Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Broadly Adopted SD-WAN Use Cases of 2019
    Broadly Adopted SD-WAN Use Cases of 2019
    Yishay Yovel, Chief Marketing Officer at Cato Networks Recorded: Oct 23 2019 45 mins
    SD-WAN is all the rage in enterprise networking these days. IT teams are excited about the opportunities SD-WAN creates to transform their WAN to become simple and agile, while improving security, and reducing costs.

    As you review and look at your WAN challenges, we would like to share insights and takeaways, following hundreds of SD-WAN customer deployments worldwide, to better aid and inform your enterprise network decisions.
  • Cloud-Managed IT - Everything you always wanted to know
    Cloud-Managed IT - Everything you always wanted to know
    Amelie Sutsakhan, Product Marketing Manager, Cisco Meraki Recorded: Oct 23 2019 68 mins
    Join us for an introduction to Cisco Meraki and our cloud-managed IT products, including wireless APs, security appliances, switches, cameras, and EMM. You'll learn how cloud management offers greater reliability, easier management, and a lower TCO - and we'll show you a demo of the exciting features in the Cisco Meraki dashboard.
  • What Software Defined Storage Means for Storage Networking
    What Software Defined Storage Means for Storage Networking
    Ted Vojnovich, Lenovo; Fred Bower, Lenovo; Tim Lustig, Mellanox Recorded: Oct 22 2019 62 mins
    Software defined storage, or SDS, is growing in popularity in both cloud and enterprise accounts. But what makes it different from traditional storage arrays? Does it really save money? Is it more complicated to support? Is it more scalable or higher-performing? And does it have different networking requirements than traditional storage appliances?

    Watch this SNIA webcast to learn:
    •How software-defined storage differs from integrated storage appliances
    •Whether SDS supports block, file, object, or all three types of storage access
    •Potential issues or pitfalls with deploying SDS
    •How SDS affects storage networking
    •Scale-up vs. scale-out vs. hyperconverged vs. cloud
  • Part 1: Why State and Local Governments are Prime Targets for Ransomware
    Part 1: Why State and Local Governments are Prime Targets for Ransomware
    David Morris, Roy E. Hadley Jr., Reid Eastburn and Skeet Spillane Recorded: Oct 22 2019 61 mins
    This session will cover why State and Local Governments have headed the list of Ransomware Attacks. Part 1 will delve into why is this the case and Part 2 will address what can be done to prevent these attacks.
  • When to Leverage the Internet for SD-WAN
    When to Leverage the Internet for SD-WAN
    John DeBella, Director of Infrastructure Management at Teradyne, and Aryaka experts Recorded: Oct 22 2019 23 mins
    SPECIAL GUEST SPEAKER: John DeBella, Director of Infrastructure Management at Teradyne

    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    Global networking needs of enterprises have shifted dramatically. It is no longer just about having a static and eminently fair and stable network infrastructure of manually configured routers and deterministic - yet static - MPLS.

    The new digital enterprise model demands an underlying global network that is easy to consume, agile to react to business needs and simple to manage. Hence enterprises have turned to SD-WAN with alternative direct internet access (DIA) site-to-site connectivity that augments and replaces MPLS for business-critical applications.

    Join us as we discuss:

    >> How Teradyne leverages private and public internet connectivity to deliver an optimal application experience for all stakeholders

    >> New, recently-released built-in technologies that enable Ayaka to deliver on the needs of WAN transformation for digital enterprises

    >> What’s in it for network managers as they drive a Netops approach for their enterprises

    >> How to deliver on ‘internet-first’ approaches connectivity, tracking the ‘cloud-first’ approach for applications
  • ICE [Ep.6]: Setting Budgets, Finding Stakeholders for AI-Enabled DCX Projects
    ICE [Ep.6]: Setting Budgets, Finding Stakeholders for AI-Enabled DCX Projects
    Robin Gareiss, President and Founder, Nemertes Research Recorded: Oct 22 2019 56 mins
    Intelligent Customer Engagement Series [Ep.6]: Setting Budgets, Finding Stakeholders for AI-Enabled DCX Projects

    As IT and business leaders evaluate their how to use AI to improve customer experience, one of the biggest roadblocks is funding.

    This webinar provides step-by-step guidance on finding stakeholders to fund the projects, with specific data on how much companies are spending today on their AI-enabled initiatives.
  • The challenge of the Nth Party in 3rd party risk management
    The challenge of the Nth Party in 3rd party risk management
    Brad Keller, JD, CTPRP, CTPRA Chief Strategy Officer & Sr. Vice President Santa Fe Group Recorded: Oct 22 2019 57 mins
    n this BrightTALK, Brad will be discussing the ongoing and emerging risk challenges your 3rd party's 3rd parties can present, positive solutions and the future as he sees it.
  • The 2019 Dell Commercial Client Solutions Lineup
    The 2019 Dell Commercial Client Solutions Lineup
    Cameron Goedde - Client Solutions Field Marketing | Dell EMC Recorded: Oct 18 2019 42 mins
    Smarter & faster experiences are the driver behind Dell’s 2019 Client Solutions lineup. We have the broadest portfolio to meet all needs. From highly configurable fixed solutions – our OptiPlex desktops and AIOs and our Wyse Thin clients. To the smallest, lightest mobile solutions including Latitude and the XPS to specialty systems – our powerful Precision workstations, including towers, racks and mobile workstations and finally our Rugged devices. We also have a full portfolio of displays and accessories to help build your entire ecosystem.

    Presented by: Cameron Goedde - Client Solutions Field Marketing, Dell EMC
  • How to Transform Your Wide Area Network with SD-WAN
    How to Transform Your Wide Area Network with SD-WAN
    Shamus McGillicuddy, Research Director, EMA Recorded: Oct 17 2019 59 mins
    What are the considerations, trade-offs, and keys to maximizing the impact of your WAN transformation project?
  • Performance testing latest trends and success cases
    Performance testing latest trends and success cases
    Diego Lo Giudice, VP, Principal Analyst, Forrester | Jason Hatch, Senior Director, Akamai Recorded: Oct 17 2019 57 mins
    Businesses experience disengaging clients if their websites and mobile apps don’t respond in 2, 3 seconds. They lose revenue and get bad media coverage when customer experience breaks because of large scale unforeseen load and access from increased user traffic.

    Be it an online sale event, a new financial service offering or a new game launch, every organization has planned or unplanned real-life situations where the user traffic increases 2X, 3X compared to normal days.

    Pressure is on for app dev and infrastructure teams. As they transform to deliver better apps more frequently, their continuous delivery and Agile + DevOps journeys break too if end to end performance testing at scale is not done regularly to most closely replicate real world conditions and for peaks.

    In this session, guest speaker, Forrester VP and Principal Analyst Diego Lo Giudice and, Akamai Senior Director Jason Hatch will share latest performance testing trends on how successful organizations are delivering more frequently while meeting the new pressing requirements of large scale performance load, concurrency and speed.

    Join us on 17 Oct, 14:00 Singapore time to learn:

    • Application performance needs in the accelerated digital world
    • Continuous performance testing meets continuous delivery
    • Modern performance testing trends
    • How to be ready for the unexpected with 2X, 3X, 4X user traffic
  • National Cyber Security Awareness Month- Protect IT
    National Cyber Security Awareness Month- Protect IT
    Kevin Haley | Eva Velasquez | Ryan Lawless Recorded: Oct 16 2019 55 mins
    As we wrap up National Cyber Security Awareness month join Symantec and partners The Identity Theft Resource Center and Infolock for our final webinar. Whether you are connecting to networks or collecting customer/consumer data, protection is needed. This group of speakers will help familiarize you on how to check your systems and how to keep others’ data safe.

    Topics will include:

    - If You Connect, You Must Protect: updating to the latest security software, web browser and operating systems

    - Wi-Fi safety

    - If You Collect It, Protect It: keeping customer/consumer data and information safe

    Register Today
  • Why Rip and Replace Your VPN if You Don’t Need to?
    Why Rip and Replace Your VPN if You Don’t Need to?
    Richard Greenberg, CISSP, OWSAP Foundation; Eitan Bremler - Co-Founder & VP Technology Safe-T Recorded: Oct 16 2019 33 mins
    VPNs have been a cornerstone of secure networking for the last 20+ years. While VPNs have stood the test of time, today, we now know that a true security architecture is hinged upon the concept of Zero Trust Network Access.

    Most organizations have already poured a great deal of time and resources into building out their VPN infrastructure. Considering that the technology does exactly what it’s supposed to do, ripping and replacing it may not make much sense.

    What if we tell you that you don’t have to rip and replace your VPN in order to start your journey towards Zero Trust Network Access? Join us to this webinar to find out how.
  • Best Practices for Secured ICS Deployments
    Best Practices for Secured ICS Deployments
    Barak Perelman Recorded: Oct 16 2019 60 mins
    Manufacturing and critical infrastructure organizations require the right OT solution that can deliver visibility & security from emerging threats. But that is only half the battle. Each environment is a bit different and what may be appropriate for some, will simply not work for others. Whether you are big or small, distributed or centralized will determine the right deployment model for you. Join us as we discuss a variety of deployment best practices based on different organizational models, structures and goals. After all, it is about leveraging the right model for YOUR organization that will ultimately achieve a fully secured environment.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    K. Eric Gentry, Managing Principal, VTRAC Recorded: Oct 16 2019 79 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the social attacks and the current cybersecurity threat landscape.

    We’ll cover:
    •The most common social engineering attacks
    •New insights on phishing attacks
    •Top threat actors in social attacks

    Our Verizon Threat Research Advisory Center presenters will be:
    •K. Eric Gentry, Managing Principal, VTRAC
    •David Kennedy, Managing Principal, Open Source Intelligence

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • Top 10 Best Practices to Launch an SD-WAN uCPE with Special Guest Ekinops
    Top 10 Best Practices to Launch an SD-WAN uCPE with Special Guest Ekinops
    Marc Bouteyre, VNF Product Management at Ekinops & Kishan Ramaswamy, Product Management at VMware Recorded: Oct 16 2019 60 mins
    Telcos are facing multiple challenges in adopting the two main disruptive technologies that are NFV and SD-WAN. Some are inherent to their existing networks infrastructure but they also have to face the cost and complexity to integrate functions from different vendors while they need to achieve an economic model of virtualization. By integrating VMware SD-WAN as a virtual edge on Ekinops’ NFVi environment, Telcos get carrier grade quality of services on top of any combination of network underlay (LTE, MPLS, Broadband) and a robust and simple integration of those services on a branch form factor fully integrated into their back-office system (OSS/BSS).

    In this webinar, you will learn how the Ekinops and VMware integration:

    · Enables Telcos to simplify SD-WAN delivery
    · Speeds up their time to market (TTM)
    · Opens up a large market opportunity for deploying SD-WAN as a service
    . Allows customers to reap the benefits of SD-WAN and virtualization

    Don’t miss out: reserve your seat today!
  • DNS as a Foundational Security Architecture for Digital Transformations
    DNS as a Foundational Security Architecture for Digital Transformations
    Jerry Wong, Systems Engineer, Infoblox Recorded: Oct 16 2019 57 mins
    The perimeter has shifted. Your users directly access cloud applications from everywhere and data no longer reside only in data centers. Digital transformations like SD-WAN, IoT and cloud make securing your infrastructure, applications and data complicated. SD-WAN enabled branches directly connect to the Internet, but they don’t have the ability to replicate a full HQ security stack. IoT leads to an explosion of non-standard devices using non-standard protocols, making them harder to secure. Every new change doesn’t equal need for a new security tool.

    What’s needed is a scalable, simple, and integrated security solution that leverages existing infrastructure that organizations already own. DNS is critical to the fabric of the internet and any IP based communication (on-premises, cloud, SD-WAN and IoT environments). It serves as the perfect foundation for security because it is simple to deploy, ubiquitous in networks, is needed anyway for connectivity and can scale to the size of the Internet.

    Join Infoblox and (ISC)² on Oct 16, 2019 (Wed) at 14:00 (GMT +8) to learn how leveraging DNS as a foundational security architecture for digital transformations can:

    • Protect your brand by securing your traditional networks and transformations like SD-WAN, Cloud and IoT
    • Reduce time and cost of your enterprise threat defense
    • Automate response when it sees things happening and provide data to the rest of the ecosystem

    Presenter: Jerry Wong, Systems Engineer, Infoblox
    Moderator: Sam Goh, CISSP, GM for Korea and Japan, Ensign InfoSecurity
  • What Happens When Your Bank is Hacked?
    What Happens When Your Bank is Hacked?
    David Morris, Lance James, Steven Teppler, and Mark Rasch Recorded: Oct 15 2019 61 mins
    This session will delve into the legal responsibilities of your Bank's liability and your requirements to protect your banking credentials from the unauthorized transfer of funds as a result of a hack.
  • Cloud-Managed Smart Cameras - Everything You Need to Know
    Cloud-Managed Smart Cameras - Everything You Need to Know
    Saralyn Dasig | Product Marketing Manager, MV Smart Cameras Recorded: Oct 15 2019 45 mins
    MV security cameras leverage advances in solid state memory technology and Meraki expertise in cloud management. By removing the need for additional on premise hardware and standalone software packages, like the network video recorder (NVR) and video management software (VMS), Meraki MV streamlines and simplifies purchasing, deployment, and monitoring of video security systems. Join us on a live webinar to learn more!
  • Live Interview with Graeme Payne, former VP and CIO of Equifax
    Live Interview with Graeme Payne, former VP and CIO of Equifax
    David Morris, Graeme Payne and Reid Eastburn Recorded: Oct 14 2019 61 mins
    Tune in for this live interview with Graeme Payne, former VP and CIO for Global Corporate Platforms at Equifax. This session will give you first hand insights into what happened at Equifax, and lessons learned.
  • Understanding Agent vs. Agentless backups to better protect your VM’s with the b
    Understanding Agent vs. Agentless backups to better protect your VM’s with the b
    Jaap Van Kleef, EMEA Technical Manager Recorded: Oct 17 2019 49 mins
    Companies of all size are running heterogeneous environments, with physical and virtual servers. As a result, every so often, IT professionals hesitate between deploying agent-based or agentless backup solutions. There is no right or wrong answer; it all depends on your requirements and objectives.

    Join our StorageCraft expert, Jaap van Kleef, and learn how you can best protect your VMs and physical machines and keep the business running at all times!
  • Top 3 Ways to Maximize Network Performance and Reduce Help Desk Tickets
    Top 3 Ways to Maximize Network Performance and Reduce Help Desk Tickets
    Cherie Martin - Product Marketing, Aruba Recorded: Oct 10 2019 53 mins
    Join us October 10th at 10am PDT as we discuss how to:
    •Consistently deliver high-quality network and application services
    •Reduce help desk tickets
    •Identify and resolve issues before they affect your users

    This webinar also includes a live demo of Aruba Central, our cloud managed networking solution.

    Attend and you may qualify for a free Aruba Instant Access Point and a 90-day trial of Aruba Central.
  • Nice to Have or Have to Have? The Case for Cyber Insurance
    Nice to Have or Have to Have? The Case for Cyber Insurance
    John Smith, Prin. Sec. Engr, ExtraHop; Sean Scranton, RLI Cyber; William Boeck, Lockton; Brandon Dunlap, Moderator Recorded: Oct 10 2019 59 mins
    More and more companies are offering cyber insurance policies to help mitigate the financial losses an organization might suffer from a cyber incident. With the increase in breaches, intrusions and ransomware incidents, cyber insurance could be right for your organization as a part of the risk mitigation strategy. But there’s a lot of confusion for organizations in determining what a company’s exposure is and what exceptions and exclusions might be in a policy. Organizations are almost forced to think like an underwriter to address these concerns. Join ExtraHop and (ISC)2 October 10, 2019 at 1PM Eastern for a discussion on cyber insurance, demystifying the current insurance landscape and what are the right questions to answer.
  • CCS [Ep.5]: Application Security Meets Multicloud
    CCS [Ep.5]: Application Security Meets Multicloud
    John Burke, CIO and Principal Research Analyst, Nemertes Research Oct 23 2019 5:00 pm UTC 60 mins
    Cloud and Cybersecurity Series [Ep.5]: Application Security Meets Multicloud

    Enterprises are developing and buying applications to run everywhere: across multiple clouds, multiple data centers, desktops, mobile devices, and IoT devices. In a multicloud environment, IT needs to take a multipronged approach to securing applications.

    We'll how organizations approach securing their applications for the multicloud, ranging from changes in the development process to the embrace of security technologies including IAMaaS, microservice authentication, and enterprise secure cloud access and policy enforcement (ESCAPE).

    This webinar presents data from Nemertes' in-depth research study of 335 organizations in 11 countries across a range of vertical industries.
  • Experience-based networks, a new model for virtual networking
    Experience-based networks, a new model for virtual networking
    Dr. Ritesh Mukherjee, Vice President of Product Management at 128 Technology with Dino Farinacci and Shawn Zandi Oct 23 2019 5:00 pm UTC 60 mins
    The imminent advent of 5G, virtual reality (VR), connected cars, Internet of Things (IoT), and smart devices has moved us into the Experience Age. Consumers are now more informed and discriminating than ever before. Network deployments must mirror the adaptive and connected qualities of end users to succeed. In this webinar/panel discussion we will get perspective from network industry stalwarts on what features and functions networks must possess to create and deliver exceptional user experiences. It is time to reinvent the digital future to deliver exceptional user experiences.
  • Deutsch - Einführung in Cloud Managed IT
    Deutsch - Einführung in Cloud Managed IT
    Joel Vilaca | Cisco Meraki Oct 24 2019 9:00 am UTC 53 mins
    Nehmen Sie Teil an einer Einführung in Meraki und in unsere Cloud Managed IT Produkte. Die Einführung beinhaltet eine Vorstellung unserer Wireless-Access Points, Security Devices und Features, Switches, Mobile Device Management und Überwachungskameras.

    Sie erfahren, wie unsere Produkte Ihr Netzwerk verlässlicher machen, das Netzwerkmanagement dramatisch vereinfacht und Ihre TCO- Kosten gesenkt werden.
  • Single and cohesive view into your healthcare IT environment
    Single and cohesive view into your healthcare IT environment
    Chuck Petrie & Peter Haagenson Nov 21 2019 4:00 pm UTC 60 mins
    Join Blue Medora experts, Chuck Petrie & Peter Haagenson, as they discuss the benefits of building a single view for end-to-end monitoring of your healthcare environment. Learn how monitoring Epic alongside the rest of your IT environment can increase reliability, improve productivity and lower cost of ownership.
  • Deception Imperatives and Vendor Comparison Spotlight
    Deception Imperatives and Vendor Comparison Spotlight
    Jim Hurley, CEO of Wellington Research, and Carolyn Crandall, Chief Deception Officer and CMO at Attivo Networks Oct 24 2019 5:00 pm UTC 60 mins
    In this session, industry veteran Jim Hurley, the CEO of Wellington Research and Cyber Source Data, will cover primary research results on cyber effectiveness and how it is influenced by detection and incident response. Additionally, attendees will gain insights into the latest Wellington Research Market Spotlight covering the vendors and market for deception. The primary research includes:

    • Data loss rates and time to detection
    • Data loss rates and time to respond
    • Current market positions of deception vendors and what these mean
    • Market cycle and value for deception technologies
    • Guidance for sourcing deception vendors

    Join in for an insightful and objective look at why Cyber Deception is now a critical security control for organizations small and large.
  • Airheads Tech Talks: SD-WAN-Routing(Underlay and Overlay) and PBR Enhancement
    Airheads Tech Talks: SD-WAN-Routing(Underlay and Overlay) and PBR Enhancement
    Karthikeyan Mookkandi, Aruba TAC Oct 29 2019 10:00 am UTC 90 mins
    Aruba’s SD-Branch solution leverages WAN services that interconnect hub and spoke sites to establish VPN tunnels which encapsulate and forward corporate traffic. Each WAN service is referred to as the underlying network while the VPN tunnels form the overlay network.

    Reachability and forwarding through the underlay and overlay networks is achieved using IP routing on gateways. The VPNCs and BGWs each implement their own routing tables to determine the next-hop for each IP packet on its way to the desired destination. The routing tables on the BGWs consist of default gateways and static routes while the routing tables on VPNCs consist of default gateways, static, IKEv2, and OSPF routes

    Agenda:

    1. Introduction to underlay and overlay routing.
    2. Configuration of Overlay routing.
    3. What is PBR.
    4. Traffic using with PBR/DPS
    5. Configuration and troubleshooting.
  • Enhancing Subscriber QoE with Network Policy Automation and Machine Learning
    Enhancing Subscriber QoE with Network Policy Automation and Machine Learning
    Kamakshi Sridhar, PhD & Nicolas St-Pierre from Sandvine Oct 29 2019 3:00 pm UTC 60 mins
    Learn how Sandvine leverages network policy automation and machine learning to enhance subscriber QoE (Quality of Experience) via dynamic bandwidth allocation across service categories, in near-real time, by analyzing operator-expressed ‘intent’.
  • Part 2: What can State and Local Governments do to Prevent Ransomware?
    Part 2: What can State and Local Governments do to Prevent Ransomware?
    David Morris, Reid Eastburn and Skeet Spillane Oct 29 2019 5:00 pm UTC 60 mins
    This session will be a short recap of Session 1 and will then go into detail as to what State and Local Governments can do to prevent Ransomware Attacks.
  • 5 MPLS Migration Challenges SD-WAN Solves
    5 MPLS Migration Challenges SD-WAN Solves
    Yishay Yovel, Chief Marketing Officer at Cato Networks Oct 30 2019 3:00 pm UTC 52 mins
    It’s no secret that enterprises are looking beyond MPLS for their new WANs. For some, it’s the rigidity and high costs of MPLS services; for others, it’s MPLS’s complexity and incompatibility with the cloud. But how exactly will migrating to SD-WAN help you overcome MPLS’s limitations?

    Find out on our next webinar, as Yishay Yovel, Chief Marketing Officer at Cato Networks shares the stories of businesses from around the globe who made the transition to SD-WAN.

    Join us to hear:

    - How DSM Pharmaceuticals and Fisher & Company solve global latency issues without paying through the nose.
    - The ways UMHS and Pet Lovers Center, with its 100+ site Cato implementation, deliver direct, secure Internet access without deploying a heap of branch office security appliances.
    - What Brady PLC and Adroll did to optimize cloud access at the branch and on the road.
    - How companies reduce costs and optimize global voice and UCaaS delivery without relinquishing the control of MPLS.
  • How to get your DevNet Certification for Data Center Automation
    How to get your DevNet Certification for Data Center Automation
    John McDonough, Developer Advocate, Cisco DevNet Oct 31 2019 3:00 pm UTC 38 mins
    This webinar will help you start your journey towards Cisco Certified DevNet Specialist in Data Center Automation and Programmability. The webinar takes you on a tour of developer.cisco.com with respect to Data Center Automation and Programmability. You will gain an understating of the technologies tested and the respective weighted percentages of those technologies on the certification exam. You will see how DevNet has aligned the DevNet resources to each section of the certification exam.
  • CCS [Ep.6]: Next-Generation Cybersecurity - Policy Process and Organization
    CCS [Ep.6]: Next-Generation Cybersecurity - Policy Process and Organization
    Johna Till Johnson, CEO and Founder, Nemertes Research Oct 31 2019 3:00 pm UTC 60 mins
    Cloud and Cybersecurity Series [Ep.6]: Next-Generation Cybersecurity: Policy Process and Organization

    Resources are finite. So deploying them wisely is what differentiates successful cybersecurity organizations from those that are less successful. Find out how these successful cybersecurity organizations are structured, what policies they have in place, and what strategies they do—and don’t—follow to protect their enterprise organizations.
  • Understanding Fibre Channel Scaling
    Understanding Fibre Channel Scaling
    Mark Rogov, Dell EMC; Brandon Hoff, Broadcom; J Metz, Cisco Nov 6 2019 6:00 pm UTC 75 mins
    One of Fibre Channel’s greatest strengths is its ability to scale to thousands and thousands of nodes, while providing predictable performance. So, when we say that Fibre Channel has unmatched scalability, what does that actually mean? And how does it work?

    We often hear about “designed from the ground up,” but in this case it’s actually true. From each individual link, to the overall domain architecture, each step along the way is intended to be approached in a scalable fashion.

    In this webinar, we’ll be breaking down the pieces of the puzzle that help give Fibre Channel its robustness when you’re working at fabrics even greater than 10,000 nodes. We’ll be talking about:

    •What a deterministic storage network is
    •Fabric management principles
    •Negotiated credit transfers (buffer-to-buffer credits)
    •Network Engineering/Design Principles
    •Oversubscription and Fan-In Ratios
    •Topologies that help scale
    •Domains and Fabric limits
    •Consistency of performance at scale

    Along the way, we’ll be talking about some of the ways that Fibre Channel differs from other popular storage networks as they approach large-scale environments, and how it handles issues that arise in such cases.

    Please join us on November 6th at 10:00 am PT/1:00 pm ET for another educational webinar on Fibre Channel!
  • Network Automation with pyATS, Genie and Cisco DNA Center
    Network Automation with pyATS, Genie and Cisco DNA Center
    Siming Yuan, Technical Leader Engineering, Cisco Systems Nov 7 2019 4:00 pm UTC 30 mins
    Cisco DNA Center brings about a new way to manage and visualize your enterprise network. But above and beyond the UI, AI and ML, how do you integrate it into your NetDevOps cycle, and ensure your network is well-validated end-to-end? In this webinar, we’ll demonstrate how to integrate Cisco DNA Center REST APIs with pyATS | Genie, take configuration and operation snapshots, diff them programmatically, and track any changes over time.
  • How Artificial Intelligence is Powering Business & Digital Transformation
    How Artificial Intelligence is Powering Business & Digital Transformation
    Ken LeTourneau, Intel Corporation | Matt Johns, CoreSite | Jaime Schmidtke, Microsoft Azure | Arun Trivedi, Wipro Technology Nov 7 2019 6:00 pm UTC 60 mins
    Cloud plays a crucial role in enhancing the power of AI-driven applications. These technologies are allowing organizations to process structured and unstructured data like never before.

    Tune into this live panel discussion with experts in Cloud, AI, Machine Learning and Big Data as they discuss:
    - The importance of APIs and machine learning
    - Best practices for preparing your cloud infrastructure for AI
    - How big data driven from IoT will benefit from the application of AI and ML technologies

    Speakers:
    Ken LeTourneau, Solutions Architect, Intel Corporation (Moderator)
    Matt Johns, VP of Enterprise Sales, CoreSite
    Jaime Schmidtke, Cloud Networking Specialist, Microsoft Azure
    Arun Trivedi, Partner, Wipro Technology
  • Ask the Expert: Matt Johns, VP of Enterprise Sales, CoreSite
    Ask the Expert: Matt Johns, VP of Enterprise Sales, CoreSite
    Matt Johns, VP of Enterprise Sales, CoreSite Nov 7 2019 7:30 pm UTC 30 mins
    A 1-on-1, 25-minute interview with an expert discussing in-depth insights from the conference and answering questions from the live online audience. Questions are determined ahead of time and only requires experts to show up and share their knowledge.
  • 4G and 5G virtual RAN, from LAN to WAN
    4G and 5G virtual RAN, from LAN to WAN
    Eran Bello, GM at ASOCS Inc. Nov 19 2019 4:00 pm UTC 60 mins
    In this webinar ASOCS will present the benefits of full RAN virtualization in both 4G and 5G networks. Leveraging modern open interfaces such as the ORAN Ethernet Fronthaul and open management interfaces will allow network orchestration and automation for use cases spanning from local area network (LAN) to wide area network (WAN).
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Adam Harrison, Cryptocurrency Nov 20 2019 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Adam Harrison, Principal Consultant, PS Advisory Services
    •David Kennedy, Managing Principal, Open Source Intelligence

    This month's theme: Cryptocurrency

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Airheads Tech Talks: SD-WAN-MicroBranch(IAP-VPN)
    Airheads Tech Talks: SD-WAN-MicroBranch(IAP-VPN)
    Ramkumar Radhakrishnan, Aruba TAC Nov 26 2019 10:00 am UTC 90 mins
    The Aruba SD-Branch solution provides a complete suite of solutions for all the needs in a distributed enterprise. This also includes the support for micro-branches (SOHO), where the branch network could be built just using IAPs and switches. This helps in VPN connectivity to access corporate resources to the larger branches, that may need redundant gateways as well as the complete cloud-managed LAN/WLAN.

    Agenda:

    1. Introduction
    2. Supported topologies
    3. Modes of operation
    4. Configuration
    5. Integration with Clearpass
    6. Troubleshooting"
  • Airheads Tech Talks: SD-WAN-Branch Security and Zscaler
    Airheads Tech Talks: SD-WAN-Branch Security and Zscaler
    Abdul Ali Irfaan, Aruba TAC Dec 17 2019 10:00 am UTC 90 mins
    Security is an integral part of the Aruba SD-Branch solution. The security of the Aruba SD-Branch solution is built in layers, from the hardening of the operating system to the integration with best-of-breed security partners like Zscaler.
    With these integrations, the Aruba SD-Branch architecture seeks to offer enterprise-grade advanced threat protection in a scalable manner. The integration with Zscaler’s Security as a Service offering provides an extremely simple and scalable solution for advanced threat protection in branch networks.

    Agenda:

    1. Feature Description
    2. Pre-requisites
    3. Configuring Aruba Branch Gateway
    4. Configuring Next-Hop List
    5. Add Next-Hop List to Routing Policy
    6. Add Routing Policy to User-Role
    7. Debugging
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Eric K. Gentry, Principal Consultant, PS Advisory Services Dec 18 2019 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Eric K. Gentry, Principal Consultant, PS Advisory Services
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Live Interview with Reid Eastburn
    Live Interview with Reid Eastburn
    David Morris and Reid Eastburn Dec 25 2019 5:00 pm UTC 90 mins
    Tune in for this live interview with Reid Eastburn
  • Proactive Threat Hunting
    Proactive Threat Hunting
    David Morris, Zac Blenden, Mark Rasch Dec 27 2019 6:00 pm UTC 75 mins
    This session will feature a live demonstration of Threat Hunting by a cyber threat hunter. In this session, you will see what a Threat Hunter actually does and how it is done.