Network infrastructure professionals understand that a reliable and secure infrastructure is crucial to enabling business execution. Join the network infrastructure community to interact with thousands of IT professionals. Browse hundreds of on-demand and live webinars and videos to learn about the latest trends in network computing, SDN, WAN optimization and more.
DNS security breaches are more common than you think. From hijacking of a DNS record at the registrar to cache poisoning to data exfiltration through DNS, they can cause significant damage in terms of direct revenue loss, theft of sensitive information, and brand damage. Because DNS is rarely monitored closely, malicious actors use it to avoid detection and slip under the radar. Early detection is key to minimizing damage and disrupting the cyber-kill chain at the DNS level. Join this webinar to learn the different breach tactics, the impact a security breach can have, and best practices and mitigation techniques. Keeping your DNS secure means keeping your data secure.
This webinar discusses the potential pitfalls when cable operators begin upgrading their networks for IP video delivery. Delivering IPTV is more economical than cable TV and offers a higher quality of service to end customers, but a key challenge is to maintain an excellent customer experience during the transition period in order to deliver an increasing bottom line.
This webinar will give a structured and cost-efficient approach to assuring network and service quality for IPTV and Cable TV.
We will share insights and best practices around:
* Pre-assessment of new network deployments to reduce service calls
* A system approach that pinpoints problems along the entire service delivery chain
* Remote troubleshooting to quickly eliminate customer issues to reduce churn
* 24/7 customer quality insight vs. isolated measurements with handheld tools
Private cloud deployments are going mainstream. The problem is that VM visibility and DNS, DHCP, and IP address management automation are still a huge challenge that can cause delays, manual work, and errors. Those days are over. Watch this webinar and learn how you can be enabled to put your private cloud networking on auto-pilot. See the next generation of network automation for cloud and virtual environments to help simplify your private cloud deployment.
To realize the full benefits of the cloud, you must choose a cloud that fits your needs and supports your organization’s cloud workloads. In this webinar, we will discuss the results of a Forrester Consulting study that show why capacity management is essential to your cloud transformation strategy. You will learn how capacity optimization tools manage workloads in the cloud and help you:
• Gain visibility into capacity utilization at the resource, service, and business level.
• Support timely decision-making on IT investments.
• Increase agility, reduce IT costs, and minimize risks.
Learn how capacity management will help you understand and optimize your environment to support effective decision-making aligned to business priorities.
With Microsoft Lync - soon to be Skype for Business - predicted to become a top-three global telephony provider by 2016 (Gartner), it is no surprise many organizations are either deploying, or evaluating a deployment, of Skype for Business. But how do you measure the success of such an initiative?
In this exclusive presentation Eric Bauer, Global Product Director UC, will be joined by John Hand, a former Microsoft employee of 25+ years who is now IR’s Global Microsoft Alliance Director, to detail the 4 Measures for Success in a Lync/Skype for Business deployment.
Following the presentation there will be an opportunity for Q&A.
Modern performance tools and techniques can dramatically improve the user experience, reduce developer and ops frustration, lead to better utilization of infrastructure and allow you to smartly ship products to market faster.
Working with many companies across all industries, we recognize the pitfalls and barriers to adopting DevOps. The Rackspace DevOps Automation team works with various tools every day to counteract these pitfalls. Join Product Manager @EricBrinkman as he shows you the technologies our DevOps Automation team uses, provide insight as to why they were chosen, and walk through a customer experience demo.
This webinar will include:
•Deploying Magento through UI and pushing code
•A look into the control panel
•Demo of New Relic and Chef
•Simulation of Rackspace customer experience
The arrival of mass-storage services, the emergence of analytics applications and the adoption of Object Storage by the cloud-services industry have provided an impetus for new storage hardware architectures. One such underlying hardware technology is the Ethernet connected hard drive, which is in early stages of availability.
Join this Webcast to hear Chris DePuy, Vice President of Dell’Oro Group, share findings from interviews with storage-related companies, including those selling hard drives, semiconductors, peripherals and systems. Chris will present some common themes uncovered, including:
•What system-level architectural changes may be needed to support Ethernet connected drives
•What capabilities may emerge as a result of the availability of these new drives
•What part of the value chain spends the time and money to package working solutions
This Webcast will also present some revenue and unit statistics about the storage systems and hard drive markets and will discuss potential market scenarios that may unfold as a result of the Object storage and Ethernet connected drive trends.
Cybercriminals are bypassing conventional security tools and increasingly using DNS — a business-critical but rarely protected service — to execute APTs, infect devices, and exfiltrate data. In 2014, according to Ponemon Institute, data breaches cost an average of $159 per record, impacting companies like eBay, JPMorgan Chase, and Sony Pictures. Can you afford to be next? Find out why you should be worried about APTs that exploit DNS — and how to defend your network.
The ability of public sector organizations to accomplish their missions depends on reliable connectivity. Now, more than ever, these network connections must be mobile, rugged, and secure – but most of all, they must be flexible.
At the federal, state, and local level, as well as at institutions of higher learning, the opportunities to gain efficiency and manage budgets through mobile connectivity are increasing exponentially. Cradlepoint enables the public sector to quickly implement networking solutions that are powerful, flexible, easy to manage, and easy to scale; without busting tight budgets.
Join us for a webinar to learn how Cradlepoint solutions make it easy for public sector organizations to adapt their networks to take advantage of 3G/4G LTE wireless to provide the strongest signal at the best price in any given location.
Gartner has predicted 18-20% growth in SaaS market, and expects it to hit US $22.1 billion by the year 2015. They have also measured that SaaS adoption rate has increased many fold in the last few years (almost 71% of enterprises use SaaS solutions).
SaaS has come a long way from “hype” to “norm”. The key to this change is the confidence that has been built by the cloud/SaaS community by providing enterprise class security. Since, SaaS model of delivery has become a defacto standard of delivering products it’s critical for software providers to ensure that their SaaS product meets the required industry security standards. In this webinar, we will address the security aspects related to architecture, deployment and management of SaaS solutions.
• Security considerations in each of the architecture layers
• Data isolation risks and mitigation plans
• Overview of CWE/SANS and OWASP Security threats
• Data retention and termination policies
• Infrastructure and cloud related security risks and solutions
So you have been tasked to find a DCIM solution for your organization. There's only about a hundred of them, so that sounds like fun!
Before you plunge into mind-numbing RFP writing, join Jason Sherman, Director of Sales Engineering at Graphical Networks as he provides valuable tips and tricks of the trade that can save you time and energy.
We'll go over some of the aspects that may be forgotten in the RFP writing process as well as requirements for a meaningful proof of concept, and other important things to consider when evaluating a DCIM software tool.
The “consumerization of IT” is largely represented by public cloud services. But when it comes to cloud file sync – a technology that is centered on storing, accessing, and sharing data – many businesses are taking pause at public hosting. In this BrightTALK exclusive webinar, learn why deploying cloud file sync in a private environment may be worth considering.
This webinar will provide an overview of Intel’s contribution and engagement portfolio to the Software Defined Networking (SDN) and Network Functions Virtualization (NFV) open source community. In detail it will discuss how Intel is accelerating network transformation to SDN and NFV specifically through the Open Network Platform (ONP) Server program. Attend the webinar to discover various SDN/NFV open source engagement opportunities to drive SDN/NFV adoption in telco, cloud, and enterprise IT markets.
Finding the location of a fault on a copper pair doesn't have to be like finding a needle in a haystack. Faults come in all different shapes and sizes, some are even intermittent. Opens, shorts, bridge taps, and splices could be on any pair at any time, so every technician needs to understand where these faults are located; the detection of the fault alone is often half the battle. There are many methods for locating copper faults such as using TDR or RFL, and when coupled with new analytic methods, the fault-finding task becomes much easier and less time consuming.
This webinar will explore different fault-finding techniques, whether you are deploying voice, residential DSL, or hi-cap services. In addition, you will learn how to work smarter, not harder, when detecting and locating faults. At the end of this webinar, the hope is that you will be more confident in your fault-finding prowess.
There are more costs to your phone system than you think. From capital expenditures to software upgrades, your phone system could be costing you. Join Matt McGinnis, Senior Director of Product Marketing at RingCentral, as he discusses the total cost of ownership (TCO) of an on-premise phone system and how you can see up to a 70% savings on your phone bill.
Companies today have a very heterogeneous environment with distributed, mainframe and Cloud, ERP systems, CRM systems, Hadoop and Reporting systems that can be disruptive to the status quo. Customers have to rely on automation since there is no new budget to manage more environments, more applications, more events and flexible placement of workloads. CA Technologies has been helping organizations reduce costs, improve availability of critical processes and increase business responsiveness for more than a decade. Join us to hear about some of our new cross enterprise solutions in our product portfolios, for CA Workload Automation and CA Output Management, and how they can help you drive new cost efficiencies and achieve faster returns on your IT infrastructure investments in this application economy.
This is the third in a series of webinars about the benefits of open source in the NFV market. In our first webinar, we discussed the increasingly prominent role open source is playing in NFV and SDN, and how Intel Network Builders partners can leverage open source. The second webinar focused on the wide variety of options partners have to integrate with open source in the NFV market.
In this webinar we'll show you how Brocade, an Intel Network Builder partner, is working with Red Hat and Intel to integrate their market-leading technology with NFV open source infrastructure software. Join us to hear from Brocade discuss how they use open source technology to their business advantage, and lessons learned along the way.
Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer.
This week tune in and learn about how RingCentral integrates with Google Gmail, Calendar, Docs and more.
Security and Scalability in the Hybrid Cloud: How to get one without losing the other
Traditionally, you had to design for a focus on scalability or security in the cloud, but not both. Now with services that connect virtual and real computers together, you can achieve cloud scale while satisfying the most stringent security requirements. Join Rackspace’s Matt Shover and Joseph Palumbo Thursday, March 19th to learn:
•Top reasons why people choose the cloud
•Top reason why people think the cloud isn’t the best fit for them
•What is scaling?
•How do you scale?
•How does the hybrid cloud help scale your application?
•How does the hybrid cloud help secure your application?
•So how do you build a hybrid environment?
About the Speakers
Matt Shover is the manager of RackConnect Operations at Rackspace, where he leads a passionate team of Rackers that work to seamlessly connect Rackspace's Dedicated and Cloud offerings -- turning customer challenges into awesome outcomes. He holds an MBA in finance from California State University, Hayward and has been a Racker for over eight years.
As a founding member and architect of both the Rackspace Cloud’s Managed Operations service level and Launch Team, Joseph has spends half his time teaching customers about the cloud and the other half learning from his customers what the cloud can do. When he’s not writing blog posts, recording podcasts or making videos, he can be found discussing innovation with other Rackers and wishing paper documents had a built-in search function.
Mobile applications, cloud computing and BYOD (Bring Your Own Device) are reshaping nearly every aspect of your business, from revenue opportunities to how and where your employees work. They’re also forcing you to reinvent your security policies. Otherwise every device, from laptop to smartphone, is a data breach waiting to happen.
In Pulse Secure’s webinar on March 19, Senior Principal Analyst Jon Oltsik of Enterprise Strategy Group will explore the new world of mobile security:
User role, device type, network location & factors define your new security needs.
Creating - Enforcing - Effective network access policies for secure mobile processes.
How top organizations are tackling mobile security.
Join us this week for a special 30-minute live session on how RingCentral integrates with Zendesk for improved workflow and increased productivity.
Tune in every Friday for RingCentral Live. We’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session also features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer.
The different types of DSL are designed to work on copper local loops, and deliver ever more bandwidth. Yet, often the challenge is not more speed, but reaching and connecting more customers. How do you get DSL further out to more customers, especially on long loops? It is quite a challenge to get broadband to go further on an aging plant designed for traditional telephone services. This webinar discusses the issues behind that and how to make DSL work more reliably on long loops.
To reach further out to more customers we have to consider three areas when deploying any type of residential DSL:
- Which type of DSL is more suited (ADSL2 vs. VDSL2)
- Loop length and quality
- Other signals and noise
We will discuss:
- How far can DSL go? How fast?
- What types of DSL are best for longer loops? Why?
- How signals travel down copper pairs.
- Faults that reduce signal strength (loss).
- Why there may be too much noise (interference).
- How to minimize interference.
What you will learn:
- The best DSL profile/mode for longer reach
- Pair quality factors that affect signal strength
- Issues that create or allow too much noise/interference
- Techniques to reduce the effect of noise/interference
In deze webinar zal worden ingegaan op hoe beide oplossingen inspelen op verschillende IT infrastructuur uitdagingen.
In het datacenter zoekt u efficiëntie en effectiviteit. Die zijn vaak ver te zoeken door slecht op elkaar afgestemde componenten. Een converged data center infrastructure-platform biedt hiervoor al enkele jaren dé geïntegreerde IT-infrastructuur oplossing.
U heeft echter de term hyper-converged vast wel eens horen langskomen:
•Maar wat houdt een Hyper-converged oplossing eigenlijk in?
•Hoe verhouden Hyper-converged en converged zich tot elkaar en waar verschillen ze?
•Wat kunnen beide oplossingen u opleveren?
•En in welke situatie is welke oplossing het meest geschikt voor u?
Enkele uitdagingen die aan bod komen in deze webinar zijn o.a.:
•Hoe kan ik mijn IT-infrastructuur budget voorspellen voor de komende jaren?
•Hoe ik snel innoveren en inspelen op vragen vanuit de business zoals het uitrollen en ondersteunen van applicaties?
•Hoe koppel en beheer ik de losse onderdelen binnen mijn IT-infrastructuur?
•Hoe kan ik een geleidelijke transitie naar de cloud maken in mijn eigen tempo?
Volg de webinar en ontdek op basis van 4 verschillen die worden uitgelicht welke oplossing van EMC en Proact het beste kan aansluiten bij uw uitdagingen.
Companies rely heavily on networked technology today to operate their businesses. Highly distributed organizations like restaurant chains, retail stores, financial services or supply chain companies have an extra layer of difficulty. Rarely does each of the remote locations have IT expertise on site. As an IT manager, you are demanded by your executive management to keep the network available 100% of the time, avoid security breaches, support all the new strategic marketing initiatives and to do all of this with less money than you had in your budget last year! This session will review the top 5 challenges an IT manager in this situation needs to consider and suggest solutions:
1) Executive mandate to "Do more with less"
- Free-up your time to do what you do best
- Vendor consolidation
- Outsource, focus Internal resources on strategic tasks
2) Lack of IT Expertise at remote sites
- Consistency of deployment, Office in a box
- How to make sure all locations have the same technology
- Preplanned for growth and new services
3) Sometimes lack of ownership of remote sites (Franchises)
4) Security compliance/PCI DSS
5) High availability
- Network is down, business has stopped (can't take payments)
Practice Makes Perfect When Defending Against DDoS Attacks
DDoS attacks have been on the rise, especially hard-to-detect Layer 7 attacks that take down websites via resource exhaustion. Take the guesswork out of defending against these attacks by validating your DDoS defense effectiveness using realistic scenarios of real-world users and attacker behavior at scale.
In this webinar, we will analyze and discuss the techniques and technology necessary to validate defenses against DDoS attacks:
• Take a deep dive into multi-vector DoS attack strategies
• Learn how to attack yourself in a controlled, safe environment
• Create a DDoS Range to test your network defenses, personnel, and incident playbook
Mobile Edge Computing (MEC) provides a new ecosystem and value chain in mobile networks. The Open-RAN ecosystem enables Mobile Operators to open their Radio Access Network (RAN) edge to authorized third-party applications and services. By transforming proximity, context, agility, rapid response time and speed into value for mobile users, mobile operators, network equipment vendors, and third-party providers can improve the customer experience and monetize mobile broadband. The MEC trend is gaining momentum with the establishment of an ETSI MEC Standardization group led by Intel, Nokia, Huawei and other major players.
In the Webinar, we will present the MEC architecture within the mobile network and demonstrate a number of use cases
-Leveraging the Open-RAN ecosystem to bring 3rd party applications like Content Delivery Networks (CDNs) to the Radio Edge;
-Demonstrating the value of real-time network awareness for optimized content delivery;
-And presenting advanced RAN-based technologies that further accelerate content delivery
Hyper-converged storage is turning out to be the buzz phrase of the storage industry in 2015, one with as many confusing and contradictory definitions as there are vendors. In theory, the combining of server and storage tiers into a single entity should deliver better application performance and lower infrastructure costs. In practice, your mileage will vary.
Join us for this webinar where industry expert Jon Toigo – chairman and co-founder of the Data Management Institute – will help to identify key criteria for making the right infrastructure decision for your business. Mr. Toigo will offer his key criteria in selecting a hyper-converged infrastructure model and he will survey the offerings of leading vendors to identify the “gotchas,” trade-offs and lock-ins of each option so you find the best fit for your company.
„Bester NIC - bester Preis! Garantiert kein Aprilscherz“ Erfahren sie, wie Emulex 10Gb Ethernet Server-Konnektivität performanter und lukrativer macht! Langsam, aber sicher wird 10Gb Ethernet (10GbE) der Standard für Server-Netzwerk-Konnektivität. Wir möchten Ihnen in diesem Webcast zeigen, dass die Basisfunktionen eines NICs in vielen Fällen nicht mehr ausreichen. Emulex bietet Ihnen jetzt 10GbE-Netzwerkadapter mit umfangreichsten Funktionen und sehr hoher Flexibilität, zum günstigsten Preis! Aktuell erhalten Sie sogar einen Adapter kostenfrei, beim Kauf von 5 Emulex 10GbE-Netzwerkadaptern. Wir werden im Webcast unter anderem auf Themen wie Low Latency über Ethernet, Small Packet Performance oder Overlay Networking für Hybrid Cloud-Umgebungen eingehen. Überzeugen Sie sich selbst anhand von Testergebnissen, wie Emulex 10GbE Netzwerkadapter im Vergleich zu NICs anderer Hersteller, wie z.B. Intel, abschneiden.
Warum viel Geld ausgeben für wenig Funktionalität? Es geht auch anders.
Pick up your smartphone, tap a button, and get a lift to wherever you need to go. That’s the idea behind Lyft, the San Francisco-based company whose service is now available in five major metropolitan areas.
“We wouldn’t be able to operate at this capacity without a product like RingCentral,” says Adam Fishman, Director of Growth and Operations. “We needed something that was fast, scalable, and had all the features we were missing.”
With RingCentral, Lyft has realized an exponential growth in productivity, including:
-An increase in call-back rates from 5% to nearly 50%
-More than 100% improvement in outbound call volume
Watch the video to understand the role cloud communications plays in turning a good idea into something revolutionary.
So many companies drown in spreadsheets and duplicate diagrams when trying to document IT infrastructure, but there are better ways. This webinar will cover simple methods and techniques to reduce effort and improve quality of network, data centre and systems documentation. The aim is to achieve a baseline of complex environments which is updated and maintained by change processes.
Small form-factor pluggable transceivers (SFP’s) are increasingly common in multiple areas of the telecom environment within fiber-based architectures using Rx/Tx systems such as in data centers or fiber-to-the-antenna (FTTA). Inspecting and cleaning these connectors creates a whole new set of challenges for technicians to tackle. In this short video, Francis Audet will explain in layman’s terms: what is an SFP connector, why it represents a challenge to inspect, and more importantly what you should know about how to inspect one.
When organizations are looking at a phone system, they have two paths they can take — upgrading their entire on-premise equipment in each office or evaluate a cloud-based system. Marty Piombo, VP of Partnership Development at RingCentral, discusses what it takes to transition to a phone system in the cloud and the benefits it can provide.
Year-over-year, the number of organizations moving from one-off communication tools to a more collaborative approach are growing dramatically. A key driving force behind this shift is the increase in worker mobility. Research shows that within 3 years, 51% of organizations will be doing businesses primarily over mobile devices. Without the presence of a unified communication system, the increase in mobility may not translate into an increase in productivity.
In this webinar, you will learn three ways to increase productivity with your unified communications platform.
The proliferation of data on mobile devices has created huge headaches for CIOs as they attempt to protect data, stay in compliance and move workloads to the cloud. How IT approaches data protection for mobile devices can support or hinder these high level efforts. Endpoint backup, traditionally viewed as a functional requirement below the radar of CIOs, is evolving to offer not just data backup and restore, but also a modern way to address costly data governance challenges such as compliance and eDiscovery. This webcast will cover real-world case studies of Fortune 1000 companies leveraging endpoint backup solutions to gain significant business advantages including cost control, compliance and embracing the cloud.
Join Cyveillance and Centripetal Networks as we explore the challenges in closing the breach detection gap, managing large dynamic sets of threat intelligence, and how to operationalize threat intelligence in a perimeter defense strategy. Additionally, we will demonstrate how leveraging threat intelligence in the security stack is providing large enterprises with real-time active network defense.
It is estimated that 21 billion devices will be connected to the internet by 2018. How will you prepare your data center for added network demands?
In this data center focused Webinar, topics will include:
- Growth of cloud based services
- how many fibers needed to support next generation switches
- Optimization of migration path's for maximum flexibility
- How to maximize density in pathways and racks
More than 75% of organizations in the U.S. and U.K. have experienced at least one DNS attack according to SC Magazine. DNS Attacks are increasing in frequency and evolving constantly. They range from common amplification, reflection, and flood attacks to more sophisticated and stealthier types. These might have fancy names like random subdomain, phantom domain, and domain lock-up, but their effects on DNS are far from pretty. Join this webinar as we reveal the top 10 attacks on external and internal DNS servers; and the impact they have on your operations.