Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Cradlepoint Whiteboard Series -- Home Station WiFi and Offload Cradlepoint Whiteboard Series -- Home Station WiFi and Offload Landon Reese, Cradlepoint Recorded: Aug 26 2016 2 mins
    Learn more about Home Station WiFi and Offload: https://cradlepoint.com/content/whats-new/firmware-and-ecm-enhancements

    Learn more about the COR IBR1100: https://cradlepoint.com/products/cor-ibr1100-series
  • Cradlepoint Whiteboard Series -- Modem Data Usage Analytics Cradlepoint Whiteboard Series -- Modem Data Usage Analytics Mike Hagman, Cradlepoint Recorded: Aug 26 2016 3 mins
    Learn more about Modem Data Usage Analytics: https://cradlepoint.com/content/whats-new/firmware-and-ecm-enhancements

    Learn more about Enterprise Cloud Manager: https://cradlepoint.com/ecm
  • Cradlepoint Whiteboard Series -- Fog Computing With Router SDK Cradlepoint Whiteboard Series -- Fog Computing With Router SDK Mike Hagman, Cradlepoint Recorded: Aug 26 2016 2 mins
    Learn more about Fog Computing with Router SDK: https://cradlepoint.com/content/whats-new/cradlepoint-platform-extensibility

    Learn more about Enterprise Cloud Manager: https://cradlepoint.com/ecm
  • DDoS LIVE: Watch as a Security Expert Performs a Live DDoS Attack DDoS LIVE: Watch as a Security Expert Performs a Live DDoS Attack Andy Shoemaker Founder and DDoS Expert, NimbusDDoS and Nabeel Hasan Saeed Product Marketing Manager, Imperva Incapsula Recorded: Aug 26 2016 56 mins
    In this webinar Andrew Shoemaker, a DDoS simulation expert from NimbusDDOS, gives you a rare glimpse into how hackers find the weak points in your defenses and exploit them to level devastating DDoS attacks. You'll see real world examples of the tactics and methods used to create tailored DDoS attacks that can bring down a targeted network or application, and learn how best to defend against them.
  • Cradlepoint Whiteboard Series -- Cradlepoint LTE Advantage Cradlepoint Whiteboard Series -- Cradlepoint LTE Advantage David Rush, Cradlepoint Recorded: Aug 26 2016 2 mins
    Learn more about Cradlepoint’s COR IBR600B with embedded Cat 4 LTE modem: https://cradlepoint.com/content/whats-new/ibr600b-launch

    Read our blog post “7 Things to Know About LTE Advanced”: https://cradlepoint.com/blog/david-rush/7-things-know-about-lte-advanced
  • Cradlepoint Whiteboard Series -- Secure Connectivity for Mobile Health Professio Cradlepoint Whiteboard Series -- Secure Connectivity for Mobile Health Professio Roger Billings, Cradlepoint Recorded: Aug 26 2016 2 mins
    Learn more about secure LTE solutions for mobile healthcare applications: https://cradlepoint.com/products-and-services/solutions/healthcare

    Learn about Enterprise Cloud Manager: https://cradlepoint.com/ecm
  • Gain a Holistic View of User Experience in an Omnichannel World Gain a Holistic View of User Experience in an Omnichannel World Bryan Whitmarsh - Sr Principal Product Manager, CA Technologies Recorded: Aug 25 2016 55 mins
    It’s a paradox that too many tools and too much data can actually lead to not enough insight into what is really going on with your users’ experience across web, mobile and wearables. To best improve your users’ digital experience you must be able to observe users from an outside-in view. With the end user’s experience top of mind you are able to make experience focused improvements in design, development, and performance across various channels. Equally important is to have the inside-out view to find and fix problems fast. Finally, it’s is critical to have an integrated view of both outside-in and inside-out analytics.

    In this webcast you’ll learn:
    •How to understand the experience of all of your customers across mobile, web and wearables
    •How to identify and address problems that can impact user experience even at times when you have no active users
    •How to monitor user experience in conditions where security or other concerns prohibit direct end-user monitoring
    •How a holistic view of user experience can help you see wide and deep: across all channels and from end to end
  • Using your Load Balancer for Application Performance Monitoring Using your Load Balancer for Application Performance Monitoring Ashish Shah, Director of Product, Avi Networks Recorded: Aug 25 2016 47 mins
    Load balancers occupy an important position (in the path of application traffic) on the enterprise network. Yet, traditional application delivery controllers (ADCs) are unable to provide meaningful application insights to drive business decisions. Avi Networks’ software-defined architecture for load balancing separates the control plane (management layer) from the data plane (load balancers) to generate continuous insights about applications.

    In this 30 minute presentation from Avi Networks, learn how you can get rich analytics and actionable insights into end user experience, application performance, resource utilization, security, and anomalous behavior. See how you can benefit from:

    • A “Network DVR” to record and replay traffic events to pinpoint app issues
    • At-a-glance view of all virtual services throughout the system
    • Real-time visibility into DDoS attacks, SSL versions and ciphers used in transactions
    • Health scores that give you immediate feedback on application performance
  • Know Your Baseline Costs Before Considering Migration Know Your Baseline Costs Before Considering Migration Chris Grossmeier, Director of Product Management Recorded: Aug 25 2016 42 mins
    Join this webinar to be certain of making the right decisions on moving resources to the cloud. You’ll see how to evaluate which workloads are candidates for cloud migration PLUS measure how efficiently you’re utilizing your own resources.

    The CloudPhysics Cost Calculator for Private Cloud lets you apply basic costing models to determine your actual costs per virtual machine (VM) in terms of power, compute resources, memory, storage, licensing, and more to generate a cost baseline.

    Now you can apply CloudPhysics rightsizing intelligence to your VMs. See your “as is” costs beside your rightsized costs at peak, 99th percentile, and 95th percentile. Capture savings by reducing workloads to match actual demands and reduce overprovisioning.

    When mapping your VMs to their public cloud instances, apply the same peak, 99th percentile, and 95th percentile data to reveal cost difference for private versus public cloud.

    Attend this webinar to be sure you’ve optimized decision-making before you move.
  • Skype Operations Framework & Network Readiness Skype Operations Framework & Network Readiness Korneel Bullens, Sr Customer Eng Architect - Microsoft | John Hand, Global Microsoft Alliance Director - IR Recorded: Aug 25 2016 62 mins
    Microsoft just announced the Skype Operations Framework (SOF) - which incorporates network pre-assessment. This session will take a deep dive in to how the program can be used to deliver an effective and reliable Skype for Business Deployment.

    One of the most critical elements in a successful UC deployment in the cloud or a hybrid environment is ensuring the IT infrastructure is optimized to cope with the demands of real-time communications.

    However, organizations often fail to pre-assess their network and UC environment and later find out during deployment the network is unable to handle the demands, causing a poor user experience.

    Join us to learn more about the new SOF and network pre-assessment requirement.
  • Ransomware: How to Battle the Most Evolved Ransomware: How to Battle the Most Evolved Ben Brobak and Marc Laliberte Recorded: Aug 25 2016 60 mins
    Large corporations are no longer the primary target for hackers, making network security for small and mid-sized businesses more important than ever before. Ransomware has evolved dramatically over the last few years, but one thing remains the same: it can wreak havoc the likes of which many businesses will never recover from.

    Join Ben Brobak, Technical Product Manager, and Marc Laliberte, Information Security Analyst, as they take a look at the evolution of Ransomware – and the best ways for businesses to protect themselves.
  • Telco Cloud: Exploring the Tools and Technologies Powering the Ecosystem Telco Cloud: Exploring the Tools and Technologies Powering the Ecosystem Steve Adams, Strategy Director, Network Platforms Group, Intel Corporation Recorded: Aug 25 2016 46 mins
    Telco Cloud represents an enormous opportunity for communications service providers to transform their business practices. By bringing together the best of telco and cloud tools and technologies, communications service providers can deploy network functions anywhere to provide the best user experience without sacrificing service reliability. In this webinar, we will highlight the technical problems and challenges and offer a variety of solutions for the audience to address performance, availability, security, and manageability and automation as they consider their options for transforming their networks in a Telco Cloud environment.
  • Micro-Segmentation Series: Automate Security Workflows with VMware NSX Micro-Segmentation Series: Automate Security Workflows with VMware NSX Joshua Soto, Senior Product Marketing Manager, Networking & Security Recorded: Aug 25 2016 23 mins
    What Don’t You Know About Micro-Segmentation?

    Join us for the third and final webcast in our series on micro-segmentation, how it protects networks, and how it works with perimeter firewalls. We’ll also discuss its advantages beyond protection in automating security workflows and more.

    In this webcast series, we’ve explored the security benefits of micro-segmentation with NSX, notably how it protects data centers inside the perimeter firewall. But did you know that with micro-segmentation, IT can also automate security workflows such as provisioning, moves/adds/changes, threat response, and security policy management? Join us as we discuss:

    • How to improve accuracy and gain better overall security in the data center
    • Security policy approaches with network virtualization
    • How to automate security workflows to gain greater agility

    Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.
  • Not All SD-WANs Are Equal. Performance Matters! (EMEA Version) Not All SD-WANs Are Equal. Performance Matters! (EMEA Version) Zeus Kerravala is founder and principal analyst with ZK Research & Chris Rogers, Director of Cloud Solutions at Silver Peak Recorded: Aug 25 2016 41 mins
    The use of broadband Internet connections in SD-WAN environment has many benefits, however for any enterprise, performance and reliability cannot be compromised. An SD-WAN solution must include all the functionality needed to meet these essential requirements that deliver outstanding performance and Quality of Service by:

    •Actually improving the quality of the bandwidth you already have, instead of routing around it
    •Enabling centralized control and administration of network-wide policies
    •Providing detailed visibility into real-time and historical application and network trends
    •Allowing for the modular deployment of WAN optimization to insure performance when you need it, where you need it
    This all adds up to an enterprise-grade, performance-centric offering that allows your SD-WAN to rapidly connect users to the applications they need. Deployment times are reduced significantly and enterprises enjoy enhanced performance, visibility and control over the entire network.
  • Top 3 Cybersecurity Challenges Facing Healthcare with Real Life Lessons Learned Top 3 Cybersecurity Challenges Facing Healthcare with Real Life Lessons Learned Sam McLane, Head of Security of Engineering at Arctic Wolf Networks Recorded: Aug 24 2016 42 mins
    Healthcare organizations have become prime targets for cyber criminals. In this webcast, security experts identify three key areas that are critical to improving your organization’s cybersecurity and provide effective strategies to combat cyber attacks using real-life examples.
  • Managed Detection and Response Answers the Question, “Am I Safe?” Managed Detection and Response Answers the Question, “Am I Safe?” Young-Sae Song, VP of Marketing at Arctic Wolf Networks Recorded: Aug 24 2016 31 mins
    Cyber attacks are becoming more complex, and it is becoming harder to determine what the best strategy is for vigilant cybersecurity. Companies feel like they are playing catchup, and there always seems to be another security hole to fill. Join this 30-min webcast to hear about the emerging security service segment, managed detection and response (MDR).
  • Pure Storage & SolarWinds: Monitoring All-Flash Storage Devices with Discipline Pure Storage & SolarWinds: Monitoring All-Flash Storage Devices with Discipline Andrew Levin, Product Manager, Pure Storage; Kong Yang, Cloud and Virtualization Practice Leader, Solarwinds Recorded: Aug 24 2016 41 mins
    In this session Pure Storage discusses a case study with Kong Yang, Head Geek of Virtualization & Cloud Practice at SolarWinds on why storage monitoring is essential to maximize performance and maintain application uptime. Topics covered include:

    – How monitoring an all-flash array is different than monitoring a traditional storage array
    – Best practices to optimize your monitoring solutions/processes to deliver expected performance to applications and meet your end users’ Quality-of-Service (QoS) SLA
    – How to do forecast capacity requirements and utilization over time with capacity planning tools

    Save your seat to filter through the complexities of data storage, all-flash vs. traditional storage arrays, and how to effectively and efficiently manage your storage devices.
  • Next Generation Data Centers – Are you ready for scale? Next Generation Data Centers – Are you ready for scale? Qing Xu, Technology and Applications Manager, Belden; Stephen Worn, CTO, DatacenterDynamics Recorded: Aug 24 2016 51 mins
    This presentation will provide a general overview of the data center trends and the ecosystem that comprises of “hyperscale DC”, “MTDC”, and “enterprise DC”.
  • Executive Webinar Series: Cut Audit Prep with Continuous Compliance Executive Webinar Series: Cut Audit Prep with Continuous Compliance John Parmley, Area VP, Tufin Recorded: Aug 24 2016 32 mins
    Today's expectations of security executives is to do more with less: provide tighter security with less resources for a dynamic, hybrid, complex IT environment.
    As an existing Tufin customer, you can turn the Tufin Orchestration Suite from a management tool into a strategic infrastructure.

    Join us for the second webinar in our Executive Webinar Series: "Cut Audit Prep and Tighten Security with Continuous Compliance" and learn how you can maximize your Tufin investment to:
    •Cut audit preparations by enforcing continuous compliance across the hybrid network
    •Tighten security posture with a unified zone-based security policy
    •Maximize agility AND policy compliance with proactive risk analysis
    Reserve your seat now!
    We look forward to you joining us.
  • 利用大数据实现积极且具有高度关联性的安全防御Using Big Data For Active And Contextual Security 利用大数据实现积极且具有高度关联性的安全防御Using Big Data For Active And Contextual Security 周德振(Adam), 高级解决方案顾问, Akamai Technologies Recorded: Aug 24 2016 59 mins
    *This webinar will be conducted in Mandarin
    Organizations are turning to leverage big data and analytics to ‘look’ for indicators of intent or indicators of compromise, thus helping organizations focus their security resources on the threats at hand. The challenge though is how to process the vast amount of data, and furthermore, keep it relevant, timely, actionable – contextual. The challenge becomes harder when threat actors utilize a variety of techniques to maintain anonymity, reduce their ‘fingerprint’ and mask their intent.

    In this webinar, Adam will share how Akamai leverages the vast amount of data that it sees daily to help its customers improve their security decisions, when the threat would otherwise be unclear. John will showcase how Akamai’s big data and analytics platform, Cloud Security Intelligence, powers its Client Reputation service. A service that provides the ability to forecast intent and protect applications against Distributed Denial of Service (DDoS) and application layer attacks, and how active defence can be applied to a variety of response mechanisms, delivering an intelligent contextually aware defence.

    各家机构正越来越倾向于使用大数据资源来“查找”各种恶意行为的迹象、甚至是破坏的先兆,来帮助机构把有限的安全资源集中在关注现有的威胁之上。但是,挑战在于如何处理这样大量的数据,而且保证数据的相关性、及时性和可用性不会受到影响。而且,随着安全威胁使用了更多样的技术来保证其匿名性、减少留痕并掩盖其意图,机构所面临的安全挑战也越来越严峻。

    在本次的网络研讨会中,Akamai 高级解决方案顾问-周德振先生(Adam),将会向您展示Akamai是如何在威胁尙不明确的情况下,使用每日承载的海量数据来帮助客户做出更加明智的网络安全决策的。Adam将会展示Akamai的大数据及分析平台、云安全智能是如何强化其客户端信誉(Client Reputation)服务。这种服务能够提前预告各种行为的迹象,并保护应用程序不会受到DDoS和应用层攻击。此外,您还将看到这种积极的安全防御是如何帮助各种响应机制,是如何交付智能化、高度关联的防御。

    8月24日(周三)| 时长60分钟 | 北京时间 14:00
    演讲人: 周德振(Adam), 高级解决方案顾问, Akamai Technologies
    主持人: 毛宇, CISSP, AMBCI, CCNP, PRINCE2, (ISC)²官方授权讲师


    预留席位,就在此刻!

    *This webinar will be conducted in Mandarin
  • What Your Object Storage Vendor Isn't Telling You About NFS Support What Your Object Storage Vendor Isn't Telling You About NFS Support George Crump, Storage Switzerland Recorded: Aug 23 2016 61 mins
    NFS has been the “go to” file system for large data stores but there is a new offering on the horizon...Object Storage. To help ease the transition, many Object Storage vendors have provided a gateway that allows their systems to look like NFS servers. The problem is that most of these implementations are very limiting and often create more problems than they fix. In this webinar Storage Switzerland and Caringo will discuss why object storage systems are the heir apparent to NFS servers and how to make that transition without the typical roadblocks that NFS gateways create.
  • Not All SD-WANs Are Equal. Performance Matters! Not All SD-WANs Are Equal. Performance Matters! Zeus Kerravala is founder and principal analyst with ZK Research & Chris Rogers, Director of Cloud Solutions at Silver Peak Recorded: Aug 23 2016 41 mins
    The use of broadband Internet connections in SD-WAN environment has many benefits, however for any enterprise, performance and reliability cannot be compromised. An SD-WAN solution must include all the functionality needed to meet these essential requirements that deliver outstanding performance and Quality of Service by:

    •Actually improving the quality of the bandwidth you already have, instead of routing around it
    •Enabling centralized control and administration of network-wide policies
    •Providing detailed visibility into real-time and historical application and network trends
    •Allowing for the modular deployment of WAN optimization to insure performance when you need it, where you need it
    This all adds up to an enterprise-grade, performance-centric offering that allows your SD-WAN to rapidly connect users to the applications they need. Deployment times are reduced significantly and enterprises enjoy enhanced performance, visibility and control over the entire network.
  • Cradlepoint’s Extensibility Platform, SDK & New COR Devices Cradlepoint’s Extensibility Platform, SDK & New COR Devices Cradlepoint's Product Management Team Recorded: Aug 23 2016 44 mins
    Cradlepoint announced it is delivering an innovative Router Software Development Kit (SDK) and extensibility platform to enable enterprises to customize Machine-to-Machine (M2M) and Internet of Things (IoT) connectivity to meet their specific business needs, applications, and network requirements.

    With the new Router SDK and extensibility platform, enterprises can now build and customize more intelligent, application-specific solutions on top of Cradlepoint’s latest COR IBR routers. Developers and enterprise customers can now create tailored M2M and IoT applications on top of Cradlepoint Solution Platforms that can precisely address their specific business needs.

    The extensibility platform launches in conjunction with new additions to Cradlepoint’s COR family of M2M-IoT and in-vehicle routers — the COR IBR600B and COR IBR650B. The new routers include embedded Cat4 modems that will perform at higher speeds and support additional bands. They also support auto-carrier selection that automatically connects to the U.S. wireless carrier associated with the SIM card installed.

    The new routers support the COR Extensibility Dock that enables dual modems, extra Ethernet ports, and support for a third party expansion card, as well as, Cradlepoint’s SDK and extensibility platform that enable customers, partners, and third parties to write custom scripts and then securely push those scripts down to the router fleet for distributed computing at the Networks Edge.
  • High Performance vADCs & OpenStack Virtual Infrastructure by 6WIND and Radware High Performance vADCs & OpenStack Virtual Infrastructure by 6WIND and Radware Frank Jimenez, Product Marketing Manager, 6WIND, and Frank Yue, Director Solution Marketing, Radware Aug 30 2016 3:00 pm UTC 60 mins
    Experts from 6WIND & Radware prove that it is possible to attain and sustain virtualized performance above and beyond industry expectations for NFV using an OpenStack environment. By combining 6WIND Virtual Accelerator™ and Radware Alteon® NG VA, network operators can migrate to high performance vADCs while eliminating PCI passthrough and SR-IOV. The end result is a cost effective move to an NFV architecture without compromising the performance or impacting the virtualization environment that their customers expect.
  • How to improve network visibility and ease IT frustration How to improve network visibility and ease IT frustration Neela Sambandam Aug 31 2016 6:00 pm UTC 60 mins
    Today’s new generation of mobile-centric users and the sheer number of authentications due to mobility is driving the need for better visibility into who and what is on the network.

    Join Neela Sambandam, ClearPass Product Manager, to learn how the Insight reporting package within the ClearPass solution gives you:
    •Unsurpassed views into the users, devices and connections on your network
    •An easy-to-use dashboard and analytics engine
    •Triggered alerts based on pre-defined metrics
    •Improved reporting with pre-configured templates

    Learn how ClearPass Insights can improve network performance and user experience, as well as about future enhancements.
  • Skype Operations Framework & Network Readiness (EMEA Timezone) Skype Operations Framework & Network Readiness (EMEA Timezone) Thomas Canty - Chief Innovation Officer, IR | Stephen Elliott - Marketing Director Sep 1 2016 9:00 am UTC 60 mins
    Microsoft just announced the Skype Operations Framework (SOF) - which incorporates network pre-assessment. This session will take a deep dive in to how the program can be used to deliver and effective and reliable Skype for Business Deployment.

    One of the most critical elements in a successful UC deployment in the cloud or a hybrid environment is ensuring the IT infrastructure is optimized to cope with the demands of real-time communications.

    However, organizations often fail to pre-assess their network and UC environment and later find out during deployment the network is unable to handle the demands, causing a poor user experience.

    Join us to learn more about the new SOF and network pre-assessment requirement.
  • Optimieren Sie Ihren Storage um 36% mit Lösungen von HPE Software Optimieren Sie Ihren Storage um 36% mit Lösungen von HPE Software Matthias Bayer, Presales Consultant Storage Resource Management Solutions, HPE Sep 1 2016 11:00 am UTC 60 mins
    Wächst auch Ihr Speicherbedarf über alle Storage Tier hinweg exponentiell? Bindet der Storage-Bereich mehr und mehr Zeit und Personal und stellt inzwischen einen stark wachsenden, aber geschäftskritischen Kostenblock dar?

    Sorgen Sie mit dem Storage Operations Manager von HPE Software, kurz HPE SOM, für die erforderliche Transparenz entlang des Nutzungspfades der Daten, silo- und herstellerübergreifend, quer über physische und virtuelle Umgebungen hinweg.

    Innerhalb von 15 Minuten installiert, liefert er binnen eines Tages erste Auswertungen und Optimierungspotenziale. Durch seine kontinuierlichen Scans und pfadorientierte Korrelierung filtert HPE SOM von Anfang an die richtigen Probleme und Risiken aus dem Sturm der Events in Ihrem Storage-Bereich heraus. Alle unsere Kundenergebnisse weisen auf ein Einsparpotential von 30% oder mehr hin – sowohl im Bereich Hardware als auch in den laufenden Betriebskosten – bei gleichzeitiger Erhöhung von Leistungsfähigkeit und Stabilität des Storage.

    Informieren Sie sich in unserem Webinar, wie wir Ihr Unternehmen auf dem Weg zu verbesserter Transparenz und optimaler Nutzung Ihrer Storage-Umgebung unterstützen können.
  • How Software Eats Hardware in the Datacenter: Reducing Cost and Complexity How Software Eats Hardware in the Datacenter: Reducing Cost and Complexity Andy Ryan, Cloud Solutions Architect at vArmour Sep 1 2016 5:00 pm UTC 45 mins
    INTRO:

    As organizations move to virtual data centers and multi-cloud environments in a dangerous threat climate, they are faced with new security challenges they must overcome. But, they must do this without exponentially increasing the manpower, products, or resources they need, so they still get the most of their valuable security budgets. These challenges include:

    -Improving visibility inside data centers and cloud
    -Reducing the attack surface
    -Maintaining regulatory compliance standards.

    WHAT'S IN THIS WEBINAR:

    vArmour will explore trends in data center security that include the rise of software to replace firewalls inside the data center, segmentation and micro-segmentation as security techniques, and shifting ideas about how software defined networking that:

    -Eliminate under-utilized zones and choke points
    -Avoid costly hardware refresh cycles and on-going maintenance
    -Lower the time it takes to see and stop threats
    -Reduce the time and complexity to process security changes
    -Increase speed of secure application delivery

    ABOUT THE SPEAKERS:

    Andy Ryan, Cloud Solutions Architect at vArmour
    https://www.linkedin.com/in/andyr
  • S'entraîner, se préparer, se juger, réagir face aux attaques ciblées S'entraîner, se préparer, se juger, réagir face aux attaques ciblées David Grout, Technical Director, Southern Europe, FireEye Sep 2 2016 9:00 am UTC 45 mins
    Aujourd’hui la question n’est plus “vais-je être victime d’une attaque ou d’une tentative d’attaque ? » mais plutôt « quand vais-je l’être ? ». Comme pour le sport de haut niveau, la gestion de la sécurité d’une infrastructure nécessite de la préparation, de l’entrainement et de la compétition. Fort de notre expérience en victimologie avec nos équipes Mandiant et de notre vision des groupes d’attaquants à travers Isight Partners, nous avons mis en place différents programmes qui vous permettent d’être prêt le jour J et de régir le cas échéant. Venez découvrir comment nous pouvons vous accompagner dans toutes les phases amont et aval à travers nos prestations de consulting.
  • 보안이상징후 및 내부정보 유출을 방지하기 위한 프로파일링의 기반의 이상 행위 분석을 통한 보안 전략 보안이상징후 및 내부정보 유출을 방지하기 위한 프로파일링의 기반의 이상 행위 분석을 통한 보안 전략 홍세진, 부장, HPE 소프트웨어 보안사업부, 휴렛팩커드 엔터프라이즈(HPE) Sep 7 2016 5:00 am UTC 60 mins
    공격자들은 지하 시장에서 점점 전문화 , 조직화하고 있으며, 공격 기법도 무서운 속도로 고도화하고 있습니다.
    정보 보호 업체인 “Websense Security Labs”이 미국, 영국, 캐나다, 호주의 IT관리자 1,000명 을 대상으로 조사한 결과 보고서에 따르면 대부분의 데이터 유출 사고는 “인가된 사용자”에 의해 이루어지고 있다고 합니다.
    또한 그 동안 국내/외 많은 보안 사고 사례를 통해 알 수 있듯이 대부분의 정보 유출 사고는 탈취된 정상 사용자 계정 권한을 이용해서 이루졌다는 사례를 언론 등을 통해서 접할 수 있었습니다.

    정보 유출 사고 예방을 위해 대부분의 보안 담당자는 이러한 알려진/알려지지 않은 다양한 보안 위협과 고도화된 내/외부에서 발생되는 위협을 식별 및 대응을 위한 위협 관리 체계의 필요성을 느끼고 있으며, 가트너에서는 향후 내/외부 다양한 보안 위협 예측 그리고 예방을 위해User Behavior Analytics (UBA) 사용은 필수이며, 2018년까지 최소 25%이상의 보안사고가 UBA 기술에 의해 탐지될 것이라고 리포트를 통해 예측하고 있습니다.

    프로파일링 기반 이상행위 분석은 정상적인 사용자 및 시스템의 행동과 적절한 연관성의 정상 기준선을 설정하고 사용자 및 동료 그룹 간 이상 현상을 실시간으로 분석을 통해 권한 보유 사용자의 비정상 행위를 시각화 및 위협 예측 그리고 예방합니다.

    또한 전체 IT 환경에 대한 보안을 더욱 민첩하고 지능적으로 변모하도록 요구하고 있으며, SIEM 보안 플랫폼과 연계 가능하며 UBA 기술은 알려진 위협과 알려지지 않은 위협에 관한 조치 가능한 정보를 생성하여, 사용자 및 시스템에 대한 세부적인 가시성을 제공함으로써 위협을 선제적으로 대응할 수 있는 보안 인텔리전스와 내부 위협를 보다 신속하게 해결할 수 있습니다.
  • Exploring Russia’s Cyber Operations Exploring Russia’s Cyber Operations Dan McWhorter, Chief Intelligence Strategist at FireEye Sep 7 2016 1:00 pm UTC 45 mins
    Russia has a long history of utilising cyber actions to accomplish their information operations and national security goals. Organisations in Europe – in the private and public sector – are a top target of Russia-based cyber activity for espionage and crime. This talk will cover how some of Russia’s recent cyber actions were conducted, and it will highlight how well Russia has embraced the opportunities cyber provides when it comes to national security and foreign policy objectives. Dan McWhorter, Chief Intelligence Strategist at FireEye, will also discuss why organisations need to take note of these activities in Russia and steps to ensure your organisation is able to defend against these threats.
  • Influencers Panel Series: Key Use Cases for Network Virtualization: How and Why? Influencers Panel Series: Key Use Cases for Network Virtualization: How and Why? Aram Avetisyan, IBM | Rene Van Den Bedem, RoundTower Technologies | Maqsood Siddiqui, VMware | Joshua Soto, VMware Sep 7 2016 3:00 pm UTC 30 mins
    In this two-part series, a panel of top influencers will share their experiences with network virtualization and VMware NSX, how it is being used by organizations as they move toward a fully software-defined data center, and what its deployment requires. You’ll hear valuable advice and use cases for transforming your data center into one that’s more agile, secure and scalable.

    Join us for an open panel of NSX top influencers in a no-slide webcast conversation. They’ll explore how enterprises are using NSX for multiple use cases not previously possible with traditional data center infrastructure. Get insights from their first-hand experiences and IT outcomes that are resulting in unparalleled speed, agility, and security – with orders of magnitude better economics, flexibility, and choice.

    Don’t miss this opportunity to learn from industry experts as they share their valuable insights into:

    - How NSX is being deployed in a variety of customer scenarios
    - Key use cases of NSX
    - Getting started with NSX

    Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.
  • NSA Hacking Tools Exposed... Who's Next? NSA Hacking Tools Exposed... Who's Next? Cody Mercer, Sr. Threat Research Analyst, NSFOCUS Sep 7 2016 5:00 pm UTC 60 mins
    Every day, the techniques, attack vectors, and tools used by ethical and non-ethical hackers grows exponentially. In lieu of the recent breach conducted by the ‘Shadow Brokers” on the NSA, a new hacking arsenal has been released into the wild. Unfortunately, for the majority who are unaware of this recent breach, they not only open themselves up to being compromised, but also do not possess the skill-set and proper security measures required to combat against these nefarious actors - and their advanced weaponry.

    Join us in this session where we’ll discuss:
    •Black-Hats and White-Hats and the intrinsic life-cycle of the hacking process
    •The real motivations and skills behind state-sponsored hackers, hacktivists, and script kiddies
    •How hackers will use the NSA tools for even more nefarious activities
    •How to combat these highly-sophisticated hacking tools with the right defenses
  • Ein Tag im Leben eines Analysten eines Security Operation Centers (SOC) Ein Tag im Leben eines Analysten eines Security Operation Centers (SOC) Sven Schriewer, Director, FireEye as a Service, FireEye Sep 8 2016 12:00 pm UTC 45 mins
    Was macht überhaupt ein Analyst? Welche Abläufe finden wie statt? Welche Unterstützung benötigt ein Analyst, um effektiv zu sein. Und und und … .

    Möchte man ein SOC auf- oder ausbauen oder eine entsprechende SOC Aktivität extern unterstützen lassen, stellen sich solche und viele andere praktische Fragen. Wir geben einen Einblick, wie FireEye Analysten aus unserem SOC tagtäglich arbeiten. Ein Security Analyst berichtet von seiner täglichen Arbeit, wie er Angreifer im Zusammenspiel mit Spezialisten, Technologie und Intelligence identifiziert und Empfehlungen zur Abwehr gibt. Der SOC Direktor erläutert, wie die Analysten unterstützt und koordiniert werden.
  • Hybrid Security Services Orchestration & Automation Hybrid Security Services Orchestration & Automation Hervé Guesdon, CTO, UBIqube Sep 8 2016 3:00 pm UTC 45 mins
    Virtualization presents tremendous efficiency and service innovation opportunities for the telecom industry.

    However, while most of the attention in the industry has focused on the virtualization of the functions themselves by leading networking hardware vendors, a greater challenge lies ahead for the telco aiming at orchestrating holistically services across these new architectures while still exploiting their legacy installed base.

    The task is rendered even more complex as what used to be a standalone silo in legacy network architectures now has to be weaved into every service delivered and orchestrated by the telco for their clients: Security.

    In this webinar we will focus on the specific challenges that come with orchestrating security as part of the network service (whether virtual or physical), and the associated end customer expectations on the matter (self-management portals, monitoring, big data analysis, remediation etc..).

    We will also discuss the broader adoption of next generation orchestration technologies as they relate to security services and the need for channel empowerment through devops and agility and technology integration easiness, which may lead to a subset of open source communities/solutions in the industry.
  • Achieving Optimal Performance Through Smart Mobile Backhaul Network Design Achieving Optimal Performance Through Smart Mobile Backhaul Network Design Bruno Giguere - MEF; Julius Robson - Small Cell Forum; Glenn Parsons - Ericsson; Rami Yaron - Telco Systems Sep 8 2016 4:00 pm UTC 75 mins
    To meet the demands for quality of service (QoS) and experience (QoE) for its users, operators are deploying new types of infrastructure and technologies, such as Wi-Fi carrier grade, distributed antenna systems (DAS), small cells and remote radio heads (RHH), among others.

    Still, most of the traffic load will remain in the hands of the macro cells. This means that, before embarking on the deployment of new technologies and infrastructure, operators must have a clear strategy to improve their current Mobile Backhaul networks. Mobile Backhaul network design may determine the capacity and performance of the mobile network. LTE and LTE-Advance Small Cells impose new requirements on the backhaul such as synchronization and latency in order to achieve better user experience.

    This webinar will cover current and future work of MEF with regard to mobile backhaul for LTE/ LTE- Advance Small Cells including:
    -Optimizing your network for LTE Advance cellular backhaul - MEF Mobile Backhaul Initiative
    -Outlining requirements for synchronization, resiliency, and service mapping
    -Achieving performance objectives for multiple classes of service
    -Best practices in LTE-Advance and Small Cell backhaul transition
    -Outlining the latest MEF developments in mobile backhaul
    -Assessing the impact of small cells’ synchronization and coordination on the backhaul
  • VoIP on an LTE Network VoIP on an LTE Network Ken Tucker, Senior Solutions Architect for Cradlepoint Sep 8 2016 4:00 pm UTC 60 mins
    Voice Over Internet Protocol (VoIP) is deployed one of two ways: on-premises or cloud. Each deployment strategy has its pluses and minuses — with variables including features, upfront costs and total cost of ownership, existing infrastructure, and scalability.

    VoIP services traverse the WAN and are subject to overall WAN bandwidth. If adequate WAN resources are not available, call quality degradation can result. That’s why more and more IT professionals are asking this question: “How would using an LTE WAN for failover or primary connectivity impact VoIP services in our network?”

    Join our webinar at 9 a.m. PDT/12 p.m. EDT on Sept. 8, 2016, to learn the best practices and considerations for deploying VoIP on an LTE network.

    We also will discuss:

    — VoIP on an LTE network vs. VoLTE
    — VoIP on LTE for failover or primary connectivity
    — VoIP network conditions
    — LTE vs. 3G/2G
    — Best practices
    — Quality of Service (QoS)
    — Cradlepoint field testing
  • Software Defined Networking for Real Life Disaster Recovery as a Service Software Defined Networking for Real Life Disaster Recovery as a Service Carl Brooks, 451 Research; Shishir Agrawal, Juniper; John White, Expedient Sep 8 2016 5:00 pm UTC 60 mins
    In this webinar, learn how Expedient uses the Juniper Networks vSRX Services Gateway platform in combination with VMware vCenter Site Recovery Manager and Zerto Virtual Replication to seamlessly move public networks among data centers and clouds to create push button DRaaS.

    Facilitator
    Carl Brooks, Information Technology Analyst – 451 Research

    Speakers
    Shishir Agrawal, Senior Manager, Product Management – Juniper Networks
    John White, Vice President, Product Strategy – Expedient

    Complimentary Document Distribution
    Juniper Case Study: Expedient Keeps Customers’ Networks Safe and Highly Available with vSRX
    451 Market Impact Report: Expedient to offer private cloud in customer facilities.
  • The Professionalization of Hackers The Professionalization of Hackers Bob Shaker, Incident Response Product Management, Cyber Security Services, Symantec Sep 8 2016 5:00 pm UTC 60 mins
    We are no strangers to breaches and compromises but why has it gotten worse? What is happening in the adversary landscape that has changed the attack model from opportunity of convenience to campaign driven assault plans? We’ll highlight the professionalism of hackers and how they are operating as a business to take advantage of organizations of all sizes. The facts presented are from the findings that can be found in Symantec’s 2016 Internet Security Threat Report.
  • HackerCraft - Avoid the Breach HackerCraft - Avoid the Breach Rob Krug, Systems Engineer Sep 12 2016 5:30 pm UTC 60 mins
    This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security engineer. Once you have seen what the bad guys have been up to today, you will be exposed to a crash course of security policy management and network security architecture design that will help avoid the breach of tomorrow.

    Rob will discuss the following:
    • Threat landscape 2016 recap
    • Fortifying the network
    • Security craftsmanship
    • Implementing the solution
  • DDoS Fossils to Future: A Brief History and What to Expect DDoS Fossils to Future: A Brief History and What to Expect Darren Anstee, Chief Security Technologist, Arbor Networks Sep 13 2016 4:00 pm UTC 45 mins
    The history of DDoS provides a clear, unambiguous guide as to where things are going - attacks are becoming more expansive, impacting a wider variety of targets, and the durations are longer and more destructive. Response strategies however, have kept pace and can handle the scale. Available in variety of deployment options and informed by vast quantities of intelligence, the right technology can empower you to stay abreast the threats and prevent or mitigate the inevitable attacks. The key is in discovering the optimal match between your architecture and the available solutions.

    Join this session to find out:
    -Learnings from past DDoS threat and attack trends
    -How today’s DDoS poses threat to any organization’s availability
    -What prevention and mitigation approaches are proving most effective
  • Overwhelmed by Security Vulnerabilities? Learn How to Prioritize Remediation Overwhelmed by Security Vulnerabilities? Learn How to Prioritize Remediation Deb J, SME & Solution Architect – APAC & Middle East, Qualys Inc. Sep 14 2016 6:00 am UTC 60 mins
    One of the biggest challenges faced by information security teams today is how to effectively prioritize their vulnerability remediation work. Burdened with this overload of vulnerability disclosures, Infosec teams often get overwhelmed by the task at hand and throw up their hands in frustration. After all, no IT department has enough staff and resources to promptly patch every single vulnerability within their environment.

    Join Qualys and (ISC)² on Sept 14 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefing on how to prioritize remediation.

    Presenter: Deb J, SME & Solution Architect – APAC & Middle east, Qualys
    Bios:
    Deb J (DJ) works with Qualys as a Subject Matter Expert for all products and platforms at Qualys. He is also a Field Solution architect responsible for customer success in the region. Deb has over 12 years of experience of which a large amount of time was spent on security. Started his career as a Code Quality Governance Specialist, so attention to details comes naturally. In the past he has worked with Compuware, NetIQ, LogLogic & ArcSight that adds a lot of experience for him to understand customer problems and identify solutions that work for them.
  • The Ruby Behind Chef The Ruby Behind Chef Franklin Webber, Training Team Lead, Chef Sep 14 2016 5:00 pm UTC 60 mins
    Chef is built in Ruby - a conscious choice for its great flexibility and developer friendliness. For some people, learning the language can feel difficult because most examples lack your perspective as a Chef practitioner. In this interactive webinar, we invite you to follow along in your favorite editor as we dive through the source code to teach you core Ruby concepts.

    Join us to learn:
    - Fundamental Ruby concepts and how they create the Recipe Domain Specific Language and the tools that power Chef
    - Pry’s ability to navigate and query source code

    Prerequisites:
    Come with the Chef Development Kit installed

    Who should attend:
    Chefs with a basic understanding of writing recipes and cookbooks that want to gain a better understanding of the cookbooks they author and the tools that they employ each day.
  • Protecting Your Website in a Public Cloud from DDoS Attacks Protecting Your Website in a Public Cloud from DDoS Attacks Habib Bilfaqi, Network Manager, IPC and Robert Hamilton, Product Marketing Director, Imperva Incapsula Sep 14 2016 5:00 pm UTC 45 mins
    There are many benefits of hosting your websites and apps in the public cloud—reliability, scalability, and cost savings resulting from shared resources are just a few. But did you know that your organization is ultimately responsible for the security of whatever you host in the public cloud?

    Your public cloud service may not be able to withstand an aggressive DDoS attack. And while it’s almost impossible to prevent a DDoS attack, there are things you can do to significantly reduce the damage it can cause. Just ask Habib Bilfaqi.

    Habib is the Network Manager at IPC. He found out the hard way what it took to secure his organization’s assets in the public cloud. Find out what he did, why he did it, the challenges he faced, and the lessons he learned when you register to attend the latest webinar from Imperva Incapsula.

    Here’s just some of the information you’ll get from this timely new webinar:

    •How a public cloud works
    •The security that a public cloud provides—and why it’s not enough
    •How to build a fast global site for better performance
    •What you need from a DDoS mitigation vendor
  • Operations through a business lens - Webinar 1: Einführung Operations through a business lens - Webinar 1: Einführung Klaus Holthaus und Eduard Spiegel, Presales Consultants, HPE Sep 15 2016 11:00 am UTC 60 mins
    IT-Betriebskosten senken, Prozesse automatisieren, agil sein und immer mehr mit denselben oder weniger Ressourcen stemmen – das sind die bekannten Herausforderungen für die IT und die Treiber für innovative Virtualisierungs- und Cloud-Technologien.

    Diese Technologien helfen, die IT zu einem strategischen Partner für das Business zu machen. Wenn man in der Lage ist, auch klar die Wirkung der IT auf das Business darzustellen.

    Dafür müssen Sie den Zustand Ihrer IT-Services in Echtzeit aus Endbenutzersicht erfassen und analysieren sowie gemäß den Business-Anforderungen jederzeit anpassen können. Sie müssen in der Lage sein, den Fachbereichsverantwortlichen auf Knopfdruck und proaktiv vollständige Transparenz bereitstellen zu können. Ihr ultimatives Ziel sollte es sein, den IT-Betrieb aus der Business-Perspektive heraus zu betreiben. Damit Sie tatsächlich der strategische Partner für Ihr Unternehmen sind.

    Wie Sie genau das erreichen können, erfahren Sie in unseren kostenfreien Webinaren „Operations through a business lens“.

    Webinar 1: Einführung in HPE Operations Bridge
    In diesem Webinar zeigen wir Ihnen, wie Sie durch den Einsatz einer zentralen IT Operations Bridge ein konsolidiertes IT-Management betreiben und auf einen Blick den Zustand Ihrer IT-Services erfassen können. Damit können Sie sich auf die Events konzentrieren, welche negativ das Business zu beeinträchtigen drohen, proaktiv eingreifen, um Störungen zu vermeiden und die Fehlerbehebung automatisieren. Gleichzeitig wird die Zusammenarbeit über Teams und Bereiche hinweg gestärkt. Erfahren Sie, welche Ergebnisse andere Unternehmen erzielt haben: Vodafone – Senkung der IT-Betriebskosten im ersten Jahr um 1,2 M$; Schweizer Mobiliar – Rückgang der MTTR um 58 %; Fidelity Investments – Erhöhung des Automatisierungsgrads auf 80 %.
  • Lightboard Series: Episode 1 - Why is Network Virtualization Inevitable? Lightboard Series: Episode 1 - Why is Network Virtualization Inevitable? Julie Starr Security Strategist, VMware | John Whitman Sr. Systems Engineer, VMware Sep 15 2016 3:00 pm UTC 30 mins
    Join NSX experts for a series of engaging videos and learn more about the use cases driving the adoption of network virtualization today. Through the use of a lightboard, we’ll illustrate the technology and business drivers around network virtualization with VMware NSX.

    Virtualization in the data center is not a new concept, but until now has been limited to compute and storage. For organizations who have already adopted server virtualization, the next step should be obvious. Join us to learn:

    - Why virtualized environments will ultimately incorporate network virtualization and why networking and security go hand-in-hand
    - How organizations can get started today without requiring changes to existing physical network topology
    - How NSX can run as a feature-rich overlay on top of your existing physical network bringing the capabilities of network virtualization to your environment, dramatically improving operations and automation

    Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.
  • Improve Customer Experience using Omni-channel Integration Improve Customer Experience using Omni-channel Integration Hariharan Ganesarethinam, Director of Enterprise Architecture and Integration Sep 15 2016 6:00 pm UTC 60 mins
    If you're in the consumer business, you will know how challenging it is today to retain a single customer and making them to buy from you. With the digitization, shopping has become a 24/7 experience and customers are now expecting seamless experience across all your sales channels - web, mobile, in-store, kiosk, call center and marketplace.

    Today many organizations have gone into digital to meet their customer’s expectations but later face the challenge of integrating their legacy/IT systems with the digital platform; leading to slower product or promotion rollouts, data sync issues, lack of operational visibility and all leads into unsatisfied customers.

    This session will show you how AURAS -an Aspire's Unified Architecture will help you establish unified integration platform across all your sales channels and provide an accurate data, shopping experience and higher customer satisfaction.