Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • BroadView Instrumentation Enabled Closed Control Loop In CORD BroadView Instrumentation Enabled Closed Control Loop In CORD Tom Tofigh, Architect, AT&T; Bhaskar Chinni, Principal PLM, Broadcom Dec 7 2016 6:30 pm UTC 60 mins
    “Central Office Re-architected as a Datacenter (CORD)” is a new design of a telco central office that replaces closed and proprietary hardware with software running on commodity servers, switches, and access devices. Analytics-CORD is an environment that provides tools for applications to program or actuate target probe primitives such as Broadcom based network switches. 

    BroadView Instrumentation is a software suite that enables advanced network analytics in a platform agnostic manner. BroadView Instrumentation provides deep observability of switches and network fabric in A-CORD environment. 

    In this webinar, we will discuss CORD architecture, A-CORD framework and how BroadView Agent integrated w/ A-CORD enables closed feedback loop in service provider networks. We will further discuss how BroadView Agent supports A-CORD use cases such as network level packet trace profile, end-to-end latency computation for real-time traffic, micro-burst detection and scalable monitoring of network fabric to prevent congestion.
  • Hyper-Converged Infrastructure (HCI) Decision Making Hyper-Converged Infrastructure (HCI) Decision Making Greg Schulz, Founder/Sr. Advisory Analyst, Server StorageIO Dec 7 2016 7:00 pm UTC 60 mins
    Are Converged Infrastructures (CI), Hyper-Converged Infrastructures (HCI), Cluster in Box or Cloud in Box (CiB) solutions for you? The answer is it depends on what your needs, requirements, application among other criteria are. In addition are you focused on a particular technology solution or architecture approach, or, looking for something that adapts to your needs? Join us in this discussion exploring your options for different scenario as we look beyond they hype including to next wave of hyper-scale converged along with applicable decision making criteria.

    Topics include:
    - Data Infrastructures exist to support applications and their underlying resource needs
    - What are your application and environment needs along with other objectives
    - Explore various approaches for hyper-small and hyper-large environments
    - What are you converging, hardware, hypervisors, management or something else?
    - Does HCI mean hyper-vendor-lock-in, if so, is that a bad thing?
    - When, where, why and how to use different scenarios
  • No IT security staff? No problem. Learn how to outsource your network security No IT security staff? No problem. Learn how to outsource your network security Dan Sell Dec 7 2016 7:00 pm UTC 45 mins
    Not every organization has the in-house resources needed to support IT security. Outsource your network security with SonicWall Security-as-a-Service (SECaaS). This flexible, affordable subscription-based service lets you detect and block a wide range of advanced and emerging threats, including intrusions, viruses, spyware, worms, Trojans, key loggers, rootkits, botnets and “zero-day” malware.
    Join this webcast to find out how the SonicWall SECaaS subscription-based service provides organizations of every size with the ability to:you can benefit from:

    •Meet all network security needs
    •Reduce management time
    •Eliminate upfront capital investment
    •Utilize subscription pricing for a predictable operating expense model
    •Gain valuable network reporting and expert insight
    •Have a network security professional manage it all
  • How to Build a Hybrid Cloud with AWS and VMware vSphere How to Build a Hybrid Cloud with AWS and VMware vSphere Brian Cha, Solutions Architect, SoftNAS Dec 7 2016 8:00 pm UTC 60 mins
    Gartner predicts hybrid clouds will be the most common cloud architecture by 2020. With AWS and VMware vSphere, companies have the ability to create a hybrid cloud architecture with ease. But what is the optimal storage architecture for a hybrid cloud? What’s the best way to build it? How do you guarantee your data will be highly-available and protected?

    This webinar will answer those questions. Specifically, we will cover:

    -Hybrid cloud architecture with AWS and vSphere
    -Use Cases: backup, disaster recovery and more
    -Demo: Learn how to replicate storage across vSphere and AWS
    -Common management interface across on-premises vSphere and AWS deployments

    **The first 100 attendees to register during the live webinar will receive a FREE $100 Amazon Web Services credit!**


    Presenters:
    Brian Cha, Solutions Architect, SoftNAS
  • Starting out with Network Automation Starting out with Network Automation Chris Powers, General Motors Information Technology, Ullas v v, HPE Dec 7 2016 8:00 pm UTC 60 mins
    Brought to you by the Network Automation (NA) Special Interest Group.

    The Vivit Network Automation SIG will bring real world expertise, training and advocacy to the HPE user community. We will cover new NA releases, integration, business efficiency opportunities, performance, and much more.

    Today we will target new administrators of HPE NA by targeting five areas key to getting started. These include adding devices, running tasks to collect data (Diagnostics and Snapshots), reporting on that data, performing Compliance and Remediation tasks and lastly running tasks that perform changes through Command Scripts.

    This webinar will introduce the administration of Network Automation including:

    Populating Network Automation
    Basic Task Management
    Basic Reporting
  • Converged Operations: Maximize the potential of Hyper-Converged Architecture Converged Operations: Maximize the potential of Hyper-Converged Architecture Eitan Segal, Global Architect, Dell EMC Dec 8 2016 2:00 pm UTC 45 mins
    Hyper converged infrastructure is starting to become the new norm in the IT space as customers are seeking for a solution which will help them solve the three main challenges; cost reduction, providing agility to the business and simplify datacenter operations.

    As we all know, technology alone cannot provide the full solution to the problem, that is why a new mode of operations is the key to maximize the full potential of a technology like; Hyper Converge.

    In our session, we will discuss:
    1. The new mode of operations?
    2. What are the main benefits while adopting new team structures and new processes
    3. Where to start
  • Performance Tuning of the Network Performance Server in Network Node Manager i Performance Tuning of the Network Performance Server in Network Node Manager i Prem Monica Raj Natarajan, SSE, Hewlett Packard Enterprises Dec 8 2016 3:00 pm UTC 60 mins
    Network Performance Server is a key component of Network Node Manager i. It provides a platform for data storage, analysis and reporting of performance metrics. In this webinar, learn from experts on how to maximize the value of this important tool.

    Topics include:

    •Tuning parameters in Network Performance Server (NPS)
    •Best practices for using NPS
    •Troubleshooting tips and techniques
  • Monitor with Discipline – Hyper-Converged Infrastructure Unlocked Monitor with Discipline – Hyper-Converged Infrastructure Unlocked Kong Yang, Head Geek of Virtualization & Cloud Practice, SolarWinds Dec 8 2016 4:00 pm UTC 60 mins
    Hyper-converged infrastructure (HCI) brings together all the primary tech constructs such as compute, memory, network and storage. HCI provides IT pros consistency in the form of infrastructure building blocks. As an IT professional, this removes the barrier to consume; but it presents challenges that move up the application stack.

    In this session, we will discuss how to monitor HCI with discipline.
    ·How do I manage applications efficiently and effectively on HCI?

    ·How do I put into practice skills and techniques that delivers acceptable Quality-of-Service (QoS) and success in an HCI environment?

    Join Kong Yang, pro BrightTALK thought leader and Head Geek at SolarWinds, to learn more!
  • Introducing the Latest Release of Symantec Advanced Threat Protection: Email Introducing the Latest Release of Symantec Advanced Threat Protection: Email Jane Wong,Product Management,Gateway Security Group,Symantec & Nirav Shah, Email Security Product Marketing Manager, Symantec Dec 8 2016 4:00 pm UTC 30 mins
    Stop Sophisticated Email Threats by Leveraging one of the World’s Largest Global Intelligence Networks

    Email continues to be the #1 threat vector for targeted and advanced attacks. The ubiquity of email and the widespread adoption of traditional email security solutions has led attackers to move beyond basic spam and phishing emails to more targeted and sophisticated attacks to infiltrate an organization.

    Join Symantec’s Jane Wong, Sr. Director, Product Management,Gateway Security Group and Nirav Shah, Email Security Product Marketing Manager to learn:

    - How Symantec can help your organization uncover, stop and respond to sophisticated email attacks while providing the deepest level threat intelligence.


    Register Today
  • Threat Detection 101: Why Advanced Monitoring is Key to Ensuring Cybersecurity Threat Detection 101: Why Advanced Monitoring is Key to Ensuring Cybersecurity Matt Thurston, Chief Architect, Arctic Wolf Networks Dec 8 2016 5:00 pm UTC 45 mins
    Advanced persistent threat detection is part art and part science. This presentation provides a simple, straightforward explanation for non-technical people to help them understand how threat detection works. Having the best firewall and antivirus in the world will not keep you safe from cyber attacks. Attend this webinar to see why advanced monitoring is the only way to ensure vigilant cybersecurity.
  • Coalfire and vArmour: PCI Compliance with Software-Based Segmentation Coalfire and vArmour: PCI Compliance with Software-Based Segmentation David Anderson, Director of Technology Marketing at vArmour, and Chris Krueger, Principal, Cloud & Virtualization at Coalfire Dec 8 2016 6:00 pm UTC 60 mins
    Join PCI Qualified Security Assessor Coalfire and vArmour to learn how application-layer network visibility, software-based segmentation, and micro-segmentation can help organizations adhere to PCI DSS 3.2 requirements in data center and cloud environments.

    We’ll dive into:
    -vArmour Distributed Security System architecture and capabilities
    -Coalfire evaluation criteria and findings
    -PCI requirements addressable by vArmour DSS
  • CA Briefings Part 4: Step 3: Secure and Simplify Cloud Access CA Briefings Part 4: Step 3: Secure and Simplify Cloud Access Hadeel Dabbaugh, Sr. Principal Product Mgr; Kathy Hickey, VP, Product Mgmt.; Brandon Dunlap (Moderator) Dec 8 2016 6:00 pm UTC 75 mins
    The steps for strengthening your enterprise and increasing customer engagement has seen the rise of cloud adoption and a "bring your own app" trend in the workplace which continues to grow. IT and security leaders are hard pressed to keep up with the demands of a seamless user experience while protecting user identities across the cloud environment. On December 8, 2016 at 1:00PM Eastern, CA Technologies and (ISC)2 will examine how to leverage identity-as-a-service to secure access to cloud applications - including provisioning, onboarding and deployment, deliver a seamless user experience without compromising security and how to keep up with the pace of cloud adoption.
  • New APM Webcast: What's New in CA APM New APM Webcast: What's New in CA APM Josh Napier, Senior Principal Product Marketing Manager at CA Technologies/David Martin Principal Product Owner at CA Dec 8 2016 6:00 pm UTC 60 mins
    The Application Economy means that our apps are the face of our business, yet what impressions are they leaving? CA APM is the premier business enabler to help you drive app user loyalty so that every user transaction becomes a loyalty-building experience.
    In this webcast, we will explore how CA APM will help your organization answer key questions such as:
    •What is the quality of my user's experience?
    •If the quality is poor, why?
    In addition, we will explore how simplified monitoring makes CA APM easier than ever.
  • Hyperconverged Infrastructure: The Reshaping of IT Is Underway Hyperconverged Infrastructure: The Reshaping of IT Is Underway Christian Perry, Research Manager, IT Infrastructure, 451 Research Dec 8 2016 6:00 pm UTC 60 mins
    Hyperconverged infrastructure represents the face of today's rapid IT evolution, in which enterprises seek efficient, streamlined technology to meet stringent business demands. Once a supportive, edge infrastructure, hyperconverged has matured into a primary infrastructure solution used in today's core datacenters. However, finding the right fit for hyperconverged in existing IT environments poses a challenge for many organizations.

    Join 451 Research to understand the drivers behind hyperconverged adoption and learn how IT teams are using this technology to boost their business advantage.
  • The End of Proprietary Software The End of Proprietary Software Merav Yuravlivker, Co-founder and CEO, Data Society Dec 8 2016 7:00 pm UTC 45 mins
    Is it worth it for companies to spend millions of dollars a year on software that can't keep up with constantly evolving open source software? What are the advantages and disadvantages to keeping enterprise licenses and how secure is open source software really?

    Join Data Society CEO, Merav Yuravlivker, as she goes over the software trends in the data science space and where big companies are headed in 2017 and beyond.

    About the speaker: Merav Yuravlivker is the Co-founder and Chief Executive Officer of Data Society. She has over 10 years of experience in instructional design, training, and teaching. Merav has helped bring new insights to businesses and move their organizations forward through implementing data analytics strategies and training. Merav manages all product development and instructional design for Data Society and heads all consulting projects related to the education sector. She is passionate about increasing data science knowledge from the executive level to the analyst level.
  • Harnessing 2017’s biggest database trends Harnessing 2017’s biggest database trends Matt Aslett, 451 Research Director for Data Platforms & Analytics; Mike Kelly CTO, SelectStar Dec 9 2016 7:00 pm UTC 60 mins
    Recent years have seen an explosion in the number of different platforms and approaches used to store, process and analyze data in multiple formats from multiple sources. An abundance of data platforms (relational and non-relational databases, NoSQL, NewSQL, Hadoop, database as a service, etc.) has created a complex data management landscape that relies on the integration of multiple interdependent platforms and analysis tools. This trend is expected to continue in 2017. This webinar will preview how the database market is expected to change and what database professionals can do to use these changes to their advantage.

    In this session you’ll:

    - Learn what’s driving increasing adoption trends in specific data platforms like NoSQL and Hadoop
    - See how cloud-based data platforms are being used—and who is using them
    - Discover the implications of IoT for data platforms
    - See a demo of a new database management platform designed to address these changes
  • Protecting Online Shopping & Payment with PCI DSS Best Practices Protecting Online Shopping & Payment with PCI DSS Best Practices Maya Malevich - Director, Product Marketing Tufin Dec 13 2016 4:00 pm UTC 45 mins
    Black Friday and Cyber Monday are behind us, but if you are still working on your holiday shopping then you may be thinking about the risks associated with online payment options. Just in time for the 2016 shopping season, the PCI Security Standards Council recently announced changes to the Payment Card Industry Data Security Standard (PCI DSS).

    While usually associated with retail and financial services, PCI DSS compliance is in fact a challenge that crosses industries since online transactions are essential for any digital business. Join this webinar to learn how leaders from different industries are running network security policy orchestration to ensure continuous compliance with PCI DSS requirements.
  • Using Deep Packet Inspection, Semantic Awareness to Implement Zero Trust to IoT Using Deep Packet Inspection, Semantic Awareness to Implement Zero Trust to IoT Alexander Müller, Product Manager DPI, Rohde & Schwarz Cybersecurity ipoque Dec 13 2016 4:00 pm UTC 60 mins
    The Internet of Things (IoT) will provide a wealth of information that will enable us to collect, understand and process data in real-time. This new form of M2M interaction will be partially enabled through SDN/NFV. Networks in Telecoms and other enterprises will now become connected to legacy hardware through IoT ready Telematics platforms. Securing this new technology is imperative in maintaining and protecting the network. In this webinar we will discuss how to make the network ready for IoT and explore the relation between IoT and SDN/NFV:
    • Introduction to IoT
    • The impact of SDN on IoT
    • Securing brownfield IoT deployments (e.g. Industrial Control Systems (ICS) & Telematics platforms)
    • Where and when protection is required in the network
    • Using DPI to understand communicated data
  • LSO Innovations Platform for Rapidly Introducing New Network Functionality LSO Innovations Platform for Rapidly Introducing New Network Functionality Daniel Bar-Lev, Dir. of Strategic Programs - MEF; Sarit Target, VP of R&D, SDN, LSO, Apps - ECI Telecom Dec 13 2016 5:00 pm UTC 75 mins
    MEF's LSO Innovation Platform is a valuable tool for technology providers to develop and test both service orchestration functionality and business applications incrementally. Traditionally, service orchestration and business applications have been the domain of monolithic OSS/BSS systems that precluded the rapid introduction of new functionality. MEF's LSO Innovation Platform upends that approach and enables any best-of-breed analytics, assurance, control, fulfillment, performance, policy, security and usage functionality to be rapidly introduced into service provider environments. This webinar will provide a business-oriented explanation of the LSO Innovation Platform and explain its importance to service providers and technology providers in the telecom and cloud services market
  • Effective Patch Strategies for Windows 10 and Office 365 Effective Patch Strategies for Windows 10 and Office 365 Damon Covey, Director of Solutions Product Management – Symantec Dec 13 2016 5:00 pm UTC 60 mins
    Microsoft has made significant changes in how they provide updates to Windows 10 and Office 365. These changes have caused confusion and additional complexity for many enterprises.

    Please join us for this special webcast to gain a better understanding of:

    - What these change are and how new features in IT Management Suite can help simplify using Windows 10 and Office 365.

    Register Now
  • Who You Gonna Call? Arm the Service Desk to Ghost-Bust Issues Before They Occur Who You Gonna Call? Arm the Service Desk to Ghost-Bust Issues Before They Occur Chris Marsh, 451 Research; Chris Dunn, Easy Vista; & Bruce Aboudara, Scalable Software Dec 13 2016 6:00 pm UTC 60 mins
    The Service Desk is at the frontlines of a changing landscape in IT. IT is now, more than ever, required to provide 100% uptime of their services, and provide them to users anytime and anywhere – thanks in large part to the growth in new consumer apps and services accessed through mobile devices.

    To support this demand the service desk must be aware of and prepared for several key trends:

    •Mobile. More and more, users are accessing their services through their mobile devices. Powerful trends are shaping the mobile world that will impact the Service Desk. We in the service desk must adapt, but what does that mean?

    •Service Availability. Users expect their services to always be up – just like they experience with their other mobile apps and should there be an issue, they expect it to be resolved immediately. What can the Service Desk to make this dream a reality?

    •New Technologies. Prompted by this need for always-on, mobile-available services, infrastructure teams are looking toward newer technologies such as public clouds, software defined networking (SDN), and hyperconverged architectures. How does this impact the Service Desk?

    Join, Chris Marsh, lead mobility analyst at 451 research, Chris Dunn, Global Director of Product marketing for EasyVista, and Bruce Aboudara SVP at Scalable Software as they discuss the key trends the service desk need to know about as well as actions the service desk can take to capitalize on those trends.
  • Scalable Network Infrastructure: SD-WAN for Large Enterprises Scalable Network Infrastructure: SD-WAN for Large Enterprises Steve Woo, Co-Founder; VP of Product: Mike Wood, VP Marketing Dec 13 2016 6:00 pm UTC 60 mins
    Large and multinational Enterprises face a unique set of challenges when it comes to deploying branch office wide area networking, delivering exceptional experiences to end users and maintaining security and control over thousands of locations. The multipliers for everything related to the network, branch offices and users are enormous for organizations of this size combined with the fact that thirty to fifty percent of workloads for these large businesses are shifting to the cloud.

    Join this webinar to better understand the unique set of network challenges these big businesses face, the problems they experience, the necessary solutions and how SD-WAN technologies address their needs. The session will cover architectural requirements, security demands, scalability issues, operational expenses and other large scale topics.
  • Evolving the Digital Experience in 2017 Evolving the Digital Experience in 2017 Simon Crawley Dec 13 2016 6:00 pm UTC 60 mins
    The digital revolution within society is in full swing, as the rate of consumer-facing technological advancement accelerates to unprecedented levels. Your users have never been so tech aware, and businesses need to keep up in order to stay relevant in the current marketplace. The pressure on businesses is two-fold – not only do they need to successfully transform themselves and their processes, but they need to apply that transformation to their customers’ experience.
    So where do organizations need to focus their digital transformation efforts in order to be successful? And what part does analytics play in this digital revolution? How beneficial is a comprehensive and experienced analytics partner to organizations currently attempting to transform digitally?
    During this webinar we will discuss the difficulties organizations are encountering when undertaking their digital journey, investigate why some organizations are more successful at digital transformation than others, and take a look at the impact and repercussions of failing to successfully transform in 2017.
    Huge business challenges are also often opportunities, and where some businesses struggle, others will excel. Organizations today need to view digital transformation as their defining moment, and reap the benefits moving into the future.
  • When Things Misbehave: How to Mitigate Massive DDOS Attacks When Things Misbehave: How to Mitigate Massive DDOS Attacks Moshe Elias, Director of Product Marketing and Scott Poretsky, AVP Solutions Architect Dec 13 2016 6:00 pm UTC 45 mins
    The Distributed Denial of Service (DDoS) attack launched Friday, October 21, against Dyn - one of the largest managed DNS infrastructure providers - was the most destructive attack to date launched from an IoT botnet. The threat of mega attacks launched from infected connected devices is now a reality that dramatically changes the paradigm for mobile and fixed operators whose core infrastructure is susceptible to global attacks that are large enough to significantly disrupt subscriber quality of experience (QoE).

    Join us in this webinar to learn:
    •The impact of IoT driven DDoS mega attacks
    •Architectural approaches to volumetric DDOS mitigation
    •How to measure and maintain subscriber quality of experience during an attack
  • IoT普及で急拡大するDDoS, Web攻撃リスクと防衛のための検討ポイント IoT普及で急拡大するDDoS, Web攻撃リスクと防衛のための検討ポイント 中西一博, セキュリティプロダクトマーケティングマネージャ, アカマイ・テクノロジーズ 合同会社 Dec 14 2016 7:00 am UTC 60 mins
    現在、最も頻繁に用いられるサイバー攻撃のひとつとなったDDoS攻撃。Mirai Botnetに代表されるIoTを媒介する新たな攻撃手法によって、ビジネス停止のリスクがかつてないほど高まっています。実際にその攻撃を受け止めたAkamaiが観測した最新の攻撃データに基づき、現在のDDoSの特徴としくみ、その対策を用意する際に留意すべきポイントを中心に、企業Webを中心にしたシステムが今まさに直面しているリスクを解説します。