Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • What is 802.11ax? And how to prepare your network.
    What is 802.11ax? And how to prepare your network. Peter Thornycroft, Distinguished engineer in the CTO group Recorded: Aug 15 2018 62 mins
    Each new Wi-Fi standard has brought significant improvements in performance. Unfortunately, these gains have not been enough to keep pace with demand. There is still a need for higher speeds, better network capacity and longer battery life.
    The 802.11ax standard solves these problems and others by completely redesigning how Wi-Fi works and taking some best practices from LTE.
    Join us for a tour of the key technical ingredients of this new release, and a discussion of how it works, where it will be useful, and how you should prepare.
  • Salesforce Monitoring Best Practices
    Salesforce Monitoring Best Practices Angelique Medina, Sr. Product Marketing Manager, ThousandEyes Recorded: Aug 15 2018 40 mins
    Salesforce is a SaaS leader, powering Customer Service, Marketing and Sales for enterprises all over the globe. Yet too many organizations run into user experience issues due to external dependencies such as ISPs, DNS and secure web gateways impacting availability and performance. Without visibility into those dependencies, you’re operating blind and exposed to a large business continuity risk.

    Join us for our third webinar in our SaaS series where we’ll share:

    -How Salesforce service delivery works and monitoring best practices to de-risk adoption and ensure optimal performance
    -Real-world use cases where Network Intelligence uncovered the root cause of performance issues
    -Hands-on demonstrations of using ThousandEyes for Salesforce visibility
  • Advanced Threat Protection: Email Best Practice Recommendations Webinar
    Advanced Threat Protection: Email Best Practice Recommendations Webinar Jimmy Lin Recorded: Aug 15 2018 50 mins
    The purpose of this webinar is to make sure our ATP Email customers are aware of all the services within this solution and that they are configured to our recommended best practices.

    The ATP Email solution consists of the following services:

    Click-time URL Protection
    Cynic sandboxing
    Auto remediation for Office 365
    Advanced Email Analytics
    Phishing Readiness
  • Top Drivers for SD-WAN Adoption
    Top Drivers for SD-WAN Adoption Scott Raynovich, Principal Analyst, Futuriom Recorded: Aug 15 2018 45 mins
    Huge demand for cloud services means huge demand for wide area network (WAN) connectivity, security, and bandwidth. It has also changed enterprise network architectures and created new challenges for Chief Information Officers (CIOs) and IT managers in charge of building networks and purchasing bandwidth for their company. The need for fast, secure access to cloud applications, demand for services and app agility, and the desire to leverage Internet connectivity is boosting demand for software-defined WAN (SD-WAN), which has more flexibility and better economics than traditional WANs.

    Tune in as Futuriom Principal Analyst R. Scott Raynovich recaps the findings of its recent SD-WAN Growth Outlook, detailing what’s driving fast adoption for SD-WAN technologies.
  • TechTALK: Why next-generation businesses are focusing on time as their #1 asset
    TechTALK: Why next-generation businesses are focusing on time as their #1 asset Joe Hanson, Sr Content Marketing Manager, PubNub Recorded: Aug 15 2018 32 mins
    For the modern business - time is everything, and every millisecond counts. In fact, time is the #1 asset to any business.

    In this webinar, we’ll show you why time is so important and how to best utilize the small window you have.

    Key takeaways:
    *Learn about information decay, and why it’s accelerating.
    *What information decay means for your business, and why managing time is imperative to a modern business’s success.
    *What technologies and services can be used to take advantage of small amounts of time.
  • The Future of Work in the 21st Century: Multigenerational Teams
    The Future of Work in the 21st Century: Multigenerational Teams Monique Morrow, President & Co-Founder, The Humanized Internet Recorded: Aug 15 2018 51 mins
    The way in which we work is changing. Technology, social norms and economic influences are impacting the working world every day.

    Did you know the right to work is a human right? It allows men and women of all ages and backgrounds to become self-reliant in dignity and free from discrimination. At a time when technology is taking over the workplace and a younger demographic is entering most workforces, it's more imperative than ever to understand the future of work and how multi-generational teams can make a meaningful impact on your business.

    Tune in with Monique Morrow, Dedicated Futurist, Technologist and Advisor, as she discusses these ever-important topics, opportunities and calls to action.
  • The State of Cybersecurity in the Healthcare Industry
    The State of Cybersecurity in the Healthcare Industry Juanita Koilpillai, Mark Rasch and Dr. Jerald Dawkins Recorded: Aug 15 2018 62 mins
    In this session we will use the NIST Cybersecurity Framework as a backdrop to delve into the state of Cybersecurity preparedness within the healthcare sector. This sector is among the most vulnerable and least mature.
    In this session we will examine:
    - What are the vulnerabilities to the Healthcare sector?
    - What are the NIST Cybersecurity Framework implications?
    - What are some immediate best practices?
  • Verizon Threat Research Advisory Center - Data Breach Digest 2018
    Verizon Threat Research Advisory Center - Data Breach Digest 2018 John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Aug 15 2018 75 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Data Breach Digest Highlights

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    For this month's theme: 'Data Breach Digest Highlights', we'll feature John Grim, Senior Manager, Investigative Response – Americas, who'll highlight the latest in terms of data breaches.

    Specifically, John will discuss scenarios in this year's Data Breach Digest, reveal how these scenarios match up against the 2018 Data Breach Investigations Report incident classification patterns, and in doing so, provide detection and validation, response and investigation, and mitigation and prevention countermeasures from an incident response and cybersecurity perspective.

    We'll then see what's happening with the IR Pulse and our caseload trends, followed by:

    •Current Intelligence
    •Attacks & Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Solving the Financial Services Security Talent Shortage with Managed Detection
    Solving the Financial Services Security Talent Shortage with Managed Detection Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Recorded: Aug 14 2018 39 mins
    Financial institutions face a daunting combination of cybersecurity threats and compliance requirements. IT teams at regional banks and credit unions have a relatively small staff but facing similar security and compliance burden to what larger, well-resourced financial institutions carry. How can small and mid-sized financial institutions counter sophisticated cyberthreats, provide monitoring and incident response needed for compliance, and do so with tight budgets that do not allow for staffing an elaborate security operations center? Managed detection and response provides a “force multiplier” to address all three issues.

    Attend this webinar and learn about:

    • Top cyberthreats facing financial institutions
    • Financial services compliance evolution, security monitoring and incident response
    • Differences between SIEM, SOC, and SOC-as-a-service
    • Monitoring on premises and cloud resources without adding headcount

    To gain insights on these challenges and how to solve them, save your seat now!
  • AppDynamics + Cisco: Driving Transformation Across the Stack
    AppDynamics + Cisco: Driving Transformation Across the Stack Steve Long, Regional CTO, AppDynamics Recorded: Aug 14 2018 45 mins
    In today's digital enterprise, it's technology that drives business success. And with the strategic pairing of AppDynamics and Cisco, organizations can now drive their digital transformation forward in ways never before possible. But how?

    In this webinar, you’ll learn how AppDynamics real-time data platform is being correlated with Cisco’s data platforms to give you the richest end-to-end view across the stack, allowing for faster remediation and automation

    You’ll gain insights into:

    - New challenges of cross-domain failures in the enterprise
    - The future of IT intelligence across the software and infrastructure industries
    - How Cisco solutions like ACI, CloudCenter and Workload Optimization Manager (CWOM) will be integrated with AppDynamics and Cisco
  • Don't Break the Bank: Achieve Compliance Quickly and at Scale
    Don't Break the Bank: Achieve Compliance Quickly and at Scale Vijay Chauhan, Director of Product Marketing, at Illumio Recorded: Aug 14 2018 49 mins
    Compliance regulations such as SWIFT and GDPR can be challenging to understand and implement. Many of these regulations have cybersecurity requirements that are focused on protecting critical banking infrastructure with aggressive timelines – and without disrupting the very business-critical systems you’re trying to protect. Jumping from one set of requirements to another and to subsequent internal and external audits can feel like a never-ending cycle.

    In this webinar, Vijay Chauhan will share some of his experiences as a security practitioner in financial services and highlight Illumio's unique position helping the largest financial institutions in the world solve regulatory and compliance challenges quickly and at scale. You'll learn:

    - Top challenges facing global banking
    - Approaches to protecting your "digital crown jewels"
    - Pros and cons of different approaches
    - How to future-proof for evolving requirements
  • Financial Services and GDPR: The Next 60 Days….
    Financial Services and GDPR: The Next 60 Days…. Ray Ford, Mark Rasch, Mary J. Hildebrand and David Morris Recorded: Aug 14 2018 61 mins
    In response to GDPR and Privacy Shield changes, entities in the Financial Services Industries have taken initial steps to identify gaps and modify their public facing privacy policies.

    This session will focus on what these heavily regulated industries will have to do in the next 60 days to establish and maintain a legally defensible position with respect to privacy and security of personal data not only to comply with regulation but to be poised to do business in the 21st Century.

    Learn from this leading panel of experts:.
    - Ray Ford: Founding member of the GDPR Institut
    - Mark Rasch: Chief Legal Council, Digital Risk Management Institute, Former head of US Dept. of Justice, Cyber and High Technology Crime Unit
    - Mary J. Hildebrand CIPP/US/E, Partner, Founder, and Chair, Privacy & Cybersecurity, Lowenstein Sandler LLP
  • Security for IT: Own Your Networking and Data Protection
    Security for IT: Own Your Networking and Data Protection Newsha Sharifzadeh- Product Marketing Manager, Aruba Recorded: Aug 14 2018 61 mins
    With the arrival of digital workplaces comes added security threats. Your business will need integrated and automated security controls to help protect your data from malware and unauthorized users. Including wireless intrusion detection and prevention, your network can be safeguarded from wireless threats, rogue access points and clients.

    As a trusted brand that provides next generation network solutions, Aruba helps keep business applications and data safe.

    Join us and learn about:
    •Network security landscape
    •Aruba SMB solutions and their security benefits
    •Resources to leverage

    Qualified attendees with receive a free Aruba Instant Access Point and a 90-day trial license of Aruba Central networking cloud management solution.
  • Optimize Cloud-based Analytics to improve SOC team Productivity
    Optimize Cloud-based Analytics to improve SOC team Productivity Torry Campbell; Sr. Director, Enterprise Solutions and Javier Santoyo; Sr. Director, Global Security Intelligence Recorded: Aug 14 2018 50 mins
    Security Operations Center (SOC) managers struggle to build teams with the right balance of skills and experience. A cyber security skills shortage and budget constraints are pushing managers to enhance the skills of tier 1 analysts and increase the productivity of tier 2 analysts.

    In addition, tier 3 analysts are expensive and hard to retain, so organizations are looking for better ways incorporate the expertise of skilled threat hunters.

    This webcast covers innovations in threat analytics and automation that enhances the efforts of analysts at each level.

    Join us to learn how security teams

    -Employ local and global telemetry to continuously improve attack and anomaly detection

    -Find attack patterns with cloud-based analytics before attackers exfiltrate data

    -Quickly convict unknown files with advanced content inspection and sandboxing

    -Replicate the skills and best practices of expert analysts via automated artifact collection and threat hunting playbooks

    In addition, we’ll demonstrate how Symantec Endpoint Detection and Response (EDR) allows
    resource-constrained SOC teams to detect and respond advanced attacks more effectively.

    Register Today
  • Network Security & Compliance for Kubernetes on AWS and EKS
    Network Security & Compliance for Kubernetes on AWS and EKS Amit Gupta, VP Product Management at Tigera, and Carmen Puccio, Principal System Architect at AWS Recorded: Aug 14 2018 60 mins
    Join this exclusive AWS webinar co-hosted with Tigera. We will demo how to implement turnkey compliance and security controls for Kubernetes in AWS and Amazon EKS environments.

    This webinar will explore how to extract data required for IT audits and implement network segmentation and encryption to meet your security and compliance requirements. We'll cover the security and compliance challenges that users face when deploying Kubernetes in AWS and Amazon EKS environments

    We'll also present a live demonstration of key capabilities within Tigera Secure Cloud Edition
  • Strengthen Security While Ensuring Network Uptime
    Strengthen Security While Ensuring Network Uptime Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Recorded: Aug 14 2018 38 mins
    Your financial services network is critical to operations and that makes it a juicy target for cyberthreats like ransomware and data breaches. What can you do? Inline security tools can be an effective solution, but represent multiple points of possible failure, particularly as network speeds increase because they simply can’t keep up. But if they go down, so can your network. And the difference of a nanosecond can severely impact currency, stock trading, and critical financial transactions.

    To provide pervasive visibility into data in motion and maintain compliance in high-speed networks, many financial services companies have turned to next-generation network packet brokers (NGNPB), which offer flexible inline bypass protection. This feature automates access to traffic, scales and optimizes existing monitoring infrastructure, and simplifies rollout of new technology. NGNPB also:

    • Delivers complete network-wide visibility across physical, virtual and cloud environments.
    • Scales metadata extraction for improved forensics.
    • Isolates applications for targeted inspection.
    • Gives you visibility into encrypted traffic for threat detection.

    See how you can strengthen security while ensuring network uptime and reducing costs. Learn how a simplified, resilient, and scalable architecture can:

    • Maximize tool efficiency by providing the right data to the right tools and by offloading processor-intensive tasks such as SSL decryption.
    • Scale to speed of the network without “rip and replace” by load balancing across tool groups.
    • Remove single points of failure and increase availability of both the tools and the network.
    • Give you operational agility to seamlessly add, remove, and upgrade tools, and instantly change between detection and prevention modes.

    Find out how both network and security teams can operate faster and safer in a swiftly evolving cybersecurity landscape within regulated industries such as financial services–register today!
  • How to Reduce Critical Application Downtime Using vRealize Operations
    How to Reduce Critical Application Downtime Using vRealize Operations Tim George, Solution Architect, Blue Medora Recorded: Aug 13 2018 56 mins
    VMware vRealize Operations can do so much more than monitor. Learn how you can bring together monitoring on different infrastructure components—including multiple hypervisors and monitoring platforms to turn it into a troubleshooting tool for your most critical workloads. See new dashboards that can help you identify the root cause of issues in databases, storage and networking before they cascade to other parts of your stack.
  • Best Practices for Implementing Container Security
    Best Practices for Implementing Container Security Knox Anderson, Sysdig Recorded: Aug 9 2018 57 mins
    Containers have changed the way we build, deploy, run, and investigate what goes on with our applications. It’s critical to validate that you’ve configured your containers securely, they don’t include any vulnerabilities, and enforce they are doing what’s expected in production.

    In this webinar we’ll cover:

    -How to implement image scanning in your CI/CD pipeline
    -How to prevent vulnerable images from being deployed to production
    -Methods for detecting anomalous behavior inside containers
    -What’s required for forensics when the container may no longer be running
    -How to audit and report on compliance at each stage of your SDLC
  • Hybrid Defense: Boost Cybersecurity with Human Augmented Machine Learning
    Hybrid Defense: Boost Cybersecurity with Human Augmented Machine Learning Matthew Thurston, Chief Architect - Arctic Wolf Networks Recorded: Aug 9 2018 49 mins
    Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?

    In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.

    We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.

    After attending, you will be able to:

    - Recognize how AI and Machine Learning are typically used in Cybersecurity, and what are the gaps
    - Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
    - Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks

    About our guest speaker:

    Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
  • Beyond Office 365: How Your Peers are Taming the Long Tail of SaaS Apps
    Beyond Office 365: How Your Peers are Taming the Long Tail of SaaS Apps Salim Hafid, Marketing Manager, Bitglass; Brandon Dunlap (Moderator) Recorded: Aug 9 2018 61 mins
    The long tail of SaaS is growing rapidly. Today, thousands of unmanaged "Shadow IT" applications are used in every major enterprise around the globe and IT departments have little visibility or control over these rogue apps. While the challenge was first simply to secure major SaaS platforms like Office 365, the new reality is a “cloud and mobile-first world” where employees often use new applications that aren’t approved and put corporate data at risk. Join Bitglass and (ISC)2 on August 9, 2018 at 1PM Eastern for the final part of this Security Briefings series where we’ll discuss how leading organizations are evolving their security to solve these challenges, what organizations are prioritizing when evaluating a solution and how zero-day technologies built for a cloud-first world are able to identify, categorize, and secure unknown apps.
  • Stop Unknown Threats: Deep Learning for Deeper Cybersecurity
    Stop Unknown Threats: Deep Learning for Deeper Cybersecurity Matt Pannebaker, Channel Engineer, Sophos Recorded: Aug 8 2018 57 mins
    With 75% of malware threats unique to a single organization, reactive endpoint security alone is not enough.

    Join this webinar to learn how predictive deep learning technology detects new and unseen malware, protecting you from never-seen-before attacks. Hear from security experts on the latest malware trends and attack techniques.
  • Office 365: Active Monitoring & Best Practices
    Office 365: Active Monitoring & Best Practices Ameet Naik, Technical Marketing Manager, ThousandEyes Recorded: Aug 8 2018 42 mins
    Office 365 is a strategic SaaS application for many enterprises, yet many organizations get blindsided by network performance issues, due to the unpredictability of the Internet. In fact, Gartner predicts that through 2019, 50% of Office 365 deployments with global scope will suffer network performance problems.

    Join us for this webinar on Office 365 monitoring best practices using Network Intelligence from ThousandEyes. In this webinar, we’ll discuss:

    -Why you can’t think of Office 365 as a singular service when preparing for deployments
    -Monitoring best practices for readiness, deployment and operational phases of your Office 365 rollout
    -Real world case studies explained through a demo
  • 2019 E-rate Update: Make the most of your funding
    2019 E-rate Update: Make the most of your funding John Harrington, CEO Funds For Learning Recorded: Aug 8 2018 63 mins
    The E-rate program provides an average of $54,000 per site to install Wi-Fi on school campuses. Support is available for almost every K-12 institution in America, including charters and private schools. We want to make sure that you are taking advantage of everything this program has to offer.


    Attend this webinar to get up to the minute updates on the E-rate program, learn why 2019 is the best year to apply and ask our E-rate experts any questions you may have. We will review important information for Funding Year 2019, such as:


    · Key Dates
    · Eligible Services
    · Recent USAC Announcements
    · Funding Levels
    · Potential changes in FY2020
  • The Five Most Common OT Security Breaches
    The Five Most Common OT Security Breaches Roee Stark & Michael Rothschild Recorded: Aug 8 2018 54 mins
    In the OT world, security was never a concern because it was air-gapped and isolated from the rest of the world. Today however, IIoT is the effective and efficient way to go; but it is not without risk. Join us for this session where we will discuss how hackers can get into your environment given the new operating paradigm and how to stop them before they cause damage.
  • Digitalization in the Factory, How to Protect The Network for IIoT
    Digitalization in the Factory, How to Protect The Network for IIoT Rich Karpinski, 451 Research & David Knapp, Chatsworth Aug 16 2018 3:00 pm UTC 60 mins
    This presentation presents recent survey data from 451 Research [VOTE product] on trends in Digitization of the Factory from the perspective of Operational Technologists. Top use cases for the Industrial Internet of Things (IIoT) and the current project focus of IT/OT teams will be discussed. Followed by a discussion of how to protect your technology investment in non-traditional environments, including extending the network onto the factory floor, the wireless overlay, and the addition of compute and storage resources on the site (edge computing).
  • [Ep.19] Ask the Expert: From the Office of the CTO
    [Ep.19] Ask the Expert: From the Office of the CTO Simon Evans, CTO, Amido & Kelly Harris, Senior Content Manager, BrightTALK Aug 16 2018 4:00 pm UTC 45 mins
    This webinar is part of BrightTALK's Ask the Expert Series.

    Join Simon Evans, CTO of Amido, as he takes a technical deep dive into key priorities for next-gen CTOs and what they should be considering for their 2020 strategy and beyond.

    Simon will bring perspective from both the CTO of a consultancy, but also from the perspective of their clientele who are primarily Enterprise CTOs.

    Join us for this live Q&A and get all of your questions answered!
  • Defending our Critical Infrastructure
    Defending our Critical Infrastructure Juanita Koilpillai and Mark Rasch Aug 16 2018 5:00 pm UTC 90 mins
    Critical Infrastructures such as Power, Water, Internet, Pipeline(Gas), and Smart Cities have been and continue to be attacked. This session will address the vulnerabilities and best practices for defending and protecting critical infrastructures.

    In this session, you will learn:
    Attacks most commonly used
    Defensive measures
    Best practices
  • Overcoming The Cybersecurity Skills Shortage in Law Firms
    Overcoming The Cybersecurity Skills Shortage in Law Firms Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Aug 16 2018 7:00 pm UTC 60 mins
    The evidence is clear: law firms of all sizes need to securely handle sensitive information associated with their clients, investigators, and witnesses. According to the American Bar Association’s 2017 Legal Technology Survey Report, 22 percent of respondents suffered a security breach at their law firms.*

    Compromised client information can destroy reputations and lead to decreased billables and lost business. While the need for improved security is evident, IT and security teams struggle to locate, retain and train talent needed to maintain and improve their security posture. So, what are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure?

    In this Arctic Wolf webinar, you will:

    - Discover why cybersecurity is top of mind in the legal community
    - Recognize the IT and Cybersecurity skills shortage and its impact on security
    - Understand how SOC-as-a-Service approaches enable law firms to rapidly improve their security posture and provide evidence to satisfy technology audits

    Save your seat today to learn more!

    *https://www.americanbar.org/groups/law_practice/publications/techreport/2017/security.html
  • Fighting Cybercime with Artificial Intelligence
    Fighting Cybercime with Artificial Intelligence Mr Keith Rayle, Security Strategist, Fortinet FortiGuard Labs Aug 21 2018 7:00 am UTC 60 mins
    See how artificial intelligence can be used to stop malware more quickly. Learn more about the history of artificial intelligence dating back to nearly a century plus an examination of a system comprised of highly efficient deep machine learning neural networks that are currently deployed and proactively defeating malware attacks.
  • DPI: The key technology for vEPC Solutions - Build or Buy?
    DPI: The key technology for vEPC Solutions - Build or Buy? Alexander Mueller, Product Manager DPI, Ipoque, Rhode & Schwarz Cybersecurity Aug 21 2018 5:00 pm UTC 60 mins
    When your virtual Evolved Packet Core (vEPC) solution needs deep packet inspection (DPI) as a key enabling feature, highly reliable and accurate real-time identification of network traffic and applications is an important requirement.
    Whether it is for analytics, policy enforcement, tiered pricing, web and video optimization, content filtering, parental control or security services, DPI is a crucial technology to implement virtualized network equipment solutions.
    vEPC vendors looking at the business case can decide to build DPI software in-house, use open source solutions or to license software from a DPI specialist. Within this webinar, we will do a deep dive explaining the different sourcing options and the respective evaluation criteria, which should be considered.
    The real-life vendor scenario of a vEPC vendor will be used to illustrate the different aspects of a realistic use case.
    By the end of this session, attendees will have learned:
    •How DPI has become a crucial technology for vEPC solutions
    •How the scope of needed know-how has changed for vEPC vendors
    •What the benefits of DPI for vEPC use cases are
    •What the sourcing options for DPI solutions are
    •How to evaluate and answer the important aspects of the build or buy DPI decision
  • Data management platform consolidation with enterprise Linux
    Data management platform consolidation with enterprise Linux Ashish Nadkarni, program vice president, Worldwide Infrastructure Practice, IDC Jennifer LuPiba, product mktg, Red Hat Aug 21 2018 6:00 pm UTC 60 mins
    Modern businesses depend on their applications. Databases that support these applications must deliver high performance and increased stability to meet business requirements for reliability, availability, and end-to-end security. IT should select an appropriate database management system (DBMS) and operating system environment (OSE) for enterprise-wide consolidation. A tried and trusted DBMS platform matched with an equally proven commercial Linux® OS is valuable to the entire application stack.

    Join IDC and Red Hat to learn about:
    > Application modernization and data management.
    > The role of Linux in enterprise application strategy.
    > How the choice of DBMS and OSE influences scalability and reliability of the overall stack.
    > How Red Hat® Enterprise Linux and Microsoft SQL Server 2017 deliver a highly available and reliable foundation for database operations.
    > The benefits of bringing together product development expertise, investments in cloud platforms and services, and the support and services of Red Hat and Microsoft.
  • IoT in Mining: Current Capabilities & Future Pathways
    IoT in Mining: Current Capabilities & Future Pathways CSIRO: Australia's Commonwealth Scientific & Research Organisation Aug 22 2018 12:00 am UTC 60 mins
    IoT is turning mining into a safer and more productive industry. The technology involves connecting machines, fleet and people with sensor technologies that transfers and receive data over a network.
  • WebEx Performance Monitoring
    WebEx Performance Monitoring Archana Kesavan, Sr. Product Marketing Director Aug 22 2018 5:00 pm UTC 45 mins
    Many organizations have adopted Webex as the primary platform for communication and collaboration across both, internal and external teams. However, enterprises constantly run into VoIP performance issues with Webex and lack sufficient visibility to troubleshoot and ensure optimal user experience.

    Join us for a webinar where we’ll cover:
    -How Webex access works and monitoring best practices
    -Customer stories and real-world use cases on how to monitor Webex voice quality
    -Hands-on demo of using ThousandEyes for Webex visibility and delivering enhanced user experience
  • RoCE vs. iWARP
    RoCE vs. iWARP Tim Lustig, Mellanox; Fred Zhang, Intel; John Kim, Mellanox Aug 22 2018 5:00 pm UTC 75 mins
    Network-intensive applications, like networked storage or clustered computing, require a network infrastructure with high bandwidth and low latency. Remote Direct Memory Access (RDMA) supports zero-copy data transfers by enabling movement of data directly to or from application memory. This results in high bandwidth, low latency networking with little involvement from the CPU.

    In the next SNIA ESF “Great Storage Debates” series webcasts, we’ll be examining two commonly known RDMA protocols that run over Ethernet; RDMA over Converged Ethernet (RoCE) and IETF-standard iWARP. Both are Ethernet-based RDMA technologies that reduce the amount of CPU overhead in transferring data among servers and storage systems.

    The goal of this presentation is to provide a solid foundation on both RDMA technologies in a vendor-neutral setting that discusses the capabilities and use cases for each so that attendees can become more informed and make educated decisions.

    Join to hear the following questions addressed:

    •Both RoCE and iWARP support RDMA over Ethernet, but what are the differences?
    •Use cases for RoCE and iWARP and what differentiates them?
    •UDP/IP and TCP/IP: which uses which and what are the advantages and disadvantages?
    •What are the software and hardware requirements for each?
    •What are the performance/latency differences of each?

    Join our SNIA experts as they answer all these questions and more on this next Great Storage Debate
  • TechTALK: Top 8 Things When Considering Chat and Mobile
    TechTALK: Top 8 Things When Considering Chat and Mobile Johnathan Flowers, Sr Product Marketing Manager Aug 22 2018 5:00 pm UTC 60 mins
    Extending chat to mobile customers is one of the hottest topics in mobile engagement. With mobile devices playing an increasingly important role in both e-commerce and in-store spending, connecting with customers wherever they are has become more important than ever. And just as live chat has become a critical part of customer engagement on your website, it’s just as important on your mobile site and mobile app!

    The shift from desktop to mobile among online consumers is incontrovertible and is accelerating in a variety of ways, including mobile commerce volume, research of products and services, and expectations of service levels. Professionals in e-commerce, marketing, customer service, and customer experience are aggressively deploying strategies to meet customers where they are and to deliver the services and experiences customers want and expect. Live chat has become an expected service on traditional websites and now has the highest customer service rating among online service channels (Forrester, 2017). Live chat on mobile is now expected to standard. Your selection of a great mobile chat solution can have important and enduring implications for your business, and careful consideration of your options is imperative.

    In this webinar, we’ll be going over the TOP 8 things to considering as you think about Chat and Mobile.
  • Scared of data security in SaaS applications? Don’t worry, we have your back
    Scared of data security in SaaS applications? Don’t worry, we have your back Akhilesh Dhawan, Dir. Product Marketing, Networking/Security; Praveen Raghuraman, Dir. Product Management, Networking, Citrix Aug 23 2018 1:00 pm UTC 60 mins
    Most organizations have some data stored in SaaS applications or are thinking of moving to SaaS. Some of this migration to SaaS is controlled by IT (sanctioned SaaS apps), while most of this migration is undertaken by individual business units (unsanctioned SaaS apps) in order to achieve better productivity or to get some tasks done. While IT has deployed methods like single sign-on to sanctioned applications, they cannot control access to any unsanctioned SaaS applications using the same SSO solution. And traditional single sign-on solutions don’t provide any control on what actions a user can take after they login to SaaS applications, nor do they provide security policies for IT to control user access to the Internet.

    In this session, you will learn about a single solution that helps:

    • Improve user experience with single sign-on to SaaS, web and virtual apps
    • Implement enhanced security policies for SaaS apps to control user actions after login
    • Enable Web filtering to control what users cannot access on the Internet
    • Securely browse the internet
    • Provide end to end visibility and user behavior analytics with Citrix Analytics
  • Planning your visit to the future of broadcast & media: IBC2018 Preview
    Planning your visit to the future of broadcast & media: IBC2018 Preview IBC365 | Tata Communications | Rohde & Schwarz | IABM | Marquis Media Partners Aug 23 2018 3:00 pm UTC 75 mins
    Join IBC365 on Thursday 23 August at 4pm BST.

    Don’t miss the highlights of IBC2018 with this inside preview of the big themes and must-see tech on this year’s show floor.

    Our panel of broadcasters and exhibitors guide us through their predictions of the hot topics from IP to AI, the rise-and-rise of OTT, and the impact of 5G, blockchain and ATSC 3.0.

    Plus the new focus on building an efficient supply chain to create, manage, store and distribute content.

    Join us to help make your IBC experience the best yet.

    Speakers:
    Jeremy Dujardin, CTO Global Media & Entertainment, Tata Communications
    Tim Felstead, Director of Strategic and Operation Marketing Broadcast & Media, Rohde & Schwarz
    Kathy Bienz, Director North America, IABM
    Jurgita Rhodes, Partner, Marquis Media Partners
  • Technical Education Series: Further Securing the SaaS Model
    Technical Education Series: Further Securing the SaaS Model Hari Nanda Aug 23 2018 3:00 pm UTC 60 mins
    In this webinar you will learn how to utilize and configure Symantec’s CoudSOC service to protect access to an Office 365 SaaS environment.
  • Maintaining Secure Network Connectivity for Elections
    Maintaining Secure Network Connectivity for Elections Bryan Wood and Edwin Mendoza, Cradlepoint Aug 23 2018 4:00 pm UTC 60 mins
    With election polling places more dependent on technology and network connectivity than ever before, choosing a branch network solution requires careful consideration of factors including data security, connection flexibility, ease of use, remote management capabilities, and costs.

    With nearly $400 million in 2018 HAVA Election Security Fund now available, agencies have a prime opportunity to meet all of their networking needs and drastically improve their Election Day technology systems not just now, but for the future.

    Join Cradlepoint’s Bryan Wood and Edwin Mendoza for a live webinar to explore Cradlepoint’s comprehensive solution packages for secure, multi-WAN — including high-performance 4G LTE — and cloud-managed pop-up connectivity at polling locations.
  • Business Benefits of APM, featuring guest speakers from Forrester
    Business Benefits of APM, featuring guest speakers from Forrester Charles Betz, Principal Analyst at Forrester Research; Henry Huang, Sr., TEI Consultant at Forrester Research; Thomas Wyatt Aug 23 2018 4:00 pm UTC 60 mins
    The application is now the business, and investing in the right APM solution is imperative to delivering flawless customer experiences. So how can you present a solid business case for this major IT investment?

    We commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study to showcase the cost savings and business benefits you can expect from AppDynamics APM and its integration with Cisco technology.

    Register for our webinar featuring Forrester guest speakers as they explain the TEI methodology and learn:

    - Technology trends in the APM landscape
    - How you can save $1.45 million annually through consolidation of monitoring tools
    - Why Cisco + AppDynamics together will accelerate your digital transformation
  • Accelerating SAS Analytics with Vexata NVMe Storage
    Accelerating SAS Analytics with Vexata NVMe Storage Dana Rafiee, Managing Director at Destiny and Shailesh Manjrekar, Sr. Director, Product and Solutions Management at Vexata Aug 23 2018 5:00 pm UTC 60 mins
    94% of the Fortune Global 100 use SAS analytics. Through innovative software and services, SAS empowers and inspires customers around the world to transform data into intelligence. IDC predicts by 2019, 40% of Data Transformation initiatives will use AI services; by 2021, 75% of commercial enterprise apps will use AI, over 90% of consumers will interact with customer support bots, and over 50% of new industrial robots will leverage AI.

    Data-driven applications and Machine Learning (ML) workloads, using SAS analytics are increasing in volume and complexity as organizations look to reduce training and operational timelines for artificial intelligence (AI) use cases. To enable predictive and cognitive analytics, you need to accelerate training and operations by delivering ultra-low latency with massive ingest bandwidths when faced with heavy mixed random and sequential read/write workloads.

    Vexata is teaming up with Destiny Corporation, a Business and Technology firm who is a SAS gold partner and reseller. This webinar is targeted towards SAS Line of Business and IT owners who are challenged with
    - new use cases like IoT, machine and deep learning across FSI, Insurance, Healthcare and Lifesciences verticals
    - handling growing data-sets and deriving actionable intelligence from these data-sets as well as
    -optimizing their existing long running jobs and IT infrastructure without a rip and replace policy.

    Learn how to identify your SAS analytics IO bottlenecks and leverage Vexata VX-100 with its transformative VX-OS purpose built to overcome these challenges.
  • Fibre Channel Interoperability
    Fibre Channel Interoperability Barry Maskas, HPE; Tim Sheehan, University of New Hampshire Interoperability Lab; David Rodgers, Teledyne LeCroy Aug 23 2018 5:00 pm UTC 75 mins
    Interoperability is a primary basis for the predictable behavior of a Fibre Channel (FC) SAN. FC interoperability implies standards conformance by definition. Interoperability also implies exchanges between a range of products, or similar products from one or more different suppliers, or even between past and future revisions of the same products. Interoperability may be developed as a special measure between two products, while excluding the rest, and still be standards conformant. When a supplier is forced to adapt its system to a system that is not based on standards, it is not interoperability but rather, only compatibility.

    Every FC hardware and software supplier publishes an interoperability matrix and per product conformance based on having validated conformance, compatibility, and interoperability. There are many dimensions to interoperability, from the physical layer, optics, and cables; to port type and protocol; to server, storage, and switch fabric operating systems versions; standards and feature implementation compatibility; and to use case topologies based on the connectivity protocol (F-port, N-Port, NP-port, E-port, TE-port, D-port).

    In this session we will delve into the many dimensions of FC interoperability, discussing:

    •Standards and conformance
    •Validation of conformance and interoperability
    •FC-NVMe conformance and interoperability
    •Interoperability matrices
    •Multi-generational interoperability
    •Use case examples of interoperability
  • Best Practices for Reducing Your Attack Surface with Vulnerability Management
    Best Practices for Reducing Your Attack Surface with Vulnerability Management Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Aug 23 2018 6:00 pm UTC 60 mins
    Attack surfaces are rapidly changing by the minute, as IT organizations are provisioning new types of endpoints, IoT devices, servers, web-applications and cloud-based services to increase business efficiencies. Due to this dynamically changing asset landscape, it has become increasiingly difficult for IT security teams to maintain visibility to which ones need to be patched to reduce the risk from being exploited by hackers.

    Narayan Makaram, Sr. Director of Product Marketing, Arctic Wolf Networks, will explore the following, to emphasize the need for regularly running external vulnerability scans to boost your visibility and reduce business risks.

    •Trends affecting your attack surface
    •Need for vulnerability management program
    •What should you look for in an external vulnerability scan report

    Register today to hear from this expert!
  • Scared of data security in SaaS applications? Don’t worry, we have your back
    Scared of data security in SaaS applications? Don’t worry, we have your back Akhilesh Dhawan, Dir. Product Marketing, Networking/Security; Praveen Raghuraman, Dir. Product Management, Networking, Citrix Aug 23 2018 6:00 pm UTC 60 mins
    Most organizations have some data stored in SaaS applications or are thinking of moving to SaaS. Some of this migration to SaaS is controlled by IT (sanctioned SaaS apps), while most of this migration is undertaken by individual business units (unsanctioned SaaS apps) in order to achieve better productivity or to get some tasks done. While IT has deployed methods like single sign-on to sanctioned applications, they cannot control access to any unsanctioned SaaS applications using the same SSO solution. And traditional single sign-on solutions don’t provide any control on what actions a user can take after they login to SaaS applications, nor do they provide security policies for IT to control user access to the Internet.

    In this session, you will learn about a single solution that helps:

    • Improve user experience with single sign-on to SaaS, web and virtual apps
    • Implement enhanced security policies for SaaS apps to control user actions after login
    • Enable Web filtering to control what users cannot access on the Internet
    • Securely browse the internet
    • Provide end to end visibility and user behavior analytics with Citrix Analytics
  • Artificial Intelligence & Machine Learning Techniques for Service Providers
    Artificial Intelligence & Machine Learning Techniques for Service Providers Prasanna Sivaramakrishnan Senior Solutions Architect, Red Hat Aug 23 2018 6:00 pm UTC 60 mins
    The vast amount of data assets generated by Networks, Users, Traffic and Devices has generated monetization opportunities in the Telco Domain. Daily human interaction with telecommunication networks and services of all kinds contain unconnected gems of information which, when correctly interpreted, reveal how people behave and interact. Machine Learning technologies can be put to good use to reveal how all this information fits into relevant patterns.

    In this session you will learn about the following:
    > Brief Overview of AI and ML
    > Different types of ML Techniques and how to apply them
    > A look at projects such as Jupyter Notebook and Tensorflow and relevance to IoT
  • Where are you on the Digital Transformation Journey? Further than you think
    Where are you on the Digital Transformation Journey? Further than you think Vishal Ganeriwala, Senior Director, Product Marketing, Citrix Workspace Aug 23 2018 8:00 pm UTC 45 mins
    Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?

    Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.

    You’ll learn how to:

    • Simplify your systems and ongoing management with a cloud-based approach
    • Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
    • Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
  • How Stitch Fix is Building a DevOps Focused Security Team
    How Stitch Fix is Building a DevOps Focused Security Team Charles Nwatu, Director of Security at Stitch Fix Aug 23 2018 8:30 pm UTC 60 mins
    As you look to build out your security team or expand your security skills in a modern, DevOps focused organization, you’ll likely encounter a few challenges along the way. In this webinar, we discuss many of the challenges Charles Nwatu, Director of Security at Stitch Fix, is facing while building his own high performing, DevOps focused security team, and how he is overcoming them.

    This webinar is for any security professional who is looking to:
    * Better integrate security practices with their DevOps teams
    * Build the skill sets needed to work fluidly with DevOps teams
    * Automate more security into their SLDC
    * Shift their security operations left and right