Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • How To Increase MITRE ATT&CK Coverage with Network Traffic Analysis
    How To Increase MITRE ATT&CK Coverage with Network Traffic Analysis
    John Smith, Principal Sales Engineer at ExtraHop; Chris Crowley, Senior Instructor at SANS Recorded: Jun 24 2019 63 mins
    The MITRE ATT&CK Framework is a useful tool for SecOps teams trying to understand their security posture against common adversary tactics, techniques, and procedures (TTPs). In this presentation you'll learn how to take your ATT&CK understanding and coverage to the next level with network traffic analysis. You'll also learn:

    - Key tips for understanding the MITRE ATT&CK Framework and how to use it as a tool to improve your security posture.
    - What the framework is optimized for, and where it has room to grow
    - Which security tools and data sources you'll need to achieve the best coverage against TTPs in all 12 categories of the MITRE ATT&CK Framework
  • Overcoming Key Barrier to SD-WAN Adoption in the Enterprise Journey to the Cloud
    Overcoming Key Barrier to SD-WAN Adoption in the Enterprise Journey to the Cloud
    Rajesh Ghai Research Director, Carrier Network Infrastructure IDC, Rajesh Ghai Director, Carrier Network Infrastructure Recorded: Jun 24 2019 53 mins
    Enterprises have embraced cloud computing to unlock the opportunity offered by digital transformation. The cloud’s flexibility and agility enable enterprises to grow their business without borders and ensure productivity and efficiency.

    While enterprise applications continue to migrate to the cloud, the necessary change in the wide area network (WAN) is often overlooked. The hub-and-spoke WAN architecture that served the needs of the enterprise when applications were delivered from the datacenter, must evolve to serve the needs of the era of cloud applications. Software-defined WAN (SD-WAN) is the WAN's response to this paradigm shift in application traffic to the cloud.

    While SD-WAN has emerged as a key enabler of secure and seamless direct cloud application access with the benefits of transport independence, better security and path selection, it has brought into focus the importance of the transport underlay and the technology investment — both past and future — that an enterprise needs to consider before adopting SD-WAN.

    This webinar spotlights two critical success factors for driving mainstream enterprise adoption of SD-WAN:

    *Predictable and robust Internet connectivity
    *Investment protection (of installed legacy network equipment or in new technology) as the WAN evolves to support applications delivered from the cloud.

    Join us at this webinar as we make sense of SD-WAN adoption for your company.
  • Top 3 security risks for your SD-WAN implementation
    Top 3 security risks for your SD-WAN implementation
    Kevin Brown, Adrian Comley, and Peter Sader Recorded: Jun 24 2019 30 mins
    The visibility, control and agility that an SD-WAN can deliver to a global organisation makes it very attractive, but it can come with significantly higher risks. In around 80 per cent of the bids we see, customers aren’t actively considering or aware of these risks. SD-WAN is highlighting the tension between CIOs, focused on supporting the business with technology enabled solutions, and CISOs, concerned with managing information security risks. Are you clear on how to deliver the benefits of SD-WAN, whilst maintaining the security of your organisation?

    Join our webinar on 24 June where Kevin Brown, our Managing director of Security, Adrian Comley, General manager, Dynamic Network Services, and Peter Sader, Security head of business development, discuss the top 3 security risks you need to consider to make sure your SD-WAN implementation is secure.
  • Webinar: An Actionable Plan for Segmenting Your Network
    Webinar: An Actionable Plan for Segmenting Your Network
    Erez Tadmor,Sr. Product Manager, Tufin & Dan Rheault, Sr. Product Marketing Manager, Tufin Recorded: Jun 24 2019 49 mins
    A segmented network operationalizes your network security policy, enables a demonstrable state of continuous compliance, and provides mitigation options for cyberattacks.

    Our advice: organizations must go back to the basics to accomplish this crucial project.

    This webinar will cover actionable tips for network segmentation based on the experience of over 2,000 organizations. We will share:
    •Common pitfalls to avoid
    •How to start segmenting your network today
    •Tips for applicable enforcement
    •Q&A from the attendees
  • Make Digital Cities a Reality with Dell Technologies & Boomi
    Make Digital Cities a Reality with Dell Technologies & Boomi
    Rob Silverberg, Dell Technologies CTO, Digital Communities Recorded: Jun 21 2019 34 mins
    As cities move to embrace smart city technologies and Internet of Things (IoT) solutions, they need to understand the new data challenges associated with these projects. In this webcast, we’ll explore the drivers and reasons to implement a Smart City Data strategy and architecture for tangible city and community improvements, not just a science experiment. We will review the challenges and how some cities are preparing to manage the data coming from sensors and IoT devices, as well as review how the Boomi platform and Dell EMC infrastructure supports smart city solutions.
  • 5 Steps for SMBs to Improve Cyber Risk Management & Gain a Competitive Advantage
    5 Steps for SMBs to Improve Cyber Risk Management & Gain a Competitive Advantage
    Mike Volk, VP, Cyber Risk Solutions, PSA Financial and Casey Corcoran, CISO, OPAQ Recorded: Jun 21 2019 30 mins
    Cyber security is complicated. Managing cyber risk is even more complicated, particularly for small- and midsize businesses that have limited financial and personnel resources to apply to this business priority. It’s not that SMB executives don’t understand the consequences of falling prey to cyber-attacks. They acknowledge that they should do more to improve their risk posture. However, they need help with understanding where best to invest their finite resources to reduce their exposures.

    Forget the fear and uncertainty factor, and say goodbye to depending solely on fate and hope for risk management – this webcast is designed to equip SMBs with actionable steps to greatly improve their risk management posture and open up opportunities with customers, supply chain partners, and others who seek to do business with risk-savvy businesses.
  • Open Source for the 4th Industrial Revolution
    Open Source for the 4th Industrial Revolution
    Shane Dewing, Snr. Director SW Strategy and Open Source, Industrial Solutions Division, Internet of Things, Intel Recorded: Jun 21 2019 57 mins
    This session will focus on the transformation to software defined at the Industrial Edge, along with introducing some new and relevant open source projects - LF Edge as an umbrella along with the anchor projects EdgeX Foundry and Akraino Edge Stack including the new Time-Critical Edge Compute blueprint.
  • Обзор системы хранения данных среднего уровня Unity XT
    Обзор системы хранения данных среднего уровня Unity XT
    Артур Вартанян, менеджер по направлению СХД в России, Казахстане и Центральной Азии, Recorded: Jun 21 2019 45 mins
    В рамках данного вебинара будут озвучены основные технические особенности и функциональные возможности нового массива Unity XT от компании Dell Technologies, который был анонсирован на Dell Technologies World 2019 в Лас-Вегасе. Присоединяйтесь к вебинару чтобы узнать о новинках в линейке СХД компании Dell Technologies.
  • Automating your AI for IT™ Network with Mist
    Automating your AI for IT™ Network with Mist
    Christian Gilby Recorded: Jun 20 2019 32 mins
    In this webinar, we will discuss how Mist has brought a unique user-centric approach to Wi-Fi using 100% APIs while leveraging an AI-driven, modern microservices cloud architecture. Learn how this AI for IT™ automation solution brings the power of APIs across the Juniper enterprise switching, SD-WAN and Mist wireless portfolios.

    We will share several best practices and how, by leveraging Mist’s APIs, customers like you can enable a seamless integration experience across the IT stack and experience proactive operations that will deliver a better user experience.

    You will see hands-on examples of how easy it is to create thousands of customer sites through automation and hear about experiences from some of Mist’s Fortune 100 customers in how they have leveraged Mist APIs to transform their business with automation and insights. We will also share an innovative customer example of complete API integration using OpenConfig of which Mist is the first Wi-Fi vendor to support this open standard.

    Finally, we will share several example automated scripts that expose Mist APIs to customers who are new to this software model through easy to use tools like Postman. You will learn about several simple Python templates that are publicly available for customers to experiment with and begin their automation and API journey.
  • Don’t Put Your Data at Risk by Not Running the Latest Version of SQL
    Don’t Put Your Data at Risk by Not Running the Latest Version of SQL
    Scott McComas, Product Marketing Sr. Advisor, Dell EMC Recorded: Jun 20 2019 55 mins
    Microsoft SQL 2008 support ends on July 8, 2019. Stay protected with the latest version of SQL to receive continued support and security patches. With this announcement, you may be looking to not only upgrade your SQL version, but also refresh your servers hardware. Now is also the time to start looking at the advantages of a hybrid cloud solution with SQL 2017 and Azure Cloud.
  • Micro Focus ALM/QC Integration w/ AutoTesting for Reporting & Analysis Americas
    Micro Focus ALM/QC Integration w/ AutoTesting for Reporting & Analysis Americas
    Matt Angerer Recorded: Jun 20 2019 43 mins
    Over the last few years, a major shift has occurred in the Quality Assurance (QA) and Software Testing Management space. Organizations are adopting smart test automation, but continue to find the need for traditional PMO-level reporting offered by tools like Micro Focus ALM and Quality Center. Often, this results in a tool mismatch that negatively impacts the ability to report in real-time across all phases of manual and automated testing.

    Smart test automation is no longer a “nice to have” but rather a foundational aspect of the testing process, and this is impacting the toolchain. Organizations are adding new test management tools like Selenium, Tricentis Tosca and others to their suite to better align with their Agile and test automation efforts. Global QA Directors are recognizing a multi-vendor and multi-tool approach to software quality assurance with commercial and open-source tools yields the best results.

    With test planning, design, execution, and reporting now split across multiple tools, organizations have lost their visibility into key QA metrics for measuring manual vs. automated test execution effectiveness, test automation progress, automated testing execution progress, and defect remediation for all phases of the software testing lifecycle.

    Join Senior Value Stream Architect, Matt Angerer, to learn how Tasktop can help you:

    •Modernize test management by adding new, specialized tools for test automation
    •Improve collaboration between QA teams working in their preferred tools of choice
    •Eliminate the laborious effort of manual synchronization and report generation
    •Centralize test data from automated and manual tests spanning multiple tools and instances for real-time reporting
  • Want Better Network Visibility with Less Complexity? Here's How!
    Want Better Network Visibility with Less Complexity? Here's How!
    Bob Laliberte, Senior Analyst, ESG and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Recorded: Jun 20 2019 53 mins
    Enable IT Collaboration with a Common Distributed Data Services Layer.

    The IT environment is rapidly changing, becoming more distributed and complex as organizations transform themselves to provide better digital experiences. Because these improved experiences will be more dependent on the network, it’s imperative for organizations to properly plan and prepare now to eliminate security blind spots. The bottom line is that companies need complete visibility into their physical, virtual and cloud infrastructure to detect and contain data breaches and mitigate risk.

    To accomplish this, successful organizations resist the legacy mentality that relies on more people and more tools at every location. Instead, they are turning to a new architectural approach that disaggregates the speed of the network from the speed of the tools inspecting traffic on that network. This innovative approach allows enterprises to absorb change in network speed and technology without compromising security.

    ESG believes the foundational step in this approach is to ensure comprehensive infrastructure visibility across data centers and distributed edge and cloud environments. To do this, organizations must have a common distributed data services layer that can collect, process and distribute the right information to the right tools at the right time.

    Join us to learn how a consolidated network architecture that includes security delivers better visibility, reduces complexity and increases tool efficiency.
  • Enterprise CDN Best Practices: A Technical Deep Dive
    Enterprise CDN Best Practices: A Technical Deep Dive
    Armand Sultantono, Technical Solutions Architect at NGINX Recorded: Jun 20 2019 32 mins
    If you deliver content over the internet to a global audience and care about performance, you're likely using a content delivery network. CDN is a popular use case for advertising, media, online gaming, commerce, mobile, healthcare, even government and education because users can access web pages and apps much faster. What you may not know is most major CDN providers use NGINX under the hood. Commercial CDN services can be expensive to scale, limited in fine-grain control and customization, and offer fewer performance optimizations that you would want. If your enterprise CDN bill is astronomically high, and you need more control and customizations, it will be more cost effective to build your own.

    Watch this webinar to learn how a CDN works, when it makes sense to build your own CDN, and jump into a technical deep dive on how a CDN solution performs with NGINX Plus, with performance comparisons and a live demo.
  • Creating a Path to Modern Endpoint Management
    Creating a Path to Modern Endpoint Management
    Aaron Spencer - Product Marketing Manager, Dell EMC Recorded: Jun 20 2019 30 mins
    Advancements to endpoint management have simplified and streamlined the way IT staff maintain their business’s PC environments.

    Now is the time for your organization to begin the path to unified endpoint management.

    Join us for our webinar, Creating a Path to Modern Endpoint Management, where we’ll be discussing the ways partnering with Dell can:

    • Streamline and automate your deployment and update process
    • Decrease user downtime and reduce productivity issues
    • Save your business time and money with modern management solutions
  • How FireEye Protects FireEye
    How FireEye Protects FireEye
    Matt Shelton, Director, Technology Risk & Threat Intelligence, FireEye Recorded: Jun 20 2019 60 mins
    FireEye relentlessly protects its customers. But who protects FireEye? Join us for an overview of how FireEye uses its own products and services to protect itself from the same threats faced by customers.

    In this webinar, Matt Shelton, FireEye Director of Technology Risk and Threat Intelligence, will reveal how FireEye:

    •Uses threat intelligence to proactively protect the organization
    •Detects threats using FireEye Network Security products
    •Responds to incidents with FireEye Endpoint Security
    •Leverages Helix as its security operations platform
    •Hunts for known and unknown threats within its environment.
  • Simplifying vSAN Infrastructure Deployments
    Simplifying vSAN Infrastructure Deployments
    Sim Upadhyayula, Supermicro, Christine McMonigal, Intel, Jase McCarty, VMware Recorded: Jun 20 2019 59 mins
    Supermicro's Intel® Select Solutions for VMware VSAN are designed to provide the ability to provision and manage compute, network and storage resources from a single pane of management. 

    Join Supermicro, VMware & Intel in a webinar which will discuss how next generation technologies from all three companies are enabling VSAN solutions to simplify deployment and accelerate memory intensive applications. 
  • Introduction to Red Hat OpenShift Container Platform
    Introduction to Red Hat OpenShift Container Platform
    Grant Shipley, Director, OpenShift Container Platform, Red Hat Recorded: Jun 20 2019 43 mins
    Everyone's heard about containers, and how they're going to solve all of our problems - or not.


    Watch this session from Red Hat Summit, Grant Shipley, Red Hat, walks you through using containers and:

    •Discuss why using a scheduler and orchestration system like Kubernetes is important.
    •Dive into Red Hat OpenShift Container Platform to show how it makes both containers and Kubernetes accessible to everyone.
    •After deploying several containers, we'll turn up the heat by showcasing scaling and moving on to deployment strategies including blue/green and rollbacks.

    We'll keep the slides to a minimum and instead focus on live demo, coding, and deployments. It'll be 95% hands-on demo using the latest version of OpenShift Container Platform and will be a great introduction to the platform if you haven't used it before or if you just want to understand what OpenShift is.
  • 7 Pitfalls of TAM
    7 Pitfalls of TAM
    Nlyte Recorded: Jun 20 2019 29 mins
    Do you know what are the 7 Pitfalls of managing technology assets? Attend this webinar to learn how to improve your ITAM.

    Join this webinar to learn how to avoid the 7 Pitfalls of technology management and reduce costs and improve security across all your assets.

    1. Learn how next generation technology management is reducing costs
    2. Find assets you didn’t know were on your network
    3. Reduce risk and costs from rogue software users
  • Turning the 5G Network into an Agile Monetization Platform
    Turning the 5G Network into an Agile Monetization Platform
    Alla Goldner & Ofer Farkash - Amdocs Recorded: Jun 20 2019 59 mins
    5G promises a world of unprecedented speed and differentiated quality of service that has the potential to unleash a wide array of new services and business models.
    But, in order to maximize 5G monetization, service providers need to be fast to deploy, open to drive innovation, smart to efficiently orchestrate a dynamic network, and quick to capture every revenue opportunity. In this presentation we will explore how service providers will utilize NFV and SDN technologies and principles to achieve dynamic programmability, agility and control for 5G use-cases monetization and what is done in ONAP for managing the lifecycle of 5G network services.
  • Top 5 Cloud Security Myths Debunked
    Top 5 Cloud Security Myths Debunked
    Martin Holste, Cloud CTO, FireEye Recorded: Jun 20 2019 55 mins
    Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story.

    Join our webinar, which helps debunk several common myths that jeopardize your fast, secure, migration to the cloud:

    • The cloud is unsafe
    • My organization doesn’t use the cloud
    • My cloud provider will keep me secure
    • The cloud is just someone else’s computer
    • Advanced adversaries aren’t attacking the cloud

    You’ll also learn how to identify a trusted advisor for cloud migration so you can confidently take advantage of cloud advancements.


    Presented by: Martin Holste, Cloud CTO at FireEye
  • Micro Focus ALM/QC Integration w/ Automated Testing for Reporting Analysis EMEA
    Micro Focus ALM/QC Integration w/ Automated Testing for Reporting Analysis EMEA
    Tina Dankwart Recorded: Jun 20 2019 27 mins
    Over the last few years, a major shift has occurred in the Quality Assurance (QA) and Software Testing Management space. Organizations are adopting smart test automation, but continue to find the need for traditional PMO-level reporting offered by tools like Micro Focus ALM and Quality Center. Often, this results in a tool mismatch that negatively impacts the ability to report in real-time across all phases of manual and automated testing.

    Smart test automation is no longer a “nice to have” but rather a foundational aspect of the testing process, and this is impacting the toolchain. Organizations are adding new test management tools like Selenium, Tricentis Tosca and others to their suite to better align with their Agile and test automation efforts. Global QA Directors are recognizing a multi-vendor and multi-tool approach to software quality assurance with commercial and open-source tools yields the best results.

    With test planning, design, execution, and reporting now split across multiple tools, organizations have lost their visibility into key QA metrics for measuring manual vs. automated test execution effectiveness, test automation progress, automated testing execution progress, and defect remediation for all phases of the software testing lifecycle.

    Join Senior Value Stream Architect, Tina Dankwart, to learn how Tasktop can help you:

    •Modernize test management by adding new, specialized tools for test automation
    •Improve collaboration between QA teams working in their preferred tools of choice
    •Eliminate the laborious effort of manual synchronization and report generation
    •Centralize test data from automated and manual tests spanning multiple tools and instances for real-time reporting
  • Getting more from Azure Part 3: SQL Database
    Getting more from Azure Part 3: SQL Database
    John Noakes and James Wilson Recorded: Jun 20 2019 18 mins
    Microsoft Azure – which offers an open, flexible, enterprise-grade cloud computing platform is helping our clients do just that; helping them increase agility, do more and control costs with IaaS and PaaS.

    Whether you’ve already migrated some of your workloads or you’re considering migrating to Azure, this webinar shares best practice for operating, managing and securing SQL Database through the Azure platform.

    Please visit uk.insight.com/azurewebinars to learn how Insight can help you optimise your Azure workloads or to speak to your Insight Account Manager today.
  • Introduction to Machine Learning and Behavioural Analytics
    Introduction to Machine Learning and Behavioural Analytics
    Bruno Hareng, Cyber Security Business development Manager, EMEA Recorded: Jun 20 2019 60 mins
    The role of a Chief Information Security Officer is fraught with new threats inside the organization from compromised users, negligent employees and malicious insiders. To find these threats, security approaches must now also deal in the world of “gray”—small signals that must be detected, put in context over time and added up to indicate pending harm. This webinar will show how Machine Learning (ML) is best suited for this mission.
  • Seminario web: 5 señales claras que necesitas automatización
    Seminario web: 5 señales claras que necesitas automatización
    Alberto Maestre, Pre-Sales Engineer SEEMEA Jun 25 2019 8:30 am UTC 60 mins
    ¿Por qué automatizar? ¿Porqué ahora? La automatización es crítica para la transformación digital, esencial para reducir la superficie de ataque y obligatoria para garantizar el cumplimiento continuo.

    Únase a nosotros para nuestro webcast el 25 de junio a las 10:30 “5 señales claras que necesita para automatizar las operaciones de seguridad de red” para aprender:

    Cómo acelerar de forma segura el proceso de cambio de red
    Mejores prácticas para comenzar con la automatización
    Pautas para cumplir con el objetivo de Zero-Touch Automation

    Conviértalo en una de sus resoluciones 2019 para adoptar la automatización y reducir el tiempo y el esfuerzo que dedica a las tareas manuales relacionadas con las operaciones de firewall. Los cinco signos claros pueden ayudarlo a desarrollar el caso de negocios y obtener una participación de la administración para maximizar la agilidad y la seguridad con la automatización y la orquestación de políticas de seguridad de Tufin.
  • Airheads Tech Talks Cluster: Live Upgrade
    Airheads Tech Talks Cluster: Live Upgrade
    Abdul Ali Irfaan, Aruba TAC Team Jun 25 2019 9:00 am UTC 90 mins
    The Live Upgrades feature allows the managed devices and APs in a cluster to automatically upgrade the software from ArubaOS 8.1 version to higher ArubaOS versions. Managed Devices in a cluster can be seamlessly upgraded by specifying the new image file and a target partition.

    During this webinar we will cover the below topics:

    · Cluster Live Upgrade is a feature introduced in 8.1.x version.
    · This feature works along with clustering.
    · It provides seamless upgrade of the controllers, APs with minimal RF impact.
    · No manual intervention required during the upgrade.
    · APs are logically partitioned and upgraded using AP image pre-load feature and thereby providing the coverage for the clients during the upgrade.
  • How to Optimize Network Performance During Infrastructure Transformation
    How to Optimize Network Performance During Infrastructure Transformation
    Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Jun 25 2019 10:00 am UTC 47 mins
    How do you reduce complexity of your transforming infrastructure, gain greater IT tool efficiency and maximize visibility into your network? The right solution should empower you to produce better outcomes with less effort at lower cost. That is where a next-generation packet broker comes into play.

    Join Gigamon to get the latest best practices to:
    • Acquire and aggregate all network traffic for better visibility
    • Stop duplicate packets from overloading your tools
    • Filter traffic to provide the right data to the right tools
    • Optimize compliance and reduce risk across your entire IT environment

    If you need to optimize your tools, improve network performance and availability, get better insights into threats and enable your Network Operations and Security Operations teams to collaborate, you won’t want to miss this technical webinar.
  • Four Steps to Multi-CDN: How to make the most of your investment (EMEA)
    Four Steps to Multi-CDN: How to make the most of your investment (EMEA)
    Emily Pali, Product Manager, and James Royalty, Principal Engineer Jun 25 2019 12:00 pm UTC 22 mins
    CDNs are critical in a globally distributed world where users expect optimal performance regardless of where they are located.

    The reasons for implementing a multi-CDN environment might seem obvious--high availability and redundant infrastructure--but if set up correctly, it can actually impede the user experience.

    The reality is, if you’re not routing traffic efficiently across your multi-CDN environment you’re not truly benefiting from it. NS1’s Pulsar Active Traffic Steering allows you to truly harness the power of multi-CDN without the headache.
  • Cloud Storage Security Innovations Video
    Cloud Storage Security Innovations Video
    Symantec Jun 25 2019 1:00 pm UTC 2 mins
    CWP 4.0 and DLP Integration Video
  • Our technology in action: delivering superior experiences .
    Our technology in action: delivering superior experiences .
    Mark Burton, from Riverbed and Tim Wade, from Dimension Data Jun 25 2019 2:00 pm UTC 60 mins
    For anyone following pro cycling, our web-based Race Center application is revolutionary. Combining live data, video, images, social media feeds and commentary, it gives fans, teams and organisers an unparallel view of the action. Through the smart application of machine learning and artificial intelligence it enables us to tell the story of pro cycling like never before.
    But in order for us to provide seamless access to the information Race Centre requires that the team have transparent view of the user experience.

    Join Dimension Data and Riverbed to find out how we’re using a high-performance platform to delivers superior experiences with quick access to data with 100% accuracy and no blind spots.
  • HCL BluGenie Solution Overview
    HCL BluGenie Solution Overview
    Ramesh Sriraman, Head – Telecom Center of Excellence, HCL Technologies Ltd. Jun 25 2019 3:00 pm UTC 60 mins
    Engineering the Intelligent Connected Ecosystem
  • Getting Current and Staying Current on Windows 10
    Getting Current and Staying Current on Windows 10
    Dell EMC Jun 25 2019 3:00 pm UTC 60 mins
    Getting Current and Staying Current on Windows 10:
    What You Need to Know About Updating, Managing and Supporting the OS

    We all know the way we work has changed dramatically. Employee needs are more global and complex than ever, and work is tackled using a range of devices. Organizations must think differently about the tools and the technology they provide to their workforce.

    As organizations transition to Windows 10, they can benefit from superior security, better performance and the ability to get more things done– all with maximum support and ease of use.
    But the way organizations update, manage and stay current across the operating system, has changed.

    Register today and learn:
    •Why IT and security teams must collaborate to deliver secure, productive experiences
    •How to get the most out of Windows 10 and Modern Management practices
    •The specifics on what you need to know about Windows 7 end of support
    •Key things to consider as you migrate, transition and stay current on Windows 10

    Register today!
  • Automated Hunting for Malicious Insiders and Advanced threats using Symantec ICA
    Automated Hunting for Malicious Insiders and Advanced threats using Symantec ICA
    Bruce Ong, Director of Product Management, Symantec, Ryan Stolte, ICA Chief Technical Architect, Bay Dynamics Jun 25 2019 3:00 pm UTC 60 mins
    Preventing Malicious Insiders from wreaking havoc and stealing sensitive data is extremely challenging as today’s security teams and SOC operators must analyze huge volumes of data to isolate threats. Further, even when risks are uncovered, in-depth investigation must encompass numerous security systems and data streams to determine how these activities can be stopped.

    In this webinar, you’ll learn how Symantec Information Centric Analytics automates threat hunting and speeds remediation, pinpointing problematic behaviours and informing response.
  • How Healthy Is Your OT Environment
    How Healthy Is Your OT Environment
    Ben Abigadol & Michael Rothschild Jun 25 2019 4:00 pm UTC 75 mins
    With an expanding attack surface and new attack vectors, what you thought was once secured in your industrial or critical infrastructure environment may indeed have new threats that you were unaware of.

    Join us for this exciting webinar which will cover:
    a.The changing security environment given recent attacks – and the increasing need to address industrial security threats
    b.The potential complexity in securing your environment given the new reality
    c.Take the OT HealthCheck by Indegy. What it is. How it works. And what you get.
    d.Learn where your vulnerabilities may be and what you should consider to address them
    e.Beyond the HealthCheck. How to take the next step.
  • What's New in DX Application Performance Management
    What's New in DX Application Performance Management
    Amy Feldman, Head of APM Product Marketing and Nishant Kabra, Product Management Jun 25 2019 4:00 pm UTC 75 mins
    With this increased reliance on applications, it’s more important than ever that IT organizations monitor and manage the end-user application experience across physical, virtual, web, mobile, wearables, cloud, containers, mainframe, user journey, behavior, and funnel. However, the ability to predict, identify, diagnose, and fix application issues is difficult, especially in today’s modern app environments that are complex, noisy, and dynamically changing. For organizations seeking to improve customer experience, reduce application issues, and gain insights into user behavior, using analytics and machine learning becomes a critical capability for any APM solution. As a result, modern APM solutions have evolved to include AIOps platforms that correlate and analyze data across users, applications, infrastructure, and network services apply machine learning, advanced analytics, and automation to deliver a new level of visibility with automated actionable intelligence. Attend this session to learn more about the exciting innovations delivered in DX APM 11.
  • How to Make the Case to Management: Paying for Open Source
    How to Make the Case to Management: Paying for Open Source
    Dan Pacek, Competitive Intelligence/Market Analyst, Red Hat and Lauren Stranch, Product Marketing Manager, Red Hat Jun 25 2019 6:00 pm UTC 35 mins
    A Red Hat subscription gives you access to enterprise-ready open source innovations to help you along your digital transformation. However, your management might ask, "Why are we paying for open source?"

    Watch this session from Red Hat Summit, Daniel Pacek and Lauren Stranch, Red Hat, discuss how to effectively make the case for your Red Hat subscription so your management and procurement teams understand the value of their investment - including access to the latest technologies, expert knowledge, continuous security, and participation in the open source community.
  • 5 Clear Signs You Need to Automate Network Security Operations
    5 Clear Signs You Need to Automate Network Security Operations
    Hadas Lahav, Senior Product Manager,Automation, Tufin and Karen Crowley, Sr. Product Marketing Manager, Tufin Jun 26 2019 6:00 am UTC 35 mins
    Why automate? Why now? Automation is critical to digital transformation, essential for reducing the attack surface and mandatory to ensure continuous compliance.

    Watch the pre-recorded webinar “5 Clear Signs You Need to Automate Network Security Operations” to learn:

    * How to securely speed up the network change process
    * Best practices to getting started with automation
    * Guidelines to meet the goal of Zero-Touch Automation

    We will review the use cases to begin automating network security operations and explain why it’s mandatory to focus on policy-based change automation. Watch now!
  • Protéger vos données dans le Cloud
    Protéger vos données dans le Cloud
    Vincent Leclerc, CISSP Jun 26 2019 6:00 am UTC 22 mins
    La nature dynamique des organisations aujourd’hui est principalement conduite par les demandes de plus en plus fortes des employés pour une meilleure flexibilité, productivité et mobilité.

    Alors que les applications Cloud répondent à la demande des utilisateurs, elles posent de nouveaux challenges en termes de visibilité et de contrôle aux équipes IT et elles impliquent de nouveaux risques aux entreprises.

    Quels sont les principes de base dont vous avez besoin pour reprendre la main sur l’équilibre entre productivité et risque ?

    Comment assurer une protection des données dans les applications Cloud ?

    Et surtout est-il possible de combiner la simplicité et l’efficacité pour chaque métier concerné ?
  • Top Network Challenges for the Global Enterprise | As Solved for 300+ Companies
    Top Network Challenges for the Global Enterprise | As Solved for 300+ Companies
    Eyal Webber-Zvi, Sr. Dir. Product Marketing & Business Development Jun 26 2019 8:00 am UTC 19 mins
    Learn how to solve the biggest and baddest networking and security challenges confronting your organizations from the stories of people who faced those very same challenges.

    On our next webinar, Eyal Webber-Zvik, Senior Director of Product Marketing and Business Development, will tell the tales of nine IT teams who confronted — and destroyed — the networking and security problems threatening their digital transformation efforts.
  • How to Take Control and Troubleshoot with Office 365
    How to Take Control and Troubleshoot with Office 365
    Mike Marks, Product Evangelist, Riverbed Technology | Alex Duncan, Senior Director, Microsoft Solutions Presidio Jun 26 2019 8:00 am UTC 45 mins
    You’ve moved to Office 365 for greater collaboration and operational efficiencies. But, even with the move to the cloud, your team is still responsible for responding to user issues.

    How can you ensure service delivery and troubleshoot issues with Office 365 when you don’t control the backend?

    With end-user experience monitoring, you can find and fix problems quickly whether they occur in the device, your network, or the back end. Microsoft Partner Presidio and Riverbed will show you how.

    Join us to learn how to use end-user experience monitoring with Office 365 to:
    - Troubleshoot critical Office 365 issues before your users are affected
    - Stay ahead of Office 365 update
    - Use end-user experience data to effectively collaborate with Microsoft
    - Ensure an excellent Office 365 experience anywhere, anytime, on any device
  • Moving Voice to the Cloud with Cisco Webex Calling
    Moving Voice to the Cloud with Cisco Webex Calling
    Thom Jorgensen Jun 26 2019 2:30 pm UTC 60 mins
    Cisco has created a full-stack cloud collaboration platform that includes voice, messaging, meetings, and video. Join the Presidio experts as we explore Cisco Webex Calling in detail. We will kick off with an architecture overview and then discuss features available. Because Webex Calling allows for BYO PSTN, we will cover different supported deployment strategies that our customers are using. We will close with migration options and some tips on finding trade-in credits. Register now to catch the live discussion!
  • Effective Multi-Vendor Management | Fortinet & AlgoSec Joint Webinar
    Effective Multi-Vendor Management | Fortinet & AlgoSec Joint Webinar
    Satish Veerapuneni, Director of Products and Solutions (Fortinet) and Yoav Karnibad, Product Manager (AlgoSec) Jun 26 2019 3:00 pm UTC 60 mins
    In today’s complex and dynamic environment with growing digital business demands, IT often struggles to gain adequate visibility and control, and to ensure compliance with security policies and regulatory guidelines. Effective security policy management that accommodates the dynamic nature of today’s organizations is a key challenge for many IT departments.

    In this webinar, Satish Veerapuneni, Director of Products and Solutions at Fortinet and Yoav Karnibad, Product Manager at AlgoSec will discuss how joint customers benefit from AlgoSec’s multi-vendor security policy management capabilities while leveraging Fortinet’s industry-leading Security Fabric’s FortiManager & FortiAnalyzer.

    Join this live webinar to learn how to:
    • Automate policy optimization and risk assessment across all your security devices.
    • Enhance visibility and exercise greater control over your hybrid / heterogeneous network
    • Tie application connectivity needs to network security policies, reduce planning time and costs for network change automation
    • Assess risk and ensure regulatory compliance across the entire enterprise environment
    • Realize single pane of glass management with advanced analysis and management of policy modifications through Fortinet Security Fabric’s FortiManager/FortiAnalyzer
    and AlgoSec’s Firewall Analyzer, FireFlow and BusinessFlow
  • How to Define Network Zones
    How to Define Network Zones
    Dan Rheault Sr. Product Marketing Manager, Tufin Jun 26 2019 3:00 pm UTC 60 mins
    Defining zones is a critical part of network segmentation and achieving Zero Trust, but it’s very rarely a simple process. Some struggle to identify where to start, others neglect the ongoing management of zones, while still more over-segment their network into a state of unmanageability. The good news is that you can avoid the mistakes of others.
    In this session, Tufin network security expert Dan Rheault will share lessons learned from implementing segmentation for some of the largest and most complex networks in the world, on how to:
    •Successfully establish and maintain network zones
    •Avoid common pitfalls that compromise network manageability
    •Utilize proven strategies for network segmentation

    Whether you’re starting your zone creation for network segmentation or delving into microsegmentation, this webinar is designed to be helpful for all.
  • IT Modernization in the Public Sector: Troubleshoot Network Performance Issues
    IT Modernization in the Public Sector: Troubleshoot Network Performance Issues
    John Lehane, Sr. Product Marketing Manager, Gigamon, and Bill Coon, Technical Director, Riverbed Jun 26 2019 3:00 pm UTC 60 mins
    Join experts from Gigamon and Riverbed as we discuss how Application Intelligence can open up the network “black box” and show you exactly what’s running inside. Find out why the evolution of Network Performance Monitoring (NPM) demands a more integrated approach to Digital Experience Monitoring, and how you can achieve that by leveraging the perspectives of end users and their applications to extend the value of network visibility.
    Attendees will learn how to:
    • Get pervasive visibility of network traffic across geographically dispersed locations
    • Ensure only the right people have access to the network and data center, as well as guarantee optimal performance and availability
    • Receive near real-time actionable alerts based on Government Furnished Information, allowing for mitigation and remediation of incidents that could have gone unnoticed
    • Address issues quickly so that Department of Homeland Security requirements can be met
  • An IoT Story: Connecting & Securing Living Walls
    An IoT Story: Connecting & Securing Living Walls
    Harry Eschel, VP of Products, Sagegreenlife; Ken Hosac, VP of IoT Strategy & Business Development, Cradlepoint Jun 26 2019 4:00 pm UTC 60 mins
    Enterprises like Sagegreenlife are constantly innovating new ways to turn data from IoT devices into a strategic competitive advantage — and finding best practices to address their challenges.

    Sagegreenlife’s living walls, which serve companies by bringing nature into man-made spaces, required an easy-to-use and customizable IoT solution that would allow its field operations team to remotely monitor various facets of the irrigation and power systems that support the plants — leveraging both cloud services and highly reliable network connectivity. Otherwise, the greenery would die, customers would be unhappy, and Sagegreenlife’s brand credibility would be at risk.

    Watch our live webinar with Harry Eschel, Sagegreenlife’s Vice President of Products, to explore how the company uses Azure IoT Central and Cradlepoint’s LTE edge network solutions to discover and address system problems from headquarters. Also learn how Sagegreenlife did all of this without specialized developers.
  • The Transformative Effect of Data Science and Machine Learning
    The Transformative Effect of Data Science and Machine Learning
    Tim Vidas - Senior Distinguished Engineer, Nash Borges PhD, Sr Director of Engineering and Data Science Jun 26 2019 5:00 pm UTC 60 mins
    The combination of big data and machine learning is making it possible for defenders with limited resources and expertise to detect and respond to unknown threats faster than ever before. In an industry forever locked in an adversarial battle with increasingly sophisticated actors, Tim Vidas, Distinguished Senior Engineer, and Nash Borges PhD, Sr Director of Engineering and Data Science at Secureworks explain how the power of machine learning combined with human intelligence have become fundamental to defending the digital economy.
  • Modern Deception Technology: Advanced Methods for Reducing Cyber Risk
    Modern Deception Technology: Advanced Methods for Reducing Cyber Risk
    Carolyn Crandall, Chief Deception Officer at Attivo Networks and Edward Amoroso, CEO of TAG Cyber Jun 26 2019 5:00 pm UTC 60 mins
    Join host Carolyn Crandall, Chief Deception Officer at Attivo Networks, and special guest Edward Amoroso, CEO of TAG Cyber, to hear exclusive insights on how modern deception technology is being used for early and accurate threat detection, network visibility, and cyber risk reduction. Don't miss this interactive discussion based on a series of five articles that Ed created in order to help information technology professionals better understand modern deception technology.

    Key Takeaways:
    • Evolution and use of deception technology in the enterprise, with emphasis on practical cybersecurity requirements.
    • Insight into deceptive methods and how they are used to slow and create uncertainty for malicious actors.
    • How deception reduces the effectiveness of a cyberattack against network and system infrastructure.
    • Deployment and risk reduction in the modern enterprise.
    • A future vision for deception technology in the context of the evolving enterprise.
  • 5 Ways VMware SD-WAN Enables Network Transformation
    5 Ways VMware SD-WAN Enables Network Transformation
    Ramnath Shenai, Senior Technical Product Manager at VeloCloud, now part of VMware Jun 26 2019 5:00 pm UTC 60 mins
    Traditional WAN was built with the assumption that all applications would be hosted at a centralized on-premises data center. In this model, traffic forwarding was based on destination IP. Enterprises today are migrating slowly but steadily to cloud-based applications, either in the form of IaaS or SaaS. With this dramatic shift in where the applications reside, organizations must reevaluate their approach to WAN architecture and pursue a solution that ensures predictable application performance leading to a network transformation.

    SD-WAN helps solve this challenge and much more. VMware SD-WAN by VeloCloud provides enterprises with the ability to leverage Internet links to connect to the Cloud both public and SaaS, instead of backhauling that traffic to a data center. Some applications will still reside in the data center, so businesses need application visibility at the edges and application-based traffic forwarding to their respective destinations.

    This webinar will explore multiple SD-WAN use cases for enterprises looking to begin their SD-WAN journey and outline the unique features and benefits VMware SD-WAN provides.
  • Hybrid Cloud Management strategies and best practices
    Hybrid Cloud Management strategies and best practices
    Pete Cruz, Manager, Product Marketing Red Hat , Xavier Lecauchois, Senior Director, Product Marketing, Red Hat Jun 26 2019 6:00 pm UTC 47 mins
    The majority of enterprise organizations recognize the business value of hybrid cloud strategies spanning bare metal, virtual machines, and containers deployed across on-premise and public cloud infrastructure. Their goal is to provide end users and developers with cost-effective, on-demand IT resources that are optimized for applications, regulatory requirements, and performance priorities.

    In this presentation, Pete Cruz and Xavier Lecauchois, Red Hat, discuss the most critical management requirements needed to optimize large-scale hybrid cloud operations and application performance. We'll share how Red Hat’s hybrid cloud management strategy is evolving to address customer needs by unifying the operator, developer, and end user experience across a range of public and private cloud platforms.

    Hear how traditional management products, such as Red Hat Satellite and Red Hat CloudForms are being connected with Red Hat Ansible Tower and Red Hat’s recently introduced hybrid cloud cost management and self-service SaaS solutions to provide customers with comprehensive, flexible, and forward-looking hybrid cloud management environments.