Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Milwaukee Tools Moves Unstructured Data to AWS Milwaukee Tools Moves Unstructured Data to AWS Alan Musser Recorded: Sep 24 2016 52 mins
    Learn how Milwaukee Tool moved all of its unstructured data off NetApp into AWS cloud storage using Panzura, reducing costs by over $40,000 per shelf in the process and freeing up space on NetApp for additional applications. In the process, Milwaukee Tool also reduced video file open times for its global offices from hours to just seconds while ensuring file integrity.
  • Key Requirements for Next Gen Storage Key Requirements for Next Gen Storage Henry Baltazar, Eric Quinn, Rich Weber Recorded: Sep 23 2016 60 mins
    Join Guest speaker Henry Baltazar, Senior Analyst at Forrester Research, Eric Quinn, IT Director at C&S Companies, and Rich Weber, Chief Product Officer at Panzura, as they discuss the key requirements for Next Generation Global File Storage.
  • How SLAM Eliminated $300K in Infrastructure Cost with Cloud Storage How SLAM Eliminated $300K in Infrastructure Cost with Cloud Storage John Stergakis Recorded: Sep 23 2016 58 mins
    Join John Stergakis, Director of Information Services at SLAM Collaborative as he discusses how his company eliminated $300,000 in infrastructure costs while redesigning the Notre Dame football stadium by consolidating storage into the cloud, avoiding additional investment in their SAN storage, WAN acceleration and VDI solutions.
  • I-SOC, gérer la sécurité de manière proactive grâce à l'intelligence I-SOC, gérer la sécurité de manière proactive grâce à l'intelligence David Grout, Technical Director, Southern Europe, FireEye Recorded: Sep 23 2016 46 mins
    Les SOC D’aujourd’hui se détournent de leur métier de base en devenant des centres de gestion d’alertes. Nous vous présenterons comment l’apport de la cyberveille peut permettre aux équipes de passer d’un mode réactif qui gère des alertes à un modèle proactif axé sur la chasse aux indicateurs et aux groupes d’assaillants présents sur vos environnements IT.
  • Software Defined Packet Processing in FPGAs with P4 Software Defined Packet Processing in FPGAs with P4 Awanish Verma, Sr. Manager and Architect “SDN/NFV”, Xilinx Inc. Recorded: Sep 22 2016 62 mins
    Programmability with flexibility in the network has gained traction in the market due to a variety of use cases. Customers are looking to differentiate the infrastructure with programmability and the addition/removal of custom packet headers.  The emerging custom protocols and flexible packet processing in edge, access and data center networks has created the demand for defining the packet processing in high level languages.  This requirement is further stressed with SDN and NFV based networks requiring modification of the packet processing logic without knowledge of underlying hardware.

    To this end, the newly emerging language P4 is widely being viewed as the de-facto standard in standards based packet processing.  

    Xilinx is co-chairing the P4 Language Design group, and has developed a compiler to compile programs written in P4 into Xilinx FPGA binary images. This compiler has been demonstrated at the P4 Workshop series held at Stanford University in 2015-16, and at the major SIGCOMM conference this year.   

    Xilinx All programmable FPGAs offer a unique architectural advantages for these requirements, since they offer programmable logic together with programmable interconnect to a large number of DSP units, SRAM blocks, hardened IO interfaces, and 100GE Ethernet MACs and PCIe blocks.  These attributes make it the suitable architecture for the packet processing for today and the future generation of programmable networks.
  • Smart Storage - Virtualization Unleashed Smart Storage - Virtualization Unleashed Calvin Nieh, Virtualization Solutions Marketing Manager, Pure Storage Recorded: Sep 22 2016 36 mins
    Smart Storage for the cloud IT is effortless, efficient and evergreen. In this webinar, learn how operational simplicity, data efficiency, and predictable performance through flash will enable your business to be more competitive in the market at the same cost as traditional disk infrastructure.

    We will cover:

    - What is possible with flash?
    - What flash solutions are available today?
    - How do the costs compare?
    - Pure Storage architecture overview
    - Demonstration of storage provisioning tasks
  • Running a Highly Efficient Next Generation Data Center Running a Highly Efficient Next Generation Data Center Jeff Klaus General Manager, Intel Data Center Solutions - Dr. Rene Meyer Director of Product Development AMAX Engineering Recorded: Sep 22 2016 50 mins
    AMAX's [SMART]DC Data Center Manager is the premier out-of-band DCIM solution to consolidate and optimize the highly efficient, next generation data center, providing advanced management features while reducing operational costs.

    In this webinar we will cover:
    •The Next Generation of Data Centers: High Efficiency Meets Scalability
    •Streamline Heterogeneous Data Center Management with [SMART]DC
    •Achieve up to 30% in Power Savings From Your Data Center With Minimal Disruption
    •How You Can Start Today

    Presenters

    Jeff Klaus
    General Manager, Intel Data Center Solutions

    Dr. Rene Meyer
    Director of Product Development AMAX Engineering
  • OpenDaylight Controller: Redefining SDN through Open Source OpenDaylight Controller: Redefining SDN through Open Source Ajay Chhabria, Software Test Engineer, and Sai MarapaReddy, Software Engineer, Brocade Recorded: Sep 22 2016 59 mins
    The new age of Software-Defined Networks is upon us. Of them, open source projects through common platforms. OpenDaylight is an Open Source Software project under the Linux Foundation with the goal of furthering the adoption and innovation of Software Defined Networking (SDN) through the creation of a common industry supported platform.

    OpenDaylight Controller project contains more than 48 individual projects, out of which L2Switch & BGP LS PCEP are two important projects.

    BGP LS PCEP :- BGP LS PCEP project is an effort to bring two south-bound plugins into the controller: one for supporting BGP Linkstate Distribution as a source of L3 topology information, the other one to add support for Path Computation Element Protocol as a way to instantiate paths into the underlying network.

    L2switch project provides basic Layer2 switch functionalities. It also consists of reusable services (packet-handler, address tracker. flow writer) which further supports L2 switch functionalities.

    Join experts from Brocade and the OpenDaylight project to learn how software-defined networking has evolved, projects you can implement, and what to look out for in the future.
  • Successfully Troubleshooting Skype for Business Successfully Troubleshooting Skype for Business John Hand - Global Microsoft Alliance Director | Dave Bottomley - Communications Solutions Engineer Recorded: Sep 22 2016 63 mins
    This session will give a view on how to successfully troubleshoot Skype for Business scenarios:
    - Conference Calls
    - Soft phone
    - Voice quality
  • Lightboard Series: Episode 2 - Security at the Speed of Business Lightboard Series: Episode 2 - Security at the Speed of Business Julie Starr, Security Strategist, VMware | Hadar Freehling, Staff Security Strategist, VMware Recorded: Sep 22 2016 23 mins
    Join NSX experts for a series of engaging videos and learn more about the use cases driving the adoption of network virtualization today. Through the use of a lightboard, we’ll illustrate the technology and business drivers around network virtualization with VMware NSX.

    While there are many benefits of a SDDC approach including NSX, micro-segmentation has become the foundation for a dramatic improvement in data center security for many organizations. Join us to learn:

    - Why there is no other solution in market that can achieve micro-segmentation in an operationally feasible manner
    - How Service Composer, distributed firewall, and service chaining work in concert to bring considerable benefits, implementing micro-segmentation to stop lateral movement in your data center
    - The ability to insert third party network and security services to respond to changing conditions in the data center

    Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.
  • Quality of Service and flow management in OpenStack Neutron Quality of Service and flow management in OpenStack Neutron Rodolfo Alonso Hernandez, Intel; David Shaughnessy, Intel Recorded: Sep 22 2016 46 mins
    During this presentation two areas of development in OpenStack Neutron will be discussed.
    The first is Quality of service, we will describe how to enable it, the back end drivers it is implemented on and the features currently available and in development.
    Extension interoperability in OpenStack Neutron will also be discussed, specifically in regards to the Open vSwitch driver and the extensions use of the OpenFlow tables.
  • HPE ART - Protect your Business now HPE ART - Protect your Business now Pedro Miguel Jeronimo Mendes, Datasmart Recorded: Sep 22 2016 48 mins
    In this session, you will gain understanding on how data is growing faster and is shared every day across the business world. It looks that company’s today won’t survive without their Data, and it’s not only a matter of lose everything, could be a matter of unavailability and you are out of Business. This session will cover how to protect your data and secure it for sharing
  • 5 SD-WAN Integration Challenges SOLVED (EMEA Version) 5 SD-WAN Integration Challenges SOLVED (EMEA Version) Ethan Banks, Co-Founder of Packet Pushers Rolf Muralt, VP of Product Marketing Silver Peak Recorded: Sep 22 2016 64 mins
    SD-WAN can dramatically reduce cost and increases the ability to rapidly bring new services online, connecting users to all types of applications, and speeding up time to market. But the idea of re-architecting the WAN can be daunting and the decision to adopt an SD-WAN solution can be a difficult one.

    Join renowned network expert Ethan Banks, Co-Founder of Packet Pushers, and Rolf Muralt, VP Products Management SD-WAN at Silver Peak, in a webinar that discusses the SD-WAN market, lessons learned, and what features to be on the lookout for as you make your decision. They will discuss issues around technology selection and deployment, including:

    · How a zero-touch, hybrid or SD-WAN can leverage multiple connectivity forms
    · Ways to prioritize and route traffic across different connections
    · Quality of Service (QoS), and how to maintain 100% uptime
    · Best practices for transitioning with minimal impact on budget and resources
    · Real customer examples that demonstrate different deployment stage and benefits
  • Mobile Apps - Webinar 1: Mobility & Agile Entwicklung Mobile Apps - Webinar 1: Mobility & Agile Entwicklung Andreas Widmann, Technical Consultant, HPE Software Recorded: Sep 22 2016 46 mins
    Höhere Umsätze und Wettbewerbsvorteile lassen sich heute nur noch über die digitale Transformation der Geschäftsmodelle erzielen. Das gilt über alle Branchen hinweg, vom Handel über Finanzdienstleistungen, Transport und Logistik, bis hin zur Automobilindustrie und anderen produzierende Unternehmen.

    Eine digitale Strategie steht und fällt jedoch mit ihrem mobilen Einsatz. Mobile Apps spielen deshalb in allen Zukunftsfeldern eine entscheidende Rolle.

    Erfahren Sie in unserer 3-teiligen Webinarreihe, wie die Lösungen von HPE Software durch den gesamten Lebenszyklus mobiler Apps dafür sorgen, dass diese Ihr Business wirklich nach vorne bringen können – von der Entwicklung über das Testen, bis hin zum Monitoring.

    Webinar 1: Mobility & Agile Entwicklung
    Da eine App stets neue, sich ändernde Anforderungen des Marktes berücksichtigen muss, ist Agile der Standard für die Entwicklung im Bereich Mobility. Sehen und erleben Sie in diesem Webinar in einer Live Demo, wie sie den agilen Entwicklungsprozess managen und optimieren können, damit auch Ihre mobile Applikation stets wettbewerbsfähig bleibt
  • Live Q&A with David Leighton, President, Women in Technology Live Q&A with David Leighton, President, Women in Technology Katie Broderick, 451 Research & David Leighton, President, Women in Technology International Recorded: Sep 21 2016 23 mins
    Live from the 2016 Hosting & Cloud Transformation Summit in Las Vegas, Katie Broderick of 451 Research will interview David Leighton, President of Women in Technology about a recent survey of 1,100 WITI members, which found that early STEM (science, technology, engineering and math) exposure is crucial and a variety of support mechanisms are needed to achieve women's goals in a predominantly male field.
  • Live Q&A with Julian Kudritzki, Uptime and John Sheputis, Infomart Data Centers Live Q&A with Julian Kudritzki, Uptime and John Sheputis, Infomart Data Centers Brett Azuma, Julian Kudritzki, John Sheputis Recorded: Sep 21 2016 20 mins
    Live from the 2016 Hosting & Cloud Transformation Summit in Las Vegas, Brett Azuma from 451 Research will interview Julian Kudritzki, COO of Uptime Institute and John Sheputis, President of Infomart Data Centers about how organizations use Uptime Institute’s Efficient IT to seize opportunities to innovate while reducing their environmental impact and meeting a variety of business and sustainability goals.
  • Finding Quick Wins in Cybercrime Investigations Finding Quick Wins in Cybercrime Investigations Tim Helming, Director, Product Management at DomainTools and Jeff Pollard, Principal Analyst at Forrester Research Recorded: Sep 21 2016 63 mins
    Most analysts or threat hunters who have multiple investigations under their belts are familiar with frustrating dead ends, or lengthy time investments. However, new tools and techniques are making it easier to establish “quick wins” that pay off in helping defend your organization.

    Join Tim Helming of DomainTools and guest speaker Jeff Pollard of Forrester to:

    - Discover keys to completing a successful investigation
    - Improve your defensive posture and demonstrate value up the org chart
    - Help answer the difficult question of how to know when you have reached the end of the investigation
    - Learn to apply these concepts to real world threat hunting scenarios
  • The Top 3 Cybersecurity Challenges and Customer Case Studies The Top 3 Cybersecurity Challenges and Customer Case Studies Sam McLane, Head of Security of Engineering at Arctic Wolf Networks Recorded: Sep 21 2016 23 mins
    Cut through the noise and identify the three biggest challenges to cyber security. In this live webinar, Sam McLane, Head of Security Engineering at Arctic Wolf Networks, will provide the most effective strategies to combat threats such as ransomware, targeted phishing attacks, and other threats that bypass perimeter defenses. Join this presentation and learn the insights gained from working with real customers and how Arctic Wolf Networks helped them combat cyber attacks.
  • 5 SD-WAN Integration Challenges SOLVED 5 SD-WAN Integration Challenges SOLVED Ethan Banks, Co-Founder of Packet Pushers Rolf Muralt, VP of Product Marketing Silver Peak Recorded: Sep 21 2016 66 mins
    SD-WAN can dramatically reduce cost and increases the ability to rapidly bring new services online, connecting users to all types of applications, and speeding up time to market. But the idea of re-architecting the WAN can be daunting and the decision to adopt an SD-WAN solution can be a difficult one.

    Join renowned network expert Ethan Banks, Co-Founder of Packet Pushers, and Rolf Muralt, VP Products Management SD-WAN at Silver Peak, in a webinar that discusses the SD-WAN market, lessons learned, and what features to be on the lookout for as you make your decision. They will discuss issues around technology selection and deployment, including:

    · How a zero-touch, hybrid or SD-WAN can leverage multiple connectivity forms
    · Ways to prioritize and route traffic across different connections
    · Quality of Service (QoS), and how to maintain 100% uptime
    · Best practices for transitioning with minimal impact on budget and resources
    · Real customer examples that demonstrate different deployment stage and benefits
  • Business Transformation: On the Evolutionary Path to IoT and 5G Business Transformation: On the Evolutionary Path to IoT and 5G Gloria Nogales, Intel; Jesus Cabrera, Verizon Wireless Recorded: Sep 21 2016 49 mins
    With the advent of 5G, the coming advancements in wireless technology will dramatically impact the way we do business, interact with each other, and accomplish everyday tasks. As with any coming or newly emerging technology, predicting the impact of 5G is a challenge, but we know for sure that the leap to 5G will have an instant impact on end-to-end device and network transformation. The increase in speed, power, and functionality that 5G offers can enable Communications Service Providers to keep pace with the increasing demands of their customers. In essence, 5G will enable the network to become personal.

    In this webinar, Intel and Verizon will explore how 5G will make it possible to transform the way we think about devices and things and the networking technologies that will drive the need for flexible computing to enable the widespread connectivity required for the Internet of Things. In addition, participants will learn how platform scalability and flexibility through virtualization are necessary to deliver the efficient, powerful use of computing needed in the 5G network and how Communications Service Providers can streamline the delivery of services and drive new opportunities for service growth.
  • Introducing Your Next WAN: SD-WAN Introducing Your Next WAN: SD-WAN Todd Kelly, VP of Emerging Technologies, Cradlepoint Recorded: Sep 21 2016 60 mins
    Until recently there has been very little fundamental innovation in terms of how WANs are designed and implemented. Driven by the development of Software-Defined Networking (SDN), that is changing.

    Introducing your next WAN — software-defined, LTE-based, and designed with security in mind for today’s connected enterprise. This new combination reduces complexity and enables IT and network teams to deploy cloud-based networks in minutes to connect distributed people, places, and things — anywhere.

    Join us for a webinar to learn how you can make the public Internet your private network to augment, complement, extend, or replace legacy network infrastructure without giving up visibility, security, and control.
  • CA UIM per il controllo di infrastrutture IT tradizionali e ambienti cloud CA UIM per il controllo di infrastrutture IT tradizionali e ambienti cloud Luigi Benocci & Cristiana Darra, CA Technologies Recorded: Sep 21 2016 42 mins
    Oggi l’Application Economy richiede un approccio Agile anche nel controllo quotidiano delle infrastrutture IT e nel controllo delle sue performance.
    Gli ambienti IT tendono sempre di più ad essere eterogenei con la presenza di sistemi legacy e cloud sia in forma privata che pubblica (hybrid cloud). Allo stesso tempo agli operation manager viene chiesto di essere proattivi e sempre più veloci nel tenere sotto controllo lo stato dei servizi di business erogati.
    Un approccio ai tool di monitoraggio a “silos” non risponde a questi requisiti e rischia di mantenere alti i tempi di risoluzione delle criticità e dei problemi (MTTR alti).
    CA Unified Infrastructure Monitoring (UIM) consente di avere una visibilità a 360 gradi sulle applicazioni, servizi e infrastruttura (fino al mainframe) in modo moderno e ottimale unificando i vari tools di monitoraggio dipartimentali, offrendo un controllo puntuale sia sui sistemi più tradizionali che sulle nuove tecnologie cloud e micro-service.
  • Digitale Archivierung im Zeitalter von Big Data Digitale Archivierung im Zeitalter von Big Data Robert Kreher, Business Development Manager HPE IM&G und Marc Fisseler, Pre-Sales Consultant HPE IM&G Recorded: Sep 21 2016 49 mins
    Die weltweit jährlich generierte Datenmenge wächst nach Prognosen von IDC von 2.837 Exabyte in 2012 auf 40.026 Exabyte in 2020.
    Daher spielen intelligente Lösungen für das Informationsmanagement eine immer wichtigere Rolle.
    HPE Software Lösungen bieten intelligente Sicherung und Wiederherstellung, Zugriffsmöglichkeiten und Archivierung von Informationen von den zentralen Komponenten bis zur Peripherie – in physischen, virtuellen und Cloud-basierten Infrastrukturen.
    In diesem Webinar möchten wir Ihnen das Thema digitale Archivierung näher bringen und dabei zwei Software Lösungen in den Fokus rücken:

    • HPE Storage Optimizer - eine Lösung zur Speicheroptimierung, mithilfe derer Sie auf intelligente Weise unstrukturierte Daten verwalten und Informationen über unterschiedliche Speichersysteme (unter anderem die Cloud) verteilen können.

    • HPE Structured Data Manager (SDM) automatisiert das Information Lifecycle Management und die Optimierung strukturierter Daten, indem inaktive Daten von kostspieligen Tier 1-Produktionssystemen und vorhandenen Datenbanken verlagert werden.
  • Phishing Awareness and Response: Can Technology Alone Make a Difference? Phishing Awareness and Response: Can Technology Alone Make a Difference? Jim Hansen, Chief Operating Officer, PhishMe Recorded: Sep 21 2016 63 mins
    Phishing has been well established as the top entry method for hackers trying to access corporate networks. Yet, in spite of record spending on security technology, data breach reports continue to highlight the substantial lag between incident occurrence and detection.
    That technology- those investments are failing while organizations continue to neglect their final and best line of defense – their employees. Employees hold the key to fortifying the last line of defense and providing IT and Security teams with critical real-time attack intelligence.
    In this presentation, PhishMe’s COO, Jim Hansen, will draw on his 25 years in law enforcement and IT security to discuss:
    •The current state of phishing
    •The success and failure of technology systems and how human systems can protect the last mile
    •How conditioning – not training - activates employees to identify and report phishing attacks
    •The critical attack intelligence generated from employees and how it can be used to detect attacks-in progress and aid phishing incident response

    Join PhishMe and (ISC)² on Sept 21 (Wed) at 2:00p.m. (Singapore time) for a security briefing on phishing awareness and response.

    Presenter: Jim Hansen, Chief Operating Officer, PhishMe
    Bios:
    Jim has over twenty-two years’ experience in sales, operations and
    executive management in the information security industry,
    including co-founding and serving as COO of Mandiant. He has also
    held numerous executive and management positions in both sales
    and consulting organizations, and regularly speaks and publishes
    articles on information security topics.
  • Trends in Software-Defined Networking Trends in Software-Defined Networking Dan Conde, Analyst, ESG Recorded: Sep 20 2016 61 mins
    Join Enterprise Strategy Group in this all-about-SDN webinar. We'll explore the trends in Software-Defined Networking: how it has evolved from data center uses to support WAN use-cases, support for security, new programming models such as containers, and more. We will examine how it offers different models to support traditional networking professionals, DevOps users, and how Layer-2 based software-defined networks differ from pure Layer-3 based systems.

    Save your seat today!
  • Open Architecture for Branch Services in the Cloud and on Premises Open Architecture for Branch Services in the Cloud and on Premises George Hamilton, RIFT.io; Noel Charath, RIFT.io; Lakshmi Sharma, Sr. Director of Product Management Sep 27 2016 4:00 pm UTC 60 mins
    Join this webcast to learn how to seamlessly deploy and orchestrate virtual network functions and services for the branch as both cloud-based and on-premises solutions. You’ll discover how easy it is to operationalize new service offerings and create a path to cost savings, rapid service monetization, and competitive differentiation.

    RIFT.io and Brocade have collaborated to integrate the Brocade Vyatta Network Operating System, deployed as a Virtual Network Function (VNF) Platform, with RIFT.ware’s network service orchestration capabilities (NFV-O). This combination creates an on-premises branch services solution (vCPE) and cloud-based service.
    The webcast will discuss best practices and feature a demo that will show:
    • How Brocade and RIFT.ware jointly deliver a robust and scalable solution for operators to deploy virtualized network services for vCPE in the cloud and customer premises.
    • How RIFT.ware and Brocade work together to deploy Vyatta Network OS as a VNF and VNF platform.
    • Details on why an open architecture approach to interfaces is critical to ensure interoperability and rapid operationalization of services.
  • Modern Cookbook Design Modern Cookbook Design Kevin Dickerson, Loom Sep 27 2016 5:00 pm UTC 60 mins
    If you’re a typical Chef user, you learned cookbook design by writing recipes and then tuning functionality with node attributes—and you probably didn’t focus too much on the underlying Ruby concepts. This approach can lead to messy designs that are more difficult to verify and maintain.

    Chef’s fundamental building blocks are resources, not recipes. In this webinar, Kevin Dickerson of Loom (a Chef Certified Partner), will demonstrate a resource-centric approach to designing and verifying cookbooks that can reduce defects, increase clarity, and provide greater isolation of logic and various configuration concerns.

    Kevin will show you how to create and use resources and resource properties instead of emulating resources with recipes. He’ll also teach you how to verify cookbooks, and how verification is simplified when a resource is only concerned with the conditions that affect its behavior.

    You’ll also be introduced to some Ruby concepts that don’t seem to get a lot of attention—after all, Chef cookbooks are written in Ruby.
  • Top 3 Critical Factors to Consider for Network Protection Top 3 Critical Factors to Consider for Network Protection Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint Sep 28 2016 5:00 am UTC 60 mins
    Next Generation Firewalls are Next Generation Firewalls…or maybe NOT.

    In the light of new advanced attacks and the demands to lower security infrastructure costs, just how can one get the most out of the Next Generation Firewall (NGFW) solutions? Are all NGFW solutions the same?

    What criteria should one consider for a NGFW solution that is best for your distributed enterprise environment? Join Forcepoint™’s Michael Ferguson and find out key value points when selecting a network security solution catered to your environment:

    • Latest trends in NGFW
    • Addressing total cost of ownership
    • Security effectiveness in increasingly complex threat landscape
    • Challenges in policy management

    Also, find out why Forcepoint Stonesoft NGFW has won NSS Labs' coveted highest rating of “Recommended” for the 4th year in a row. Learn how it can provide the scalability, protection and visibility needed to effectively manage your distributed networks. Plus, rapidly and easily deploy, monitor and manage thousands of firewalls from a single pane of glass.
  • State of the Hack: Nordics State of the Hack: Nordics Jens Monrad, Senior Intelligence Account Analyst, FireEye iSIGHT Intelligence Sep 28 2016 12:00 pm UTC 45 mins
    The cyber threat landscape has never been more dynamic, than what we are seeing today. With an expanding surface area for attacks and a cybercriminal ecosystem worth billion of dollars on a global scale, cybercriminals are constantly pursuing new methods to obtain financial funds.

    It is no different in the Nordics – a region that is well known for its natural resources, innovations in renewable energy and healthcare, proximity to the Arctic, and emphasis on transparency in government is also a prime target for cybercriminals. These unique attributes make the region a prime target for cyber threat groups looking to capitalize on Nordic countries’ robust economies and distinct geopolitical concerns.

    Join Jens Monrad, Senior Intelligence Account Analyst at FireEye, who will discuss:

    * The Threat Landscape in the Nordics
    * Trends and Insights in Malware detections across the Nordics
    * Geopolitical situations which can influence the threat landscape in the Nordics
    * How having accurate and enriched threat intelligence can enable organisations to make tactical, operation and strategic decisions.

    Register today and learn what tools, processes and information organisations need in order to allow them to fully reconstruct the attack scenario and help make the right decisions based on the attack, as well as prepare for the next one.
  • Practical Steps to Data Centre Migration Planning and Execution Practical Steps to Data Centre Migration Planning and Execution Simon Allen, Mike Dorfler, David Cuthbertson, Sep 28 2016 12:00 pm UTC 45 mins
    This webinar is being delivered in conjunction with the UKDCIG, PTS Consulting and Square Mile Systems.
    Migrating data centres or moving to co-location is complex and subject to cost overruns, especially where existing infrastructure documentation is of questionable quality. We'll show how the use of database driven toolsets can help automate the project processes and avoid many of the typical problems that organisations with overstretched teams encounter.
  • Software-Defined WAN:  A Disruptive Intersection Software-Defined WAN: A Disruptive Intersection Rory Browne, Network Architect, Network Platforms Group, Intel Corporation Sep 28 2016 3:00 pm UTC 60 mins
    Today, Communications service providers face real challenges in terms of their ability to innovate and deliver new services with greater speed and agility and at lower costs. Software-Defined WAN (SD-WAN) is fast becoming a disruptive intersection of cloud, telco and enterprise. SD-WAN offers an alternative to delivering managed services with centralized configuration, management, and optimization of Enterprise applications across the WAN. According to IDC, SD-WAN is projected to be a $6B market by 2020, with an estimated compound annual growth rate of 100 percent.

    In this webinar, viewers will learn about the technologies that enable SD-WAN and the value proposition for enterprises and communications service providers. They’ll also hear about specific deployment options where SD-WAN delivers benefits over traditional methods.
  • Contact center compliance and call recording assurance (APAC Timezone) Contact center compliance and call recording assurance (APAC Timezone) Travis Polland Senior Product Manager IR Sep 29 2016 4:00 am UTC 60 mins
    In the wake the new US financial regulation such as the "Dodd-Frank" Wall Street Reform and Consumer Protection Act, many banks in the US, Europe and Asia have been looking at how best to monitor and control the activities of their traders and contact centers.

    The cost of compliance can considerable, however, the risks associated with non-compliance can result in even more substantial costs to the business.

    Hear emerging trends in compliance for contact centres and traders.
  • Operations through a business lens - Webinar 2: Live-Demo Operations through a business lens - Webinar 2: Live-Demo Matthias Precht, Presales Consultant, HPE Sep 29 2016 7:00 am UTC 60 mins
    IT-Betriebskosten senken, Prozesse automatisieren, agil sein und immer mehr mit denselben oder weniger Ressourcen stemmen – das sind die bekannten Herausforderungen für die IT und die Treiber für innovative Virtualisierungs- und Cloud-Technologien.

    Diese Technologien helfen, die IT zu einem strategischen Partner für das Business zu machen. Wenn man in der Lage ist, auch klar die Wirkung der IT auf das Business darzustellen.

    Dafür müssen Sie den Zustand Ihrer IT-Services in Echtzeit aus Endbenutzersicht erfassen und analysieren sowie gemäß den Business-Anforderungen jederzeit anpassen können. Sie müssen in der Lage sein, den Fachbereichsverantwortlichen auf Knopfdruck und proaktiv vollständige Transparenz bereitstellen zu können. Ihr ultimatives Ziel sollte es sein, den IT-Betrieb aus der Business-Perspektive heraus zu betreiben. Damit Sie tatsächlich der strategische Partner für Ihr Unternehmen sind.

    Wie Sie genau das erreichen können, erfahren Sie in unseren kostenfreien Webinaren „Operations through a business lens“.

    Webinar 2: Live-Demo HPE Operations Bridge
    In diesem Webinar zeigen wir Ihnen, wie eine Verknüpfung von Event und Incident Management Prozessen mittels automatisierten Workflows die Zeit zwischen Erkennen und Beheben eines Fehlers drastisch reduzieren kann. Sehen Sie das Zusammenspiel von HPE Operations Manager i, HPE Service Manager und HPE Operations Orchestration in einer Live-Demo.
  • Contact center compliance and call recording assurance (EMEA Timezone) Contact center compliance and call recording assurance (EMEA Timezone) Travis Polland Senior Product Manager IR Sep 29 2016 10:00 am UTC 60 mins
    In the wake of financial regulation such as MiFID II or the "Dodd-Frank" Wall Street Reform and Consumer Protection Act, many banks and providers of independent financial advice in the US, Europe and Asia have been looking at how best to monitor and control the activities of their traders, wealth brokers and contact centers.

    The cost of compliance can considerable, however, the risks associated with non-compliance can result in even more substantial costs to the business.

    Hear emerging trends in compliance for contact centers and traders.
  • How to Avoid the Citrix Blame Game How to Avoid the Citrix Blame Game Peter Connolly, Systems Engineer at ExtraHop Sep 29 2016 1:00 pm UTC 45 mins
    When applications and desktops are delivered over Citrix, the Citrix administration team becomes the front-line for responding to complaints about slow performance. But more than 60 percent of the time, the root cause of the problem lies outside of the Citrix environment.

    In this webinar, you’ll learn how wire data analytics can enable Citrix administrators to not only see end-user experience for ICA sessions, but also dig into application and infrastructure performance to uncover the real reason for slowdowns.
  • Lightboard Series: Episode 3 - The Future of Business Now: Automation Lightboard Series: Episode 3 - The Future of Business Now: Automation Hadar Freehling, Staff Security Strategist, Networking & Security, VMware Sep 29 2016 3:00 pm UTC 30 mins
    Join NSX experts for a series of engaging videos and learn more about the use cases driving the adoption of network virtualization today. Through the use of a lightboard, we’ll illustrate the technology and business drivers around network virtualization with VMware NSX.

    The delivery of IT services and applications has historically been a slow, manual, error-prone process. In this session, discover:

    - How the VMware NSX network virtualization platform automates your networking and security operations, increasing the speed, agility, and consistency of your business, without compromising on security
    - With NSX and vRealize Automation, we’ll show you how to reduce manual operations of network and security services, making it is possible to deliver end-to-end services that include applications, VMs, networks, security policies and load balancers
    - We’ll also demonstrate an incident response scenario. In this, we’ll show you how security automation allows the shift away from a very manual ticket driven process to a faster and more efficient automated response

    Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.
  • 6 Basics of Successful AV Deployment with HDBaseT Over Category Cabling 6 Basics of Successful AV Deployment with HDBaseT Over Category Cabling Todd Harpel, Berk-Tek and Bill Lauby, Leviton Sep 29 2016 3:00 pm UTC 60 mins
    High Definition Video is prevalent in our everyday lives. From the board room to the classroom, the sports bar to the sports stadium, the demand for dynamic audio-visual content is rapidly increasing. Traditional methods of transporting content to displays are a thing of the past. This presentation explores technologies and methods for connecting A/V sources to HD displays using twisted pair cabling and provides guidance for successful deployment.

    By attending this presentation, you will learn:
    - Cabling system requirements needed to support a high density digital AV distribution environment
    - Alternative methods and equipment that can be used to extend the reach of an HDMI connection

    * One BICSI CEC will be provided after viewing this presentation up until April 15, 2017*
  • Service Assurance in 2020: Fully orchestrated assurance & a path to get there Service Assurance in 2020: Fully orchestrated assurance & a path to get there Marcus Friman, Netrounds; Kaela Loffler, Netrounds Sep 29 2016 3:00 pm UTC 45 mins
    Network functions virtualization (NFV) has promised us many things- lower capital and operational costs, increased interoperability with best of breed vendors, and at the same time decreased vendor lock-in, and lastly, but most importantly, faster time to revenue for new services with enhanced, agile service creation and platform awareness capabilities. But what exactly does a completely automated network with fully orchestrated assurance look like and what are the benefits that programmable service assurance solutions will bring you?

    This webinar will describe the challenges and limitations with test and assurance today and one suggested transformation route to achieving a fully programmable, actively assured network, allowing you to take advantage of the operational cost savings and the ability to deploy new services faster promised by NFV.
  • Network Performance Management for Cloud & Digital Operations Network Performance Management for Cloud & Digital Operations Jim Frey, Kentik VP Strategic Alliances Sep 29 2016 5:00 pm UTC 45 mins
    Traditional network performance management (NPM) was designed in the pre-cloud days of monolithic applications running in centralized data centers. But in the cloud and digital business era, applications are more distributed, and network traffic patterns are more complex and reliant on Internet transit. Cloud-friendly NPM for digital operations requires a different approach, one that can collect pervasive performance data from cloud environments, integrate unsummarized NetFlow and Internet path data, and offer Big Data insights to assure optimal user experience. Join this webinar to learn how to get this integrated insight for cloud and Internet-facing applications.
  • Sending Attackers Down the Rabbit Hole: Introducing vArmour DSS Deception Sending Attackers Down the Rabbit Hole: Introducing vArmour DSS Deception Jesse McKenna, Director of Product Management, Cyber Security Sep 29 2016 5:00 pm UTC 60 mins
    The use of deception technologies to level the playing field against attackers sounds like a pretty compelling proposition for security teams. So why has adoption been limited to only the largest enterprises? What can security teams expect when deploying deception? What are the risks and what can be done to address them?

    This presentation will provide attendees with an understanding of the challenges facing deception solutions to date, approaches for mitigating those challenges, and an introduction to vArmour’s deception solution: vArmour DSS Deception.
  • SOC Operations: Orchestrating for Optimization SOC Operations: Orchestrating for Optimization Victor Lee, CISSP, Intel Security; Mat Gangwer, Rook Security; Brandon Dunlap, Brightfly Sep 29 2016 5:00 pm UTC 75 mins
    As a wise person once said, a man with one watch knows what time it is, a man with two isn't so sure. Despite the myriad of tools at our disposal in the SOC, how do you accurately identify and triage security Events, escalate those that need it to the status of Incident, and mange them through remediation or response effectively? Join Intel and (ISC)2 on September 29, 2016 at 1:00PM Eastern as we bring a panel of SOC operational experts to discuss strategies and opportunities to orchestrate SOC operations for peak performance.
  • Data Center Agility with Software-defined Load Balancing and NFV Data Center Agility with Software-defined Load Balancing and NFV Guru Chahal – VP of Product Management, Avi Networks and Gunnar Anderson – Product Manager, Cisco CNSG Sep 29 2016 5:00 pm UTC 60 mins
    Load balancing and what load balancers can do are undergoing significant changes as enterprises seek to deploy cloud-native applications in data centers and public clouds. According to Gartner, “Application-centric personnel are driving a return to lightweight, disaggregated load balancers, creating challenges and opportunities for I&O leaders.”

    Simultaneously, Network Function Virtualization (NFV) is now reaching mainstream enterprises with the Cisco Cloud Services Platform (CSP) 2100. Avi Networks and Cisco CSP integrate to provide a turn-key solution for the rapid deployment of application services such as load balancing, analytics, and autoscaling on an elastic NFV platform, without requiring any additional expertise. The joint solution ensures that administrators can efficiently roll out elastic, high-performance, load balancing and application monitoring capabilities.

    Join Avi Networks and Cisco guest speaker, Gunnar Anderson to learn how enterprises now have an opportunity to take advantage of software-defined load balancing and NFV quickly and easily using:

    • Standard x86 servers
    • Virtualized/software-based functions
    • API-driven approach
    • Elastic scaling to millions of SSL TPS
  • Navigating the Threat Landscape: Developments in Cybercrime & How To Stay Ahead Navigating the Threat Landscape: Developments in Cybercrime & How To Stay Ahead Michael Mimoso, Editor-in-chief, Threatpost Sep 29 2016 6:00 pm UTC 45 mins
    In the 25 years since the first PC viruses appeared, how has the threat landscape changed?
    - What are the most vulnerable areas that cybercriminals look to exploit?

    Join us for our webinar to get the latest information you need to know about how cyberthreats are evolving. We'll cover the areas of cybercrime that are growing the fastest and how businesses can stay ahead of the threats that most affect their businesses.

    90% - Organizations who have experienced some form of external threat in the past 12 months.

    We'll cover everything from the rise of ransomware to the greatest mobile security threats, as well as taking your questions on the topics you are most concerned about.
  • Hardware Load Balancers Don’t Cut It Any More – Why? What Should You Do? Hardware Load Balancers Don’t Cut It Any More – Why? What Should You Do? Ashish Shah, Director of Products, Avi Networks Oct 4 2016 3:00 pm UTC 60 mins
    Enterprises are increasingly focused on driving automation with the flexibility of private and public clouds and modern application architectures. Legacy application delivery controllers (ADCs) rely on proprietary appliances with custom ASICs to meet performance requirements driving up costs without addressing next generation computing needs. Significant performance improvements achieved on Intel architecture servers now enable industry leading ADC performance on standard bare-metal servers. It is time to rethink L4 – L7 services for today’s applications.

    In this webinar jointly presented by Intel and Avi Networks learn how with the right architecture, software-defined application services on standard Intel architectures deliver superior performance at the best price / performance ratio. Learn how you can finally go beyond table stakes load balancing and static hardware appliances to:

    - Use Webscale IT principles and software load balancers to achieve the best performance
    - Autoscale load balancers and applications on-demand with no manual intervention
    - Troubleshoot gnarly application issues within a minute
    - Take advantage of multi-cloud environments with central management
    - Eliminate overspending on ADCs and lower your TCO by more than 70%
  • Creating the next generation of DevOps Creating the next generation of DevOps Aaron Kalin, Caffeine Powered Server Fox, dnsimple.com Oct 4 2016 5:00 pm UTC 60 mins
    It can be difficult to hire people with the exact skills you want or need for your DevOps team. Just look at the job boards! There’s tons of competition and not nearly enough people to meet the demand. With a total size of 8 employees, DNSimple decided to take a different approach by starting an apprenticeship program to train people with little to no experience in DevOps.

    In this webinar, Aaron Kalin of DNSimple goes over the lessons learned in budgeting, hiring, and onboarding their first ever apprentice along with why and how you might want to start a similar program at your company. Aaron will conclude with an update of where their apprentice is now and answer any questions you might have.

    Join us to learn:

    - Ways to change your hiring practices to be more inclusive and increase diversity
    - How to go about starting an apprenticeship program at your company and who is currently running programs
    - The benefits of having a DevOps apprenticeship program at your company
  • The challenges of the Communication Service Providers at the age of OTT & cloud The challenges of the Communication Service Providers at the age of OTT & cloud lior barak Oct 5 2016 1:00 pm UTC 45 mins
    In this webinar we will discuss the challenges of Communication Service Providers (CSPs) in the age of Over the Top (OTT) and Cloud services and the potential solutions to address those challenges.
    We will explain in details how CSPs can address future trends such as growing demand for L3 and mixed of L2+L3 connectivity , and the loss of revenue, which forcing them to reduce OPEX and CAPEX.
  • Open Disaggregated Telco Cloud using OpenStack - Is it a Telco's Pipe dream? Open Disaggregated Telco Cloud using OpenStack - Is it a Telco's Pipe dream? Bala Pitchaikani, Telco Cloud Strategy, Mirantis; Deepak Rana, Network Systems Technology, Intel Oct 5 2016 4:00 pm UTC 60 mins
    You know the Telco technology landscape is changing, and you don't want to be left behind. So what do you do about it? In this webinar, we'll look at the realities of creating distributed Telco clouds, and what they mean to you today, and in the very near future. You will benefit from this webinar if you: (i) Hear some of these buzzwords: NFV, SDN, ETSI, OPNFV, OpenStack, MANO, Orchestrator, Distributed NFV, ODL, ONOS, CORD, VNF, NFVI, or VIM, (ii) Are puzzled by all the hype, considering the fact that production deployments by Telcos are few and far between, (iii) Wonder if (and how) a Carrier-Grade Cloud OpenStack Solution can be delivered, (iv) Want to know the best way to characterize and run workloads in a Telco Cloud, (v) Want to learn how to characterize, test and size a Telco Cloud using these new buzzwords
    [Note: This webinar goes deep into the technical underpinning of an end-to-end solution, so be ready to be drenched with lots of details in a short period of time. We will try to do follow-on single-subject sessions based on your feedback, so come prepared with your questions and suggestions.]
  • Cloud Management Platforms-The State of the Market in 2016 and Beyond Cloud Management Platforms-The State of the Market in 2016 and Beyond William Fellows, VP and cofounder of 451 Research, Mark Jamensky, EVP of Products at Embotics Oct 5 2016 5:00 pm UTC 60 mins
    Faced with growing pressure for faster provisioning times, easier-to-use platforms, and better visibility into digital and virtual assets, IT organizations are recognizing the value of incorporating a cloud management platform (CMP) into their broader cloud strategy.

    While there are clear benefits to implementing a CMP, it can be daunting to figure out which platform can properly manage your public, private, and hybrid resources. 451 Research data shows organizations will be using more than one cloud service which increases complexity with each additional cloud.

    Join William Fellows, VP and cofounder of 451 Research, along with guest speaker Mark Jamensky, EVP of Products at Embotics, as they dissect the key takeaways and findings of 451’s CMP market study of technology buyers at 166 US enterprise. This webinar will examine the growing need for a CMP in today's market, factors to consider when deciding to move to a CMP, and how to ensure successful deployment in your organization.
  • Cyber Readiness: Going Beyond “Awareness” and Building a Culture of Security Cyber Readiness: Going Beyond “Awareness” and Building a Culture of Security Kelley Bray, Employee Trust and CustomerONE at Symantec Oct 5 2016 5:00 pm UTC 60 mins
    Building a strong culture of security is the key to ensuring that your users care enough about the security of your company to protect it. Every day, in every interaction, we want our users to do the right thing when it comes to security.

    In this webinar we will discuss:

    - Symantec’s Employee Trust Program

    - How we go beyond basic security awareness training to continuously cultivate our security culture.
  • The All-Flash Storage Advantage: With Pure Storage CTO Aaron Skogsberg The All-Flash Storage Advantage: With Pure Storage CTO Aaron Skogsberg Aaron Skogsberg, CTO, Pure Storage, David Isaacs, Business Development Manager, Pure Storage Oct 6 2016 12:00 am UTC 45 mins
    Join this webinar to learn how operational simplicity, in-line data efficiency, and predictable performance through the use of flash enables your business to be more competitive in the market at the same cost as your traditional disk infrastructure.

    Topics covered include:

    - What is possible with flash?
    - What flash solutions are available today?
    - How do the costs compare?
    - Pure Storage architecture overview
    - Demonstration of storage provisioning tasks