Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Fortune 500 Best Practices for Cloud Migration, Secure Connectivity and DevOps
    Fortune 500 Best Practices for Cloud Migration, Secure Connectivity and DevOps Chris McDaniel, Senior Vice President and Chief Infrastructure Architect and Ajay Dankar, VP of Products Recorded: May 23 2017 60 mins
    Cloud migrations are happening everywhere but are ripe with project delays, complex and time-consuming hardware-based networking and a lack of cloud skills to make them really successful. Not to mention extending your cloud is just as challenging. What if you could set up and manage clouds in a few minutes and accelerate your cloud projects?

    Join the discussion where you will hear from one of the most foremost authorities on cloud, Chris McDaniel, SVP & Chief Infrastructure Architect at Integnology, who helps enterprises with their cloud strategy and migration path.

    In this webinar you will learn:

    - Best practices of Fortune 500 companies for cloud migration, operations and DevOps in the cloud

    - How to avoid the 3 most common pitfalls with cloud set up and ongoing cloud management

    - Why enterprises are choosing Aviatrix to connect their cloud in minutes, accelerating their migration, reducing costs and making everything dramatically more simple and secure
  • Spot & Patch Web App Bugs in One Click
    Spot & Patch Web App Bugs in One Click Vikas Phonsa, Product Management, Qualys WAF and Frank Catucci, Product Management, Qualys WAS Recorded: May 23 2017 60 mins
    Web application security is becoming increasingly complex due to the continuously evolving threat landscape, the diverse nature of web applications, and the broad range of systems needed to manage security.

    Qualys simplifies web app security with an end-to-end solution.

    During this webcast, presenters Vikas Phonsa and Frank Catucci will show you how you can:

    * Scan your apps using Qualys Web Application Scanning (WAS)
    * Deploy one-click virtual patches for detected vulnerabilities in Qualys Web Application Firewall (WAF)
    * Manage it all from a centralized, cloud-based portal

    This webcast will include a live Q&A session.
  • Tech Talk: Security and SD-WAN
    Tech Talk: Security and SD-WAN Derek Granath and Anusha Vaidyanathan Recorded: May 23 2017 60 mins
    The Internet is notoriously insecure – we hear about security breaches nearly every day. Discover the multiple security features of a Silver Peak SD-WAN, architected to ensure that all traffic moving across broadband Internet is highly protected. Got compliance requirements? Learn how micro-segmentation using business intent overlays helps organizations meet compliance mandates.
  • Trends & Key Considerations of Data Center Convergence with Terri McClure of ESG
    Trends & Key Considerations of Data Center Convergence with Terri McClure of ESG Terri McClure, Senior Analyst; Vaughn Stewart, VP of Product; Joel McKelvey, Infrastructure Solutions Recorded: May 23 2017 35 mins
    Convergence is a hot trend in today’s data center – with Converged Infrastructure (CI) and Hyper-Converged Infrastructure (HCI) playing a growing role in how IT departments are architecting for the future.

    In this session Senior Analyst at Enterprise Strategy Group, Terri McClure, will discuss her recent research in to CI and HCI offerings and why companies turn to convergence to improve infrastructure simplicity and reduce management overhead. Terri will be joined by Vaughn Stewart, VP and Enterprise Architect at Pure Storage to discuss how the latest generation of converged architectures are evolving as the underlying technologies become increasingly sophisticated. Terri and Vaughn will detail some key considerations for buyers who are considering CI or HCI solutions for their critical workloads.

    Terri McClure, Senior Analyst, ESG

    Vaughn Stewart, VP of Product, Pure Storage

    Joel McKelvey, Infrastructure Solutions, Pure Storage
  • The State of WAN Architecture in a Software-Defined World
    The State of WAN Architecture in a Software-Defined World Dr. Jim Metzler, Principal Analyst, Mike Wood, VP of Marketing Recorded: May 23 2017 57 mins
    Dr. Jim Metzler, Principal Analyst at Ashton, Metzler & Associates, presents a detailed analysis of network organizations’ level of satisfaction with current WAN architecture. Jim discusses the issues experienced with existing Wide Area Network (WAN) transmission services, the general interest in adopting a software-defined WAN (SD-WAN), as well as various related topics such as the differences between a DIY vs. a Managed Services approach.

    Join this webinar to learn more about:
    · Key customer use cases
    · Critical operational issues faced by enterprises
    · Setting up a project team to evaluate SD-WAN options
    · Managing existing WAN contracts
    · Building a business case for adopting a new WAN solution
  • Cut the Work From Your Workflow: An Analytics-First Approach + Machine Learning
    Cut the Work From Your Workflow: An Analytics-First Approach + Machine Learning ExtraHop Team Recorded: May 23 2017 55 mins
    The digital business is growing at a rate IT can’t match without over-worked staff and costly data storage. Over the next few years, more reliance on cloud hosting and software-defined networks will send your stress levels up and your IT visibility down… unless you take advantage of a smarter workflow designed to scale IT with real-time insight, on-prem and in the cloud.

    Backed by machine learning for “always-on” anomaly detection, the ExtraHop platform redefines analytics for a more productive—and proactive—you.
  • Extending Real-time Service Assurance with 360o Visibility to Telco Cloud
    Extending Real-time Service Assurance with 360o Visibility to Telco Cloud Anton Basil, Vice President – Technologyand Selvaraj Balasubramanian, Vice President – Products, Veryx Technnologies Recorded: May 23 2017 60 mins
    While network service providers are keen to adopt disruptive technologies such as network function virtualization (NFV) and software defined networking (SDN) to facilitate rapid deployment of new services at improved ROI, they know they cannot afford to sacrifice service performance. Concerns arise primarily due usage of commodity hardware which are not designed for supporting real-time applications. Thus, there is the need for tools and mechanisms that can measure network service performance in a calibrated fashion can accurately measure and help correlate the optimal performance of commodity hardware and related IT infrastructure needed to deploy the services. Service Providers armed with such tools can confidently deploy their services on NFV-based environments.

    Join this webinar to learn about:
    - Challenges faced by telecom service providers while deploying NFV-based services.
    - Understanding potential bottlenecks in NFV infrastructure.
    - How to diagnose the bottlenecks and overcome them.
    - How Veryx provides the needed capabilities for monitoring and visibility for delivering services using NFV infrastructure

    Who should attend?
    - Network Architecture teams and teams currently involved in proof-of-concepts of NFV-based architecture from Telecom Service Provider organizations.
    - Network engineering teams exploring service assurance and visibility tools.
    - Service activation teams and network operations teams involved in ensuring SLAs on NFV deployments.
    - Application providers and system integrators designing and deploying NFV ecosystem.
    - Engineering teams of equipment vendors who are developing network platforms supporting virtualization and third party virtual applications.
  • WannaCry Aftermath: Lessons Learned and What to Expect Next
    WannaCry Aftermath: Lessons Learned and What to Expect Next Tom Roeh, Systems Engineering Manager, Jeff Costlow, Director of Security, ExtraHop Networks Recorded: May 19 2017 49 mins
    What happens when cybercriminals get hold of exploits developed at the NSA? We found out earlier this month with the WannaCry ransomware attack, which quickly spread within organizations around the globe. In this webinar, we will discuss the weaknesses in existing IT defenses that WannaCry exposed, what the attack portends for the rest of 2017, and—most importantly—what IT organizations can do to defend themselves against increasingly potent threats.
  • Optimize Cloud and Traditional Data Center for Performance and Access
    Optimize Cloud and Traditional Data Center for Performance and Access Randy Hayes (Avere), David Belardo (Google Cloud), Scott Jeschonek (Avere) Recorded: May 19 2017 54 mins
    While cloud computing and storage are where IT is going, it is important to get the most value out of your existing data center assets. Seamless integration between these assets and cloud resources is key to optimizing each to match agency needs. But, how difficult is it to build a hybrid cloud architecture? How do you maximize performance while keeping security and cost in check?

    Ready to learn more? Please join Avere Systems, Google, and Carahsoft for a webcast as we explore how to approach integration between your existing architecture and Google Cloud Platform.

    Attendees of this webcast will learn:
    - Why and when to use Hybrid Cloud Architectures
    - Advantages of using Google Compute Engine and Google Cloud Storage services to government agencies
    - How to provide seamless integration between existing clients, network attached storage resources, and remote Google Cloud Platforms services
  • Tendances et chiffres sur les fuites d’information et les attaques Cyber en EMEA
    Tendances et chiffres sur les fuites d’information et les attaques Cyber en EMEA David Grout, Director, Southern Europe Systems Engineering, FireEye Recorded: May 19 2017 48 mins
    Rejoignez-nous pour un webinaire en live avec David Grout, Directeur Technique Europe du Sud, qui explorera les tendances qui définissent le paysage actuel des menaces en se basant sur les investigations des équipes Mandiant en 2016.
     
    Inscrivez-vous aujourd’hui pour découvrir :
     
    •Les nouvelles tendances d’hameçonnage
    •Les changements en termes de volume et de méthodologie
    •Les apports de la cyber veille et de l’intelligence sur les attaques émergentes
    •Les approches défensives pour mieux se protéger
    •Comment la GDPR impacte les sociétés en EMEA
    •Comment l’Europe se situe par rapport à l’Amérique du Nord et à l’Asie
     
    Inscrivez-vous!
  • Operational Technology & IoT Help Move Monitoring Closer to Users
    Operational Technology & IoT Help Move Monitoring Closer to Users Ryan D. Schmierer, Principal Consultant , RS Consulting NW Recorded: May 18 2017 48 mins
    IT organizations have struggled for years to move beyond monitoring of technology components and measure the performance of business processes, services and end user experiences. Operational Technology (OT) and the Internet of Things (IoT) provide a unique opportunity for service management professionals to embed sensors, collectors and instrumentation capabilities directly into the interactions between users and IT Systems. This webinar will provide an overview of the use of OT and IoT in the IT monitoring context, some management considerations and a look forward at how these capabilities are expected to evolve over the next 2-3 years.
  • A Step-By-Step Approach For Endpoint Detection & Response
    A Step-By-Step Approach For Endpoint Detection & Response Scott Hardie, System Engineer, Symantec Recorded: May 18 2017 31 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 5 of 5: A Step-By-Step Approach For Endpoint Detection & Response

    Endpoint Detection and Response (EDR) was developed as a way to address Advanced Persistent Threats (APTs). It is the sneakiness of APTs that make them so dangerous and so difficult to eradicate.

    Although it is generally accepted that EDR technology requires a unique agent, we’d like to ask “should it”?

    Join us to learn how Symantec Endpoint Protection 14 tackles EDR without an extra agent. Discover:

    •How EDR is used to improve security
    •Why integrations are important
    •Why Symantec Endpoint Protection and ATP beat the competition
    •Future plans EDR

    Finally, see a demo that showcases how quick and easy it is to identify and respond to threats with Symantec.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223

    • Symantec Endpoint Protection 14 Webinar Series: Part 3 of 5: Achieving Zero-Day Attacks and What To Do About It http://bit.ly/Part3Webinar0323

    • Symantec Endpoint Protection 14 Webinar Series: Part 4 of 5: Easy Ways To Improve Your Security Posture http://bit.ly/Part4Webinar0420
  • Centro de Datos. Agilidad y Control de TI
    Centro de Datos. Agilidad y Control de TI Roger Garcia Villajuana Gerente de Ventas SW Intel LAR Karen Cordóva Comercial Datavision Ricardo Bobadilla Ingeniería Recorded: May 18 2017 61 mins
    Una rápida evolución de la tecnología complica cada aspecto de la gestión del centro de datos y los modelos de cómputo basados en el servidor son demasiado complejos para las cargas de trabajo altamente variables de hoy en día.
    ¿Es posible optimizar recursos y operaciones en entornos dinámicos?
    En esta presentación, aprenda cómo reemplazar el aprovisionamiento y la gestión de aplicaciones manuales y definidas por hardware con un modelo de recursos y una capa de orquestación altamente automatizados y definidos por software que permiten flexibilidad, hacer más eficiente el uso de capital en un esquema bajo demanda y un menor TCO. Descubra cómo agrupar de manera más ágil los recursos de centro de datos, y a la vez, aumentar la eficiencia de TI, optimizar los requerimientos de energía, aumentar la flexibilidad del centro de datos y fortalecer los planes de recuperación de desastres.
  • Trends in Fintech Security - Mobile Payment Apps, Risks & Cybersecurity
    Trends in Fintech Security - Mobile Payment Apps, Risks & Cybersecurity Ted Eull (NowSecure), JP Bourget (Syncurity), RJ Gazarek (Thycotic), Jason Kent (AsTech) Recorded: May 18 2017 75 mins
    Fintech may still be in its early stages, but it's seen tremendous growth and is expected to see global investments exceed $150 billion in 2017. With the proliferation of mobile apps, cybersecurity is extremely important. Trust is a key difference maker for customers, so fintech companies need to ensure that their sensitive client information stays secure.

    Join this panel roundtable of cyber security experts as they discuss:
    - The top cyber threats financial institutions are facing
    - Ransomware, data loss & BCDR
    - Mobile banking apps and security vulnerabilities
    - Recommendations on improving security and establishing consumer trust

    Speakers:
    - JP Bourget, CSO of Syncurity
    - Ted Eull, VP Privacy and Risk at NowSecure
    - RJ Gazarek, Product Manager at Thycotic
    - Jason Kent, CTO of AsTech Consulting
  • What's New in OPNFV Danube?
    What's New in OPNFV Danube? Amar Kapadia, NFV Specialist at Mirantis and Serg Melikyan, Technical Customer Success Manager at Mirantis Recorded: May 18 2017 60 mins
    In March of this year, the OPNFV community will make generally available its 4th release, OPNFV Danube. As always, this version includes hundreds of new features and fixes, but what does that really mean to you?

    Our fast-paced, in-depth look at what's new in OpenStack Danube focuses on the major highlights of this release, but we'll also give you an idea of what's going on in the rest of the ecosystem -- now roughly 60 different projects -- so you'll know where to turn your attention next.

    In this webinar, you will learn:

    - How the OPNFV ecosystem has changed in the last year
    - What new scenarios are covered by Danube
    - What testing improvements will you find in Danube
    - What new features has Danube influenced in the constituent upstream projects
    - How can you get involved or take advantage of OPNFV Danube
  • 7 Qualities that are Revolutionizing CDN Origin Storage - EMEA
    7 Qualities that are Revolutionizing CDN Origin Storage - EMEA Charlie Russel, Sr. Product Marketing Manager & Kerrion Burton Evans, Solutions Engineer II Recorded: May 18 2017 47 mins
    Discover a hidden gem for your digital content delivery. If you’re using or considering a Content Delivery Network (CDN), you’ve probably heard of origin storage. But you may not know much about it.

    Done right, CDN origin storage doesn’t take a lot of your team’s time, dramatically improves user experience, and can even save you money.

    Done wrong, it can waste valuable resources, time, effort and money, only to deliver bad user experience -- and you might not even know it.

    Whether you’re delivering online video, files, websites, gaming or e-commerce, this webinar can provide valuable perspective and opportunities for improvement.

    We will explore:

    • What CDN origin storage is, and why you should care about it
    • 7 qualities that are revolutionizing CDN origin storage
    • Just released capabilities in Limelight Origin Storage that make it a game changer for your team, your audience and your bottom line

    Then we’ll open up the floor to an “Ask the Expert” session with Solutions Engineer Kerrion Burton Evans.

    Register now for this informative session and submit questions for Kerrion!
  • [Video Panel] Fighting Ransomware & Responding if the Worst Happens
    [Video Panel] Fighting Ransomware & Responding if the Worst Happens Josh Downs, BrightTALK; Adrian Taylor, FireEye; Ian Whiting, Titania & Bart Parys, PwC Recorded: May 18 2017 47 mins
    Ransomware was one of the biggest threats facing businesses in 2016 and that trend is expected to continue as we press further into 2017.

    As more and more cheap malware becomes available to cyber criminals the sheer amount of ransomware attacks is on the rise.

    However, cyber defences are beginning to catch up.

    This expert video panel will be discussing the ransomware landscape, what you can do to better protect your business from the threat and steps to take should the worst happen.

    Panelists:

    - Josh Downs, BrightTALK (moderator)

    - Adrian Taylor, Field CTO, FireEye

    - Ian Whiting, CEO, Titania

    - Bart Parys, Threat Intelligence Analyst, PwC
  • Securing FinTech through Deception 2.0 Technologies
    Securing FinTech through Deception 2.0 Technologies Chris Roberts, Chief Security Architect, Acalvio Recorded: May 17 2017 58 mins
    Why the same old things don’t work, and how to build in a strategic advantage that will provide early warning to security teams, while also deceiving and delaying attackers who have already penetrated existing defenses.

    About the Presenter:
    Regarded as one of the world’s foremost experts on counter threat intelligence within the cyber security industry, Chris Roberts is the chief security architect for Acalvio Technologies, helping to drive technology innovation and product leadership. Roberts directs a portfolio of services within Acalvio designed to improve the physical and digital security posture of both enterprise, industrial and government clients. In addition, Roberts works to shape the next generation of deception platforms and helps companies with their maturity modeling and overall security solutions.
  • Webinar: Data Center Design, Planning, and Upcoming Changes to the ANSI/TIA-942
    Webinar: Data Center Design, Planning, and Upcoming Changes to the ANSI/TIA-942 Jonathan Jew - J&M, Glenn Sexton - NIS, Limor Schafman - TIA Recorded: May 17 2017 82 mins
    Understanding the customers’ business model and reaching a healthy consensus between the push of technology (e.g., IoT and 5G) is required in data center design and planning to meet the demand for ubiquitous coverage and the demand of data anytime, anywhere. This presentation will provide an overview of data center design, the changes in the upcoming revision of ANSI/TIA-942 Telecommunications Infrastructure Standard for Data Centers, and review use cases in the implementation of ANSI/TIA-942.

    Speakers:
     Jonathan Jew, J&M Consultants
     Glenn Sexton, President and Principal Consultant, NIS

    1 BICSI CEC

    About TR-42 Telecommunications Cabling Systems Committee:
    The TR-42 Telecommunications Cabling Systems Committee develops and maintains voluntary telecommunications standards for telecommunications cabling infrastructure in user-owned buildings, such as commercial buildings, residential buildings, homes, data centers and industrial buildings. The generic cabling topologies, design, distances and outlet configurations as well as specifics for these locations are addressed.

    The ANSI/TIA-942 Telecommunications Infrastructure Standard for Data Centers is developed by the TR-42.1 Generic and Premises Cabling Subcommittee. TR-42.1 develops and maintains cabling standards for generic customer-owned telecommunications networks. These standards are intended to specify open systems designed to support a wide variety of voice, data, video, and other low voltage, power-limited applications. TR-42.1 also develops and maintains telecommunications cabling standards for premises networks such as commercial buildings, data centers, building automation, etc. This Subcommittee specifies cabling system topology, architecture, design, installation, testing and performance requirements. Go to https://www.tiaonline.org/all-standards/committees/tr-42 for further info.

    Participate in TR-42: Stephanie Montgomery: SMontgomery@TIAonline.org.
  • Protecting your Industrial Control System from Digital Threats
    Protecting your Industrial Control System from Digital Threats Speakers: Steve Hanna, Senior Principal, Infineon Technologies; Jeff Lund, Senior Director, Product Line Manageme Recorded: May 17 2017 61 mins
    Part of the Industrial Internet Consortium's Webinar Series on Securing the Industrial IoT, this session will feature Protecting Your Industrial Control System from Digital Threats.

    Industrial Control Systems are everywhere. They’re running power grids, regulating data center energy use in large buildings, or managing production processes in at your favorite snack food manufacturer. What makes Industrial Control Systems so important, yet so difficult to secure? Learn about types of security challenges that operators of industrial control systems face and the tools available to help alleviate risk.
  • The State of Tech M&A in China: Activity & Outlook
    The State of Tech M&A in China: Activity & Outlook Brenon Daly, Agatha Poon & Tim Miller Recorded: May 17 2017 61 mins
    A decade ago, tech deal flow barely trickled into and out of China. While M&A in the world’s second-largest economy is still relatively small, it has dramatically accelerated in recent years, with the overall number of tech transactions in China having doubled over the past half-decade to a record level in 2016. Spending on deals also surged to unprecedented levels last year. However, there are some concerns about whether the M&A boom will continue. China’s currency has weakened, economic growth has slowed and relations with its main tech partner – the US – have soured. Will M&A falter, too?

    Join 451 Research’s Brenon Daly, Research Director, Financials, Agatha Poon, Research Director of APAC Services, and Tim Miller, VP of Financial Markets for a 45-minute webinar on the state of M&A in China now, as well as the outlook for the coming years.
  • To SIEM or not to SIEM
    To SIEM or not to SIEM Sridhar Karnam, Director of Product Strategy; Stephen, host from SC Media Recorded: May 16 2017 36 mins
    Security information and event management (SIEM) has been a cornerstone of cybersecurity for years, but its future as a stand-alone product might well be in question. As advanced threat intelligence platforms, search engines, and other advanced tools come to market, we could be seeing a consolidation in how tools are packaged and marketed. This webcast will examine the following:

    - The motivations behind a security overhaul
    - SIEM as a core part of a SOC (security operations center)
    - Security without SIEM
    - Alerts versus actionable intel
    - The role of a SOC analyst
    - What makes up “a better SIEM?”
  • How to Deliver Optimized SD-WAN Segmentation for your Cloud Network
    How to Deliver Optimized SD-WAN Segmentation for your Cloud Network Fan Gu, Sr. Technical Marketing Manager, VeloCloud Recorded: May 16 2017 29 mins
    Network segmentation is essential when traffic from different customers and/or business entities must be isolated from each other. Full support for segmentation includes the isolation of management, control and data plane traffic.

    This webinar discusses:
    - Why Enterprise and Service Provider networks require segmentation
    - What is SD-WAN segmentation
    - How VeloCloud segmentation is implemented and optimized
  • Top Tips for Service Request Catalog Success
    Top Tips for Service Request Catalog Success Phyllis Drucker, Senior Consultant, Linium Recorded: May 16 2017 49 mins
    Many organizations struggle to release a service request catalog that gains adoption of the enterprise. It’s too technical, too difficult and fails to offer a modern Internet experience. In today’s world of empowerment Phyllis Drucker, author of “Service Management Online: Creating a Successful Service Request Catalog, provides practical tips to ensure your efforts deliver the “WOW!” your customers are seeking.