Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Cloud Security: The next generation
    Cloud Security: The next generation Chris Hill, RVP, Public Cloud EMEA; Alex Hilton, Chief Executive, Cloud Industry Forum Recorded: Oct 22 2018 51 mins
    Multi-Cloud or hybrid environments has become a growing strategy for many organisations moving their applications and data in the cloud as it gives organisations the ability to be flexible in what they need for their business. In fact, according to recent research by Computing, 26 per cent of enterprises surveyed were using a multi-cloud approach compared with 22 per cent last year. However, along with this approach one thing organisations should not forget is that the need for security does not diminish. As the cloud continues to offer more in services, organisations need to be aware of the protection they are responsible for to ensure their applications and workloads are safe.

    So how do organisations stay ahead of the curve with security as well as being able to manage these multi-cloud or hybrid environments?

    Join our latest webinar where, Chris Hill, VP Public Cloud EMEA at Barracuda, and Alex Hilton, Chief Executive and Cloud Industry Forum (CIF)will discuss the latest challenges when it comes to migrating to the cloud, especially in a multi-cloud environment as well as analyse CIFs latest research findings on what organisations need to consider when adopting these cloud services.
  • #ArubaAirheads_ Getting Started with the ClearPass REST API - CPPM
    #ArubaAirheads_ Getting Started with the ClearPass REST API - CPPM Saravanan Rajagopal, Aruba TAC team Recorded: Oct 22 2018 69 mins
    During this webinar, we will explore the REST API as the ClearPass API integrations and further developments are more focused to REST API than the other existing API services like xml-rpc, SOAP, etc.
  • What Executives Should Know about Cyber AI
    What Executives Should Know about Cyber AI Claudio Scarabello Director Product, APAC FireEye Inc Recorded: Oct 22 2018 54 mins
    Artificial intelligence (AI) is a transformative technology that provides organizations with better cyber defense tools but also helps adversaries improve methods of attack. Organizations need to understand how AI will impact cyber security before they rely on it for their defenses.
    Watch this webinar as we discuss:
    • How AI tools can be used for offensive and defensive purposes in the cyber domain
    • Changing geopolitical landscape as threat actors develop and implement AI capabilities
    • Enhancement of a businesses’ defensive capabilities through AI technology
    • How FireEye uses machine learning to bolster its internal defenses and tools
  • FireEye Global Threat Response – How we Protect the World
    FireEye Global Threat Response – How we Protect the World Tim Wellsmore, Director, Government Security Programs, Mandiant International, a FireEye Company Recorded: Oct 22 2018 57 mins
    Most approaches to the global cyber security problem are usually focused locally inside separate organisations, who struggle to look out across the global landscape and effectively respond. National responses from government capabilities can be challenged by capacity and jurisdiction to truly understand the global threat environment, and to effectively respond. This presentation will highlight how FireEye utilises its various capabilities and threat focused teams from all parts of the business to build a cohesive global detection and response capability for the biggest global threats.

    This presentation will outline how we tactically respond within our internal capability teams, and across our customer base of 67 countries and how we keep the media, our customers and our government partners informed on the latest information. How we scale quickly to respond to WannaCry or NotPetya to ensure our Community Protection mandate is relentless maintained is an impressive story. This presentation will highlight how our FireEye technology arm and FireEye's subsidiary companies of Mandiant and iSight work seamlessly together in a global cyber threat event to bring our best against the world's most advanced cyber threat actors.
  • A Truly Hybrid Cloud: Where Business Drives Technology
    A Truly Hybrid Cloud: Where Business Drives Technology Mark Vaughn, Director, Strategic Technology Group, Presidio Recorded: Oct 18 2018 45 mins
    Many hybrid cloud technologies are designed to allow different private cloud and public cloud technologies communicate with each other, while leaving the actual workloads in proprietary formats that are not portable.

    With Hybrid Cloud offerings like VMware Cloud on AWS, existing VMware environments can be extended to the cloud and create a truly hybrid model that allows workloads to easily move to where the business needs them.

    Mark Vaughn, Director of the Strategic Technology group at Presidio, will share his insights and expertise during this engaging talk.
  • Solving The Cybersecurity Skills Shortage in Financial Institution
    Solving The Cybersecurity Skills Shortage in Financial Institution Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Recorded: Oct 18 2018 40 mins
    Financial institutions face a daunting combination of cybersecurity threats and compliance requirements. IT teams at regional banks and credit unions have a relatively small staff but facing similar security and compliance burden to what larger, well-resourced financial institutions carry. How can small and mid-sized financial institutions counter sophisticated cyberthreats, provide monitoring and incident response needed for compliance, and do so with tight budgets that do not allow for staffing an elaborate security operations center? Managed detection and response provides a “force multiplier” to address all three issues.

    Attend this webinar and learn about:

    • Top cyberthreats facing financial institutions
    • Financial services compliance evolution, security monitoring and incident response
    • Differences between SIEM, SOC, and SOC-as-a-service
    • Monitoring on premises and cloud resources without adding headcount

    To gain insights on these challenges and how to solve them, save your seat now!
  • Breaking through I/O Bottlenecks for Faster Financial Outcomes
    Breaking through I/O Bottlenecks for Faster Financial Outcomes Matt Meinel and Rick Walsworth Recorded: Oct 18 2018 51 mins
    In order to deliver immediate value back to the business, it’s critical to ensure that an organization’s financial systems are running at full strength, but in most cases, I/O bottlenecks throttle performance and delay analytic outcomes. Vexata and Levyx have collaborated on a joint solution that achieves increased performance with less infrastructure, resulting in a 300% improvement in the price/performance ratio over the industry's next best alternative solution. In this webinar, you’ll learn:
    •How to utilize the Levyx low-latency software and Vexata’s NVMe-based storage systems
    •Best practices to eliminate bottlenecks for tick-analytics, strategic back-testing, algorithmic modeling, etc.
    •Real-world results from customer trials and the recent STAC A3 test benchmarks


    Presenters:
    •Matt Meinel, Senior Vice President of Solutions Architecture, Levyx Inc.
    •Rick Walsworth, VP of Product & Solution Marketing at Vexata
  • Has Your Network Packet Broker Evolved with Your Infrastructure?
    Has Your Network Packet Broker Evolved with Your Infrastructure? Sam Kumarsamy, Senior Product Marketing Manager, Gigamon; Brandon Dunlap (Moderator) Recorded: Oct 18 2018 60 mins
    As your infrastructure has grown to include a mix of physical, virtual and cloud environments with increased network speeds and volume of data, so have the threats increased to your attack surface with more vectors to breach your organization. This challenges your network and security operation teams and tour traditional network packet broker needs to evolve from providing network visibility to also helping strengthen your security posture. Join Gigamon and (ISC)2 on October 18, 2018 at 1:00PM Eastern where we will examine the acquisition and aggregation of data from your physical, virtual and cloud infrastructure, filtering of traffic to provide the right data to the right tools, transforming your data with masking, header stripping and SSL decryption (TLS1.3) to ensure compliance, threat prioritization by providing context and bridging the gap between NetOps and SecOps.
  • Search and destroy hard to detect security risks
    Search and destroy hard to detect security risks Blake Connell, Dir. Product Marketing, Citrix; Martin Zugec, Sr. Architect, Technical Marketing, Citrix Recorded: Oct 18 2018 46 mins
    Like a trojan horse, they’re already inside your fortress wall. Weak or compromised credentials allow bad actors to pose as internal users exacerbating the problem. Far and away compromised credentials is the biggest security challenge faced by IT, a full 81% of hacking-related breaches used either stolen and/or weak passwords.* Attend this webinar and learn how Citrix Analytics uses machine learning to ferret-out these bad actors and importantly, stop their malicious behavior.

    Learn the benefits of advanced analytics, including:
    • Building a digital fingerprint for individual users that lets you know when they are doing something unusual
    • Predictive and prescriptive analytics beyond descriptive and diagnostic analytics
    • Creating custom rules with conditions and actions to remediate problems
    • Halting ransomware and data loss prevention (DLP)

    * Verizon Data Breach Investigations Report (DBIR) 2017
  • It’s Everyone’s Job to Ensure Online Safety at Work
    It’s Everyone’s Job to Ensure Online Safety at Work AJ Nash, Global Head, Cyber Intelligence Global Security Office, Symantec Recorded: Oct 18 2018 44 mins
    Part 3 of 4: National Cybersecurity Awareness Month (NCSAM)

    As the lines between our work and daily lives become increasingly blurred, it’s more important than ever to be certain that smart cybersecurity is integrated into our lives.

    The focus will be on cybersecurity workforce education, training and awareness with specific focus on understanding adversary objectives and the best practices for thwarting some of the most common adversary actions.

    Please Join Us, Register Today
  • Supermicro® Resource-Saving Architecture Overview
    Supermicro® Resource-Saving Architecture Overview Michael McNerney, VP, Software, Solutions and Networking Security, Supermicro Recorded: Oct 18 2018 40 mins
    IT managers are increasingly seeking out suppliers of high performance, cost-effective and energy-efficient Green IT products to primarily reduce skyrocketing data center operational costs, a large proportion of which are energy related costs. Supermicro’s Resource Saving Architecture continues our tradition of leading the market with Green IT innovation that provides TCO savings for our customers and helps reduce TCE – the Total Cost to the Environment. We have introduced an overall architecture that optimizes datacenter power, cooling, shared resources and refresh cycles by enabling the modular refresh of subsystems and using optimized extended life subsystems.

    In this webinar we will provide an intro to the key elements of this architecture and the benefits it provides including:

    • Disaggregated Server Architecture
    • Multi-node Power & Cooling
    • Resource Pooling
    • Rack Scale Management

    Join us to learn how Resource-Saving Architecture can benefit your datacenter deployment today.
  • Connecting Application Enablement to Business Results
    Connecting Application Enablement to Business Results Verizon and Equinix Recorded: Oct 18 2018 39 mins
    Network and security are more critical than ever, but they need to be application centric and a virtualized extension of your business. Learn how to re-architect your cloud to drive better business results and take advantage of technologies like Software Defined Networking (SDN), Network Function Virtualization (NFV), and Everything-as-a-Service (XaaS). We’ll discuss how cloud solutions can enable you to take control of your digital strategies and form the foundation for your enterprise’s Digital Transformation.
  • SD-WAN transforme l'industrie médicale pour mieux servir le patient
    SD-WAN transforme l'industrie médicale pour mieux servir le patient Karim Bettich, Senior System Engineer - VeloCloud, now part of VMware Recorded: Oct 18 2018 56 mins
    Dans ce webinaire, VeloCloud nous explique le rôle clé que joue la technologie SD-WAN pour permettre aux prestataires de dispenser des soins à travers:

    * Segmentation du trafic tel que les dossiers médicaux des patients du trafic Internet
    * La disponibilité constante du réseau pour un accès permanent aux dossiers des patients
    * Le stockage sur le Cloud des données de santé des patients, tout en assurant une connectivité constante et permanente au réseau
    * Accès sécurisé aux données confidentielles et sécurité par cryptage VP
    * Études de cas: cas pratiques par les clients du secteur de la santé

    De nos jours, la technologie joue un rôle primordial pour servir les patients, mais elle doit être en mesure de respecter systématiquement les réglementations en vigueur du secteur et d'être suffisamment souple pour s'adapter à son évolution.
  • #ArubaAirheads_ Virtual Switching Framework – ArubaOS Switch
    #ArubaAirheads_ Virtual Switching Framework – ArubaOS Switch Sukumar Krishnamoorthy, Aruba TAC Team Recorded: Oct 18 2018 62 mins
    During this webinar, we will discuss how Virtual Switching Framework (VSF) allows supported switches connected to each other through Ethernet connections (copper or fibre) to behave like a single chassis switch. To register for future live webinars please use the attachment link.
  • Implementing a Cloud Ready Software Defined WAN - Challenges & Opportunities
    Implementing a Cloud Ready Software Defined WAN - Challenges & Opportunities Amar Singh; Steve Vickers Recorded: Oct 18 2018 61 mins
    With the explosion of cloud-based cloud ready applications, many organisations struggle with optimising application performance for cloud or hybrid environments. The culprit, in many cases, is the connectivity from the offices to the cloud. The wide area network, (WAN) connecting offices to the Internet and to other offices, is still playing catchup. WAN technology is stuck in the old-age.

    Think about this: Does your business, small or large, have two or more broadband connections, maybe a broadband and a dial up or some other form of Internet connectivity? Apart from the security risk of having too many Internet points of exit, your business is also wasting money and resources in managing these various connectivity channels.

    In this webinar, Amar Singh and Steve Vickers explore the problems typically faced by organisations based on the latest research and show how organisations can create a seamless and secure SD-WAN infrastructure without having to manage multiple products.
  • Data Virtualization: Key Foundation of a Cloud-First Strategy
    Data Virtualization: Key Foundation of a Cloud-First Strategy Kevin Moos, Eric Greenfeder, Jay Livens Recorded: Oct 17 2018 58 mins
    As more organizations adopt a cloud-first strategy, the task of migrating high-volume transactional workloads presents a unique set of challenges, particularly in handling the large amounts of data involved. Join Primitive Logic and Actifio as we discuss the most pressing challenges around transactional data migrations … and the solutions that can help address them.

    You will learn:
    The unique challenges in migrating transactional data to the cloud
    How to handle data for applications with both on-prem and cloud components
    How to approach transactional data as part of a multi-cloud strategy
    How data virtualization helps resolve issues of security, governance, multi-cloud coordination, and more
  • Ask the Experts—Securing Data and Email in Office 365
    Ask the Experts—Securing Data and Email in Office 365 Mark Bowker, Senior Analyst, ESG / Richard Diver,Cloud Security Architect. Insight/ Jereme Lee, System Engineer, Symantec Recorded: Oct 17 2018 63 mins
    Its your job to secure email, sensitive data and apps in Office 365. Now What?

    Moving to cloud applications provides the opportunity to get your security right. This is the time to set up optimum data loss prevention, malware and phishing prevention, and access controls on your systems. No matter if you are still planning, have just started, are in the midst, or are fully migrated to Office 365, there are security policies and procedures to implement and optimize.

    Join ESG industry analyst Mark Bowker, Insight’s Cloud Security Architect, Richard Diver, and Symantec’s System Engineering Manager, Jereme Lee to learn how to:

    - Get the most out of your Office 365 instance by enhancing the security

    - Understand what Microsoft offers and how Symantec compliments their security offering

    - Enhance your email, app and data security in Microsoft Office 365 which can be used across all your cloud apps

    Register Today
  • How the Cloud is Changing What’s Possible in Networking
    How the Cloud is Changing What’s Possible in Networking Cradlepoint’s Mike Hagman, Senior Product Manager, and Anthony Lawson, Technical Marketing Engineer Recorded: Oct 17 2018 41 mins
    The cloud has become indispensable to deploying and managing a network. Cloud capabilities and features are changing how IT teams operate, enabling them to save their organizations tremendous amounts of time and money while making processes much easier and efficient than ever.

    Cloud strategies in network architectures streamline the way IT professionals deploy, monitor, manage, secure, and troubleshoot wired and wireless WAN connections all over the world.

    Join Cradlepoint’s Mike Hagman, Senior Product Manager, and Anthony Lawson, Technical Marketing Engineer, to explore how cloud-related tools such as remote management, robust network analytics, scalable security applications, edge computing, SD-WAN and traffic automation, and many others are changing what’s possible in enterprise networking.

    About the speakers:

    Mike Hagman is an expert in defining, prioritizing, and communicating product roadmaps while leveraging input from market conditions, stakeholders, customers, engineers, and executives worldwide. He has a bachelor’s degree in computer information systems.

    Anthony Lawson is an experienced solutions engineer with an extensive background in the computer networking industry. He has strong experience in servers, data centers, Software-as-a-Service (SaaS), network design, and networking. He has a bachelor's degree in computer systems networking and telecommunications.
  • Re-inventing APM for the Digital Era
    Re-inventing APM for the Digital Era Mike Sargent, Riverbed; Steve Mastin, Aetna; and Stephen Elliot, IDC Recorded: Oct 17 2018 30 mins
    Join Riverbed, Aetna and guest speaker IDC for a discussion and demonstration on how we are revolutionizing application performance management (APM) for the digital era with a focus on the end-user experience.

    Traditional APM solutions aren’t designed with the end-user in mind and rely on sampling a limited set of application performance data points. This legacy approach is not adequate for delivering today’s complex digital services. In today’s digital world, a unified application performance and end-user experience monitoring solution is critical to business success.

    Register now to see the power of our user experience-centric solution, hear from Aetna about their APM journey, and take the next step to ensuring end-user experience in the digital era.

    Topics
    User-centric: Ensure end-user experience and troubleshoot issues faster with an end-to-end APM solution.
    All Data: Use big data insights from all transactions to be more proactive and holistic in driving better business decisions.
    Every App: Monitor your entire enterprise application ecosystem without compromising data quality.
  • Mehr Sicherheit bei gleichzeitiger Sicherstellung der Netzwerk-Uptime
    Mehr Sicherheit bei gleichzeitiger Sicherstellung der Netzwerk-Uptime Daniela Fusaro, Senior Solutions Architect Recorded: Oct 17 2018 18 mins
    Ihr IT Netzwerk ist von entscheidender Bedeutung für den Betrieb, und das macht es zu einem beliebten Ziel für Cyber-Bedrohungen wie Ransomware und Verstöße gegen den Datenschutz. Was können Sie dagegen tun? Inline-Sicherheitstools können eine effektive Lösung sein, stellen aber mehrere mögliche Fehlerpunkte dar, zumal die Netzwerkgeschwindigkeiten steigen, und viele Tools sich diesen nicht anpassen können. Wenn diese Tools ausfallen, dann ist auch Ihr Netzwerk betroffen.

    Um eine umfassende Transparenz über die übertragenen Daten zu erhalten und die Compliance in Hochgeschwindigkeitsnetzen aufrechtzuerhalten, haben sich viele Firmen für die Next Generation Network Packet Broker (NGNPB) entschieden, die einen flexiblen Inline-Bypass-Schutz bieten. Diese Funktion automatisiert den Zugriff auf den Datenverkehr, skaliert und optimiert die bestehende Überwachungsinfrastruktur und vereinfacht die Einführung neuer Technologien. NGNPB bieten zudem Folgendes:

    • Vollständige netzwerkweite Transparenz in physikalischen, virtuellen und Cloud-Umgebungen,
    • Skalierbare Metadatenextraktion für verbesserte Forensik,
    • Isolierung von Anwendungen zur gezielten Untersuchung,
    • Sichtbarkeit für verschlüsselten Datenverkehr zur Erkennung von Bedrohungen.

    Erfahren Sie, wie Sie die Sicherheit erhöhen und gleichzeitig die Netzwerk-Uptime sicherstellen und so Kosten senken können. Erfahren Sie, wie eine vereinfachte, belastbare und skalierbare Architektur Folgendes leistet:

    Maximierung der Tool-Effizienz durch Bereitstellung der relevanten Daten für die relevanten Tools und durch das Auslagern prozessorintensiver Aufgaben wie der SSL-Entschlüsselung.
    Und mehr.

    Finden Sie heraus, wie sowohl Netzwerk- als auch Sicherheitsteams in einer sich schnell entwickelnden Cybersicherheitslandschaft schneller und sicherer arbeiten können.

    Network-Packet-Broker der nächsten Generation (NGNPB)
  • Intent Based Networking - What SDN Was Meant To Be
    Intent Based Networking - What SDN Was Meant To Be Mansour Karam Recorded: Oct 16 2018 60 mins
    Bloomberg Intelligence hosted Mansour Karam, CEO of Apstra to discuss next-generation networking technologies, with a focus on Intent-Based Networking. Watch this on-demand webinar featuring Woo Jin Ho, Bloomberg Intelligence Analyst, Networking, Semiconductors.
  • Running Containers in Production for Dummies
    Running Containers in Production for Dummies Jorge Salamero Sanz, Eric Carter, Knox Anderson Recorded: Oct 16 2018 62 mins
    Given by the authors of the new book - Running Containers in Production for Dummies. Are you new to containers? Let’s quickly cover the basics to get you up to speed and started with deploying containers in production. In this 1h session we will walk through:

    Containers and orchestrators: why containers have revolutionized IT infrastructure, why do you need them and which orchestration technology is right for you.
    Setting up a CI/CD/CS delivery pipeline: how containers, continuous integration and delivery make your pipeline more agile and how it all fits together.
    Monitoring containers: why this is different and so hard. What are the different approaches and how do tools like Sysdig Monitor and Prometheus compare.
    Securing containers: security cannot be missed. What are best practices for container security, including vulnerability management with image scanning and compliance, runtime defense and forensics.
    This is plenty to cover, so be prepared to rock containers hard!
  • IT Ops SIG Talk Ep. 12: 3rd Party Tools for Micro Focis Operations Bridge
    IT Ops SIG Talk Ep. 12: 3rd Party Tools for Micro Focis Operations Bridge Nate Rich, Bob Johnson Recorded: Oct 16 2018 25 mins
    Easily Get 3rd Party Metric, Event, Topology, and Log Data into Micro Focus OpsBridge Suite (OMi) … in 3 minutes (for real)!

    StreamWeaver liberates ‘operations data’ (metric, event, topology, and log) to help IT achieve high availability and optimizing the performance of critical business services. To do this, we automate the distribution of the data from all domains and all clouds to the applications (including Micro Focus OpsBridge Suite – OMi) and teams best positioned to achieve the desired business outcomes.
  • Top 5 Ways Your Network Can Give Your Business a Competitive Edge
    Top 5 Ways Your Network Can Give Your Business a Competitive Edge Cherie Martin, Aruba Product Marketing Manager Recorded: Oct 16 2018 44 mins
    Seventy percent of today’s Midsize businesses are investing in technology to customize the user experience, improve customer satisfaction, build loyalty, and gain a competitive advantage. But the ability to deliver amazing user experiences is dependent on high-performance, reliable connectivity. It requires a business-class network.

    Join us on October 16th, 10am PST to learn about the Top 5 business-class features your network must have for you to automate and optimize the delivery of network services to drive your business success.

    A high-level discussion will be followed by a demo of Aruba Central, network management in the Cloud.

    Attend and you could qualify to receive a free Aruba Instant access point and a 90-day trial to Aruba Central, our network management solution.
  • Cloud Strategy & Improving Your Enterprise Security Posture in 2019
    Cloud Strategy & Improving Your Enterprise Security Posture in 2019 Sushila Nair (NTT DATA Services) | Yonatan Klein (AlgoSec) | Diana Kelley (Microsoft) Oct 22 2018 5:00 pm UTC 60 mins
    This keynote panel is part of Cloud Month on BrightTALK.

    Join this keynote panel of security and cloud experts as they discuss:
    - The most prevalent security risks and challenges and how to contend with them
    - Your cloud strategy and how it affects your overall security posture
    - How to extend network security to the cloud
    - Areas for automation
    - Best practices on how to secure your enterprise in 2019

    Speakers:
    - Sushila Nair Sr. Director Security Portfolio, NTT DATA Services
    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - Yonatan Klein, Director of Product, Algosec
  • Outsmart Hackers by Coordinating Your Defenses
    Outsmart Hackers by Coordinating Your Defenses Greg Bennett, Engineer, Sophos Oct 22 2018 6:00 pm UTC 45 mins
    Smart hackers coordinate their attacks across your system. Now, you can learn how to outsmart the hackers by coordinating your defenses!

    Synchronized Security is a best-of-breed security system that enables security solutions to talk to each other, sharing information and responding automatically to threats.

    For example, if the endpoint detects a threat, the firewall automatically isolates the infected computer and then the cleanup kicks right in to finish the job.

    Join us for this engaging webinar to learn more about this new approach to IT security. You’ll find out how Synchronized Security:

    • Gives you unprecedented protection against advanced threats

    • Slashes incident response time by 99.9%

    • Saves IT time and effort every day
  • Addressing Today’s Cloud Attack Vectors
    Addressing Today’s Cloud Attack Vectors Joe Leonard, CISO, Presidio Oct 22 2018 7:00 pm UTC 60 mins
    During this session, we will discuss today’s cloud attack vectors and the potential impact there could be on your organization’s data.

    -How are these attack vectors exploited by an adversary?
    -What can you do to prevent these types of attack?
    -How are cloud security controls maturing to address these concerns?

    We will discuss what security controls can be put in place to reduce the attack vectors surface and minimize the risk to your organization.
  • Сетевая фабрика для модульной платформы PowerEdge MX
    Сетевая фабрика для модульной платформы PowerEdge MX Сергей Гусаров, старший системный инженер Dell EMC Oct 23 2018 8:00 am UTC 60 mins
    Мы расскажем о преимуществах сетевой фабрики для модульной серверной платформы PowerEdge MX. Мы подробно рассмотрим, как устроена сетевая фабрика, из каких элементов состоит, как масштабируется, управляется и какие варианты подключений предлагает.
  • Automate the Dreaded Task of Software Asset Management
    Automate the Dreaded Task of Software Asset Management Gary Paquette, CTO, Mike Schmitt, Sr Director Product Marketing, Karen Hutton, Sr Director of Marketing, at Nlyte Oct 23 2018 9:00 am UTC 31 mins
    Nlyte’s Gary Paquette uncovers how you can automate discovery, management, and reporting with Nlyte Software Optimizer agentless software.

    What you will learn from the webinar:

    - Organic installation and distribution of software
    - Lack of visibility in current and new deployments
    - Matching databases to physical and virtual
    - Reconciliation between required services versus installed
    - Inaccurate systems, too many systems and files
  • From Inhibitor to Facilitator: Aligning Security to Cloud Processes
    From Inhibitor to Facilitator: Aligning Security to Cloud Processes Ronen Shpirer, Security Solutions Architect, Fortinet Oct 23 2018 9:00 am UTC 45 mins
    In a fast growing decentralised and heterogeneous cloud environment, security is often considered an inhibitor to the adoption of public cloud services. In order to become a facilitator for public cloud adoption, security must align itself to native cloud processes, consumption models and mentality.

    This session will provide an insight into the security technology foundations required to turn security into a public cloud adoption enabler.
  • Migrating to the Cloud with Automation
    Migrating to the Cloud with Automation Omer Ganot, Product Manager, AlgoSec Oct 23 2018 1:00 pm UTC 60 mins
    83% of enterprise workloads will be in the cloud by 2020. Migrating the storage and compute is the easy part. Migrating the SECURITY is the part that you have to get right – unless you don’t care about outages and cyberattacks. Don’t struggle with application connectivity and management of cloud security controls. Automate the entire process and get it right.

    In this webinar, Omer Ganot, Product Manager at AlgoSec, provides technical insight and best practices for discovering, mapping and updating network security policies to provide a smooth application migration that assures proper operation and security.

    This webinar will cover:
    • Automatic discovery of existing application-connectivity requirements
    • Automated analysis of changes necessary for migrating application-connectivity to the cloud
    • Automatic execution of the required changes of all the security constructs – on-premise and in the cloud
    • Maintaining complete and ongoing visibility across the entire network topology and security constructs, including:
    o On-premise firewalls and routers
    o Cloud security controls
    o Virtual traditional firewalls deployed in the cloud
  • Automating your way past NFV complexity
    Automating your way past NFV complexity Paul Brittain, VP Product Strategy, Metaswitch Oct 23 2018 3:00 pm UTC 45 mins
    Network Functions Virtualization (NFV) is the future network architecture that almost all Telcos/CSPs desire. For many, though, it is proving an elusive goal despite the shift that IT made to cloud several years back. Network Functions are just another class of x86 workload, so why is this seemingly so hard?

    Much of the problem is due to treating NFV as purely an engineering challenge, characterized by chasing a “Telco Cloud” fit for all possible purposes. That is genuinely a tough project, but NFV will also impact many processes and people across your organization. Automation may appear to add yet more change to be managed, but it is actually key to making NFV attainable. This webinar will show how, with Cloud Native VNFs and an agile approach to Automation, you can clear both the technical and operational roadblocks on the path to a fully virtualized network.
  • Email Security.Cloud: Policy Based Encryption Best Practices
    Email Security.Cloud: Policy Based Encryption Best Practices Jimmy Lin, Sr Product Manager & Sarah Happé, Dir.Client Engagement Oct 23 2018 3:00 pm UTC 60 mins
    In this webinar, we’ll explore the Policy Based Encryptions service – highlighting how it works, how to trigger a policy, and the user experience. We’ll also cover advanced features and industry best practices to equip you with the tools needed to protect your organization.
  • Secure Cloud Migration: Automated!
    Secure Cloud Migration: Automated! Jonathan Gold-Shalev, Director of Product (AlgoSec) Oct 23 2018 4:00 pm UTC 60 mins
    As their first big move into the Age of the Cloud, enterprises are rapidly migrating applications from on-premise data centers to the cloud to take advantage of agility, segmentation, scalability, flexibility, cost and other benefits.

    While migrating the storage and compute is pretty straightforward, migrating the SECURITY presents unique challenges that cause enterprises to struggle with application connectivity and management of the cloud security controls alongside their traditional firewalls in a secure and compliant way – and quickly.

    In this webinar, Jonathan Gold-Shalev, Director of Product at AlgoSec, provides technical insight and best practices for discovering, mapping and updating network security policies to provide a smooth application migration that assures proper operation and security.

    This webinar will cover:
    • Automatic discovery of existing application-connectivity requirements
    • Automated analysis of changes necessary for migrating application-connectivity to the cloud
    • Automatic execution of the required changes of all the security constructs – on-premise and in the cloud
    • Maintaining complete and ongoing visibility across the entire network topology and security constructs, including:
    o On-premise firewalls and routers
    o Cloud security controls
    o Virtual traditional firewalls deployed in the cloud
  • Safeguarding the Nation’s Critical Infrastructure
    Safeguarding the Nation’s Critical Infrastructure Curtis Barker, Product Portfolio Manager Cloud Security, Symantec Oct 23 2018 5:00 pm UTC 60 mins
    Part 4 of 4: National Cybersecurity Awareness Month (NCSAM)

    Our day-to-day life depends on the country’s 16 sectors of critical infrastructure, which supply food, water, financial services, public health, communications and power along with other networks and systems.

    Will emphasize the importance of securing our critical infrastructure and highlight the roles the public can play in keeping it safe.

    Please Join Us, Register Today
  • Choosing a Gateway to Europe
    Choosing a Gateway to Europe Penny Jones, 451 Research & William Fenick, Interxion Oct 23 2018 5:00 pm UTC 60 mins
    Europe is seeing an influx of US organizations keen to establish or expand operations across the region for a diverse set of reasons. Many face challenges, from understanding new business cultures and data regulations and the service provider landscape, to knowing where IT should be best positioned to scale for new technology adoption. We surveyed 250 US organizations seeking entry into - or expanding across - Europe to get a deep understanding of the issues that could delay actions in Europe today. In this webinar, we will draw upon these results to discuss not only the challenges these organizations face but considerations that should be top of mind for companies wanting to simplify and futureproof rollouts across Europe, a market that provides great opportunity for those that can deploy their IT assets right.
  • Using Micro-Segmentation to Secure Your Hybrid Multi-Cloud Environment
    Using Micro-Segmentation to Secure Your Hybrid Multi-Cloud Environment Faraz Aladin, Product Marketing Director, at Illumio Oct 23 2018 6:00 pm UTC 45 mins
    With the rise of hybrid multi-cloud architectures, micro-segmentation is fast becoming a foundational layer of the security architecture to help protect against unauthorized lateral movement and access to high-value assets. When implemented correctly, micro-segmentation can offer  the security needed and provide  tremendous application visibility in the process.

    In this webinar, you’ll learn:

    - Why you need micro-segmentation and how it works
    - How customers are using it to solve problems
    - 5 steps to implementing a micro-segmentation strategy for your data center and cloud

    About the presenter:

    Faraz Aladin, Product Marketing Director - As Illumio’s Product Marketing Director, Faraz Aladin is a Technical Product Marketing leader responsible for Product Marketing missions as well as technical evangelism. Having worked with customers across various segments and industry verticals, he is well versed in how customers successfully leverage technology to drive business outcomes. His subject matter expertise spans Networking & Cloud Infrastructure, Data Center Architectures, Security and Collaboration technologies. With over 25 years of industry experience, Faraz spent a major portion of his professional career at Cisco across various business units and roles before joining vArmour as Product Management and Marketing leader. He is a CCIE and holds an engineering degree from Bombay University.
  • Make Infrastructure Your Competitive Advantage with Packet
    Make Infrastructure Your Competitive Advantage with Packet Nathan Goulding, SVP Strategy, Packet Oct 23 2018 7:00 pm UTC 45 mins
    The leading companies of tomorrow will be technology enabled. Whether in personalized medicine, mobility, entertainment, financial services, retail, or any other experience, their chance to "win their market" will be largely determined by an ability to leverage technology as a weapon and deploy and operate that technology-based arsenal across the global.
  • Cloud migration: two paths to avoid
    Cloud migration: two paths to avoid David Simpkins, Elena Christodoulou and Dushan Ratnam from BT Oct 24 2018 1:00 pm UTC 60 mins
    We regularly see two main paths being taken when organisations decide to roll out a cloud project – and either can lead to all kinds of problems.

    Often, we hear “everything must be cloud first”, but at the other end of the scale, there are organisations letting business units do their own thing. Each approach can negatively affect the success and benefits cloud has to offer.

    We can help you navigate the potential storms quicker and more easily. Hear from our cloud experts about some of the best practice in successful multi-cloud projects. Learn how to become more agile and innovative, whilst reducing your costs. It’s never too late to get your cloud journey on the right track.

    Join David Simpkins, General manager, managed services and public cloud, BT; Elena Christodoulou, Director, global strategic alliances, BT; and Dushan Ratnam, Senior product manager, BT, on 24 October,2018.
  • Compliance in the Cloud: How to Secure Identities & Meet Regulatory Requirements
    Compliance in the Cloud: How to Secure Identities & Meet Regulatory Requirements Mason Takacs Oct 24 2018 3:00 pm UTC 60 mins
    Cloud technology offers a host of benefits, including flexibility and accessibility. But it also brings new compliance challenges and security risks. Although cloud providers claim that their technology is mature enough to handle any security-related issues, ensuring data integrity in the cloud and proving it to compliance auditors are still top concerns for most organizations.

    Join us to get deep insight on:
    •How you can share responsibility for IT security with cloud providers
    •How to protect the sensitive data you store in the cloud
    •How to meet compliance requirements for data in the cloud
  • Webinar: From Risk to Action: Security Automation and Orchestration
    Webinar: From Risk to Action: Security Automation and Orchestration Idan Moyal, CTO and Co-Founder, Reposify, Jay Spann, SOAR Evangelist, Swimlane & Vikram Venkatasubramanian Director, BD Oct 24 2018 3:00 pm UTC 60 mins
    How do you protect your network?

    It’s getting more and more difficult to identify, analyze, and mitigate vulnerabilities and threats.

    Join security experts from Tufin, Reposify and Swimlane on October 24 as we discuss ways to tighten your security posture by leveraging a policy-centric approach, including:

    Mitigating vulnerabilities from known and unknown assets at the network edge and beyond the firewall
    Automating incident response playbooks based on rich topology and policy data
    Updating the security policy baseline in response to specific threats
    Register today for a better understanding of how to enforce security policy throughout all your security operations.
  • Flash Storage with 24G SAS Leads the Way in Crunching Big Data
    Flash Storage with 24G SAS Leads the Way in Crunching Big Data Greg McSorley, Amphenol; Rick Kutcipal, Broadcom; Kevin Marks, Dell; Jeremiah Tussey, Microsemi Oct 24 2018 5:00 pm UTC 45 mins
    The recent data explosion is a huge challenge for storage and IT system designers. How do you crunch all that data at a reasonable cost? Fortunately, your familiar SAS comes to the rescue with its new 24G speed. Its flexible connection scheme already allows designers to scale huge external storage systems with low latency. Now the new high operating speed offers the throughput you need to bring big data to its knobby knees! Our panel of storage experts will present practical solutions to today’s petabyte problems and beyond.
  • Container Connection Live! Afternoon Sessions
    Container Connection Live! Afternoon Sessions Dan Walsh | Brian Harrington | Eric Jacobs | Chris Morgan | Thomas Cameron | Ken Chenis | Timothy Hunt Oct 24 2018 5:00 pm UTC 240 mins
    Connect with Red Hat and Intel for an information-packed day focused on all things containers—current trends, key benefits, best practices, and how containers can help evolve your infrastructure.

    Agenda:
    1:00–1:45 p.m. | 10 layers of container security
    1:45–2:30 p.m. | Container supply chain
    2:50–3.30 p.m. | Bringing Istio to OpenStack: Mesh expansion across OpenStack instances
    3:30–4:15 p.m. | Ask the experts panel

    (All times above in Eastern Time and are approximate)
  • Five Ways to Prepare for AI in Sales, Marketing and Beyond
    Five Ways to Prepare for AI in Sales, Marketing and Beyond Nathan Decker, Director of eCommerce, evo Oct 24 2018 5:00 pm UTC 60 mins
    Enterprise preparation for AI has centered almost exclusively on data prep and data science talent. While without data there would be no AI, enterprises that fail to ready the broader organization, chiefly people, process, and principles, don’t just stunt their capacity for good AI, they risk sunk investment, jeopardize employee trust, brand backlash, or worse.

    Ensuring sustainable deployment starts with assessing enterprise data strategy, aligning myriad stakeholders, technological feasibility assessment, and a coordinated approach to ethics.

    Join VentureBeat and industry analyst and founding partner of Kaleido Insights, Jessica Groopman for discussion on the five fundamentals of AI readiness at our upcoming VB Live event!

    Attend this webinar and learn:
    * What you need to do to prepare for AI-- beyond the data science team
    * Real-world examples and research findings
    * Top 5 best practices for strategic AI implementation

    Speakers:
    * Nathan Decker, Director of eCommerce, evo
    * Ken Natori, President, Natori Company
    * Jessica Groopman, Industry analyst and founding partner of Kaleido Insights
    * Rachael Brownell, Moderator, VentureBeat
  • Through the LookingGlass: Top Trends to Keep Your Organization Cyber Aware
    Through the LookingGlass: Top Trends to Keep Your Organization Cyber Aware LookingGlass Senior Vice President of Product, Eric Olson, and Vice President of Customer Support, James Carnall Oct 24 2018 6:00 pm UTC 60 mins
    It’s 2018 and threat actors continue to leverage the same tactics – phishing, ransomware, botnets, etc. – against their targets. They’ve using the same techniques for years, yet it’s still working. Do we sound like a broken record yet?

    With October being National Cyber Security Awareness Month, it’s an ideal time to re-evaluate the cyber threat landscape and your cybersecurity hygiene. Topics like fake news, privacy, and the Internet of Things are “hot” topics in mainstream culture, and you need to know their impacts on your organization.

    Join LookingGlass’ Senior Vice President of Product, Eric Olson, and Vice President of Customer Support, James Carnall, in a lively discussion about the hottest cybersecurity topics and what your organization can do to protect itself against them. Wednesday, October 24 @ 2PM ET.

    This webinar will also cover:
    · Business Email Compromise (BEC)
    · Single Sign-On and Password Managers
    · Information Warfare
    · Third Party Risk
  • 自社に合ったEDRを見極めるには? ~適切なEDRサービスと使いどころ~
    自社に合ったEDRを見極めるには? ~適切なEDRサービスと使いどころ~ 髙岡 隆佳, エバンジェリスト, Symantec Japan Oct 25 2018 6:00 am UTC 60 mins
    世間では境界線セキュリティはもう無意味、と言わんばかりにエンドポイントでの脅威検知および対応を強化する技術「EDR(Endpoint Detection and Response)」が注目されています。

    EDRは、端末に侵入してきた攻撃が広まる前に対処を早める手段で、事後対応のためのセキュリティ対策です。そのため「対応」への運用が自社では困難な企業向けに、EDRの管理を代行するセキュリティ会社も存在してきています。

    当セミナーでは、モバイル端末への対応は?ユーザ側の負担は?運用は?境界線セキュリティとの使い分けは?といった疑問にお答えし、自社に合ったEDRとその使いどころについて解説します。
  • How Can Zscaler help you to define and accelerate a Zero Trust Model?
    How Can Zscaler help you to define and accelerate a Zero Trust Model? Ian Perry, Zscaler Oct 25 2018 9:30 am UTC 60 mins
    We have surpassed the market demand for BYOD and 3rd Party access, as user behaviour and cloud adoption challenge the suitability of network services.

    Innovation and identity driven security solutions are helping our customers to realise a move to zero trust. Unlike many other industry trends the adoption of zero trust brings immediate benefits associated with business and operational agility, user experience and identity driven security.

    IT teams have begun to leverage a zero trust security strategy that builds a framework to accommodate private application and 3rd party access; Accomplished without placing users on the network and in many cases without the need for a mobile client. Transition to this model is low impact and provides immediate value to both IT and business outcomes.

    Join Zscaler in a discussion of how Zscaler Private Access (ZPA) enables you to deliver the experience users want, with the zero trust security you need.

    Gain an insight into:

    - Key concepts of zero trust security.

    - Best practices for private application access.

    - ZPA’s new Browser Based access solution.

    - How our customers are already deploying and benefiting from our Zscaler Private Access service.
  • Reducing Operational Costs with a Cloud-Managed Network
    Reducing Operational Costs with a Cloud-Managed Network Roderick Dixon, Solutions Marketing Manager - Aruba Oct 25 2018 1:00 pm UTC 60 mins
    Whether you’re expanding a network to support new initiatives, navigating through growing security challenges, or planning a refresh of older technology, keeping costs down and saving time for your IT team is key.

    View this webinar to learn how Aruba not only delivers the latest SMB networking technology but helps reduce planning, deployment and operational costs.
  • Managing Effective Security Policies Across Hybrid and Multi-Cloud Environments
    Managing Effective Security Policies Across Hybrid and Multi-Cloud Environments Yitzy Tannenbaum, Product Marketing Manager (AlgoSec) Oct 25 2018 2:00 pm UTC 45 mins
    Enterprises are not only migrating applications to the cloud from on-premise data centers, but they are developing multi-cloud strategies to take advantage of availability and cost structures as well as to avoid vendor lock-in. In fact, IDC has predicted that more than 85% of IT organizations will commit to multi-cloud architectures already by the end of this year.

    In complex, multi-cloud and hybrid environments, security teams need to understand which network flows and security controls impact application connectivity, including cloud-specific security controls (Network ACL and security groups) as well as virtual and physical firewalls that protect cloud resources. They need to manage policies that maintain their compliance posture across multiple clouds and hybrid environments.

    In this webinar, Yitzy Tannenbaum, Product Marketing Manager at AlgoSec, will illuminate security-policy issues in multi-cloud and hybrid environments and show you how to achieve:
    •Visibility across the multi-cloud network topology to ensure deployment of security controls that support network-segmentation architecture
    •Uniform security policy across complex multi-cloud and hybrid environments
    •Automatic monitoring of multi-cloud and hybrid network-security configuration changes to analyze and
    assess risk and to avoid compliance violations
    •Instant generation of audit-ready reports for major regulations, including PCI, HIPAA, SOX and NERC, in the context of multi-cloud environments
    •Automatic provisioning of application connectivity flows across a variety of security controls in hybrid environments