding newer and more Digital Transformation capable tools. Deployment agility and network resiliency are primary concerns. Inline appliances present potential points of failure in the network. Whether due to a power outage, software malfunction, or processing bottlenecks, failing inline tools can disrupt the very applications and services they are meant to protect.

    With bypass protection, traffic continuity can be maintained as new tools are deployed and tools outages occur.

    Join us to learn how the Gigamon Visibility Fabric with Inline Bypass can enhance the day-to-day operations for Network Operations teams. Topics covered include;

    • Enhancing Infrastructure resiliency and availability
    • Reducing operating and monitoring Costs
    • Improved operation efficiencies and cooperation between IT teams
    • Step by step GUI configuration examples
  • (ISC)²’s Digital Transformation Journey - Part 2
    (ISC)²’s Digital Transformation Journey - Part 2
    Bruce Beam, (ISC)²; Beth Paredes, (ISC)²; Sommer Hess, (ISC)²; Brandon Dunlap (Moderator) Aug 20 2019 5:00 pm UTC 60 mins
    (ISC)² recently completed our multi-year Digital End-to-End Transformation (DETE) project, which positions us to deliver a more a seamless and user-friendly experience to all members. In addition to revamping our online presence, we launched a new Learning Management Systems where members can access all the courses developed by our Professional Development Institute. In Part 2 of the (ISC)² Digital End-to-End Transformation (DETE) will examine how (ISC)² executed the plan for the project, following the AGILE Project Management framework and the buy-in and support from other departments and stake holders within the organization. Additionally, there was board governance and oversight to contend with. Join Bruce Beam, CIO; Beth Paredes, Sr. Corporate Member Services Manager; and Sommer Hess, Director PMO, Quality and Training on August 20, 2019 at 1:00PM Eastern for a discussion on these items and the speed bumps that were run into on this project.
  • Kubernetes in the Cloud (Part 3): Stateful Workloads
    Kubernetes in the Cloud (Part 3): Stateful Workloads
    Ingo Fuchs, NetApp; Paul Burt, NetApp, Mike Jochimsen, Kaminario Aug 20 2019 5:00 pm UTC 75 mins
    Kubernetes is great for running stateless workloads, like web servers. It’ll run health checks, restart containers when they crash, and do all sorts of other wonderful things. So, what about stateful workloads?

    This webcast will take a look at when it’s appropriate to run a stateful workload in cluster, or out. We’ll discuss the best options for running a workload like a database on the cloud, or in the cluster, and what’s needed to set that up.

    We’ll cover:
    •Secrets management
    •Running a database on a VM and connecting it to Kubernetes as a service
    •Running a database in Kubernetes using a `stateful set`
    •Running a database in Kubernetes using an Operator
    •Running a database on a cloud managed service

    Register today to learn (almost) everything you need to know about stateful workloads on Kubernetes
  • Prep Your Business to Face 2019’s Most Advanced Cyber Threats
    Prep Your Business to Face 2019’s Most Advanced Cyber Threats
    Brook Chelmo, Senior Product Marketing Manager, SonicWall Aug 20 2019 5:30 pm UTC 60 mins
    The speed and progression of the cyber arms race requires a constant, detailed and unwavering commitment to threat analysis.

    Reserve your spot to gain a better understanding of what’s at stake as we explore:

    •New intelligence on shifts in malware and ransomware strategies
    •Insight on changes to cryptojacking attacks
    •Overview of record-breaking IoT malware
    •Shocking spikes in encrypted threats
  • The Importance of Risk Management Solutions in the “Age of the Breach”
    The Importance of Risk Management Solutions in the “Age of the Breach”
    Matt Duench, Product Marketing Manager, Arctic Wolf Aug 20 2019 7:00 pm UTC 60 mins
    As you read this, a business somewhere is falling victim to a new cyberattack and potentially losing millions of dollars. That’s because on average it takes hackers only a week to exploit new vulnerabilities, while businesses take four months to patch them. Don’t let your company be next.

    Attend this important webinar on vulnerability assessment and risk management where security expert Matt Duench from Arctic Wolf examines the challenge of breaches, how they happen, and what you can do to stop them. Find out:
    - Why the cybersecurity skills shortage leaves companies especially vulnerable
    - How to extend your perimeter security with risk management
    - How a SOC-as-a-service provides comprehensive security for companies of every size
  • Digital Transformation and SD-WAN Architecture: a CIO Perspective
    Digital Transformation and SD-WAN Architecture: a CIO Perspective
    Steve Woo, Co-Founder and Senior Director of Product Management at VeloCloud, now part of VMware Aug 21 2019 4:30 am UTC 50 mins
    Digital transformation has fundamentally changed how organizations across the globe conduct business. The success of an enterprise’s digital transformation will ultimately determine the rise or fall of that organization.

    While IT transformation—the enabler of digital transformation—is easily identifiable in enterprise data centers, branch offices have started to catch up. SD-WAN is the platform that leads enterprise edge transformation — the next frontier of IT transformation.

    What are the top concerns of CIOs when it comes to the edge transformation? What are the tools and best practices available from a CIO perspective? Join this webinar to hear Steve Woo, co-founder of VeloCloud, now part of VMware, discuss SD-WAN architecture, deployment models, and emerging features, and how SD-WAN is a transformative tool that helps organizations add customer value, improve economics, and mitigate risks while reducing costs.
  • 제로트러스트 세상에서 보안 태세 정의하기
    제로트러스트 세상에서 보안 태세 정의하기
    김 현 도, Senior Solution Engineer, Akamai Technologies; 한 준 형, Technical Account Manager, Akamai Technologies Aug 21 2019 6:00 am UTC 60 mins
    일반적으로 제로트러스트 접근방식에는 접근시도과 신원 확인, 그리고 기기확인이라는 3가지 핵심 축으로 살펴볼 수 있습니다.

    이전 웨비나에서는 아이덴티티 기반 접근 방식을 클라우드 프록시와 함께 사용하여 내부 어플리케이션에 보다 안전하게 액세스 하는 방법을 살펴보았습니다.

    이번 웨비나는 두가지 파트로 나뉘어 집니다. 첫번째 부분에서는 앞서 언급한 3가지 제로트러스트 접근 핵심축에 대해 좀 더 자세히 알아보고 사용자와 접근 장비에 대한 의미에 대해 더 살펴보는 과정을 통해 제로 트러스트 아키텍처를 구현하는 방안에 대해 알아보겠습니다.

    두번째 부분에서는 Web에서 API로 전환되는 보안의 트렌드에 대해 살펴보겠습니다.
    여기서 우리는 모바일 어플리케이션의 폭발적인 증가와 함께 웹에서 API로 공격이 이동하는 API의 공격 트랜드와 Credential Fraud의 라이프 사이클을 살펴볼예정입니다.

    발표자: 김 현 도, Senior Solution Engineer, Akamai Technologies
    발표자: 한 준 형, Technical Account Manager, Akamai Technologies
    진행자: 박 선 영, Senior Business Development Manager, APAC, (ISC)²
  • Webinar: How to Build a Change Workflow to Increase Control
    Webinar: How to Build a Change Workflow to Increase Control
    Maya Malevich Director of Product Marketing, Tufin & Ruth Gomel Director Product Design, Tufin Aug 21 2019 6:00 am UTC 58 mins
    “The only thing that is constant is change.” However, change can also be risky.

    Network security changes may lead to broken connectivity, exposure to cyberattacks, or even compliance violations that may result in an audit failure. How do you control and document changes to firewall access?

    Join this session to learn best practices for building a change workflow to:
    • Ensure all changes are documented and audit-ready
    • Enforce a security policy check within every change to improve control
    • Increase efficiency and eliminate errors through automation

    Register now to gain insight into what an effective workflow looks like and how you can streamline the change process you currently use.
  • Creating the Future of Work - Empowering a cloud-enabled workforce
    Creating the Future of Work - Empowering a cloud-enabled workforce
    Tony Muraki-Hart, Enterprise Architect, CANCOM & Toby Brown, Lead EMEA Domain Specialist, Citrix Aug 21 2019 9:00 am UTC 42 mins
    In collaboration with Microsoft & Citrix, CANCOM have developed this Webinar to help you pursue your cloud with confidence.

    Business is transforming, and IT is leading the charge into the digital age. Cloud computing is a critical enabler of this digital transformation. Now, the hub of worker productivity — the desktop — is transitioning to the cloud, thanks to innovations from Citrix and Microsoft.

    What's driving cloud investments today?
    Improving the speed of IT service delivery
    Greater flexibility to react to changing market conditions
    Enabling business continuity
    Improving customer support or services

    Watch this webinar to find out how you can:
    Deliver easy, secure access across devices
    Connect people and places, securely
    Reduce time to market for new products

    Start your transformation today. https://info.cancom.co.uk/move_to_cloud_with_citrix_microsoft
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    John Grim, Senior Manager, PS Advisory Services Aug 21 2019 2:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Erika Gifford, Senior Manager, GSS | Security Operations Advisory
    •Hayden Williams, Senior Manager, VTRAC | Investigative Response
    •John Grim, Managing Principal, VTRAC | Innovations and Development
    •David Kennedy, Managing Principal, VTRAC | Open Source Intelligence

    Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes knowledge of your environment and its unique threats, effective teamwork, and just as importantly, a rigorous Incident Response (IR) Plan. We'll introduce our monthly listeners to the VIPR Report – the Verizon Incident Preparedness and Response Report. We'll provide a high-level overview of our findings across three years of IR Plan assessments and data breach simulations. Insight will include:

    •Observations and recommendations across the six phases of incident response
    •Top takeaways for building a solid IR Plan and capability
    •Breach Simulations Kits and using these resources to run data breach tabletop exercises

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Getting to Yes: How to Justify your Network Packet Broker Purchase
    Getting to Yes: How to Justify your Network Packet Broker Purchase
    Zeus Kerravala, Principal Analyst at ZK Research & Gordon Beith, Sr. Product Marketing Director, Gigamon Aug 21 2019 5:00 pm UTC 60 mins
    “Is it worth it?” is a question you must overcome when purchasing new equipment. Fortunately, when it comes to next-generation network packet brokers (NG-NPBs), getting to Yes is easier than you think.

    The latest data from ZK Research shows that next-generation NPBs have grown from simply a nice-to-have to a must-have technology, making it easy to green light your purchase:

    •Winning organizations deploy next-generation NPBs for a faster, more agile infrastructure with fewer disruptions during updates
    •Enables faster transition to hybrid, multi-cloud model without ever losing out on management and security
    •Eliminates blind spots, so fewer security tools are needed

    Arm yourself with the right information to justify your next-generation NPB purchase before you fall into the widening gap between winners and losers. You – and your infrastructure – deserve it.
  • Towards Autonomous Fine-Grained Network Management
    Towards Autonomous Fine-Grained Network Management
    Dr. Kevin Tang Aug 21 2019 5:00 pm UTC 45 mins
    The current Internet is largely a heterogeneous network in the sense that it is a network that is formed by many different networks owned by different identities. Its ability to work with vastly different technologies under very different circumstances in parallel certainly has brought crucial flexibility and incentives for its growth. On the other hand, its heterogeneity has also led to rigid and coarse management which makes Internet’s performance insufficient to support the fast growing traffic with increasingly stricter quality of service requirements. Today, with the rise of cloud computing and software-defined networking, it is now possible to move towards autonomous fine-grained network management. In this talk, we birefly examine opportunities that come from three different aspects: space (finer traffic split), time (faster network load balancing) and application (route different applications differently). We study both the idealized fine-grained network management, which sets a limit for the best possible outcome, and algorithms that take into account important practical factors to approach that limit. The talk ends with some example virtual network functions (VNFs) that can be built under fine-grained network management to further improve network performance
  • Kubernetes, Helm & Network Security - Best Practices at Scale
    Kubernetes, Helm & Network Security - Best Practices at Scale
    Brandon Jozsa, Sr. Solutions Architect with Tigera Aug 21 2019 5:00 pm UTC 75 mins
    What's all this buzz about Helm v3 you ask? Helm users have been asking for changes, and the development team has answered by rearchitecting Helm in version 3.

    Learn how to operate Kubernetes and Helm at scale while maintaining network security and compliance with Brandon Jozsa, Sr. Solutions Architect with Tigera.This technical session will cover a wide range of improvements to Helm that address operability, scalability, and security concerns that users had with prior versions of Helm. During the session, we'll help users create a library that will improve scalability, security, and overall workflow complete with example code. 
  • The Dangers of Siloed Security
    The Dangers of Siloed Security
    Ken Dang, Senior Product Marketing Manager, SonicWall Aug 21 2019 6:00 pm UTC 60 mins
    Complete security. One viewpoint.

    A splintered security platform opens threat gaps and adds overhead costs and complexity.. See how you can unify, monitor and manage all your security ecosystem with the Capture Security Center.
  • Modernize Your SAP Environment with Red Hat and AWS
    Modernize Your SAP Environment with Red Hat and AWS
    Sherry Yu, Principal Partner Success Architect, SAP, Red Hat and Sabari Radhakrishnan, Principal Solution Architect, AWS Aug 21 2019 6:00 pm UTC 55 mins
    Organizations can no longer delay serious consideration of modernizing their data centers. Among those are many SAP customers who will be required to migrate to SAP HANAⓇ by 2025.

    In this webinar, learn about the benefits of modernizing your data center with the premier partners for SAP HANA, Red Hat and Amazon Web Services (AWS).

    We’ll examine:

    • How AWS and Red Hat can accelerate your journey to SAP S4/HANA.
    • Technical considerations and best practices for SAP HANA and cloud migration.
    • Benefits of scalable, on-demand, elastic infrastructure with enterprise support.
  • Gaining Complete Visibility of Your Environment with Attack Surface Monitoring
    Gaining Complete Visibility of Your Environment with Attack Surface Monitoring
    Tori Sitcawich, Product Marketing Manager; Jon Hart, Principal Security Researcher Aug 21 2019 6:00 pm UTC 56 mins
    Join Rapid7 experts for an in-depth look into Attack Surface Monitoring with Rapid7s Project Sonar research and industry reports. Learn how data from these sources can be leveraged in Rapid7s industry-leading vulnerability management solution, InsightVM, to provide complete visibility into your environment.

    During this webinar, youll learn about:

    1. The importance of having complete visibility of both your organizations known and unknown assets
    2. Rapid7s unique research project, Project Sonar, that regularly catalogs the public internet
    3. Industry reports released by Rapid7 based on data from Project Sonar, among other sources
    4. How data from Project Sonar can be leveraged within Rapid7s industry-leading vulnerability management tool, InsightVM