Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Solving Enterprise Business Challenges Through Scale-Out Storage & Big Compute Solving Enterprise Business Challenges Through Scale-Out Storage & Big Compute Michael Basilyan, Google Cloud Platform; Scott Jeschonek, Avere Systems; Rob Futrick, Cycle Computing Recorded: Jan 24 2017 58 mins
    Google Cloud Platform, Avere Systems, and Cycle Computing experts will share best practices for advancing solutions to big challenges faced by enterprises with growing compute and storage needs. In this “best practices” webinar, you’ll hear how these companies are working to improve results that drive businesses forward through scalability, performance, and ease of management.

    In this webinar, you will learn:
    - How enterprises are using Google Cloud Platform to gain compute and storage capacity on-demand
    - Best practices for efficient use of cloud compute and storage resources
    - Overcoming the need for file systems within a hybrid cloud environment
    - Understand how to eliminate latency between cloud and data center architectures
    - Learn how to best manage simulation, analytics, and big data workloads in dynamic environments
    - Look at market dynamics drawing companies to new storage models over the next several years

    In just 60-minutes, you’ll be presented with a foundation to build infrastructure to support ongoing demand growth and have ample opportunity to ask direct questions to presenters.
  • Elevate IT Operations in the Boardroom with App Analytics Elevate IT Operations in the Boardroom with App Analytics Bryan Whitmarsh, Sr Principal Product Manager, Application Performance Management, CA Technologies Recorded: Jan 24 2017 52 mins
    Over the past 20+ years, IT has mastered the art of collecting performance and user data. But to succeed in today’s application economy, you need to learn how to take this information and evolve into a data-driven business. Your success hinges on ensuring that every customer experience is the best it can be, and that means gaining insight across the vast complexity of your mobile, web and application environments. In this session, learn how analytics can sort the wheat from the chaff in your performance data to highlight key business insights that will separate you from your competitors and gain you a seat in the boardroom.
  • 2017 Trends in Cloud 2017 Trends in Cloud William Fellows, Founder and Research Vice President - Cloud and Melanie Posey, Research Vice President for VotE- Cloud Recorded: Jan 24 2017 60 mins
    Digital transformation is a business imperative, not an option. Cloud is powering this change: It provides the new style of IT that supports the information, process and platform transformations required to link technology and information assets with marketing and customer experience to deliver new or enhanced digital processes.

    Join William Fellows, Founder and Research Vice President for Cloud, as he discusses what’s coming this year in cloud, and how the industry’s major battleground in 2017 will be how, from where and at what price cloud transformation services are delivered to customers.
  • Are Hybrid Clouds in Tune with Future Business Growth? Are Hybrid Clouds in Tune with Future Business Growth? Agatha Poon 451 Research, Rajesh Awasthi Tata Communications Recorded: Jan 24 2017 61 mins
    Advancements in infrastructure and platform technologies with growing availability of innovative business models has inclined the focus on user-centric service delivery mechanisms by redefining the very nature of IT strategy within a business organization. Companies that wish to pave the way for a successful digital transformation journey must shed conventional thinking and embrace towards an agile approach to IT operations and have a reliable and intelligent Ecosystem. So, to start with, we ask ourselves How and What should we look for in a partner?
  • ATM Threats to the Financial Sector ATM Threats to the Financial Sector Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific & Japan Recorded: Jan 24 2017 54 mins
    There’s a new threat in town – Jackpotting. It utilises malware directly infected onto ATMs, requiring no card skimmers that can be easily detected, no time needed to steal credentials, and grants access to every single dollar held in the machine.

    ATM machines may not follow the strict patch management regimes that corporate machines do, leaving their operating system potentially much more vulnerable to malware attacks. Beyond the monetary loss, being Jackpotted can also negatively impact the brand, and expose the bank to regulatory action from lack of due diligence in risk management.

    Hear how Symantec Cyber Security Services can help deliver a solution for these types of attacks. Through the combination of Data Center Security (DCS) and Managed Security Services (MSS) monitoring, you will receive prompt validated detection of both pre and post compromise attempts in near real-time, allowing faster responses and remediation.
  • Accelerate threat detection and incident response through a managed SOC service Accelerate threat detection and incident response through a managed SOC service Sridhar Karnam, Director, Product Marketing @ Arctic Wolf Networks Recorded: Jan 23 2017 31 mins
    A SIEM is costly and complex, IDS/ IPS are not enough, threat intelligence is overwhelming, and a SOC takes years to build and an army of security staff to manage. So where do I start with security? How should I prioritize? How can I integrate all the tools? How many security staff will I need? How do I integrate a SOC and a NOC?

    Managed Detection and Response is the answer to all these questions. With a focus on detecting and responding to threats, the service configures the right combination of tools and provides the people and process to help you quickly implement the best security within your budget. With a simple subscription-based model, you will pay a fixed price that is not dependent on your data volume. It is time to throw your SIEM, IPS, and other point solutions out and move forward with MDR.

    This webinar covers how you can implement three years worth of work on your security roadmap in just 60 min.
  • CloudPhysics On Premise and Cloud Comparison Cost Calculators CloudPhysics On Premise and Cloud Comparison Cost Calculators CloudPhysics Recorded: Jan 20 2017 15 mins
    CloudPhysics takes the complexities of your virtual infrastructure inventory, performance, and configuration analysis and compels the evaluation nearly effortless. Learn how to use the On Premise IT Cost Calculator to derive the value of your current workloads and use the Cost Calculator for Microsoft Azure to make an informed comparison of the two scenarios.
  • What To Ask Your Vendor on Enterprise SD-WAN Capabilities What To Ask Your Vendor on Enterprise SD-WAN Capabilities Ramesh Prabagaran, VP Product Management, Viptela Recorded: Jan 20 2017 46 mins
    What are the absolute essential requirements in an SD-WAN solution? Although Gartner has defined the four key requirements for SD-WAN (see below), there are some more critical features required to meet the enterprise-grade capabilities. For example, network segmentation for different kinds of applications is a widely deployed feature across all major industries, primarily to isolate critical applications and to reduce the attack surface during vulnerabilities.

    This webinar will more broadly cover the essential enterprise SD-WAN features and how they translate to common deployment scenarios in different industries. These features include:

    - Overlay capability over MPLS, Broadband and LTE
    - Unified and centralized management of all WAN infrastructure
    - Network segmentation with per-segment topologies
    - Predictable Application SLA with centralized policies and real-time traffic steering
    - Mature routing capabilities with BGP, OSPF, VRRP, and IGMP
    - Unified and centralized management of all WAN infrastructure
    - Robust-zero trust WAN security including authentication, encryptions, segmentation and service chaining

    As a background, here are Gartner’s four key requirements for SD-WAN:
    - SD-WAN solutions provide a lightweight replacement for traditional WAN routers, and are agnostic to WAN transport technologies (that is, they support MPLS, Internet, Long Term Evolution [LTE], etc.).
    - Based on business and/or application policies, SD-WAN solutions allow for load sharing of traffic across multiple WAN connections in an efficient and dynamic fashion.
    - SD-WAN solutions dramatically simplify the complexity associated with management, configuration and orchestration of WANs.
    - SD-WAN solutions must provide secure VPNs, and have the ability to integrate additional network services and offload Internet-destined traffic closer to the edge of the network.
  • LiveAction: Gaining Deep Visibility Into The WAN Overlay LiveAction: Gaining Deep Visibility Into The WAN Overlay David Izumo, Principal Engineer, Technical Marketing, LiveAction & Manan Shah, Director of Product Management, Viptela Recorded: Jan 20 2017 38 mins
    Operation teams need to detect and correlate application problems with the real-time events happening on, both, the overlay and underlay networks. They also need capability for retrospective visualization into such problems. SD-WAN introduces new requirements for such advanced monitoring capabilities.

    LiveAction’s LiveNX™ is a robust visualization and analytics engine that integrates the network-generated metadata from Viptela SD-WAN technology to monitor application traffic on an end-to-end basis in real time. The retrospective visualization capability complements the intelligence provided by Viptela’s management solution and thus simplifies SD-WAN planning, monitoring and troubleshooting.

    This webinar will cover the major integration capabilities between LiveAction’s LiveNX and Viptela’s SD-WAN and share existing best practices to effectively manage the entire lifecycle of an SD-WAN deployment. These include:

    • Planning: Selecting pilot sites when planning SD-WAN deployments, identifying unsanctioned applications and end users, and establishing network utilization baselines which are used for right-sizing
    • Deployment: Using LiveNX real-time visualization to verify Viptela SD-WAN policies and assure services are not impacted in the event of brownouts or abnormal events
    • Management: Monitoring bandwidth and visualizing path control so network administrators can ensure application performance and mitigate problems before they affect users. Reporting on business applications to manage and optimize voice and video communications
  • TFD: Network Engineer Roundtable on Deploying SD-WAN TFD: Network Engineer Roundtable on Deploying SD-WAN Panel of 8 Network Architects, moderated by Tech Field Day Recorded: Jan 20 2017 51 mins
    Ten seasoned network engineers will debate on their views and experiences with SD-WAN. This roundtable discussion moderated by Tech Field Day focuses on how network professionals are analyzing and adopting SD-WAN technology, and integrating it into existing network architectures.

    SD-WAN has been the most rapidly deployed SDN technology. But major concerns remain on which features are the most fundamental and differentiating, and the maturity of the technology for large scale deployments. The major discussion topics will include:

    - Maturity of SD-WAN for prime-time deployment
    - Relative importance of features like routing, security, segmentation, vCPE, multi-tenancy, Application steering, SaaS, and Cloud.
    - ROI and the Before/After picture
    - Most typical use-cases across industries
    - Best practices in deploying SD-WAN based on personal experiences
  • Anuta: Network Orchestration for Managed Branch Services Anuta: Network Orchestration for Managed Branch Services Kiran Sirupa, Director of Marketing & Praveen Vengalam, Co-Founder and VP of Engineering, Anuta Networks Recorded: Jan 19 2017 36 mins
    SD-WAN presents a transformational opportunity for Telcos and MSPs to offer value added services. Anuta NCX orchestrator bridges the multi-vendor legacy and SD-WAN infrastructure for a smoother transition. Join us live to learn about Anuta's SD-WAN and vCPE customer deployments at global Tier-1 MSPs.
  • Zscaler: Cloud Security with SD-WAN, Case Studies and Best Practices Zscaler: Cloud Security with SD-WAN, Case Studies and Best Practices Sri Subramanian, Sr. Director of Product Management, Zscaler & David Klebanov, Director of Technical Marketing, Viptela Recorded: Jan 19 2017 47 mins
    Gartner estimates that by the end of 2019, 30% of enterprises will use SD-WAN technology in all their branches, up from less than 1% today. And as of Nov 2016, Gartner has estimated about 50,000 production SD-WAN deployments. SD-WAN is a transformational approach to simplifying branch office networking.

    However, security is a critical factor for SD-WAN adoption, especially for cloud and Internet applications. With Zscaler and Viptela you can now secure all Internet traffic without having to backhaul it to centralized DMZs. Customers have seen more than 50% WAN cost-savings while keeping their branch offices and employees protected.

    Join Viptela and Zscaler to discuss the best practices for securing your distributed enterprise with cloud security and SD-WAN. They will also cover:

    - Common use case scenarios for SD-WAN and cloud security
    - Real world deployment examples
    - Best practices for improving your security posture with cloud security
    - Zscaler and Viptela technical integration elements
  • Enabling AWS and Azure Migrations with SD-WAN Enabling AWS and Azure Migrations with SD-WAN Rob McBride, Solutions Marketing, Viptela & Ariful Huq, Product Management, Viptela Recorded: Jan 19 2017 49 mins
    Gartner has highlighted that the differences in network services (such as routing, security and application delivery) between internal data centers and IaaS environments cause major issues during cloud migrations. Networking teams face many challenges migrating their workloads to AWS and Azure. These include:

    - Extending secure connectivity from the enterprise to the cloud is operationally complex
    - Cloud traffic flows sub-optimally through the centralized data center/DMZ, instead of directly from the branch or from a regional exit - this affects performance of applications
    - Implementing a unified WAN policy on disparate pieces of cloud infrastructure is difficult

    This webinar will dig deeper into the networking problems of cloud migrations. And how Software-Defined WAN (SD-WAN) technology makes this faster and simpler the networking teams. The following topics will be covered:

    - Extend your WAN seamlessly to AWS and Azure
    - Implement a unified WAN policy across the enterprise and cloud
    - Typical deployment scenarios for AWS and Azure
    - Real customer examples of public cloud migration
  • Current State of Ransomware in State & Local Government Current State of Ransomware in State & Local Government Kevin Haley, Director of Product Management for Symantec Security Technology and Response Recorded: Jan 19 2017 58 mins
    Ransomware has become extremely popular with cyber criminals because it’s easy and very profitable. Organizations can defend themselves and lower the risk of ransomware or other common threats costing them time and money.

    Key Learning Objectives:

    - A look at the current state of ransomware

    - Simple and inexpensive steps that can advance state and local government security posture

    - Better understanding of the cyber security landscape

    - Best practices to take in cyber defense

    Join us for a review on simple ways, state and local government can protect themselves against ransomware attacks.

    Register for this free webinar today.
  • Visibility and Security - Two Sides of the Same Coin Visibility and Security - Two Sides of the Same Coin Cricket Liu, Exec VP, Infoblox; Dan York, CISSP, DNS Sec Prog Mgr, Internet Society; Recorded: Jan 19 2017 60 mins
    You can't secure what you can't see and not knowing what's on your network can be damaging. While security is about proactively detecting and mitigating threats before they cause damage, it is also about gaining deep visibility into today's complex networks which may include diverse platforms and architectures. A truly enterprise grade DNS, DHCP and IPAM (DDI) platform can provide that visibility because of where it sits in networks. On the downside, DNS is a top threat vector but it can be used as strategic control points to block malicious activity and data exfiltration. Join Infoblox and (ISC)2 on January 19, 2017 at 1:00PM Eastern for a round table discussion featuring Cricket Liu, a well known authority on the Domain Name System and the co- author of all of O'Reilly & Associates' Nutshell Handbooks on DNS, as we examine how strategic DNS can be used for visibility and security.
  • What’s New In CA Unified Infrastructure Management 8.5.x What’s New In CA Unified Infrastructure Management 8.5.x Robert Vacante; Raj Sundaram; Kiran Diwakar; Umair Khan Recorded: Jan 19 2017 45 mins
    Application experience is determined by the performance of the infrastructure that powers it. CA Unified Infrastructure Management (CA UIM) provides the most comprehensive solution for managing the experience of modern cloud and hybrid IT infrastructures. With the new releases of CA UIM, we continue to introduce exciting new capabilities spanning cloud, analytics and rapid configuration to help you proactively and efficiently manage the experience of today’s highly dynamic and DevOps centric environment.

    In this session we will share:
    • New out of the box dashboards that provide actionable insight across hybrid infrastructures
    • Enhanced monitoring that provides deeper insights into Microsoft Azure-based apps and services
    • Upcoming log analytics and auto¬¬-app infrastructure discovery and configuration capabilities
    • New integration between CA SystemEdge and CA UIM
    • And much more...
  • Singtel & Viptela: Address your hybrid network challenges in APAC with SD-WAN Singtel & Viptela: Address your hybrid network challenges in APAC with SD-WAN Hoo Shu Yee, Product Dir, Singtel & Ramesh Prabagaran, VP, Viptela,Inc. Recorded: Jan 19 2017 49 mins
    With APAC’s varying stages of infrastructure development, managing an enterprise Wide Area Network (WAN) in the region can be extremely challenging. This is compounded by different networking standards and service level agreements (SLAs) across countries, as well as disparities in race and culture.

    Furthermore, as more applications move onto the cloud and employees become more mobile, enterprises have to deal with growing risk of cyber attacks with increasingly complex WAN environments that combine multiple private networks and public internet services.

    In this webinar, learn more about managing an enterprise network in APAC. We will touch on how:

    - To address potential challenges with WAN architectures evolving to hybrid networks
    - To optimise and accelerate connectivity to the cloud
    - Software-Defined WAN (SD-WAN) works and helps you manage your hybrid network more effectively
    - Enterprises have leveraged SD-WAN to increase efficiency and reduce cost

    Lastly, find out how Singtel ConnectPlus SD-WAN service powered by Viptela, designed with security in mind, can help to simplify and unify your networks, while providing protection against data breaches and attacks.
  • 2017 Trends in Infrastructure 2017 Trends in Infrastructure Al Sadowski, Research Vice President - Infrastructure Recorded: Jan 19 2017 64 mins
    Enterprises and service provider customers have more storage, networking, and cloud technology choices at their disposal than ever before, and aggressive technology adopters will gain a performance and agility edge over their rivals in 2017. All Flash Arrays, Object Storage and Disaster Recovery to Cloud/Disaster Recovery as a Service are key technologies transforming the storage landscape. These new innovations account for a relatively small amount of storage revenue today, but will gradually displace traditional disk based storage systems, ultimately opening up opportunities for new innovators. The pace of change in networking technology provides the speed, capacity and agility demanded by cloud, IoT, social media, content delivery and the fabric that makes digital transformation possible.

    Join Al Sadowski, Research Vice President for Infrastructure, as he dives into what’s accelerating the virtualization of network applications and how traditional vendors will need to transform their “innovation supply chain” to produce product equivalents to highly scalable cloud infrastructure.
  • 5G RAN: A Reality Check 5G RAN: A Reality Check Brian Daly-AT&T, Adam Drobot-OpenTechWorks, Inc.,Steven Glapa-Tarana Wireless Recorded: Jan 19 2017 60 mins
    High speed and autonomous transportation, remote surgical procedures, and mixed reality experiences are just a few of the upcoming Internet of Things (IoT) technological game changers that require high speed and low latency communications infrastructure. 5G Radio Access Network (RAN) technologies continue to evolve to meet the complex and continually evolving network requirements of IoT applications.

    This webcast will explore the latest advances in RAN, including:
    • Which technologies will see the earliest deployments?
    • How important will the 3.5 GHz band networks (also known as the Citizen’s Broadband Radio Service (CBRS)) be in future 5G applications?
    • Will mmWave networks change the game in the last mile?
    • How far will the industry advance in real deployments in the next year or two?
    • Where are companies participating in this ecosystem investing their money?
    • Are there concerns for Return on Investment (ROI) that companies are trying to resolve?


    Speakers:
    Brian Daly, Director - Core & Government/Regulatory Standards, AT&T Access Architecture & Devices
    Adam Drobot, Chairman, OpenTechWorks, Inc.
    Steven Glapa, VP of Marketing, Tarana Wireless
  • Continuous Testing - Webinar 1: Einführung in das Thema Continuous Testing - Webinar 1: Einführung in das Thema Dirk Hedderich, Business Consultant, HPE Software Recorded: Jan 19 2017 44 mins
    Durch die Verwendung von agilen Entwicklungsprozessen erhöht sich die Zahl der Testfälle sowie die Frequenz der Testzyklen dramatisch. Es wird immer schwerer, alle Komponenten einer Anwendung mit allen Abhängigkeiten bei permanent reduzierten Budgets und Ressourcen umfassend zu testen. Gleichzeitig nimmt aber die Softwarequalität einer Anwendung einen immer höheren Stellenwert für den Geschäftserfolg ein. Anwendungen müssen nicht nur zuverlässig, performant und sicher sein, sondern auch schnell an veränderte Anforderungen des Marktes und/oder des Business angepasst werden, um wettbewerbsfähig zu bleiben.

    Erfahren Sie in unserer kostenfreien Webinarreihe, wie sich durch den Einsatz von Continuous Testing-Lösungen qualitativ hochwertige Anwendungen schnell, zuverlässig und kontinuierlich bereitstellen lassen und der Ressourcen-Aufwand dabei erheblich reduziert werden kann - mit dem Ergebnis, durch ein schnelleres Go-to-Market einen früheren geschäftlichen Mehrwert zu erhalten!

    Webinar 1: Continuous Testing mit HPE: Einführung
    Agile Entwicklungsmethoden, Continuous Integration, Continuous Delivery und DevOps sind aktuelle Trends – doch dabei wird der Testing-Bereich sehr oft vergessen. Software-Entwicklung und IT-Betrieb arbeiten zusammen, optimieren Prozesse und Werkzeugketten. Doch ohne Integration der Testprozesse , Erhöhung des Automatisierungsgrades und ohne eine Zusammenarbeit aller drei Bereiche bleiben wichtige Potentiale ungenutzt. Das erste Webinar dieser Reihe gibt daher eine Einführung zum Thema Continuous Testing mit Werkzeugen von HPE.
  • Singtel & Viptela: Address your hybrid network challenges in APAC with SD-WAN Singtel & Viptela: Address your hybrid network challenges in APAC with SD-WAN Hoo Shu Yee, Product Dir, Singtel & Ramesh Prabagaran, VP, Viptela,Inc. Recorded: Jan 19 2017 47 mins
    With APAC’s varying stages of infrastructure development, managing an enterprise Wide Area Network (WAN) in the region can be extremely challenging. This is compounded by different networking standards and service level agreements (SLAs) across countries, as well as disparities in race and culture.

    Furthermore, as more applications move onto the cloud and employees become more mobile, enterprises have to deal with growing risk of cyber attacks with increasingly complex WAN environments that combine multiple private networks and public internet services.

    In this webinar, learn more about managing an enterprise network in APAC. We will touch on how:

    - To address potential challenges with WAN architectures evolving to hybrid networks
    - To optimise and accelerate connectivity to the cloud
    - Software-Defined WAN (SD-WAN) works and helps you manage your hybrid network more effectively
    - Enterprises have leveraged SD-WAN to increase efficiency and reduce cost

    Lastly, find out how Singtel ConnectPlus SD-WAN service powered by Viptela, designed with security in mind, can help to simplify and unify your networks, while providing protection against data breaches and attacks.
  • Solving Today's Mobile and IoT Security Challenges Solving Today's Mobile and IoT Security Challenges Jon Garside, Product Marketing Manager & Rich Boyer, CIO, NTT i3 Recorded: Jan 18 2017 61 mins
    IoT devices are on your network. Do you know how what to do with them?
    Join this presentation to learn the latest cyber threat insights and the security challenges surrounding IoT.

    Learn more about:

    •Misconceptions in the security model for wired vs. wireless networks
    •Managing policies for IoT in the enterprise using contextual data
    •The value of device roles and real-time enforcement for IoT
  • CA Technologies: Advanced Monitoring and Management of SD-WAN CA Technologies: Advanced Monitoring and Management of SD-WAN Tim Diep, Director of Product Management, CA Technologies & Jeremy Rossbach, Sr. Product Marketing Manager, CA Technologies Recorded: Jan 18 2017 44 mins
    How does SD-WAN shift the status quo for the Operations teams? SD-WAN technology possesses sophisticated, in-built capability for operations and management, and advanced automation to address network problems in real-time. However, the Operations teams needs to seamlessly integrate this network and health status intelligence from their new SD-WAN infrastructure into their existing monitoring and management infrastructure.

    Additionally, monitoring solutions must provide visibility across all network architectures including highly dynamic and complex hybrid clouds and other SDN elements.

    This session covers the integration of CA Virtual Network Assurance and CA Performance Management with Viptela SD-WAN. The key topics that will be discussed include:

    - Eliminating visibility gaps between traditional networks and SD-WAN providing administrators with insights to optimize and transform their large hybrid networks
    - Providing relationship mapping of major IT events
    - Visualizing physical and logical dependencies in applications and service chains
    - Extending visibility for operators with network performance monitoring across cloud, SDN and SD-WAN networks (including service chains)
    - Enabling operational insight into how all elements of traditional and overlay networks affect service integrity
  • 7 Questions To Consider When Looking For An Effective Endpoint Solution 7 Questions To Consider When Looking For An Effective Endpoint Solution Josh Goldfarb, VP, CTO - Emerging Technologies, FireEye, Inc. Jan 25 2017 2:00 pm UTC 45 mins
    The endpoint market is one that everyone seems to be talking about these days. With all that hype and buzz comes a confusing vendor landscape filled with nearly identical marketing speak from each and every vendor. How can the security professional make sense of all this noise? While certainly not an exhaustive list, here are seven questions to get you started.
  • The New 'Interprise' With SD-WAN The New 'Interprise' With SD-WAN Ken Hosac, Cradlepoint Jan 25 2017 5:00 pm UTC 60 mins
    Today the Internet is becoming the new corporate network — the Internet enterprise, or the “Interprise.” This new paradigm is gaining traction because of three major technology shifts: cloud, workforce mobility, and the Internet of Things (IoT).
     
    With so many organizations looking to partially or even fully put their network architecture in the cloud, the less complex you can make the move, the better. The “Interprise” is now an essential tool for network administrators, IT professionals, and corporate employees.
     
    At 9 a.m. PT / 12 p.m. ET on Jan. 25, 2017, join Cradlepoint’s Todd Krautkremer for a presentation and discussion about leveraging the Internet and virtual technologies to securely extend the traditional enterprise network — and how Cradlepoint NetCloud can help.
  • Top Considerations for Deploying SD-WAN in a Large Enterprise Top Considerations for Deploying SD-WAN in a Large Enterprise Steve Woo, Co-founder and VP of Products, Michael Wood, VP of Marketing Jan 25 2017 6:00 pm UTC 60 mins
    Very large and multinational enterprises require SD-WAN (Software-Defined Wide Area Network) solutions that enable them to deploy flexible, secure, high performance WAN connectivity that reliably scales to large numbers and various sizes of distributed branch locations and the cloud. Before embarking on an SD-WAN deployment journey across thousands of branches, you must consider the top factors that impact the efficiency, speed, and, ultimately, the success of your implementation.

    Join this webinar with Steve Woo and Mike Wood as they walk you through the key considerations involved in typical multiple thousand-site SD-WAN roll-outs - and the top best practices of a successful deployment.
  • Is a Cloud-Managed Network right for your Schools? Is a Cloud-Managed Network right for your Schools? Dan Rivera, Product Marketing Manager - K12 Jan 25 2017 6:00 pm UTC 60 mins
    Cloud networking solutions offer a great way to manage the growing demand of high-bandwidth campus Wi-Fi when resources and funds are scarce. However, not all cloud-based solutions are equal.

    Join us for a live webinar to learn what to expect from a cloud-managed network, how to avoid common pitfalls, and how to get E-rate-ready 5-year network management licensing. We will also show the benefits of Aruba’s cloud solution for K-12, along with a live demo!
  • How to Manage, Orchestrate and Analyze Copy Data How to Manage, Orchestrate and Analyze Copy Data Alex Infanzon, Application Solutions Manager, Pure Storage; Prashant Jagannathan, Technical Manager, Catalogic Jan 25 2017 7:00 pm UTC 60 mins
    Oracle database sprawl comes with significant cost and complexity. The complexity is the result of proliferation of database copies created for a range of uses including disaster recovery, provisioning of development and testing infrastructure, quality assurance (QA), DevOps in private or hybrid clouds to name a few.

    Join this webinar to learn how Catalogic Software’s® ECX™ Copy Data Management platform deployed in conjunction with the Pure Storage® FlashArray™, allows organizations to manage, orchestrate and analyze Copy Data. The solution provides full lifecycle management of your Copy Data through automated workflows that allow you to streamline the creation, management and use of Oracle database copies.
  • The cost of Digital infrastructure - Financial Granularity The cost of Digital infrastructure - Financial Granularity Andrew Bird : Chief Digital Officer & EA Visionary Jan 26 2017 9:00 am UTC 45 mins
    How do we compose our digital building blocks to align to our value chain. Yet accommodate the volatilities of disruption and growth agendas. Understanding the underlying behaviour and technologies allows us to realise what is moving and what is not.

    This webinar is targeted at Technology leaders looking to prepare capability to support digital transformations and strategic road maps.

    Andrew Bird: Chief Digital Officer & EA Visionary
  • Continuous Testing - Webinar 2: Testumgebungsmanagement als Voraussetzung Continuous Testing - Webinar 2: Testumgebungsmanagement als Voraussetzung Thomas Köppner, Business Consultant & Markus Knöfel, Presales Consultant, HPE Software Jan 26 2017 1:00 pm UTC 60 mins
    Durch die Verwendung von agilen Entwicklungsprozessen erhöht sich die Zahl der Testfälle sowie die Frequenz der Testzyklen dramatisch. Es wird immer schwerer, alle Komponenten einer Anwendung mit allen Abhängigkeiten bei permanent reduzierten Budgets und Ressourcen umfassend zu testen. Gleichzeitig nimmt aber die Softwarequalität einer Anwendung einen immer höheren Stellenwert für den Geschäftserfolg ein. Anwendungen müssen nicht nur zuverlässig, performant und sicher sein, sondern auch schnell an veränderte Anforderungen des Marktes und/oder des Business angepasst werden, um wettbewerbsfähig zu bleiben.

    Erfahren Sie in unserer kostenfreien Webinarreihe, wie sich durch den Einsatz von Continuous Testing-Lösungen qualitativ hochwertige Anwendungen schnell, zuverlässig und kontinuierlich bereitstellen lassen und der Ressourcen-Aufwand dabei erheblich reduziert werden kann - mit dem Ergebnis, durch ein schnelleres Go-to-Market einen früheren geschäftlichen Mehrwert zu erhalten!

    Webinar 2: Testumgebungsmangement als Voraussetzung für Continuous Testing
    Die Einführung der agilen Entwicklungsmethode hat für einen fundamentalen Wandel gesorgt. Statt ein- oder zweimal im Quartal zu testen, geschieht dies nun rund um die Uhr und kontinuierlich. Dafür müssen allerdings sämtliche Testumgebungen komplett mit allen dafür benötigten Servern, Netzwerken, Testdaten, Schnittstellen sowie den aktuellen Inkrements (Builds) bereitstehen. Zudem muß die gesamte Release-Pipeline (z.B. Dev, QA, Staging, Prod) im Überblick behalten werden. Manuell ist dies nicht mehr zu handhaben. Erfahren Sie in diesem Webinar, wie Sie mithilfe von HPE ALM Octane all das erfolgreich managen können. Darüberhinaus zeigen wir Ihnen, wie Sie mit der CODAR-Lösung eine hierfür notwendige Automatisierung und On-the-Fly-Konfiguration der Anwendung erreichen und damit die Prozesse für Entwicklung, Qualitätssicherung und Betrieb gleichermaßen vereinfachen können.
  • 2017 Trends in Software 2017 Trends in Software Nick Patience, Founder and Research Vice President - Software Jan 26 2017 4:00 pm UTC 60 mins
    Digital transformation is real, and it's happening, although there is still a very long way to go. We believe it is an inescapable truth that every business is becoming a digital business, controlled by software, which is the manifestation of these digital transformations. Businesses must react, driven by the imperatives of improving intelligence, agility and their customer-centricity, with the ultimate goal of survival in a digital world.

    Join Nick Patience, Founder and Research Vice President for Software, as he dives into the three business imperatives behind digital transformation and what specifically will be transformed in 2017.
  • Building Blocks for Securing the Industrial Internet: IISF Building Blocks for Securing the Industrial Internet: IISF Dr. Jesus Molina, Security Consultant, Fujitsu; Dan Isaacs, Director Connected Systems at Xilinx Jan 26 2017 4:00 pm UTC 60 mins
    Without proper security, Industrial Internet of Things (IIoT) systems are not trustworthy, putting organizations, their missions and the greater public at increased risk. The viability of the IIoT depends on proper implementation of security to counter the growing and ever changing threats that are emerging.

    Addressing this challenge is critical to the success of the Industrial IoT, Industrie 4.0 and the Industrial Internet revolution. To that end, Industrial Internet Consortium members have developed a common security framework and an approach to assess cybersecurity in Industrial Internet of Things systems: The Industrial Internet Security Framework (IISF).

    On January 26, 2017, editors of the IISF and security experts from the Industrial Internet Consortium will provide an introduction to the approach needed to secure industrial systems and offer insights gained from one of our testbeds encompassing several security technologies.

    Join the webinar to learn:
    • The importance of securing the IIoT and why it differs from securing the IoT
    • The value of securing industrial Internet systems
    • Recommendations for engaging OT about developing an IIoT strategy

    Don’t miss this webinar – first in a series of monthly webinars offered by the Industrial Internet Consortium.

    *Upcoming Webinars*
    February: Securing IIoT Endpoints
    March: Securing the Smart Factory
  • 12th Annual WISR Review: Era of Escalated Risk 12th Annual WISR Review: Era of Escalated Risk Gary Sockrider, Principal Security Technologist, Arbor Networks + John Paul Blaho, Sr. Manager, Arbor Networks Jan 26 2017 5:00 pm UTC 60 mins
    Arbor Networks' 12th Annual Worldwide Infrastructure Security Report (WISR) offers a rare view into the most critical security challenges facing today’s network operators.This session will review the highlights from the report to help network operators understand the breadth of the threats that they face, gain insight into what their peers are doing to address these threats, and comprehend both new and continuing trends.
  • Be Vewy, Vewy Quiet... I'm Hunting Threats! Finding & Dealing with Threats Be Vewy, Vewy Quiet... I'm Hunting Threats! Finding & Dealing with Threats Lance Cottrell; Dominique Kilman; Aamir Lakhani; Brandon Dunlap Jan 26 2017 6:00 pm UTC 75 mins
    Threats. They are everywhere and one of those things that keep security practitioners awake at night. However, the exposure to and damage from the myriad threats out there can be mitigated via a number of steps. These include threat hunting and detection, investigation and timely and effective response. If your security is synchronized it can help to reduce the response times and the resources that are used. Join (ISC)2 and our sponsor Sophos for our first From the Trenches webcast of 2017 on January 26, 2017 at 1:00PM Eastern for a discussion about threats and how to cut the time in detecting and responding to them.
  • Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning Chris Diya, Systems Engineer, Symantec Jan 26 2017 6:00 pm UTC 30 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 1 of 5: Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning

    Threats are becoming more sophisticated with new attacks becoming commonplace. These unknown threats can be devastating for an organization making endpoint protection more critical than ever. The best weapon in your endpoint protection arsenal to combat unknown threats is Machine Learning.

    Join us to discover:

    •How machine learning addresses unknown threats

    •Why Symantec Endpoint Protection 14 machine learning is unique

    •Where it fits in a layered solution

    In addition to a lively discussion we’ll also show you Symantec Endpoint Protection 14 in action, with a demo that showcases how unknown threats don’t stand a chance.

    Register Today
  • How to Create Next-Generation Applications & Deploy Big Data Technology Faster How to Create Next-Generation Applications & Deploy Big Data Technology Faster Ashim Bose, Director, Analytics & Data Management Portfolio and Jan Jonak, Offering Manager, Analytics Platform Services, HPE Jan 26 2017 7:00 pm UTC 60 mins
    While the proliferation of analytic technologies has created exciting new ways to harness Big Data like never before, for many it has also created a quagmire of complexity that is slow to deploy, runs inefficiently, isn’t integrated with other systems, and cannot be scaled. There is a solution; it is possible to create next-generation applications with ease and efficiency.

    Join us for this presentation to learn:

    • How to jump start Big Data technologies deployments by using a standard analytic platform
    • How to implement an analytics platform that can scale based on your needs and simplifies your user experience
    • Where analytics deployments have failed to deliver ROI
    • Lessons learned from other companies on the journey to enterprise-grade analytics
    • What consumption models are available and which are most advantageous
  • Apstra Operating System (AOS): Vendor-agnostic, Intent-driven Network Automation Apstra Operating System (AOS): Vendor-agnostic, Intent-driven Network Automation Derick Winkworth Jan 26 2017 7:00 pm UTC 60 mins
    Learn about the latest features in the industry's first and only distributed operating system for the data center network. In this webinar, Derick Winkworth (@cloudtoad) will demonstrate several of the powerful new features, including:

    - Rack-based design intent
    - Virtual Networks
    - Parallel links (LAG)
    - L2 server dual attachment (MLAG)
    - Server-based telemetry
    - Interactive topology visualization
    - And much more...

    Be among the first to learn about the latest advances in this game-changing product!
  • How to Reinvent your Data Center with Virtualization How to Reinvent your Data Center with Virtualization Scott Herold, Red Hat Enterprise Virtualization Product Manager Jan 26 2017 8:00 pm UTC 60 mins
    Virtualization has allowed many organizations to drastically reduce costs and transform their data centers. As new technologies are deployed to accommodate evolving business demands, virtualization continues to be a core technology to support the digital business transformation.

    Join this webinar and Scott Herold, Red Hat Enterprise Virtualization Product Manager, to:

    - Learn how Red Hat® Enterprise Virtualization allows your organization to modernize your IT infrastructure by providing advanced management and networking capabilities

    - Become familiar with new features, a roadmap, and a strategic vision from Red Hat's Product Management team
  • Who’s in your network and how DO you know they are there? Who’s in your network and how DO you know they are there? Chris Roberts, Chief Security Architect, Acalvio Jan 27 2017 6:00 pm UTC 60 mins
    With the increasing focus on MTTD (Mean Time To Discovery) now north of 200 days in many cases, there is a renewed effort to curb the ever increasing advantage the attacker has in the very networks we are meant to be protecting. The efforts we pour into static defense have not worked for years, so we have to focus on more capable solutions that blend active and preventative/proactive technologies in one cohesive solution….it is to that breed of solutions that we turn our attention and dissect the options out there, point out the good, the bad and the downright ugly….Let’s see if we can actually make a dent in the 200 days.
  • COR IBR900 for Next-Gen In-Vehicle & M2M Networks COR IBR900 for Next-Gen In-Vehicle & M2M Networks David Rush, Mike Hagman and Mack Lyons, Cradlepoint Jan 30 2017 5:00 pm UTC 60 mins
    With the introduction of the new COR IBR900 and IBR950 routers that are purpose-built for in-vehicle and M2M/IoT applications, Cradlepoint is extending its leadership in 4G LTE networking.
     
    The COR IBR900 and IBR950 are the first LTE routers in the world to offer the latest generation “Wave 2” gigabit WiFi (802.11ac). At 9 a.m. PT / 12 p.m. ET on Jan. 30, 2017, join Cradlepoint experts to learn about:

    — Quad core processor that can achieve near-gigabit operational speeds on both Ethernet and WiFi, and take advantage of carrier improvements in LTE Advanced networks
    — A range of features to support high-performance, high-capability in-vehicle networks
    — Support for Cradlepoint Platform Extensibility, including elements such as Router SDK, COR Extensibility Dock, and ECM API
  • Iricent APNOS – Software Defined LAN using OpenDaylight Iricent APNOS – Software Defined LAN using OpenDaylight Damian Murray – Sales Director and Rory Mac Hale – CTO, Iricent Jan 31 2017 4:00 pm UTC 60 mins
    Iricent’s APNOS is an OpenDaylight based SDN application which enables users to take advantage of feature rich networking and security functionality without having to care about the complexity of the underlying technology or the costs of pre-SDN / NFV solutions. Developed in house and delivered as a service, APNOS key differentiator is its ability to provide a complimentary revenue stream for service providers targeting enterprise customers.

    During this webinar, we will outline the main features of the APNOS SDN application and elaborate on the role of the OpenDaylight controller. We will also discuss the use cases for APNOS in the network, including the automation capability the application can provide when in learning mode. Finally we will provide some detail on the future plans including the ability to deploy APNOS as a VNF and the potential for APNOS to meet the demands that IoT deployments are expected to create.
  • Using the NIST CSF to prepare for Canada Digital Privacy Act Using the NIST CSF to prepare for Canada Digital Privacy Act Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Jan 31 2017 5:00 pm UTC 60 mins
    The Digital Privacy Act (DPA) from Canada is here…are you ready? The Government of Canada passed the Digital Privacy Act (DPA), which amends and updates the existing federal privacy legislation. As a business in Canada what does this mean to you and are you ready?

    Aside from the obvious ramifications of a breach such as lost data and revenue, one of the many new requirements of the DPA requires all Canadian organizations to “keep and maintain a record of every breach of security safeguards involving personal information under its control.”

    Attend this Webcast to learn how to use the National Institute of Standards and Technology (NIST) with Cybersecurity Framework (CSF) as a tool to help determine if you’re ready for this new, important legislation.

    Key Learning Objectives:

    -Basic overview of NIST Cybersecuity Framework (CSF)

    -Review what the Canadian Digital Privacy Act (DPA) requirements are to your organization

    -Understand how to utilize the CSF to prepare for the Digital Privacy Act

    Register Now
  • Enhancing Performance and Security of Mission Apps with Enhanced Networking Enhancing Performance and Security of Mission Apps with Enhanced Networking Scott Schweitzer, Bob Gourley Jan 31 2017 6:00 pm UTC 60 mins
    It has been said that latency breeds contempt, this is especially true in the defense and intelligence communities where seconds can be the difference between life and death. In order to keep pace with rapidly evolving mission demands, agencies are constantly advancing their capabilities in the areas of distributed analytics and private cloud. Today, agency compute infrastructures rely on networking, not only for the delivery of content to end users, but increasingly for the distributed real-time processing of mission critical data. However, the server market, once dominated by differentiated offerings from a myriad of OEMs, has been commoditized by the adoption of virtualization and cloud computing technologies and services. While this commoditization has led to countless new analytic capabilities, it has also shifted the focus away from the hardware components and onto the software stack which has, in turn, created inefficiencies in both the overall performance and security of deployed systems.


    Join us to learn more about how enhanced networking capabilities from Solarflare can provide Agencies with a cost effective means of natively enhancing the performance and security of mission systems and applications.
  • The Top 3 Security Silos and How to Unify Them The Top 3 Security Silos and How to Unify Them Alexandra Lating, Sr. Product Marketing Manager and Marc Laliberte, Information Security Analyst Jan 31 2017 6:00 pm UTC 60 mins
    When cyber criminals lurk behind every dark corner of your network, where do you look for protection?

    Having disparate security solutions – from the network, endpoint, and threat intelligence feeds – is no longer enough. There needs to be correlation among these environments, or bad actors are certain to exploit your technology silos.

    Join Alexandra Lating, Senior Product Marketing Manager, and Marc Laliberte, Information Security Analyst, for a look at the key players needed to defend your network, but more importantly – what happens when you bring them together.

    Having the right security measures is a good start, but it’s only half the battle. You need a unified security front. You need Correlation.
  • The State of Online Video: The Consumer Is in Control The State of Online Video: The Consumer Is in Control Michael Milligan, Senior Director Product & Solution Marketing & Charlie Kraus, Senior Product Marketing Manager Jan 31 2017 7:00 pm UTC 60 mins
    Since 2015, Limelight has surveyed thousands of consumers about their online video viewing habits and expectations, but findings from our latest report reveal some interesting changes. Bottom line – the consumer has taken control of the online video experience. They not only want, but also expect, to be able to choose what they watch and when they watch it.

    What does this mean for broadcasters and content distributors trying to satisfy consumer demand while also maximizing revenue?

    Join us for this free webinar on Tuesday, January 31st as our video delivery experts share recent findings from the latest State of Online Video report. We will discuss strategies organizations can implement in 2017 to deliver compelling online video experiences to their audiences that will keep them coming back for more.

    Some of the topics that will be covered, include:
    · Which aspects of the online video experience matters most to consumers;
    · Demographic differences in online video viewing behaviors and expectations;
    · Shifting consumer attitudes about online video advertising and paying for content; and
    · Tips for optimizing the online video viewing experience.

    All webinar attendees will receive the complete December 2016 State of Online Video report.
  • Staying Ahead of Digital Disruption with On-Demand Apps & Cloud Scalability Staying Ahead of Digital Disruption with On-Demand Apps & Cloud Scalability Bob Politi, SAP Practice Director & Alex Froyo, Workload & Cloud Director, HPE, with Dr. Katy Ring, Director, 451 Research Jan 31 2017 7:00 pm UTC 60 mins
    Imagine having your SAP® applications on demand—with the scalability and responsiveness of the cloud with the security of traditional IT. It’s not only possible—it’s a terrific way to accelerate your path to digital. Did you know that in the past 15 years, digital business disruption has knocked 50% of Fortune 500 companies off the list? Don’t be next. IT is constantly challenged to accelerate time-to-value, reduce TCO, and deliver continuous business process improvement by making business more digital, scalable, and resilient. This can’t be done in a traditional IT environment. With business applications, it can’t be done from a typical cloud environment either. To accelerate the journey to a digital business future, organizations can now transform to a true SAP “on demand” application platform as a service (APaaS) solution.

    Join 451 Research and HPE Enterprise Services to learn:

    •Why successful digital strategies require cloud-based core business services
    •How to determine if your organization is ready to start digitizing core business applications
    •The business and IT benefits that an on demand SAP environment can provide
    •The attributes and characteristics you want in a true on demand SAP environment
  • How Application Development and Deployment Fuels Digital Transformation How Application Development and Deployment Fuels Digital Transformation Steph Bacon, Sr. Director of Portfolio Strategy, Red Hat Jan 31 2017 8:00 pm UTC 45 mins
    We live in an application economy, and companies who don’t recognize themselves as software or technology-driven are doomed to fail. Core aspects of digital transformation are being enabled by the way applications are built (agile methods, event-driven) the way they are deployed (containers, microservices) and the way in which they are used (mobile, IoT). Red Hat’s portfolio addresses all aspects of the application lifecycle, and can help prepare you to use software as a cornerstone for competitive advantage.