Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Proven strategies for turnkey container applications Proven strategies for turnkey container applications Avi Networks and Mesosphere Recorded: Jul 27 2016 62 mins
    Container-based applications are driving changes in the IT tool chain up and down the stack. In addition to a container orchestration platform, these applications need a full stack of services including load balancing, service proxies, visibility/monitoring, service discovery, and security.

    This webinar jointly presented by Avi Networks and Mesosphere, will uncover the strategies for delivering application services and best practices for building, deploying, and managing large Mesos clusters with thousands of nodes.

    You will learn:

    • How to simplify orchestrating microservices applications
    • How to discover services automatically
    • Gain visibility to application components and their interactions
    • Ways to scale applications seamlessly
    • Achieve security through micro-segmentation, SSL, and L4-L7 policies

    Duration: 60 mins (45 mins followed by Q&A)
  • Influencers Panel: The Importance of the Network in a Virtualized World Influencers Panel: The Importance of the Network in a Virtualized World Ron Flax, August Schell | Elver Sena Sosa, Hydra | Caio Oliveira, VMware | Joshua Soto, VMware Recorded: Jul 27 2016 25 mins
    With the relentless speed of innovation in data center technologies, how do you decide on your next step? Virtualization is being applied to every aspect of the data center, and it’s critical to first understand what makes sense for your business and why.

    Join us for an open panel of NSX top influencers as they engage in a no-slide webcast conversation. They’ll kick off the session with a discussion on network virtualization and how it completes the virtualization infrastructure; how they see the evolution of the data center progressing; and the role of fluid architectures.

    Don’t miss this opportunity to learn from industry experts as they share their valuable insights with the IT community.

    Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.
  • Banks Gone Digital: Card Analytics - A Webinar on How to Use ‘Em Banks Gone Digital: Card Analytics - A Webinar on How to Use ‘Em Kambiz Asrar Haghighi, Marc Borbas Recorded: Jul 27 2016 51 mins
    Credit and debit card transactions are one of the richest sources of customer analytics data in the banking and financial services field. But this data is commonly under-utilized. During this webinar, we will take a look at the value of card transaction data, and share some custom-built visualizations designed to help you:

    - Track card performance across all banking channels (POS, ATM, Branch, Online and Mobile)
    - Detect fraudulent card usage trends and EMV fallback issues
    - Understand customer card usage and cross-channel behavior
    - Reduce card program cannibalization
    - Analyze merchant and merchant category influencers on your card portfolio and know where revenues are coming from
  • 加入英特尔和联想,了解更多关于XClarity能源管理大师 加入英特尔和联想,了解更多关于XClarity能源管理大师 冯志雄 联想高级项目经理 马红雨 英特尔数据中心解决方案高级业务经理 Recorded: Jul 27 2016 58 mins
    监控、分析并管理服务器的能耗和温度
    联想XClarity TM能源管理大师可以帮助你优化数据中心能源管理。XClarity能源管理大师是针对服务器或服务器组的功耗和温度进行分析和控制的数据中心能源方案。通过分析能耗和温度数据,XClarity能源管理大师可以帮助数据中心管理员对数据中心能源优化目标建立基于策略的控制,从而改善业务连续性和能源效率。让我们一起来看一下该方案如何通过以下方式提升操作效率:
    •监控系统能耗,预估电力需求,根据需求对服务器的能耗进行重新分配。
    •对服务器和数据中心空间的温度和制冷能力进行监测和优化
    •在某些事件发生或监测指标超出临界值时发出预警
    •有策略的对一个或多个服务器的能耗进行限制。
    •基于带外功耗数据识别出低利用率服务器优化能耗效率,针对不同型号服务器测量其功率范围,基于资源可用性更好的将服务器与工作负荷进行匹配。
    •最低能耗策略在紧急电源事件(比如数据中心断电)发生时延长服务时间。
    演讲者
    冯志雄
    联想高级项目经理
    马红雨
    英特尔数据中心解决方案高级业务经理
    钱晓锋
    英特尔数据中心解决方案技术经理
  • 5 SD-WAN Integration Challenges SOLVED 5 SD-WAN Integration Challenges SOLVED Ethan Banks, Co-Founder of Packet Pushers & Rolf Muralt, VP of PM Silver Peak Recorded: Jul 26 2016 65 mins
    SD-WAN can dramatically reduce cost and increases the ability to rapidly bring new services online, connecting users to all types of applications, and speeding up time to market. But the idea of re-architecting the WAN can be daunting and the decision to adopt an SD-WAN solution can be a difficult one.

    Join renowned network expert Ethan Banks, Co-Founder of Packet Pushers, and Rolf Muralt, VP Products Management SD-WAN at Silver Peak, in a webinar that discusses the SD-WAN market, lessons learned, and what features to be on the lookout for as you make your decision. They will discuss issues around technology selection and deployment, including:
    · How a zero-touch, hybrid or SD-WAN can leverage multiple connectivity forms
    · Ways to prioritize and route traffic across different connections
    · Quality of Service (QoS), and how to maintain 100% uptime
    · Best practices for transitioning with minimal impact on budget and resources
    · Real customer examples that demonstrate different deployment stage and benefits
  • Shift-Left Performance Testing for Shift-Forward Quality Shift-Left Performance Testing for Shift-Forward Quality Nathan Devoll, SV Consultant, CA Technologies Recorded: Jul 26 2016 54 mins
    Traditional performance testing typically requires that all components of the application are “completed,” integrated and deployed into an appropriate environment. This results in testing not being done until late in the delivery cycle or sometimes skipped entirely. Which can then lead to a less then optimal user experience, expensive rework and potential loss of business.

    Many organizations are adopting service virtualization to overcome the key challenges associated with performance testing. During this session see why and specifically how service virtualization:
    •Enables you to do testing early in the dev cycle by simulating unavailable production systems and missing components
    •Helps you control the inputs (like response times and 3rd party system responses) so you can do more negative and exploratory testing
    •Provisions performance test environments “in a box” for on-demand testing
    •Works with CA APM so that you can monitor an app during a load and performance test and see how the app reacts
  • The New Frontier: How IoT is Changing Business As We Know It The New Frontier: How IoT is Changing Business As We Know It Theresa Bui Revon, Head of Enterprise Product Marketing, IoT Cloud Business Unit, Cisco Jasper Recorded: Jul 26 2016 46 mins
    The Internet of Things (IoT) is empowering businesses with unprecedented ways to serve customers, rapidly solve problems, and optimize operations. Using IoT, savvy companies are transforming their products to enable the delivery of connected services that deliver new customer experiences and unlock new sources of revenue.

    From enabling leaders in agribusiness to increase crop yields, to amplifying connected car innovation, Cisco Jasper Control Center cloud platform powers more than 5,000 companies in dozens of industries. Leveraging learnings from a decade of IoT experience, we’ll look at how real-world businesses are using IoT innovation to capture their share of this multi-billion-dollar opportunity.

    Key takeaways:

    - How IoT helps you drive successful business outcomes

    - Best practices for accelerating your IoT service business

    - Lessons from leaders that can help you work smarter and scale faster
  • Virtual Video Intelligence: Video Quality Measurement in an NFV/SDN World Virtual Video Intelligence: Video Quality Measurement in an NFV/SDN World Kurt Michel,Senior Director of Marketing, and Spencer Sellay, Global Solutions Director, IneoQuest Technologies Recorded: Jul 26 2016 49 mins
    Measurement is critical to high quality video viewing experiences – especially in an OTT world. OTT video introduced new challenges for measurement system architecture and deployment, which can now be addressed through virtualized tools. But NFV/SDN architectures offer something more – the ability to scale video delivery infrastructure dynamically in response to quality and viewer demands.
    Join this webcast to hear how IneoQuest and Intel worked together to develop virtualized versions of iQ’s popular end-to-end video quality monitoring tools. You will also learn how these virtualized offerings can be leveraged to monitor video quality across the distribution infrastructure.
    •In the head-end/origin for content quality assurance at the ingest, transcoding, packaging, and publishing points
    •At the network/CDN ingest points
    •Within the network/CDNs
    •Beyond the CDN, across geographically distributed access networks.
  • Network Challenges that Stand in the Way of Success Network Challenges that Stand in the Way of Success Christian Gilby, Director, Aruba & Vince DiStasi, VP of IT, Grove City College Recorded: Jul 25 2016 42 mins
    For some, the network is only a subject of conversation when there's a problem. For you, the network is a mark of success. If the network is performing well, you’re doing well; if it's not, not much is going right.

    Grove City College will also join us and review the steps they took to:
    •Improve Wi-Fi security and coverage
    •Increase Wi-Fi performance by 50%
    •Streamline operations

    Join us to learn about current challenges for your network, and to discuss ways to meet these new demands and performance standards.
  • Outerwall Case Study: Get Amazing TCO with All-Flash Storage Outerwall Case Study: Get Amazing TCO with All-Flash Storage Jason Nadeau, Director of Product Marketing, Pure Storage; Rob Kwak, Manager Systems Engineering and Ops, Outerwall Recorded: Jul 22 2016 29 mins
    View this webinar to experience the economic benefits of going-all flash. Falling flash prices combined with new ways to reduce the data actually stored on the flash media, solid state storage can cost significantly less than disk. In this session, Outerwall,the company behind Redbox(r), Coinstar(r), ecoATM(r) and other retail kiosks, discusses storage Total Cost of Ownership (TCO) from a customer point of view -- from initial acquisition, maintenance, and generational upgrades.

    Topics covered include:

    – What does a strong TCO-centric business case for storage look like?
    – What are the main components of cost over the ownership lifecycle?
    – What are the underlying technical and business model mechanisms that drive down TCO of all-flash storage?
    – What tools are available to help you customize a business case for your environment and needs?
    – How Outerwall was able to go from 18 racks to 2 and speed its business analytics reports 20X
  • Software Load Balancing for Any Cloud Software Load Balancing for Any Cloud Ashish Shah Recorded: Jul 22 2016 11 mins
    Application network services with public cloud-like flexibility including load balancing, autoscaling, service discovery, and micro-segmentation.
  • On the way to Smart Factory On the way to Smart Factory Jay Monahan, Director of Smart Factory Solutions, Dell Services Recorded: Jul 22 2016 42 mins
    Presented by Jay Monahan, Director of Smart Factory Solutions, Dell Services. In 2012, The Economist claimed we were entering the third industrial revolution based on the digitization of manufacturing, also referred to as the “smart factory.” The development and adoption of the Internet of Things is a critical element of smart manufacturing as reduced sensor device cost, and increased connectivity and in-memory processing give manufacturers the ability to gather and use data to increase product quality and transform operations. IT organizations are increasingly involved with the management, security and governance of this data as equipment and products are connected to the internet. This session will provide a practical framework for evaluating ways to improve sensor enablement, transaction processes and analytics based on real-world customer examples.
  • Briefings Part 1: Anatomy of a Ransomware Attack Briefings Part 1: Anatomy of a Ransomware Attack Barry Shteiman, Director, Threat Research, Exabeam; Brandon Dunlap, Brightfly Recorded: Jul 21 2016 60 mins
    Ransomware is currently one of the most disruptive security challenges for enterprises. As it moves from an individual employee's PC to the corporate network, the impact can be significant. Despite research and analysis by security firms and analysts, most don't have a good idea of how a piece of ransomware actually operates, i.e. what is affected and when, what signals to look for, etc. Exabeam researchers have detonated nearly 100 strains of ransomware in the labs and produced a detailed analysis of how a ransomware attack actually unfolds, and how an organization might respond to shut it down. Join Exabeam and (ISC)2 on July 21, 2016 at 1:00PM Eastern and gain a better understanding of the mechanisms of ransomware, how to detect it and shut down an attack.
  • Save More Than 50 Percent on Your Migration to Cloud by Rightsizing Save More Than 50 Percent on Your Migration to Cloud by Rightsizing Chris Schin, Vice President, Products Recorded: Jul 21 2016 28 mins
    Join this webinar to see how the CloudPhysics Public Cloud Planning Rightsizer identifies opportunities to lower your costs of running applications on the public cloud.

    The Public Cloud Planning Rightsizer automatically identifies on-premises virtual machines (VMs) that are over-provisioned with more resources (such as CPU and memory) than they use. This lets you optimize instance matching to the ideal cloud instances. Rightsizing reveals the verifiable cost of running workloads in the cloud. Now you can answer the question, “will we save money by migrating applications to the cloud?”

    This webinar shows how Public Cloud Planning Rightsizer collects resource utilization data from each VM on a fine-grained basis, and then analyzes those data across time to discover the VM’s actual resource needs. Imagine an on-premises VM configured with 8 vCPUs: if the Rightsizer shows that it has never used more than 2 vCPUs, you can Rightsize that VM to a smaller instance in the cloud, saving substantial funds.
  • Skype for Business: Journey to the Cloud Skype for Business: Journey to the Cloud Sandeep Narkhede, Microsoft | Pranavi Jakkam, Microsoft | John Hand, IR Recorded: Jul 21 2016 60 mins
    Educational session looking at the challenges and considerations when migration to a cloud based UC solution.
  • Reduce your TCO with a full-featured software load balancer Reduce your TCO with a full-featured software load balancer Ashish Shah, Director of Product, Avi Networks Recorded: Jul 21 2016 44 mins
    Hardware or software applicance-based load balancers do not scale horizontally. They often cause configuration delays, overspending, and overprovisioning. Avi Networks leverages the power of central management and insights derived from distributed load balancing resources to provide predictive autoscaling of load balancers as well as application components. Enterprises can eliminate upfront capital costs and adopt an elastic subscription-based model for load balancing. The Avi Vantage platform alleviates operational complexities inherent in buying hardware and managing multiple appliances.

    In this webinar learn new best practices for autoscaling load balancers and applications. Learn the flexibility and cost savings achieved through:

    • Software-defined L4-L7 services and central management
    • Use of commodity x86 servers for load balancing
    • Elastic scaling based on real-time traffic that eliminates overprovisioning
    • Avoiding CapEx and significantly reduced OpEx
  • Der Weg zum Cloud-ready Data Center: Voraussetzungen, Hindernisse, Lösungen Der Weg zum Cloud-ready Data Center: Voraussetzungen, Hindernisse, Lösungen Robert Kreher, Evangelist – Cloud, IT Operations & Governance, HPE Software Recorded: Jul 21 2016 55 mins
    An Cloud Computing führt kein Weg mehr vorbei, das hat sich in den Chefetagen der meisten Unternehmen herumgesprochen. Viele Geschäftsführer und CIOs haben auch schon längst eine Cloud-Strategie in der Schublade. Es hapert jedoch an der Umsetzung, weil die Voraussetzungen im eigenen Rechenzentrum fehlen. Vor dem Schritt ins Cloud-Business muss nämlich jedes Unternehmen erst einmal seine Hausaufgaben machen und seine internen Ressourcen so weit wie möglich automatisieren. Nur so lassen sich neue Services in Minuten statt in Tagen oder Wochen aufsetzen, Systeme optimal nutzen und IT-Leistungen nutzungsabhängig abrechnen.

    Welche Herausforderungen es auf diesem Weg gibt, wie Sie diese meistern und was Sie gewinnen, wenn Sie Ihre Infrastruktur Cloud-ready machen, das erfahren Sie im COMPUTERWOCHE Webinar.

    Cloud-Experte Robert Kreher zeigt Ihnen darin unter anderem: warum Server-Virtualisierung und Container-Systeme wichtige, aber nicht ausreichende Schritte auf dem Weg in die Cloud sind;wie Sie Patching, Provisionierung und Konfigurationsmanagement sowie Compliance-Durchsetzung durch Automatisierung in den Griff bekommen;wie ein Data Center letztendlich aufgebaut sein muss, um Cloud-ready zu sein.
  • Spotlight on Asia: The End of Complex Hybrid WANs Spotlight on Asia: The End of Complex Hybrid WANs Tim Sullivan, CEO, Coevolve; Kangwarn Chinthammit, Director of Solutions, VeloCloud Recorded: Jul 21 2016 57 mins
    The costs of bandwidth across Asia, especially MPLS, can vary significantly across different countries, and many enterprises depend on a hybrid WAN strategy to achieve reach and keep costs down. However, designing and deploying hybrid WAN architecture can be complex and require expensive resources to manage hundreds of lines of configurations. Software-defined WAN (SD-WAN) can transform existing hybrid networks into a dynamic, adaptive environment that uses all available bandwidth more effectively.

    In this webinar, our panel of networking experts will share real-world experiences and outline key approaches for getting more out of your existing network in Asia Pacific. We will share with you our perspectives based on numerous regional deployments on how SD-WAN has transformed many of our clients network to be adaptive, flexible & cloud-first IT asset.
  • Strategies for Securing Critical Enterprise Data Strategies for Securing Critical Enterprise Data Trent Fierro, Director of Security Solutions at Aruba, John Lehane, Sr. Product Marketing Manager at Juniper Networks Recorded: Jul 20 2016 37 mins
    Today's mobile workplace requires visibility, authorization and enhanced threat and attack mitigation based on accurate user and device identity. Yes, even devices carry an identity – whether IT-managed, BYOD or IoT. In this webinar you will learn how Aruba and Juniper help you navigate the evolving threat landscape, and how to:

    * Enable real-time employee, guest and device-based policy enforcement
    * Leverage identity and device attributes for accurate differentiation of privileges
    * Implement dynamic network controls and enforcement
  • How to use a Discovery Tool to Supercharge Your ITSM Program How to use a Discovery Tool to Supercharge Your ITSM Program Doron Orbach, Bill Dyck, Nick Rendall Recorded: Jul 20 2016 66 mins
    IT departments are constantly searching for new ways to optimize the speed, quality, and cost of their IT Service Management (ITSM) activities. Surprisingly, one solution that is often overlooked in the optimization process is the increased usage of a discovery tool within a configuration management system (CMS) to be the powerhouse for all ITSM, ITAM, operations analytics, and even network management processes.

    This webinar will take a deep dive into the uses of discovery tools and how they can be greater leveraged into all facets of ITSM, ITAM, operations analytics, and network management processes for increased value creation.

    Discovery Tools: Why they’re more relevant than ever
    ITSM, ITAM, operations analytics, and network management use cases and functions enabled by an integrated Discovery Tool
    Examples of successful integrated Discovery Tool usage across all IT processes
    HPE Universal Discovery Tool and Applications
  • DDoS Defense-as-a-Service: The New Revenue Stream DDoS Defense-as-a-Service: The New Revenue Stream Stephen Gates, Chief Security Research Analyst Recorded: Jul 20 2016 61 mins
    For many service and hosting providers, protecting against DDoS attacks has become nothing more than a cost center. As such, every provider is looking to deploy the most cost-effective DDoS defense while reducing the operational costs associated with these attacks.

    Today, many forward thinking providers are turning their DDoS investments into a revenue opportunity. By offering DDoS Defense-as-a-Service to their customers, they can increase overall revenue and create competitive differentiation.

    Attend this webinar to learn how to:
    •Deploy DDoS defenses with the lowest TCO
    •Create an ROI with new service offerings
    •Improve or replace your current DDoS detection/mitigation strategy
    •Grow your scrubbing centers beyond your current mitigation capacity
  • Whiteboard Video Series -- Power-over-Ethernet Whiteboard Video Series -- Power-over-Ethernet Ben Miller, Cradlepoint Recorded: Jul 19 2016 2 mins
    Check out our 2-minute video on “Power-over-Ethernet."

    Learn more about the features of the ARC CBA850 networking solution: https://cradlepoint.com/products/arc-cba850
  • Whiteboard Video Series — LTE Advanced Whiteboard Video Series — LTE Advanced David Rush, Cradlepoint Recorded: Jul 19 2016 2 mins
    Check out our 2-minute video on “LTE Advanced."

    Learn more about LTE Advanced: https://cradlepoint.com/content/whats-new/lte-advanced
  • Whiteboard Video Series — Next-Gen Out-of-Band Management Whiteboard Video Series — Next-Gen Out-of-Band Management David Rush, Cradlepoint Recorded: Jul 19 2016 2 mins
    Check out our 2-minute video on “Next-Gen Out-of-Band Management."

    Learn more about the features of the ARC CBA850 networking solution: https://cradlepoint.com/products/arc-cba850

    Learn more about Enterprise Cloud Manager: https://cradlepoint.com/ecm
  • Whiteboard Video Series — Zero-Touch Deployment Whiteboard Video Series — Zero-Touch Deployment Mike Hagman, Cradlepoint Recorded: Jul 19 2016 2 mins
    Check out our 2-minute video on “Zero-Touch Deployment."

    Learn more about Enterprise Cloud Manager: https://cradlepoint.com/ecm
  • DPDK 16.07 New Features DPDK 16.07 New Features Tim O’Driscoll, Product Marketing Manager for the Data Plane Development Kit (DPDK) Jul 28 2016 3:00 pm UTC 45 mins
    The DPDK 16.07 release is due to be completed in July and will be available for download from http://dpdk.org. This webinar describes the new features that will be included in this release, including major changes such as:

    Virtio in Containers
    Cryptodev enhancements (software implementation of KASUMI algorithm, bit-level support for SNOW 3G algorithm).
    Live Migration for SRIOV
    Packet Capture Framework
    External Mempool Manager
  • Deploy WebRTC Services with Confidence Deploy WebRTC Services with Confidence Kader Khan, Product Manager, EXFO Jul 28 2016 3:00 pm UTC 60 mins
    Service providers are increasingly becoming involved in the deployment of Web Real-Time Communication (WebRTC) technology to deliver richer forms of unified communication services to more connected users.

    Even though WebRTC opens up many great opportunities to extend existing VoLTE, ViLTE, VoWiFi and RCS services while also creating entirely new services to their customers, service providers need to be careful what they wish for. One of the biggest challenge is preparing networks to address interworking of new and extended services in a well-defined standardized approach.

    This webinar explores how service providers can maximize their goals by deploying standardized WebRTC services with confidence. Insight is provided on architectural requirements surrounding WebRTC implementation–including networks, devices (WebRTC gateway/SBC) and protocols–to deliver uncompromising network and service performance in today’s highly-competitive environment.

    Who Should Attend

    Network architects, designers, lab managers and testers from service providers, large enterprises, and manufacturers, press, and analysts looking to understand how to design, build, test and deploy WebRTC services.
  • Connecting Network and Application Operations for Optimal ADC Health Connecting Network and Application Operations for Optimal ADC Health Milan Bundalo, Product Manager, Comtrade Software Jul 28 2016 3:30 pm UTC 45 mins
    Lightning-fast and impeccable application delivery performance has nowadays became a modern standard in digitalized world, therefore a daily struggle to deal with increasing network loads has been undertaken into a large amount of attention and work to enable consistent flow in the delivery chain. Applications have become the new gold and protecting application delivery is the most important task for your business.

    Application performance and availability is impacted by a wide variety of factors, therefore Comtrade’s SCOM Management Pack for F5 BIG-IP identifies specific nodes affecting applications and enables complete approach for resolving and maintaining operational functionality.

    In this webinar, you will:
    - Learn how to identify application servers which are unavailable or under heavy load
    - See how to track selected load balancing algorithm performance for the specific application delivery
    - See how repetitive issues can impact overall application delivery
  • Innovation in Life Sciences: An interactive discussion with Dell Services Innovation in Life Sciences: An interactive discussion with Dell Services James Hayden (Dell Services) and David Souchik (Dell Services) Jul 28 2016 4:00 pm UTC 45 mins
    Join us for an interactive conversation as we discuss the future of technology in Life Sciences. Subject Matter Experts from Dell Services will share industry trends, use cases and customer stories featuring innovative technology, and provide best practices on how your organization can become future-ready.
  • GDPR - Brexit Means More Changes GDPR - Brexit Means More Changes Darrin Reynolds, Reynolds Privacy; Graham Jackson, General Counsel, (ISC)2; Harvey Nusz, CISO, 4IT Security Jul 28 2016 5:00 pm UTC 75 mins
    The EU's General Data Protection Regulation (GDPR) was adopted on April 14, 2016 and threw infosecurity and privacy teams into chaos. While teams were trying to get their arms around the new regulations and rules, the UK voted to leave the EU, throwing another big wrinkle into the mix. What does all of this mean to you and your compliance and regulation efforts? What does the Brexit vote mean for the GDPR and for the UK's infosecurity and privacy rules? Imperva sponsors an (ISC)2 From the Trenches webinar discussion on this and answers questions from the audience on July 28, 2016 at 1:00PM Eastern.
  • Keep mobile employees and data safe with SonicWALL's Secure Mobile Access Keep mobile employees and data safe with SonicWALL's Secure Mobile Access Steven Sanderson Jul 28 2016 6:00 pm UTC 60 mins
    Companies used to know where their data was at all times: It was in the data center, surrounded by physical walls. But today, your data is everywhere your employees and customers are — on phones, on tablets, on laptops, in the cloud. Anywhere, anytime access provides more work-life balance and helps employees stay productive, but it also puts data security at considerable risk. The challenge companies consequently face is how to provide fast, simple access to enterprise applications, data and resources without compromising security.

    Join Mark Hewett, senior product manager for Dell SonicWALL Secure Mobile Access, and Steven Sanderson, senior product marketing manager for Dell SonicWALL Secure Mobile Access, for a webcast on how to manage and provision mobile devices to protect company data and networks from cyber attacks, viruses, malware and other threats.

    •Ensure that only authorized users have access to appropriate data and through approved devices
    •Quickly and easily provision secure mobile access and role-based privileges
    •Keep company data secure in-flight and at-rest on devices
  • Applying the Scientific Method to Threat Intelligence Applying the Scientific Method to Threat Intelligence Tim Helming, Director of Product Management, DomainTools Jul 28 2016 6:00 pm UTC 75 mins
    It has been said that there are two types of companies: those who have discovered they have been breached, and those who have not discovered it yet. Although unsettling, this rationale is conducive to constructing a healthy attitude towards your organization’s’ security practices. This hour long webinar will help guide your security process to protect your organization’s most valuable assets by applying the scientific method—specifically, forming and testing hypotheses about potential incursions, and then acting upon the results.
    In this webinar, you will learn:

    1. How to apply a hypothesis-driven approach to security activities
    2. Applying this mindset across time past, present and future—to enhance defenses
    3. How DomainTools data and tools enable you to apply this strategy to your own organization
  • Digital Transformation in Life Sciences: Become future-ready with Dell Services Digital Transformation in Life Sciences: Become future-ready with Dell Services James Hayden (Dell Services) and David Souchik (Dell Services) Aug 1 2016 4:00 pm UTC 45 mins
    Better health outcomes begin with digital transformation. Thought leaders from Dell Healthcare and Life Sciences Services will facilitate a live conversation on how to best navigate the journey of becoming a digital pioneer and how your organization can outpace competition through by leveraging custom-tailored solutions built specifically for Life Sciences organizations.
  • Ubuntu 16.04 + Intel: Expanding the Possibilities of SDN and NFV Ubuntu 16.04 + Intel: Expanding the Possibilities of SDN and NFV Mark Brown, Technical Program Manager, Canonical Aug 2 2016 3:00 pm UTC 60 mins
    Mark Brown of Canonical will discuss the newest release of Ubuntu, 16.04 Xenial Xerus, with particular detail on added network capabilities using Intel technology. Through the use of supported technologies like DPDK, OpenVSwitch, and the portfolio of Intel chip technology, Mark will explore the value of Intel enhanced network features as they apply to OpenStack, NFV/SDN, and other open networking solutions.
  • Take Control of Your Mobile Fronthaul Deployments Take Control of Your Mobile Fronthaul Deployments Michael Proctor, Product Manager, EXFO Aug 2 2016 3:00 pm UTC 60 mins
    Learn how managing resources in the field can simplify and streamline the complete test and compliance validation process.

    Nearly 90% of test results contain data entry errors.
    On average, 50% of technicians’ time is spent on bookkeeping.
    (according to MNOs surveyed globally by EXFO)

    Rising bandwidth requirements, a surge in data usage and increased network complexity is putting more pressure on mobile network operators (MNOs) to modernize and upgrade their networks quickly and more efficiently. Conversely, they need to control their CAPEX/OPEX in order to protect their margins in an extremely competitive market. This means adopting a smarter approach to managing resources in the field when building fiber-based architecture such as fiber-to-the-antenna (FTTA) and centralized radio access networks (C-RAN).

    What you will learn:
    In this webinar, we will address how today’s MNOs can streamline the complete test and compliance validation process to gain control of their fronthaul deployments and maximize return on investment through on-schedule and accurate project delivery. In this session, learn how to:
    •Effectively manage and communicate testing specifications/thresholds and updates
    •Ensure technicians are following the proper testing processes
    •Safeguard against incomplete jobs and inaccurate data
    •Ensure on-schedule job completion and faster job close-out packages
    •Increase insight into test progress and identify resource bottlenecks
  • A New Approach to Data Security A New Approach to Data Security Ted Hendriks, Data Security Pre-Sales Architect, APJ, HP Enterprise Security Aug 3 2016 6:00 am UTC 60 mins
    With the phenomenal growth of data and the IT trends toward cloud and mobility adoption, enterprises are facing rising threats to sensitive data from both inside and outside the organization. They need to be able to protect data end to end without introducing complexities to users, while lowering the implementation and management costs of security solutions.

    Join Hewlett Packard Enterprise and (ISC)2 on Aug 03 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefing on how to protect data from end to end.
  • Transparent Footprints: Optimizing HPC Workloads with Colocated Infrastructure Transparent Footprints: Optimizing HPC Workloads with Colocated Infrastructure Rui Gomes (RVX), Leigh Huntridge (Avere), and Jorge Balcells (Verne Global) Aug 3 2016 2:00 pm UTC 60 mins
    Facing build or lease options for their rendering farm and storage, RVX, a growing special effects studio in Iceland, needed to factor high-performance demand and environmental impact into their cost analysis. As they weighed their options, a plan formed with the help of two providers.

    Rui Gomes, chief technology officer at RVX had challenging projects ahead that demanded seamless access to storage resources to render films like 'Everest'. Their needs were quickly outpacing their capacity in their in-house data centre and moving to a cloud service was not an option due to the content needed to remain in a controlled environment. He faced the decision to grow what he owned or look at colocation options that could handle his high performance computing (HPC) needs for complex rendering workflows. In the end, he was able to design a solution that allowed him to check all of the boxes — scalable, accessible and fast with a bonus of an environmentally-friendly footprint. Next steps: deliver powerful, exciting virtual reality (VR) experiences using the same infrastructure.

    In this webinar, Gomes and his selected partners walk through his evaluation process, talk about outcomes, and discuss new opportunities. In this webinar, you’ll learn:

    - How Gomes compared options, prioritized objectives, and evaluated costs
    - About new opportunities in virtual reality using the same infrastructure
    - How distance of the co-located infrastructure became a non-issue even with high performance demands
    - Important factors in choosing a colocation partner when considering calculated cost benefit and enterprise environmental impact
  • Micro-Segmentation Series: What it Is and What it Isn’t Micro-Segmentation Series: What it Is and What it Isn’t Matt De Vincentis, Senior Product Line Marketing Manager at VMware Aug 3 2016 3:00 pm UTC 30 mins
    What Don’t You Know About Micro-Segmentation?

    Join us for the first in a three-episode series on micro-segmentation, how it protects networks, and how it works with perimeter firewalls. We’ll also discuss its advantages beyond protection in automating security workflows and more.

    IT managers are challenged with a new breed of data center threats, ones that move within the data center, not just through the perimeter. Firewalls are not enough to contain attacks that move laterally between servers. Micro-segmentation of the network restricts this unauthorized east-west movement, but it can’t be implemented with firewalls. Join us and come away with a better understanding of micro-segmentation and how it works. You’ll learn about:

    • How micro-segmentation secures your data center cost-effectively
    • Three essential elements of micro-segmentation
    • Why micro-segmentation can’t be achieved with legacy technology
  • Intelligent Endpoint Security: Why Taking A Modern Approach Matters Intelligent Endpoint Security: Why Taking A Modern Approach Matters Robert Westervelt is a Research Manager at IDC Security and Alejandro Borgia, VP Product Management at Symantec Aug 4 2016 4:00 pm UTC 60 mins
    Endpoint security is a critical component in an organization's security program and is needed to gain the visibility necessary to rapidly detect threats and contain them before criminals gain access to critical resources.

    Join us for an interactive discussion and learn more about:

    • How emerging security technologies are helping organizations defend against targeted attacks that use zero-days and evasion tactics to evade detection

    • What technologies typically make up modern threat protection solutions and how they enable incident responders to quickly identify infected endpoints and determine the scope of an attack

    • Why endpoint visibility must be combined with network, web, and messaging security solutions to create a security architecture that works cohesively to reduce the amount of time an attacker has on infected systems

    • How risk assessment plays a role in strengthening your security to preempt future attacks
  • Skype for Business: Importance of Network Pre-assessment Skype for Business: Importance of Network Pre-assessment Skip Chilcott - Global Head Product Marketing Aug 4 2016 4:00 pm UTC 30 mins
    One of the most critical elements in a successful UC deployment in the cloud or a hybrid environment is ensuring the IT infrastructure is optimized to cope with the demands of real-time communications.

    However, organizations often fail to pre-assess their network and UC environment and later find out during deployment the network is unable to handle the demands, causing a poor user experience.

    Join us to learn more about the new network pre-assessment capability recently launched by IR.
  • Re-Introducing Ethernet Networked Storage Re-Introducing Ethernet Networked Storage Rob Davis, Mellanox, Fred Zhang, Intel Aug 4 2016 5:00 pm UTC 75 mins
    Ethernet technology had been a proven standard for over 30 years and there are many networked storage solutions based on Ethernet. While storage devices are evolving rapidly with new standards and specifications, Ethernet is moving towards higher speeds as well: 10Gbps, 25Gbps, 50Gbps and 100Gbps….making it time to re-introduce Ethernet Networked Storage.

    This live Webcast will start by providing a solid foundation on Ethernet networked storage and move to the latest advancements, challenges, use cases and benefits. You’ll hear:

    •The evolution of storage devices - spinning media to NVM
    •New standards: NVMe and NVMe over Fabric
    •A retrospect of traditional networked storage including SAN and NAS
    •How new storage devices and new standards would impact Ethernet networked storage
    •Ethernet based software-defined storage and the hyper-converged model
    •A look ahead at new Ethernet technologies optimized for networked storage in the future

    Register today for this live Webcast where our experts will be on hand to answer your questions.
  • Briefings Part 3: Secure in the Cloud - Securing Email Migration to Office 365 Briefings Part 3: Secure in the Cloud - Securing Email Migration to Office 365 Michael Osterman, President, Osterman Research; Marcelo Delima, Global Product Mktg Mgr, HPE SecureMail Aug 4 2016 5:00 pm UTC 75 mins
    The cloud's promise of on-demand functionality for a lower cost has arrived to business applications. The use of Microsoft Office 365 across the globe is growing rapidly, with a clear value proposition to re-invent productivity for organizations of all sizes. But the transition to the cloud is not without challenges. Office 365 offers concerns in terms of privacy, compliance and security which can be addressed through the use of end-to-end encryption for all e-mails and files sent to Office 365. Join HPE and (ISC)2 on August 4, 2016 at 1:00PM Eastern for an examination of the steps for an Office 365 migration, security and privacy concerns for the cloud environment and how to achieve end-to-end encryption.
  • Telco Cloud: Driving Service Transformation in the Telecommunications Industry Telco Cloud: Driving Service Transformation in the Telecommunications Industry Ben McCahill, Intel Aug 9 2016 3:00 pm UTC 45 mins
    The move to the cloud is transforming entire industries worldwide. This represents both a threat and an opportunity for Communications Service Providers. The service discovery and delivery model must keep up with the rapidly evolving landscape and demands of today’s disruptive application providers. In this webinar, you will learn how moving to a Telco Cloud infrastructure will significantly improve service models and the key success factors required to flourish in this new environment.
  • Chef Automate: Scale your use of automation Chef Automate: Scale your use of automation Andre Elizondo, Technical Evangelist & Bakh Inamov, Field Solutions Architect Aug 9 2016 5:00 pm UTC 60 mins
    During this webinar we'll discuss the different components of Chef Automate and talk about how it unifies Chef, Inspec, and Habitat into a comprehensive automation strategy for any company in today's digital world.

    Join us to learn how:
    - Workflow features provide a common pipeline for governance and dependency management.
    - Visibility features give you deep insight into what’s happening in your organization, including serverless chef-client runs and data from multiple Chef servers.
    - Compliance features enable automated compliance assessments in your workflow pipelines.
  • Securing Your Organization with a Network Sandbox Securing Your Organization with a Network Sandbox Brook Chelmo Aug 9 2016 6:00 pm UTC 45 mins
    Businesses of all sizes are being attacked with new forms of threats trying to exploit recently discovered vulnerabilities in systems. With over 64 million unique pieces of Malware detected last year, hackers are making it more difficult for traditional anti-malware software to keep up. So how can organizations keep their networks safe? Security researcher and advocate, Brook Chelmo will briefly talk about Network Sandboxing and how to stop unknown threats. Brook will talk about ways to stop advanced persistent threats such as zero-day attacks and how you don’t have to be a security expert to stop them.

    1.Learn how to stay safe from current and common attacks with advanced security technology
    2.Learn how to practice good security hygiene
    3.Understand how the threat landscape changes day to day with a hundreds of thousands of pieces of malware being authored daily.
  • Intel & Threat Analysis – The Defensive Duo Intel & Threat Analysis – The Defensive Duo Jens Monrad, Global Threat Intelligence Liaison, FireEye Aug 10 2016 1:00 pm UTC 45 mins
    The ongoing battle with cybercrime is asymmetric. You’ve invested millions in protection technology but unknown attackers still find a way in. So how do you stay ahead of the curve?

    "The core problem is that most cyber security tools do not make a distinction between everyday malware and advanced targeted attacks. If security tools cannot tell the difference, security teams have no way of prioritizing the alerts that matter the most."

    Join Jens Monrad, Global Threat Intelligence Liaison from FireEye in this webinar that will discuss:

    •How to ensure you are responding to the alert that matters

    •Benefits of Alerts with threat Intelligence

    •Using threat intelligence to think like your attacker

    •How to apply threat intelligence, expert rules and advanced security data analytics in order to shut down threats before they cause damage

    •How security teams can prioritize and optimize their response efforts.
  • Micro-Segmentation Series: 8 Reasons You Need Micro-segmentation Micro-Segmentation Series: 8 Reasons You Need Micro-segmentation Scott Goodman, Product Marketing Manager Aug 10 2016 3:00 pm UTC 30 mins
    What Don’t You Know About Micro-Segmentation?

    Join us for the second in a three-episode series on micro-segmentation, how it protects networks, and how it works with perimeter firewalls. We’ll also discuss its advantages beyond protection in automating security workflows and more.

    Micro-segmentation is a hot topic in IT for its ability to stop threats in their tracks. But micro-segmentation brings more to the IT landscape than security. It also helps simplify network traffic flows, enable advanced security capabilities, reduces operating expenses and more! In this webcast, you will learn:

    • 8 functional benefits of micro-segmentation, in addition to security
    • How VMware NSX enables micro-segmentation
    • How global customers are using NSX to revolutionize data center networks
  • Tufin Executive Webinar Series: Cloud Security at DevOps Velocity Tufin Executive Webinar Series: Cloud Security at DevOps Velocity John Parmley, Area VP, Tufin Aug 10 2016 3:00 pm UTC 30 mins
    The business doesn't care about infrastructure. As you shift your focus to productivity and time-to-market you need a way to ensure compliance with security policies and regulations without slowing down the business. What if you could accomplish this with the Tufin solution you already own? Instead of searching for new tools, join this webinar to learn how Tufin Orchestration Suite can maximize agility, inherent with security and enable you to turn your vision and strategy into reality.

    John Parmley, Tufin area VP and an expert with >25 years of experience in the security space, will share how enterprise customers around the world use the Tufin Orchestration Suite to:
    •Gain visibility and control into public cloud platforms and across the hybrid network
    •Tighten security posture and accelerate audit readiness with continuous compliance
    •Boost agility via end-to-end change automation with inherent security control
  • Efficient OTN Testing for High-Speed Networks Efficient OTN Testing for High-Speed Networks Diong Ming Cheng, Application Engineer, EXFO Aug 11 2016 5:00 am UTC 60 mins
    This webinar gives an overview of the OTN multiplexing signal structures and their benefits. It explores an efficient way to validate all optical demultiplexer unit (ODU) channels simultaneously.

    There has been a lot of pressure and discussion around the increasing use of optical transport networks (OTN) within the carrier’s environment; this is due to the increased demand for higher bandwidth where OTN offers efficient traffic grooming and optimal granularity. OTN’s flexibility makes it the main client transport mechanism today, especially up to 100G.

    This webinar gives an overview of the OTN multiplexing signal structures and their benefits. It explores an efficient way to validate all optical demultiplexer unit (ODU) channels, using a new high-granularity OTN multichannel application capable of monitoring all sub channels simultaneously up to OTU4.

    In this webinar, you will learn about:

    - High-speed OTN 100G networks muxponder and transponder testing and grooming of diversified OTN mapping structures as required in high-speed networks

    - A new capability that allows optimal detection and monitoring of multiple OTN channels, removing the need to characterize each individual channel and reducing testing time.