Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Understanding the Business Value of a Modern WAN Architecture (SD-WAN)
    Understanding the Business Value of a Modern WAN Architecture (SD-WAN)
    Bob Laliberte, Senior Analyst at ESG Inc. Recorded: Apr 24 2019 56 mins
    For many organizations, the wide area network (WAN) infrastructure that connects an enterprise’s remote and branch offices has not changed for decades. However, as application are rapidly moving to the cloud ( SaaS and IaaS), the WAN needs to evolve in response.

    Bob Laliberte, Senior Analyst with ESG, Inc., will explore the challenges many organizations face with legacy WAN environments, illustrate why a new solution is needed and highlight the business value of rearchitecting with SD-WAN. This will include reviewing customer examples and a TCO model to demonstrate the value to your business. Organizations will learn how SD-WAN provides a combination of pure economic benefits as well as agility and flexibility to help organizations be successful.
  • Fight the good fight against the bad bots!
    Fight the good fight against the bad bots!
    Brian McHenry and Graham Alderson Recorded: Apr 24 2019 35 mins
    Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organisations developing a sustainable security strategy.

    Join us for this webinar to learn:
    - How bots infect, propagate, and attack applications
    - What types of application attacks are commonly performed by bots
    - How you can defend against bad bots without disrupting the good ones
  • FREE WEBINAR: Ready, Set, SD-WAN: Winning the Readiness and Operations Game
    FREE WEBINAR: Ready, Set, SD-WAN: Winning the Readiness and Operations Game
    Angelique Medina, Director, Product Marketing, THOUSANDEYES Recorded: Apr 24 2019 61 mins
    Large enterprises are adopting SD-WANs to lower costs, increase business agility and improve performance for multi-cloud applications. Yet many IT managers are grappling with uncertainty concerning remote site readiness and operational risks, which can impede SD-WAN rollouts and negatively impact cloud service and SaaS performance. Lack of underlay visibility also leaves managers unable to manage service-level expectations and ensure a positive ROI.

    Join ThousandEyes in this webinar to learn winning strategies for SD-WAN and hybrid WAN deployments, including:

    • Benchmarking Internet-based and managed service connectivity to
    compare performance, define success and identify KPIs prior to rollout
    • Measure the performance impact of cloud-based security platforms,
    such as Zscaler
    • Eliminate SD-WAN blind spots with hop-by-hop network underlay
    visibility
    • Quickly troubleshoot Internet service provider issues across the
    Internet
    • Define processes for internal stakeholders to gain visibility into
    external providers for managing hybrid connectivity, ISPs, cloud
    services and SaaS applications

    About the Speaker:
    Angelique has worked in technical marketing roles related to network infrastructure and network visibility for the past ten years, most recently at ThousandEyes, where she works on multi-layer visibility spanning application, DNS, L3, and BGP. She’s particularly focused on performance monitoring for SD-WAN and cloud/SaaS adoption. In 2018, she served as the lead author of the Global DNS Performance Benchmark Report. Prior to joining ThousandEyes, she spent time working on data center networking at Big Switch Networks and visibility switching at VSS Monitoring.
  • What's new in Citrix Virtual Apps and Desktops
    What's new in Citrix Virtual Apps and Desktops
    Carisa Stringer, Sr. Director, Product Marketing, Virtual Apps and Desktops, Citrix and Nitin Sharma, Product Marketing Recorded: Apr 24 2019 44 mins
    Citrix continues to innovate our industry-leading Virtual Apps and Desktops platform. Join us to experience the latest updates to see how we are enhancing the user experience, improving environment management and making your move to the cloud easier than ever.

    In this webinar, we’ll share the latest capabilities of Citrix Virtual Apps and Desktops including:

    Key enhancements from the latest Cloud, Current and Long Term Service releases
    - How to make your journey to the cloud seamless
    - Administrative flexibility and security enhancements
    - Industry-first user experience innovations around graphics, video and more
    - Don’t miss this exciting product update! In addition to seeing the new features in action, you’ll hear what’s coming next and be able to ask questions of our product experts.
  • Comparing Private LTE vs. WiFi as a Wireless LAN
    Comparing Private LTE vs. WiFi as a Wireless LAN
    Cradlepoint’s Roger Billings, Chief Architect, and Matt Thueson, Solutions Engineer Recorded: Apr 24 2019 58 mins
    Wireless LAN isn’t just for offices and coffee shops. Today, IoT is everywhere, making the mobility and flexibility of wireless crucial even across large, sprawling areas such as warehouses, mines, airports, manufacturing facilities, hospitals, and even entire cities.

    The need for large-scale wireless LAN is immense, but the ability of WiFi to meet that need is limited. Many organizations are instead deploying Private LTE, which can use a range of spectrums — including CBRS — to reduce congestion, enhance traffic flow, improve information security, and dramatically drive down costs.

    In a live webinar on April 24, Cradlepoint’s Roger Billings, chief architect, and Matt Thueson, solutions engineer, will explore the benefits of Private LTE vs. WiFi for wireless LAN, and the potential ramifications within various commercial and public sector use cases.
  • Solutions that Hit the Bullseye
    Solutions that Hit the Bullseye
    Jeff Merck, NetApp Sr Account Executive & John Lavelle, Palo Alto District Manager Public Cloud Security Sales Recorded: Apr 24 2019 59 mins
    Join us to hear how NetApp and Palo Alto Networks can securely accelerate your cloud deployment with advanced security for workloads, infrastructure, hosts, apps and data.
  • Firewall Rule Recertification with Application Connectivity
    Firewall Rule Recertification with Application Connectivity
    Asher Benbenisty, Director of Product Marketing Recorded: Apr 24 2019 20 mins
    Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.

    However, manual firewall rule recertification is complex, time-consuming and prone to errors.

    Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.

    In this webinar Asher will cover:
    • Why it is important to regularly review and recertify your firewall rules
    • How to use application connectivity for firewall rule recertification
    • How to automatically manage the rule-recertification process
  • Crawler Automation - Selenium vs. Puppeteer (UK time)
    Crawler Automation - Selenium vs. Puppeteer (UK time)
    Rachel Holander, Roi Paz Recorded: Apr 24 2019 18 mins
    Make your crawler be seen as a ‘real-user’ and not get blocked.

    Webinar agenda:
    - Select the right tools for browser automation
    - Selenium vs. Puppeteer, pro and cons
    - Setup Selenium and Puppeteer to work with proxy
    - Proxy manipulation for an automated crawler
    - Setup your Proxy Manager with Selenium and Puppeteer
  • 2019 Cyberthreat Defense Report
    2019 Cyberthreat Defense Report
    Mark Bouchard, Co-Founder and COO, CyberEdge Group Ian Farquhar, Distinguished Consultant Sales Engineer, Worldwide Security Recorded: Apr 23 2019 59 mins
    New research from CyberEdge’s 2019 Cyberthreat Defense Report shows that in spite of increasing cybersecurity budgets, organizations are dealing with ongoing cyberattacks, challenges finding and properly utilizing both human and financial resources, and obstacles to threat hunting within their environments. Sign up for this webinar to learn how to:

    •Gain pervasive visibility into your network for better threat hunting
    •Deal with inevitable cyberattacks, including malware, phishing and ransomware, including those that enter the organization via the supply channel
    •Become more effective by delivering optimized traffic to tools
    •Overcome skills shortages and retain key staff through efficiency, automation and orchestration
    •Accelerate deployment and integration of new security tools

    Learn how IT security pros plan to protect themselves against cyberthreats in 2019.
    Register now!
  • Optimize Workspace Performance for the Modern WAN
    Optimize Workspace Performance for the Modern WAN
    Valerie DiMartino, Senior Product Marketing Manager at Citrix & Joshua Thompson, Product Marketing Manager at Citrix Recorded: Apr 23 2019 50 mins
    Users in remote and branch locations rely on an optimized network for a superb Workspace experience and high productivity. If your traditional WAN can’t keep up with the bandwidth demands of rich media, high-resolution monitors, virtual, web, and SaaS apps, virtual desktops, and file sync, the user experience — and ultimately the business — will suffer. This webinar explores how Citrix SD-WAN is application aware, allows you to better utilize your existing bandwidth, optimizes the performance of virtual, web, and SaaS apps like Office 365, plus other bandwidth-intensive apps such as VoIP, and ensures always-on connections.

    Learn why your existing WAN may not be able to handle future demands and how to avoid common pitfalls when choosing an SD-WAN solution.

    In this webinar you will learn how to:
    •Enable Internet and SaaS breakout from the branch
    •Increase bandwidth while eliminating outages and interrupted sessions
    •Get deep visibility into the WAN to help you understand the quality of experience
  • Crawler Automation - Selenium vs. Puppeteer (USA time)
    Crawler Automation - Selenium vs. Puppeteer (USA time)
    Rachel Holander, Roi Paz Recorded: Apr 23 2019 18 mins
    Make your crawler be seen as a ‘real-user’ and not get blocked.

    Webinar agenda:
    - Select the right tools for browser automation
    - Selenium vs. Puppeteer, pro and cons
    - Setup Selenium and Puppeteer to work with proxy
    - Proxy manipulation for an automated crawler
    - Setup your Proxy Manager with Selenium and Puppeteer
  • Operationalize Kubernetes on Azure with Avi Networks
    Operationalize Kubernetes on Azure with Avi Networks
    Pavan Kaushik and Lei Yang Recorded: Apr 23 2019 52 mins
    Microsoft Azure provides the option of a fully-managed Kubernetes orchestration service - Azure Kubernetes Service (AKS) in addition to user-managed Kubernetes running on Azure instances. Avi integrates natively and deeply into both of these deployments in Azure to help autoscale your applications to meet growing demands.
  • CCPA: How Startups and SMBs Can Prepare Without Panicking
    CCPA: How Startups and SMBs Can Prepare Without Panicking
    Jill Reber, CEO, Primitive Logic; Kevin Moos, President, Primitive Logic; David Jarzabek, Attorney, Royse Law Recorded: Apr 23 2019 59 mins
    The California Consumer Privacy Act (CCPA) impacts companies of all sizes, including startups and SMBs. CCPA will expand the privacy obligations of all organizations far beyond those required by current state privacy legislation (CalOPPA, etc.), and all organizations who gather and process personal data of California residents must be prepared. Fortunately, the right strategies can make this process easier than you may have thought.

    Join Primitive Logic and Royse Law to learn
    - Why CCPA readiness doesn’t have to “break the bank”
    - How to develop a cost-effective plan to get ready for CCPA
    - How to prepare for private right of action under CCPA and potential amendments
    - How data privacy is becoming part of standard M&A due diligence practices
  • How to Keep Your Cyber Defenders Sharp: Do You have the right people?
    How to Keep Your Cyber Defenders Sharp: Do You have the right people?
    David Morris and Brian Markus Recorded: Apr 23 2019 62 mins
    Tune into this session to learn how to determine if you have the right people with the sharpest skills defending your organization through the use of a Cyber Training Range.

    Learn what are Persistent Cyber Training Range Environments, the benefits and value of a Cyber Training Range and how they help you answer the question ARE WE READY TO DEFEND AGAINST THE NEXT ATTACK?".
  • The Perfect ICS Cyber Storm - And What You Need To Weather It
    The Perfect ICS Cyber Storm - And What You Need To Weather It
    Michael Rothschild Recorded: Apr 23 2019 55 mins
    Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. A confluence of trends has caused all the right conditions for the perfect and potentially devastating security event. This session will immerse you in this rapidly evolving topic and provide you with the expertise to weather the next category 5 cyber storm.
  • Radically reduce troubleshooting & downtime with Blue Medora
    Radically reduce troubleshooting & downtime with Blue Medora
    Chuck Petrie & Peter Haagenson Recorded: Apr 23 2019 37 mins
    Learn how you can increase productivity up to 67% by extending the capabilities of your custom dashboards in vRealize Operations with Blue Medora's True Visibility Suite. Reclaim control and visibility in your whole stack by unlocking your dimensional data.
  • Dartmouth College's Network of the Future is Powered by AI
    Dartmouth College's Network of the Future is Powered by AI
    Rahul Vir, Juniper Networks, Jeff Aaron, Mist Systems, Mitchel Davis, Dartmouth College, and Felix Windt, Dartmouth College Recorded: Apr 23 2019 60 mins
    When it came to deploying a new network across campus, Dartmouth College came to an important realization - students learn best when the network is learning, too.

    In this webinar, the Dartmouth IT team is joined by experts from Mist and Juniper to describe how an AI-driven network is being used to deliver new learning experiences on campus.

    Watch now, and learn how to:

    -Gain visibility into the Wi-Fi user experience
    -Quickly troubleshoot network problems with an AI-driven virtual assistant
    -Predict network problems before they arise
    -Implement personalized location services, such as wayfinding and proximity notifications
  • The Next Level of Cloud Security: Taming Complexity
    The Next Level of Cloud Security: Taming Complexity
    Richard Turner, Dir. Public Cloud Marketing, Barracuda; Vinayak Shastri, Sr. Product Manager, Barracuda Recorded: Apr 23 2019 40 mins
    Organizations know that cloud security is different than what they were used to doing on-premises...but what many don’t realize is that cloud introduces new vulnerabilities that their on-premises world never needed to account for.

    In the future, 80% of cloud breaches will be due to misconfiguration, credentials mismanagement, or insider theft – not the cloud itself. Just what do organizations need to worry about in the cloud, and how can they remediate these new vulnerabilities?

    Join us to discuss these new challenges and what organizations can do to better protect themselves in the Public Cloud.
  • vRouter Solutions for Internet Service Providers: Border Router, BNG and CG-NAT
    vRouter Solutions for Internet Service Providers: Border Router, BNG and CG-NAT
    Kelly LeBlanc, 6WIND VP of Marketing & Yann Rapaport, 6WIND VP of Product Management Recorded: Apr 23 2019 36 mins
    Internet Service Providers are replacing hardware routers with virtual routers (vRouters) on x86 servers for Border Router, BNG and CG-NAT use cases. 6WIND recently announced ISP customers such as Excitel Broadband, Grape, JHComp and Minorisa are now deployed with 6WIND vRouters for use cases that service up to 200,000 users on Intel servers.

    This Webinar contains information that helps Network Architects, Engineers and Managers at Internet Service Providers, Universities and educational institutions that serve as ISPs, and Integrators to increase performance while reducing costs by replacing hardware routers with vRouters on Intel servers. Customer success stories will be included.
  • Black Hat Webinar: Securing Active Directory Administration
    Black Hat Webinar: Securing Active Directory Administration
    Sean Metcalf, Trimarc (Founder and Principal Consultant) and Vince Stross, ExtraHop Networks (Principal Security SE) Recorded: Apr 22 2019 61 mins
    Organizations have been forced to adapt to the new reality: Anyone can be targeted and many can be compromised. This has been the catalyst for many to tighten up operations and revamp ancient security practices. They bought boxes that blink and software that floods the SOC with alerts.

    Is it enough? The overwhelming answer is: No.

    This Black Hat-hosted presentation will:
    - explore typical administration methods and how attackers exploit them
    - provide the best methods of secure administration to protect privileged credentials
  • Juniper Connected Security
    Juniper Connected Security
    Marco Martinez Recorded: Apr 19 2019 21 mins
    Organizations continue to evolve beyond just premises-based IT deployments and are leveraging multicloud to transform IT. As this transformation takes place, it increases the speed they can move, but also the complexity of their environment, heightening the need for fast and elastic protection from advanced threats. Organizations need automated, repeatable security across their entire network. Juniper Connected Security gives organizations the ability to safeguard users, applications and infrastructure by extending security to all points of connection across the network.
    Key validation points:
    -Safeguard users, applications and infrastructure against advanced threats
    -Automate security coverage from endpoints to edge and every cloud in between
    -Multicloud-ready with fast and elastic protection
    -See who and what is on your network and enforce policy across all connection points
    -End-to-end, top-to-bottom best-in-class secure networking
    -Open, since no one has a security green field and we must build on security solutions and infrastructure already in play
  • Introduction to Anuta ATOM Network Workflow Automation
    Introduction to Anuta ATOM Network Workflow Automation
    Anuta Networks Recorded: Apr 18 2019 1 min
    Introduces a graphical designer to automate network provisioning and maintenance activities using low-code automation.

    ATOM Network Workflow Automation eliminates human errors and empowers network administrators to focus on strategic business outcomes rather than mundane daily tasks.
  • SD-WAN: Battle of the Internet Core Alternatives
    SD-WAN: Battle of the Internet Core Alternatives
    Adam Gervin, VP & Creative Director at Mode Recorded: Apr 18 2019 14 mins
    Businesses with SD-WAN often rely on the public Internet for connectivity. When these companies experience Internet unpredictability – glitching real-time applications (e.g. video and voice), inconsistent long-haul traffic, poor SaaS and IaaS performance, or compromised security and compliance – they turn to a growing number of Internet Core alternatives. How do they make the right choice?

    In this webinar we will:

    1. Compare different Internet alternatives for SD-WAN: optimized Internet, MPLS, Cloud MPLS, and SD-CORE
    2. Discuss the advantages of Autonomous Network Control over AI-based Network Control
    3. Quantify the performance advantages of Mode Core over public Internet for branch, data center, and cloud connectivity; and cloud-to-cloud connectivity
  • The DDoS Attacks Go Up and Down
    The DDoS Attacks Go Up and Down
    Guy Rosefelt, Director of PM at NSFOCUS Recorded: Apr 18 2019 48 mins
    NSFOCUS Security Labs research has seen a dramatic decrease in DDoS attacks between 2017 and 2018. We are in consensus with other TI vendors as to most of the driving factors behind this large scale reduction, except one. This webinar will show why NSFOCUS is breaking from the pack on one of the key factors leading to the significant decrease in DDoS attacks in 2018.
  • A 360-Degree View of  the Latest APT Groups
    A 360-Degree View of the Latest APT Groups
    Fred Plan, Sr. Threat Intel Analyst, FireEye Recorded: Apr 18 2019 58 mins
    FireEye analysts work to identify cyber espionage trends and gather the evidence needed to name APT groups.

    The most recently named groups—APT38, APT39, APT40—exemplify the variety of state-sponsored threats that network defenders face today: a North Korean operator specializing in bank heists, an Iranian group tracking personal data and specific individuals and a long-established Chinese actor shifting its targeting to reflect changing geopolitics.

    In this webinar, Fred Plan, Sr. Threat Intelligence Analyst at FireEye provides:

    • A high-level overview on how nation-state interests are driving APT activity
    • Insight into the most recent APT groups investigated by FireEye
    • The latest adversary tactics, techniques and procedures (TTPs) these groups use

    Register NOW for the live webinar
  • 「ゼロトラスト」のホントのところ~騙される前に全容を知っておく~
    「ゼロトラスト」のホントのところ~騙される前に全容を知っておく~
    髙岡 隆佳, エバンジェリスト 株式会社シマンテック Apr 25 2019 6:00 am UTC 60 mins
    騙される前に全容を理解しておこ

    最近よく耳にする「ゼロトラスト」。トラスト(信用)=0(存在しない)、では一体何を信じればいいのでしょう?信用のない前提のセキュリティとは?ユーザ側の混乱を無視し、セキュリティ業界はゼロトラスト推しで持論を展開しています。
    当ウェビナーでは、今ここでゼロトラストの歴史を振り返り、ゼロトラストの本来の意味やフレームワークを理解し、今なぜゼロトラストが必要なのかを解説します。ぜひご参加ください。
  • Introduction to Managed SD-WAN
    Introduction to Managed SD-WAN
    Ashwath Nagaraj (Founder & CTO, Aryaka) Apr 25 2019 9:00 am UTC 47 mins
    As the hype cycle around SD-WAN reduces and enterprises continue to deploy hundreds of boxes across different sites, scalability is emerging as the primary challenge for growing global organizations. Network managers have to juggle multiple vendors while managing configuration, patches and security loopholes, complicating and slowing down SD-WAN adoption. Managed SD-WAN solutions are growing rapidly, but not all vendors are created equal. Some vendors offer cloud, but don’t own the network. Other service providers offer managed WANs, and yet others offer professional management. How do you differentiate between the options and pick the right managed SD-WAN for your organization?

    In this webinar you will join industry experts to learn:

    - Fundamental building blocks of a managed SD-WAN architecture
    - Pros and cons for each of the different management and operational models
    - Total cost of ownership (TCO) benefits of a 100% managed SD-WAN for a global deployment
  • Taking the Oh out of IoT
    Taking the Oh out of IoT
    Richard Leadbetter, Technical Sales Specialist, EMEA Apr 25 2019 9:00 am UTC 30 mins
    By 2019, 92% of industrial organizations will have adopted Internet of Things (IoT) technology and 77% believe it will transform manufacturing. But, how are business executives using IoT today and what do they expect from it in the future? Join us and find out
  • Transforming creative workflows: Making great content in the cloud
    Transforming creative workflows: Making great content in the cloud
    IBC365 | Jellyfish Pictures | More speakers announced soon... Apr 25 2019 3:00 pm UTC 75 mins
    Join IBC365 on Thursday 25 April at 4pm BST to explore why creators are turning to cloud to transform the way they make great content and how virtualised workflows are unlocking the ability to work in new ways: faster, more collaborative, more efficient and more creative.

    This webinar goes inside some of the world's leading content creators, production and post-production operations to hear how they are embracing cloud technology to transform the creative processes used to make, produce and deliver video.

    We'll get hands-on with practical lessons on how cloud is enabling more collaboration, access to more talent, round-the-clock working, more content security, and slicker workflows. There's also a dose of reality, as we understand the human and technology challenges and the potential pitfalls of virtualising creative workflows.

    Case studies focus on using cloud for:
    •Streamlining content creation in the field
    •Transforming production and post-production processes
    •Efficient content delivery and backhaul
  • Email Security.cloud: A walkthrough of the latest product enhancements
    Email Security.cloud: A walkthrough of the latest product enhancements
    Jimmy Lin, Sr. Product Manager, Symantec Apr 25 2019 3:00 pm UTC 60 mins
    On 29 March 2019, we further extended the capabilities of Symantec Email Security.cloud. As a SaaS security service, it undergoes many upgrades throughout the year, allowing us to make improvements and add new capabilities. We have always understood the importance of ensuring our products are designed around the user’s needs. This is critical as our customers rely on Symantec to provide a highly practical solution.

    In this webinar, we’ll do a deep dive into some of the recent enhancements of our Email Security.cloud solution:

    Indicators of Compromise Blacklisting
    Service Configuration Health
    Symantec Email Security.cloud App for QRadar
    And more
  • Field Testing and Troubleshooting of PON LAN Networks per IEC 61280-4-3
    Field Testing and Troubleshooting of PON LAN Networks per IEC 61280-4-3
    Jim Davis, Fluke Networks Apr 25 2019 3:00 pm UTC 75 mins
    This webinar address field testing and troubleshooting PON Networks per IEC 61280-4. Topics include inspection and cleaning (APC vs. UPC), PON Basics, understanding loss budgets, setting a reference, troubleshooting using an OTDR and Power Meter, and how to document results. Attendees will earn one BICSI CEC.
  • Dissecting an OEM Maintenance Contract: What Services are Actually Included?
    Dissecting an OEM Maintenance Contract: What Services are Actually Included?
    Ed Ismail, VP Maintenance; Jordan Bischof, Global Dir., Storage; Joel Coviello, Dir. Enterprise Storage Apr 25 2019 4:00 pm UTC 60 mins
    Understanding the number of services and features included in an OEM maintenance contract can be confusing and knowing which platforms these services will benefit is equally challenging.

    Join this presentation to better understand:
    •The services often “bundled” in an OEM support agreement
    •How the link between hardware maintenance and software licensing affects buying decisions
    •Variables to consider when determining which portions of your data center do and do not require premium services
    •Case-studies highlighting the operational and financial impacts of these practices
  • Managing Colo to Cloud and Beyond in the TierPoint Portal
    Managing Colo to Cloud and Beyond in the TierPoint Portal
    Dale Levesque, Director – Product Management | TierPoint Apr 25 2019 4:00 pm UTC 60 mins
    More organizations are adopting a hybrid approach to IT and are seeking a partner to help integrate both outsourced and in-house IT services, ideally managed through a single interface.

    Designed to meet the needs of our customers, the TierPoint Portal is a streamlined console that provides a comprehensive user-friendly dashboard of critical information immediately upon logging in.

    From data center and managed services performance dashboards to trouble ticketing support, the TierPoint Portal is your dependable, always-on visibility tool to help manage your TierPoint IT infrastructure environment.

    Join us to learn how the TierPoint Portal makes it easy to view, protect and access management tools for all facets of your environment.
  • 2019: How Your Network Can Help Build Better Customer Relationships
    2019: How Your Network Can Help Build Better Customer Relationships
    Cherie Martin, Sr. Solutions Marketing Mgr (Aruba), Josh Jaster, Systems Engineer (Aruba) Apr 25 2019 5:00 pm UTC 35 mins
    Is attracting new customers and increasing sales at the top of your business’s priority list for 2019? You’re not alone. In fact, roughly 70% of SMBs are investing or planning to invest over the next 1-2 years in technology to personalize and improve customer experience.

    Join us as Cherie Martin, Sr. Solutions Marketing Manager, and Josh Jaster, System Engineer, review two core features your network must have to gain insight to your customer base and take engagement to the next level.

    Attend and you could qualify for a FREE Access Point and a 90-day trial of Aruba's network cloud-management solution, Aruba Central.
  • Your modern website needs a modern CDN
    Your modern website needs a modern CDN
    Andy Wyatt, Senior Product Marketing Manager, Instart Apr 25 2019 5:00 pm UTC 45 mins
    Delivering exceptional web experiences today requires a CDN that can go beyond the edge, and actually give you control and optimizations in the browser.

    As the web quickly changes, your customers expect more secure and performant web experiences. It’s crucial that your CDN does more than just cache static files and be available all around the world.

    The truth is, almost 50% of the requests an average website makes comes from a third party, which means a traditional CDN is only delivering half of your web experience. On top of that, the browser, not the edge, is becoming the point where optimizations and control need to be applied to give every user a great experience with your website.

    In this webinar, we’ll cover:

    - What makes up a modern website: public cloud, third-party tags, and dynamic content all coming together in the browser
    - Why modern websites need more than just caching and delivery to enable exceptional customer experiences
    - What optimizations and controls you should be looking for in a modern CDN
  • Buying Down Risk in the New World of App Development - Imperva Part 2
    Buying Down Risk in the New World of App Development - Imperva Part 2
    Kim Lambert, Senior Product Marketing Manager, Imperva; Tim Garon (Moderator) Apr 25 2019 5:00 pm UTC 60 mins
    In this era of rapid modern application development, organizations often deploy code into production with critical vulnerabilities that often lead to exploitation by cybercriminals. These bad actors are on the look-out, scanning for vulnerabilities that will allow them to establish a silent foothold into your environment. Join Imperva and (ISC)2 on April 25, 2019 at 1:00PM Eastern and discover a defense in depth security strategy to protect your most valuable web applications and your business from damaging cyber-attacks.
  • Cybersecurity Mythbusters: 6 Dangerous Cybersecurity Myths Debunked
    Cybersecurity Mythbusters: 6 Dangerous Cybersecurity Myths Debunked
    Louis Evans, Product Marketing Manager & Todd Thiemann, Director of Product Marketing - Arctic Wolf Networks Apr 25 2019 6:00 pm UTC 48 mins
    At Arctic Wolf, we continually encounter IT security myths that persist among businesses of every size. Isn’t antivirus all you need for cybersecurity? Aren’t large enterprises the only ones affected by data breaches? 24x7 security monitoring is overkill, right? These myths can significantly impact strategic IT decisions and put your business operations at risk.

    These are the kinds of questions, myths, and cybersecurity urban legends we’ll explore in this webinar. Discover what’s true—and what’s simply a myth.

    The webinar covers:

    •6 common myths about cybersecurity and cyber risk
    •The threats these myths pose to your business
    •Cybersecurity facts you can use to protect yourself

    Let the Arctic Wolf Cybersecurity Mythbusters team educate and entertain you. Save your seat now!

    And click here: http://bit.ly/2B3lyFv for part one of our six-part “mythbuster” blog series.
  • Road Rage Against the Machine: Understanding & Dealing with z14 Traffic Patterns
    Road Rage Against the Machine: Understanding & Dealing with z14 Traffic Patterns
    John Baker Apr 25 2019 7:00 pm UTC 75 mins
    How often have you been stuck in traffic? In many cases, we slowly advance through the gridlock and eventually spot the offending accident or construction work, then off we go. What about when we see no problem? We slow down or stop (sometimes repeatedly), for no apparent reason, then resume just as mysteriously. Not understanding why, is often just as frustrating as the delay itself.
    The z14 has vast throughput potential. With almost 200 Processing Units (PU's) and 32 TB of cache memory, this is a box designed for massive, parallel processing. So why do the same jobs sometimes take longer? Why do I need to turn on additional engines when transaction rates seems similar? Just as higher speed limits or more lanes don't always solve traffic problems, more MIPS or more memory is not always the answer.
    In this session, John will share his insights from over 25 years of performance analysis. we will explore common sources of application delays and discuss practical solutions to reduce these delays. Stop the rage. Don't get mad; get moving.
  • Want Better Network Visibility with Less Complexity? Here's How!
    Want Better Network Visibility with Less Complexity? Here's How!
    Bob Laliberte, Senior Analyst, ESG and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Apr 29 2019 8:00 am UTC 53 mins
    Enable IT Collaboration with a Common Distributed Data Services Layer.

    The IT environment is rapidly changing, becoming more distributed and complex as organizations transform themselves to provide better digital experiences. Because these improved experiences will be more dependent on the network, it’s imperative for organizations to properly plan and prepare now to eliminate security blind spots. The bottom line is that companies need complete visibility into their physical, virtual and cloud infrastructure to detect and contain data breaches and mitigate risk.

    To accomplish this, successful organizations resist the legacy mentality that relies on more people and more tools at every location. Instead, they are turning to a new architectural approach that disaggregates the speed of the network from the speed of the tools inspecting traffic on that network. This innovative approach allows enterprises to absorb change in network speed and technology without compromising security.

    ESG believes the foundational step in this approach is to ensure comprehensive infrastructure visibility across data centers and distributed edge and cloud environments. To do this, organizations must have a common distributed data services layer that can collect, process and distribute the right information to the right tools at the right time.

    Join us to learn how a consolidated network architecture that includes security delivers better visibility, reduces complexity and increases tool efficiency.
  • SD-WAN Transforms to SD Branch – Taking Software Defined One Step Beyond
    SD-WAN Transforms to SD Branch – Taking Software Defined One Step Beyond
    Patrick Grillo, Senior Director, Security Solutions, Fortinet Apr 29 2019 9:00 am UTC 45 mins
    The benefits of SD-WAN are clear as evidenced by the massive market opportunity being forecast over the next several years. But as usual in a Wild, Wild West market not all SD-WAN solutions are equal.

    Besides satisfying the wide area networking requirements of SD-WAN – optimizing application performance, direct Cloud access and reducing WAN costs – leading SD-WAN solutions should also have comprehensive security at the top of their feature list. But that security capability should extend to the entire branch office infrastructure not just the wide area connection. That’s why SD-Branch is starting to take hold and should be part of your branch office transformation journey.

    This session will focus on the key network and security features that any SD-Branch solution should have in order to be considered for your network and how branch level security should be an extension of your larger enterprise-wide security infrastructure.
  • Microsoft Data Platform 2017 New Features and Why to Upgrade
    Microsoft Data Platform 2017 New Features and Why to Upgrade
    Warner Chaves, Pythian Consultant and Microsoft MVP; and Vitor Fava, Pythian Consultant and Microsoft MVP Apr 29 2019 3:00 pm UTC 40 mins
    Microsoft Data Platform 2017 is the latest, most up-to-date version of Microsoft’s Azure and SQL Server platforms, with many new features to discover. But where do you start?

    Listen to this webinar to learn:
    1. What improvements did Microsoft focus on in this upgrade?
    2. Are you being too cautious when upgrading?
    3. What are the differences between on-premise and cloud with this release?
  • Airheads Tech Talks:  Clarity and AirWave Glass
    Airheads Tech Talks: Clarity and AirWave Glass
    Sreedhar R, Aruba TAC Team Apr 30 2019 9:00 am UTC 90 mins
    Clarity is a new module that interacts with Aruba AirWave to deliver powerful and intuitive forensics, allowing IT teams to anticipate and quickly resolve connectivity problems before the user is affected. AirWave Glass is built from grounds up using the latest cloud computing technologies primarily the ELK (Elastic, Logstash, Kibana) stack. Unlike the master console, Glass aggregates and stores the data that is required to build dashboards and reports onto the platform itself.

    During this webinar we will cover the below topics:

    · Clarity configuration & Workflow
    · Basic Clarity troubleshooting.
    · AirWave Glass Basic Workflow.
    · Glass and AMP configuration.
    · Basic Glass troubleshooting
  • Live Cloud masterclass: mastering multi-cloud management
    Live Cloud masterclass: mastering multi-cloud management
    David Simpkins, Simon Walker, and Dushan Ratnam Apr 30 2019 1:00 pm UTC 30 mins
    In our latest masterclass, we explore how best to manage your multi-cloud environment and achieve business success.

    According to the Cloud Industry Forum:
    - Over 1/3 of organisations are using at least 3 different cloud providers
    - Over half the organisations believe that their security and regulatory solution for their cloud-based services isn’t as good as it could be

    The worrying conclusion is that it’s getting harder to manage your cloud experience across hybrid (public and private) cloud, and your compliance manager is going to get more demanding!

    This doesn’t just need the right tools, process, or systems, it needs the right people and skills, especially as you grow and scale your cloud.

    Are you getting the best guidance from your service providers to help you succeed?
    Find out more by watching our webinar.

    Speakers:
    David Simpkins- General manager, managed services and public cloud, BT
    Simon Walker- Product management, BT
    Dushan Ratnam- Product management, BT
  • How to Optimize Application Performance over a Managed SD-WAN
    How to Optimize Application Performance over a Managed SD-WAN
    Jig Ruparel, Principal Strategic Architect, Aryaka Apr 30 2019 2:00 pm UTC 45 mins
    The wide area network is key to delivering an excellent quality of experience to end-users. Enterprise application users not only expect applications to be fast and reliable but need the high performance to enable their productivity. Users don’t have time to wait for web apps to load and transactions to complete; and they need high quality real-time applications like Office365, 8x8, Salesforce, Webex, Zoom and others to work flawlessly. We will show a demo and will have a customer join us.

    In this live educational webinar, you’ll learn how a managed SD-WAN offering can help you achieve superior application performance for on-premise as well as SaaS applications, answering the following questions:

    • Can I gain constant, immediate end-to-end visibility into application performance?
    • Does focus on network performance automatically improve application performance?
    • Do I need to make trade-offs between application performance and security?
    • How can I reduce application latency across a global network?

    Who should attend:
    • Network architects and administrators
    • Application architects (SaaS, UCaaS, etc)
  • The Case for Managed Home Wi-Fi
    The Case for Managed Home Wi-Fi
    Ioannis Kanellakopoulos, PhD, Consulting Chief Scientist, ASSIA & David Stevenson, CRO, ASSIA Apr 30 2019 3:00 pm UTC 60 mins
    As in-home Wi-Fi performance is becoming a primary determinant in how a residential customer perceives the quality of their internet service, operators are looking to take responsibility for managing the Wi-Fi Quality of Experience for their subscribers. In this webinar, we will bust some of the common myths about the next generations of Wi-Fi—5GHz, 5G, and adding additional access points in the home—solving Wi-Fi QoE problems on their own. We will discuss the evolution of the Wi-Fi software stack and how a combination of emerging standards and putting the control plane in the cloud will knock down barriers of entry for chip and CPE manufacturers in being players in managing home Wi-Fi, and the benefits carriers will experience as a result.
  • How to Optimize Application Performance over a Managed SD-WAN
    How to Optimize Application Performance over a Managed SD-WAN
    Jig Ruparel, Principal Strategic Architect, Aryaka Apr 30 2019 4:00 pm UTC 45 mins
    The wide area network is key to delivering an excellent quality of experience to end-users. Enterprise application users not only expect applications to be fast and reliable but need the high performance to enable their productivity. Users don’t have time to wait for web apps to load and transactions to complete; and they need high quality real-time applications like Office365, 8x8, Salesforce, Webex, Zoom and others to work flawlessly. We will show a demo and will have a customer join us.

    In this live educational webinar, you’ll learn how a managed SD-WAN offering can help you achieve superior application performance for on-premise as well as SaaS applications, answering the following questions:

    • Can I gain constant, immediate end-to-end visibility into application performance?
    • Does focus on network performance automatically improve application performance?
    • Do I need to make trade-offs between application performance and security?
    • How can I reduce application latency across a global network?

    Who should attend:
    • Network architects and administrators
    • Application architects (SaaS, UCaaS, etc)
  • Segmentation and Security: How to plan for right-sized security testing
    Segmentation and Security: How to plan for right-sized security testing
    Mark Butler, SVP & CISO, MegaplanIT; Peter Smith, Founder & CEO, Edgewise Apr 30 2019 5:00 pm UTC 60 mins
    During this webinar, Mark Butler, SVP and CISO from MegaplanIT and Peter Smith, Founder and CEO, Edgewise will explore how to plan for penetration tests and/or audits. How can you determine if you need a full penetration test or if you simply need to prove network segmentation is implemented and working as intended?

    Topics that will be discussed include:

    - What types of network and data controls do I need to protect critical data?
    - Are those controls adequate to protect data from overexposure?
    - Do my controls allow me to achieve provable security?
  • Don’t Let Digital Transformation Wreak Havoc on Your Network!
    Don’t Let Digital Transformation Wreak Havoc on Your Network!
    Sam Kumarsamy, Sr. Product Marketing Manager Gigamon Apr 30 2019 5:00 pm UTC 60 mins
    Organizations adopting digital apps must deliver an engaging user experiences at the enterprise level to be successful. Unfortunately, the road to great digital experiences is paved with speed bumps: they can cause networks to become even more complex as they groan under the weight of accommodating more users, increased data volume and higher speeds.

    Yes, digital apps are hyper-agile, but they are also very complex: components are often outsourced, apps are usually mega-tiered and are deployed across physical, virtual and cloud networks, making it difficult to get visibility into traffic. And without that visibility, how can you truly ensure a great experience?

    Help is at hand. During this webinar, you will learn how to build an efficient network architecture to provide an engaging digital experience.

    Attendees will learn how to:
    • Utilize tools efficiently by preventing packet duplication and optimizing traffic
    • Enhance security by collecting and distributing NetFlow metadata to tools more effectively
    • Identify, categorize and visualize more than 3,000 applications automatically

    See how a next-generation network packet broker increases visibility, improves security and enables companies to maximize their investment in tools to exceed user expectations.
  • Multi-Cloud Load Balancing and Application Services
    Multi-Cloud Load Balancing and Application Services
    Steve Allie Apr 30 2019 5:00 pm UTC 41 mins
    Walk through a live demo on how applications can be delivered consistently regardless of the underlying infrastructures.
  • The Office 365 Dilemma – How Secure is Secure?
    The Office 365 Dilemma – How Secure is Secure?
    Sunil Choudrie, Senior Strategist, Symantec Apr 30 2019 5:00 pm UTC 31 mins
    Office 365 has captured the imagination of many organizations, offering a wide range of productivity applications in a single platform. However, as organizations race to the cloud they realise that solving the security challenges may not be as straightforward as they hoped.

    The Office 365 platform encompasses communication, content creation and distribution applications stored in a cloud environment that’s open to all (any user, any device). In short, this single platform reflects the full range of security challenges that any organisation faces, so no wonder security deserves a deeper think.

    Join Sunil Choudrie, a Security Strategist from Symantec where he will discuss the security implications and key considerations for organizations that have moved, or are planning to move to Office 365.