Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • 3 Lessons to Learn from Drupalgeddon 2
    3 Lessons to Learn from Drupalgeddon 2 Guy Rosefelt, Director of PM at NSFOCUS and Michelangelo Sidagni CoFounder and CTO at NopSec Recorded: Jul 20 2018 33 mins
    • An in-depth analysis of the Drupal vulnerabilities: CVE-2018-7600 & CVE-2018-7602
    • NSFocus & NopSec's research findings about the Drupal Vulnerabilities
    • Common themes with php vulnerabilities & how to protect your organization from them
  • Sophos Intercept X with Deep Learning
    Sophos Intercept X with Deep Learning Sophos Recorded: Jul 20 2018 4 mins
    A brief preview of how Sophos Intercept X utilizes deep learning technology to deliver unmatched next-gen endpoint protection.
  • Ovum + Ixia: What You Can Do To Strengthen Security Over Your Clouds
    Ovum + Ixia: What You Can Do To Strengthen Security Over Your Clouds Maxine Holt, Research Director, Security, Ovum Research. Scott Register, VP, Product Management, Ixia, A Keysight Business Recorded: Jul 20 2018 60 mins
    Cloud is transforming enterprises in every segment, yet security in the cloud may not be as strong as it should be. Responsibility for the security of data, applications, and services in the cloud remains with the enterprise, but control is limited. View this webinar to hear Maxine Holt, Research Director of Ovum, detail how to make your hybrid cloud environment visible and secure.

    Learn about how:
    •Cloud expands your attack surface
    •Your security architecture needs to adapt
    •To keep pace with cloud adoption

    Discover how you can leverage your existing security solutions to keep your cloud data, applications, and customer experience safe from cyberattacks.
  • RSA + Ixia: Cloud Security is a Marathon: How to Get a Running Start
    RSA + Ixia: Cloud Security is a Marathon: How to Get a Running Start Mike Gallegos, RSA. Sushil Srinivasan, Ixia, A Keysight Business Recorded: Jul 20 2018 36 mins
    The process of securing public, private and hybrid clouds is not unlike training for a marathon. To be successful in either endeavor, preparation—having a training plan—is key. During this webinar, experts from RSA and Ixia will share strategies for securing your workloads in various cloud environments.

    We’ll share insights into planning and implementing these strategies, review emerging designs and best practices, and provide a step-by-step demonstration of how you can:
    •Establish visibility into your workloads in public, private and hybrid clouds
    •Detect, identify, and remediate malicious activity
    •Complement data shared by cloud providers
    •Cost-efficiently retain data for long-term analysis
    •Future-proof investments / ensure scalability

    As with any test of skill and endurance, you need to set goals, develop a schedule and dedicate time to prepare and execute. Attending this session and viewing the demo will help you devise the right strategy to secure your cloud and go the distance.
  • Make the most of new opportunities as they happen with BT Agile Connect SD-WAN
    Make the most of new opportunities as they happen with BT Agile Connect SD-WAN BT Recorded: Jul 20 2018 3 mins
    There’s no time to hang around in business. So how can you be more agile? What strategies and tools can you use to get ahead of the game? Agile Connect, part of our Dynamic Network Services portfolio, combines our rock solid connectivity, service and security with Nokia Nuage Networks SD-WAN technology.
  • Sysdig & SANS Institute: Forensics and Incident Response in Containers
    Sysdig & SANS Institute: Forensics and Incident Response in Containers Knox Anderson, Sysdig and Jake Williams, SANS Analyst Recorded: Jul 20 2018 61 mins
    Almost 5 years, 48,000+ github stars, and tens of thousand of production deployments later we can safely say containers are a technology that is a here to stay. They’re developer friendly, easy to operationalize, and allow organizations to provide stable and secure services to their customers.

    While there are clear best practices for what it takes to build and run containers, there isn't as much knowledge around the performing forensic analysis of incidents that occur inside your containers.

    In this webinar we'll cover:
    - How containers change incident response and forensics
    - Best practices around forensic data collection in container environments
    - Compare opensource and commercial forensics options
    - A live demo of multiple forensics investigations using Sysdig Inspect: an opensource container forensics tool
  • Master DNS Security for a Bulletproof, Tier One Network
    Master DNS Security for a Bulletproof, Tier One Network Tony Scott, DJ Goldsworthy, D.J. Long, Cricket Liu, Victor Danevich Recorded: Jul 19 2018 97 mins
    You're charged with building a bulletproof, tier one secure network. If your Domain Name System (DNS) goes down, nothing else matters. And, DNS is the leading attack vector for cyber villains. Say “Hack no! ” to DNS threats.

    Join guest speaker Tony Scott, former CIO of the United States, Microsoft, and the Walt Disney Company, alongside leading practitioners from Aflac and McAfee in this live panel discussion. This unique gathering of industry experts will discuss their perspectives on building a safe, secure network and actionable best practices in this era of cloud and mobile. Moderated by Infoblox Chief DNS Architect Cricket Liu, this discussion will give you an opportunity to hear from the experts and ask questions about.

    - What leading organizations are doing to secure their DNS
    - When to best utilize DNS data, network context, and threat intelligence in your security operations
    - How to integrate DNS data with your security ecosystem to accelerate threat mitigation and remediation
    - How Aflac blocked nearly 37 million threat connections with < 100 false positives

    Save your spot now.

    ----------------------------------------------------------------------------------------------

    Panelists:

    Tony Scott,U.S. CHIEF INFORMATION OFFICER (2015–2017), TONYSCOTTGROUP

    DJ Goldsworthy, DIRECTOR, SECURITY OPERATIONS AND THREAT MANAGEMENT, AFLAC

    D.J. Long, VICE PRESIDENT, STRATEGIC BUSINESS DEVELOPMENT, MCAFEE

    Cricket Liu, CHIEF DNS ARCHITECT, INFOBLOX

    Victor Danevich, VICE PRESIDENT, WORLDWIDE FIELD ENGINEERING, INFOBLOX
  • Can computers be creative? Integrating AI in media content workflows
    Can computers be creative? Integrating AI in media content workflows IBC365 | Adobe | GrayMeta | Channel 4 | EBU Recorded: Jul 19 2018 63 mins
    Artificial intelligence (AI) and machine learning are starting to transform the way content is created, managed and delivered.

    New cognitive-computing tools are enhancing creativity, eliminating mundane repetitive work and unlocking new value from content.

    AI is suddenly everywhere: the ready availability of powerful AI services from all the major cloud providers means hundreds of media technology products are plugging into AI and offering new ways of working.

    This webinar cuts through the hype to reveal how media companies are actually using AI tools throughout the content supply chain - from aiding craft and creative work in post-production, automating metadata extraction and compliance, to making smart content recommendations to audiences. Our speakers will explain how best to use AI, what we can and can't do, and how it will continue to change workflows into the future.

    Speakers:
    Michael Gamböck, Senior Strategy Relations EMEA, Creative Cloud Video, Adobe
    Josh Wiggins, Chief Commercial Officer, GrayMeta
    Neil Taylor, Lead Data Strategist for Commercial Innovations, Channel 4
    Jean-Pierre Evain, Principal Project Manager, EBU Artificial Intelligence Committee
  • Implementing next-gen PON technologies over existing fiber infrastructure
    Implementing next-gen PON technologies over existing fiber infrastructure Steven Van Den Bergh, Nokia and Guillaume Lavallee, EXFO Recorded: Jul 19 2018 76 mins
    This webinar, jointly hosted by the TIA Fiber Optics Tech Consortium and the Association for Passive Optical LANs, will discuss Passive optical LANs (POL) technology, comparing POL and traditional Ethernet switching architectures, and reviewing the Telecommunications Industry Association (TIA) standards applicable to the design and testing of POL solutions to address considerations such as splitters, connectors and signals.
  • Rethinking Security
    Rethinking Security Adrian Rowley, Technical Director EMEA Recorded: Jul 19 2018 38 mins
    This webinar looks at how to eliminate complexity, increase efficiency of security tools, and improve confidence in the overall security posture of your organisation.
    Adrian Rowley, Gigamon’s Technical Director for EMEA, will discuss todays challenges in network security and how these can be resolved.
    Attendees will learn how you can:
    •Maximise network availability and operational simplicity of security tool upgrades with its integrated inline bypass technology
    •Deliver unmatched depth and breadth of traffic intelligence that is essential to increasing efficiency of overburdened security and networking tools, while decreasing complexity
    •Minimise Total Cost of Ownership and increase ROI by an average of 153%
    Join Adrian Rowley to see why only Gigamon provides a full solution for networking tools and inline and out-of-band security tools across on-premises, remote, virtual and cloud environments.
  • Next Generation Phishing Protection
    Next Generation Phishing Protection Peter Mullens, Product Marketing, Barracuda Networks Recorded: Jul 19 2018 49 mins
    Did you know email is still the biggest threat vector for phishing, with 74% of threats entered as an email attachment or link? Does your email protection do enough to help prevent your users from being phished?

    On this webinar you’ll learn how a multi-layered next generation email protection solution not only addresses the latest email threats but helps you stay ahead of the curve.

    What we’ll discuss:

    How advanced threats are evolving to use sophisticated techniques such as spear phishing and social engineering.

    The different layers needed in a next generation email protection solution.

    How you can get started today.
  • Serverless Language Translation On-the-Fly with Microsoft Translator
    Serverless Language Translation On-the-Fly with Microsoft Translator Johnathan Flowers Recorded: Jul 18 2018 22 mins
    Cognitive services have hit the mainstream. Delivered through powerful, easy-to-use APIs, businesses can harness the power of artificial intelligence and machine learning and integrate them directly into their applications.

    With Microsoft’s exciting release of Translator v3, we just announced our Translator BLOCK - bringing the power of the Microsoft AI platform to PubNub. Using the BLOCK, you can now quickly and accurately translate natural text and speech into a number of different languages with no additional servers or logic required. With Functions, all language translation takes place in the network.

    In this webinar, we’ll introduce you to the new BLOCK, and show you how easy it is to implement powerful translation capabilities into your realtime app.
  • NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM ED
    NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM ED Ulf Mattsson, Dick Morrell, Juanita Koilpillai Recorded: Jul 18 2018 60 mins
    NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM EDT

    Financial Services and GDPR: The next 60 days….

    In response to GDPR and Privacy Shield changes, entities in the Financial Services Industries have taken initial steps to identify gaps and modify their public facing privacy policies. This session will focus on what these heavily regulated industries will have to do in the next 60 days to establish and maintain a legally defensible position with respect to privacy and security of personal data not only to comply with regulation but to be poised to do business in the 21st Century.
  • Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Three reasons to choose Citrix Workspace over VMware Workspace ONE Amandeep Nagra, Sr. Product Marketing Manager, Workspace services, Citrix Recorded: Jul 18 2018 57 mins
    Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.

    With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.

    Some of Citrix Workspace key advantages include:
    • Higher user productivity and a better experience
    • Stronger security which extends to the cloud
    • joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario

    Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
  • Flexible Cyber Threat Intelligence at the Network’s Edge
    Flexible Cyber Threat Intelligence at the Network’s Edge Ken Hosac, VP of IoT Strategy, Cradlepoint Recorded: Jul 18 2018 58 mins
    Network security needs are changing right before our eyes. Digital transformation is shifting workloads to the cloud, increasing mobile workforces, and expanding IoT footprints — and network on-ramps.

    From branch locations to in-vehicle networks and IoT devices, cyberattacks become more advanced by the day. Today’s diverse network architectures and security needs make scalable solutions and flexible cyber threat intelligence essential. Many organizations want the cost savings and efficiencies of the cloud without having to sacrifice the level of security to which they’re accustomed.

    Join Cradlepoint's Ken Hosac, VP of IoT Strategy, for this live webinar to explore the blending of legacy and next-generation measures to keep enterprise networks secure.

    Hosac has helped drive Cradlepoint’s growth and development through roles in strategic planning, product management, solution strategy and thought leadership. He frequently represents the company at industry conferences and events, and served on the original Advisory Board for the IoT/M2M Evolution Magazine. Hosac has 25 years of experience in marketing, sales, R&D and manufacturing. Prior to joining Cradlepoint, he served as VP of Marketing for Casabyte (later acquired by JDS Uniphase). He also served as VP of Business Development for GoAhead Software (later acquired by Oracle). Hosac earlier spent 10 years at Hewlett Packard with cable modems and head-ends, set-top boxes, and personal computers in a variety of engineering and engineering management roles. He holds a B.S. degree in Electrical Engineering and an M.S. degree in Manufacturing Engineering, both from Stanford University.
  • Verizon Threat Research Advisory Center - Insider and Privilege Misuse
    Verizon Threat Research Advisory Center - Insider and Privilege Misuse David Kennedy and John Rudolph, Verizon Global Security Recorded: Jul 18 2018 79 mins
    Leverage Threat Intelligence where it matters most.

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Insider and Privilege Misuse

    Our Verizon Threat Research Advisory Center presenters will be:

    • John Rudolph, Principal Consultant, Identity and Access Management
    • Steve Atnip, Senior Analyst, Threat Intelligence
    • David Kennedy, Managing Principal, Open Source Intelligence
    • Laurance Dine, Managing Principal, Investigative Response – EMEA

    For this month's theme of 'Insider and Privilege Misuse' we'll feature John Rudolph, Principal Consultant, Identity and Access Management who'll discuss insider threat motivations, common denominators, and countermeasures, to include the Zero Trust approach. We'll then touch base on the IR Pulse and trends in our caseload, followed by:

    • Current Intelligence
    • Attacks & Threat Indicators
    • Latest Malware Trends
    • Significant Vulnerabilities
  • Attacker’s Advantage - Understand How & Why Cyberattackers Beat Your Defence
    Attacker’s Advantage - Understand How & Why Cyberattackers Beat Your Defence Robert Healey, Senior Director Marketing, Asia Pacific, Tenable Network Security Recorded: Jul 18 2018 60 mins
    In its inaugural report, Tenable Research explores who has the first-mover advantage – cyber criminals or security teams? What’s the difference in time between when an exploit is publicly available for a given vulnerability and the first time that security teams actually assess their systems? And why does this even matter to your organization?

    The research team analyzed the 50 most prevalent critical and high-severity vulnerabilities from just under 200,000 vulnerability assessment scans over a three-month period. What did they find?

    Alarmingly, all too often, the attackers have the advantage. On average, they have a seven-day head start on defenders. Threat actors are sprinting ahead, exploiting vulnerabilities before security teams have even left the starting blocks – before businesses even know they’re at risk.

    Join Tenable and (ISC)² on Jul 18, 2018 (Wed) at 14:00 (Singapore Time) to understand how and why cyber attackers are beating your defence.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
    Moderator: Tony Vizza, CISSP Director, Cybersecurity Advocacy for APAC, (ISC)²
  • AI Ready Infrastructure For Deep Learning Deployment at Scale
    AI Ready Infrastructure For Deep Learning Deployment at Scale Michael Lang Senior Solutions Architect, NVIDIA ANZ and Michael Boots, Head of FlashBlade Sales ANZ, Pure Storage ANZ Recorded: Jul 18 2018 52 mins
    The era of Artificial Intelligence is here. Enterprises face an extraordinary opportunity to innovate and lead. However, real-world AI initiatives are often stalled by scale-out storage infrastructure complexities.

    In this webinar we’ll explore new approaches to enable AI-at-scale for enterprises, delivering time-to-insight in hours rather than weeks. We will also cover details and customer successes with AIRI™, the industry’s first complete AI-ready storage infrastructure, architected by Pure Storage® and NVIDIA® to extend the power of NVIDIA DGX™ systems.
  • A Framework to turn IoT Technology into Operational Capability for Mining
    A Framework to turn IoT Technology into Operational Capability for Mining Pieter van Schalkwyk, CEO, XMPro Recorded: Jul 17 2018 58 mins
    Digital Transformation through IoT that focuses on digital exploration, agile mining operations, connected assets, and next gen safety brings significant benefits to mining companies and mining technology suppliers alike. Mining organizations that don’t embark on IoT-enabled Digital Transformation will find it more challenging to compete in uncertain resources cycle. With more than 80% of IoT projects not progressing beyond POC stages according to Gartner, there is a disconnect between IoT technology and IoT capabilities.

    This stems from a technology-centric approach to IoT that focus on connected “things” and less on the expected business outcomes. A July 2017 McKinsey study found that 70% of their respondents identified “integrating IoT solutions into existing business workflows” as a capability gap. The IoT challenge that mining companies now face is less of a technology problem and more of a business process problem.

    This webinar presents a framework that provides the business architecture for using IoT that connects IoT technology to operational capability and business outcomes. The I2OC framework focus on aligning IoT technology with benefits such as increased asset availability, reduced downtime, reduced costs, increased efficiencies, and improve safety and governance. Pieter uses a practical mining example to present the I2OC framework.
  • Reducing Risk by Examining Threats that are Forming in the Cyber Ecosystem
    Reducing Risk by Examining Threats that are Forming in the Cyber Ecosystem Michael Suby, VP of Research at Frost & Sullivan, and James Carnall, VP of Customer Support Group at LookingGlass Recorded: Jul 17 2018 63 mins
    In the highly dynamic online landscape of misinformation, fake news, gossip, and the trading of absconded data, organizations must expand their cybersecurity arsenals in protecting their brands, personnel, facilities, and sensitive information. They must take into account what exists outside the perimeter in the greater cyber ecosystem: the surface, dark, and deep web. Locating and assessing these threats, however, is a challenge for even experienced threat hunters. The tools and techniques are non-standard. You should ask yourself, “Is my security team ready to tackle what lies beyond the perimeter?” If not, let us shed light on this topic. Register for LookingGlass' "Threats Beyond the Perimeter" webinar on Tuesday, July 17 @ 2 pm ET to hear Michael Suby, VP of Research at Frost & Sullivan and James Carnall, VP of Customer Support Group at LookingGlass discuss how these scenarios may affect your brand, employees, and facilities.
  • Harnessing Cybersecurity Automation
    Harnessing Cybersecurity Automation Holly Schipper, Product Marketing Manager, Cybersecurity. Juniper Networks Recorded: Jul 17 2018 21 mins
    An understaffed security workforce is struggling to protect your evolving enterprise from ever changing cyber threats. Automation could be the answer to hardening your security posture in these shifting sands. However, the task of implementing automation across such a diverse and continuously morphing environment presents a challenge.

    In this webinar, we will discuss the benefits, complexities and best practices of implementing security automation.
  • SD-WAN & Hybrid WAN in the Art of Digital Network Transformation
    SD-WAN & Hybrid WAN in the Art of Digital Network Transformation Joel Stradling, Research Director, Global Data, Peter Juffernholz, Associate VP Global Network Services, TATA Communications Recorded: Jul 17 2018 61 mins
    GlobalData research reveals that around 70% of businesses have either deployed or are deploying SD-WAN technology. Businesses are moving more and more of their IT estate into cloud platforms which is the driver for SD-WAN adoption. Of course, this easily enables SD-branches for enterprises to make their businesses more agile and cost-effective.

    Join this webinar to understand the benefits and real-life experiences of end-users who have deployed hybrid WAN and SD-WAN services. Hear our speakers discuss the link between their analysis and the over-arching theme of enterprise digital transformation along with security, cloud, and applications. Get deep insights on how current enterprise WANs are transforming, and the drivers causing the change as we approach 2020. We will share insights from case-studies based on industrial applications of SD-WAN and hybrid VPNs across a handful of industry segments.

    From this webinar, you’ll get a clear picture of how you can transform your network through tactical migration to hybrid VPN and SD-WAN.

    AGENDA

    · What does Digital Transformation mean to the Enterprise
    · Drivers for Digital Transformation: Network & IT
    · What should a fully managed hybrid/SD-WAN solution look like in 2020?
    · Industry-specific challenges: Manufacturing, Services and Logistics
    · SD-WAN/Hybrid WAN Case-studies
    · Recommendations and Executive Summary
    · Q&A
  • A pragmatic approach to service assurance in 5G network slicing
    A pragmatic approach to service assurance in 5G network slicing Anton Basil, Vice President – Technology, Veryx Technologies Recorded: Jul 17 2018 42 mins
    Many leading network operators as well as network equipment manufacturers have already recognized network slicing as an ideal network architecture for 5G deployment. It provides the flexibility for network operators to slice one physical network into dedicated virtual networks, logically separated from one another and dedicated for different types of services, with different characteristics and requirements.
  • Why Threat Intelligence should be a key tool in your security portfolio
    Why Threat Intelligence should be a key tool in your security portfolio Fleming Shi, Senior Vice President, Advanced Technology Engineering, Barrcuda; Brianna Fischer, Product Marketing, Barracuda Recorded: Jul 17 2018 50 mins
    Knowing which threats are trending right now—and which vectors criminals are using to attack you—is the key to optimizing and fine-tuning your security policies and solutions for effective protection.
    Barracuda collects a vast flow of real-time information and uses big data analytics to crunch those numbers in order to deliver up to date, actionable insights. In this interactive live session with Brianna Fischer and Fleming Shi will discuss:

    • Latest threats in cyber security
    • Real world examples of using threat intelligence in defending against cyber attacks
    • How to use threat intelligence to fine tune your security policies
    • How to gain access to the information you need to stay ahead of the biggest cyber threats

    Register to learn the fastest, easiest way to get the information you need to stay ahead of the biggest cyber threat trends.
  • Incident Remediation: Could this have been prevented?
    Incident Remediation: Could this have been prevented? Manfred Erjak, Consultant, Professional Services Recorded: Jul 17 2018 31 mins
    Third and final part of our 'Breach Response Preparedness Series', a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.

    Recovering from a large-scale incident is not an easy task. When compromised by an Advanced Persistent Threat, one must plan the efforts ahead of time to succeed in fully remediating and eradicating the attacker from the environment.

    During this webinar, we will discuss:
    - How to best remediate from such an event;
    - The different stages of the preparation, when it is the best time to remediate, and how to classify actions;
    - Examples of real investigations and remediation efforts to illustrate common complications like remediating too early, remediating partially and working with third party IT providers

    Join your host Manfred Erjak, Professional Services Consultant, for a 25-minute webinar to discuss the latest incident remediation trends.
  • Top Five Benefits of Versa SD WAN
    Top Five Benefits of Versa SD WAN Danny Johnson, Dir-Verizon, Helen Wong, Verizon, Rob McBride, Dir-Versa Jul 24 2018 3:30 am UTC 60 mins
    Join us and our strategic partner, Versa Networks, for a discussion on Managed SD WAN Security Branch solutions. Through real use cases in deployments at scale, we will discuss how Managed SD WAN can help increase bandwidth, agility and reliability - while maintaining security.
  • Обзор решений Dell EMC VMware Validated Design
    Обзор решений Dell EMC VMware Validated Design Андрей Николаев, специалист Dell EMC по облачным платформам Jul 24 2018 8:00 am UTC 60 mins
    Построение программно-определяемого ЦОД на базе гиперконвергентных платформ Dell EMC и технологий VMware. Обзор решения Dell EMC VMware Validated Design.
    Вебинар проводится при поддержке компании Intel®
  • Repenser la sécurité
    Repenser la sécurité Yann Samama, Consutlant Solutions de Sécurité Jul 24 2018 8:30 am UTC 45 mins
    Les évolutions technologiques, les nouvelles normes, l’augmentation constante du trafic, la complexité des infrastructures réseau au sein desquelles l’information est de moins en moins visible, ainsi que les cyber-menaces de plus en plus sophistiquées ont un impact majeur sur les entreprise et les obligent à repenser l’architecture de sécurité.

    Yann Samama discutera des défis actuels en matière de sécurité et comment ils peuvent être surmontés en abordant les sujets majeurs tels que :

    * Augmenter la disponibilité du réseau tout en simplifiant la  connectivité des outils grâce à une solution de module bypass
    * Disposer d’une visibilité en tout point réseau afin d’améliorer de l’efficacité de l’ensemble des outils connectés  tout en réduisant la complexité de leur exploitation
    * Diminuer les coûts OPEX et CAPEX via un  ROI très court-termisme

    Découvrez les raisons pour lesquelles Gigamon propose la solution la plus complète et efficace pour la connectivité des outils en mode « inline et Out of band » au sein des environnements physiques, virtuels et de cloud public.
  • [US/UK] Network security at the speed of DevOps
    [US/UK] Network security at the speed of DevOps Anner Kushnir, VP Technology Jul 24 2018 3:00 pm UTC 60 mins
    DevOps methodologies have become extremely popular to enable agile application development and delivery.
    Unfortunately, when it comes to the associated network connectivity, such as whenever a new application needs to connect to an external resource, the process breaks. The application developer then needs to open change requests and wait for approvals which effectively breaks the continuous delivery cycle. As a result security is in the uncomfortable position of being a bottleneck and an impediment to innovation.

    In this webinar, Anner Kushnir, AlgoSec’s VP of Technology will describe how the innovative 'Connectivity as Code' approach can be implemented to overcome these challenges, and seamlessly weave network security into the existing CI/CD pipeline in order to fully automate the application delivery process end-to-end.

    Attend this webinar to learn how to:
    •Seamlessly manage network connectivity as part of the DevOps process for faster, more agile and problem-free application delivery
    •Avoid external out-of-band network connectivity problems that require separate and manual handling
    •Ensure continuous compliance and auditability throughout the application delivery process
    •Get clearly documented application connectivity requirements which help prevent disruptions to the business
    •Bridge the gap between application developers and network security throughout the entire application lifecycle
  • What's new in ONAP Beijing Release?
    What's new in ONAP Beijing Release? Amar Kapadia, Co-founder Aarna Networks, Inc. Jul 24 2018 4:00 pm UTC 45 mins
    Are you worried about orchestrating your NFV/SDN network services and edge computing applications? The Linux Foundation Open Network Automation Platform (ONAP) promised to be a key component of next generation networks to orchestrate, configure, monitor and automatically manage complex services and applications. With the recent Beijing release, the ONAP community has fortified software stability, harmonized northbound APIs with standard bodies, improved ONAP deployment using Kubernetes, added important functional features and created two new projects. If you have not followed the release too closely, join us for this webinar and learn all about it. In this webinar, you will learn:
    •What is ONAP?
    •How can ONAP help you?
    •What is new in the Beijing release?
    •How can you get involved?
  • Reliable & Agile Network Connectivity for Digital Signage
    Reliable & Agile Network Connectivity for Digital Signage Michael Dickens, Sr. Solutions Engineer & Joe Wagner, Solutions Engineer at Cradlepoint Jul 24 2018 4:00 pm UTC 60 mins
    Consumers are no longer just observers in the world of signage; today they can engage in an enriched, interactive viewing experience.

    However, to become digital, applications need a secure, reliable network solution, providing faster ROI and added value. When digital signage is connected to the Internet, it’s possible for businesses to gain real-time intelligence and respond to information quickly. Wireless connectivity lets the network move fast to adjust messages as frequently as necessary. Businesses can also manage a single wireless network — with devices connecting across the world — from a single, remote location. Additionally, keeping digital signage on its own wireless network, physically separate from the main network, strengthens cybersecurity by shrinking a company’s attack surface.

    Digital signage solutions may encompass many features including:

    - Industrial monitoring
    - Sensors
    - Ambiance for & customer experience
    - Data analysis & delivery plans for assisted selling
    - Product information
    - Brand messaging & marketing
    - Real-time intelligence & customer engagement
    - Self-service applications
    - Wayfinding

    Digital signage can reach consumers in a way that print and static signage can only dream of, and the adoption of digital signage is only growing as cloud, mobile, and wearables become the norm. However, implementation of these applications will not be successful without a constant, secure network connection.

    Join Cradlepoint for a live webinar on July 24, 2018, at 9:00 am PT to learn about trends and advancements in digital signage and how reliable connectivity and cloud management impact and enable deployments.

    Michael Dickens is a Senior Solutions Engineer at Cradlepoint. Over his 8-year tenure at Cradlepoint, he has brought the company from a consumer based applications company to full robust enterprise solutions. In his previous careers, he worked on DoD networks, ISPs, data center management, and he attended Boise State University.
  • Open source Kubernetes run-time security with Falco
    Open source Kubernetes run-time security with Falco Michael Ducy Jul 24 2018 5:00 pm UTC 30 mins
    Effective security requires a layered approach. If one layer is comprised, the additional layers will (hopefully) stop an attacker from going further. Much of container security has focused on the image build process and providing providence for the artifacts in a container image, and restricting kernel level tunables in the container runtime (seccomp, SELinux, capabilities, etc). What if we can detect abnormal behavior in the application and the container runtime environment as well? In this talk, we’ll present Falco - an open source project for runtime security - and discuss how it provides application and container runtime security. We will show how Falco taps Linux system calls to provide low level insight into application behavior, and how to write Falco rules to detect abnormal behavior. Finally we will show how Falco can trigger notifications to stop abnormal behavior, notify humans, and isolate the compromised application for forensics. Attendees will leave with a better understanding of the container security landscape, what problems runtime security solves, & how Falco can provide runtime security and incident response.
  • 2018 Security Congress Preview – Cloud Security
    2018 Security Congress Preview – Cloud Security Mike Brannon, Dir, Infrastructure & Security, National Gypsum; Tim Sills,Accudata; Tyler Smith, IT Analyst, John Deere Jul 24 2018 5:00 pm UTC 75 mins
    (ISC)2 will hold its Security Congress 2018 in New Orleans, LA, October 8th – 10th. This conference will bring together 2000+ attendees and over 100 educational sessions. One of the 13 tracks that are being offered with focus on Cloud Security and challenges practitioners face when dealing with all things cloud. On July 24, 2018 at 1:00PM Eastern, join (ISC)2 and several of the speakers who’ll be presenting in the Cloud track as we preview their sessions, get an idea of what will be discussed and discuss the state of cloud security today.
  • SD-WAN – The Lynchpin in a Transforming Virtual Cloud Network
    SD-WAN – The Lynchpin in a Transforming Virtual Cloud Network Zeus Kerravala, Principal Analyst & Founder, ZK Research Jul 24 2018 5:00 pm UTC 60 mins
    Networking is in a constant state of change, but the with the advent of cloud and virtualization, the current evolution is altering the way we’ve traditionally understood it. The Virtual Cloud Network is about virtualization, connecting data centers and branches and cloud to each other in a seamless and flexible manner that supports this evolution for the next several decades. The lynchpin to this new architecture is SD-WAN, with its pervasive, scalable, and adaptable framework.

    In this webinar, Zeus Kerravala of ZK Research, discusses how SD-WAN is transforming networking and enabling the adoption of Virtual Cloud Network to occur.
  • 11ax Wi-Fi What you need to know for 2018
    11ax Wi-Fi What you need to know for 2018 Nathanial Moore, CWNE Systems Engineer, UK Aerohive Networks Jul 25 2018 10:00 am UTC 45 mins
    Are you ready for 802.11ax? This fast approaching IEEE standard addresses some of today’s biggest high density and performance challenges – increasing capacity by up to 4x; improving spectral efficiency to benefit both 2.4GHz and 5GHz bands in a variety of environments.

    Today’s 802.11ac standard already presents many fantastic capabilities for capacity and performance. So if you’re reviewing your network, which is right for you: 11ac or 11ax? And what will be the benefits of upgrading from 11ac?

    Join us for this 30 minute quick-hit, reviewing 11ax’s most important components:

    • PHY and MAC layer enhancements for better traffic management
    and efficiency
    • Downlink & uplink OFDMA; 8 x 8 MU-MIMO; Spatial re-use
    • Considerations for clients and wider network enhancements
  • The Dark Side of SD-WAN
    The Dark Side of SD-WAN Yishay Yovel, vice president of marketing at Cato Networks Jul 25 2018 1:00 pm UTC 60 mins
    If you are considering deploying SD-WAN in your network, you probably hear a lot about its benefits. But, you may be unsure what it will take to move from your legacy MPLS and VPN network to SD-WAN. What problems will you face and how will you tackle them?

    In this live webinar, Join Yishay Yovel, vice president of marketing at Cato Networks, to learn:

    - Key planning considerations when migrating to SD-WAN
    - Availability and capacity guidance for augmenting or replacing MPLS services with Internet services
    - The impact of SD-WAN deployment on security, global connectivity, WAN management
    - When to launch and how to fund the SD-WAN project
  • DPDK 18.05 New Features
    DPDK 18.05 New Features Tim O’Driscoll, Software Product Marketing for DPDK, Intel Jul 25 2018 3:00 pm UTC 45 mins
    This webinar will describe the new features introduced in the most recent DPDK release, 18.05. It will also describe some of the features planned for the next release, 18.08, which is due in August.

    Key features included in the 18.05 release include: changes to the memory subsystem to allow dynamic allocation of memory, creation of a new API to support hardware and software acceleration of compression, extension of the vhost-user library to support a hardware accelerated data path, support for crypto operations via virtio, and the addition of port representors which provide a generic framework for virtual function management in DPDK.
  • Webinar: An Actionable Plan for Segmenting Your Network
    Webinar: An Actionable Plan for Segmenting Your Network Erez Tadmor,Sr. Product Manager, Tufin & Dan Rheault, Sr. Product Marketing Manager, Tufin Jul 25 2018 3:00 pm UTC 60 mins
    A segmented network operationalizes your network security policy, enables a demonstrable state of continuous compliance, and provides mitigation options for cyberattacks.

    Our advice: organizations must go back to the basics to accomplish this crucial project.

    This webinar will cover actionable tips for network segmentation based on the experience of over 2,000 organizations. We will share:
    •Common pitfalls to avoid
    •How to start segmenting your network today
    •Tips for applicable enforcement
    •Q&A from the attendees
  • Network Verification: Are Error-Free Networks Really Achievable?
    Network Verification: Are Error-Free Networks Really Achievable? Nikhil Handigol, Co-Founder Forward Networks Jul 25 2018 5:00 pm UTC 30 mins
    It is now possible to proactively verify large enterprise networks are error-free, end-to-end. Network verification makes it possible to certify updates before pushing them live, to avoid outages and accelerate change windows. Join Forward Networks Co-Founder Nikhil Handigol to learn how this new network analysis technology can greatly simplify network IT and ensure 100% policy compliance. Includes a live demo.
  • A CTO’s Perspective: Network Security for the Cloud Generation
    A CTO’s Perspective: Network Security for the Cloud Generation Dr. Hugh Thompson, CTO Symantec and Mark Urban, VP Product Strategy & Operations, Symantec Jul 25 2018 5:00 pm UTC 30 mins
    Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. Traditional approaches to network protection are going away as the concept of a secure perimeter disappear.

    In this webcast we’ll look at today’s new business paradigm, the challenges we now face, along with best practices for building a secure network in the cloud.

    Join Hugh Thompson, CTO of Symantec, and Mark Urban, VP Product Strategy & Operations, Symantec as they share their vision for Cloud Generation Network Security and how they see leading companies of all sizes prepare for the future.

    In this session they’ll discuss:

    •. A security insider’s view of market trends and the 24/7/365 demands of a distributed workforce

    •. The increased complexity of managing full security stack with limited resources

    •. The technical challenges of securing cloud applications

    •. Cloud solutions that solve cloud problems

    It promises to be an insightful event for all security, network and IT professionals. After their presentation the speakers will also take questions from the audience.

    We highly encourage you to register and reserve your spot today.

    Register Now
  • Sicherheit neu überdenken
    Sicherheit neu überdenken Daniela Fusaro, Senior Solutions Architect Jul 26 2018 8:00 am UTC 45 mins
    Dieses Webinar befasst sich mit der Beseitigung von Komplexität, der Steigerung der Effizienz von Sicherheitstools und der Verbesserung des Vertrauens in die allgemeine Sicherheitslage Ihres Unternehmens.

    Daniela Fusaro, Senior Solutions Architect, diskutiert die heutigen Herausforderungen im Bereich der Netzwerksicherheit und wie diese gelöst werden können.

    Die Teilnehmer lernen, wie man:
    * Netzwerkverfügbarkeit und einfache Handhabung der Upgrades von Sicherheitstools durch integrierte Inline-Bypass-Technologie maximiert
    * Unerreichte Tiefe und Breite der Traffic-Intelligenz bereitstellt, die für die Steigerung der Effizienz überlasteter Sicherheits- und Netzwerktools unerlässlich ist, während gleichzeitig die Komplexität verringert wird
    * Gesamtbetriebskosten verringert und den ROI um durchschnittlich 153 % steigert

    Melden Sie sich bei Daniela Fusaro an, um zu erfahren, warum nur Gigamon eine Komplettlösung für Netzwerktools sowie Inline- und Out-of-Band-Sicherheitstools in lokalen, Remote-, virtuellen und Cloud-Umgebungen bietet.
  • Media at the Edge: A new content technology perspective
    Media at the Edge: A new content technology perspective IBC365 | Schneider Electric | BASE Media Cloud Jul 26 2018 3:00 pm UTC 60 mins
    What you will learn:

    - What is Edge computing and why it will be key to broadcasting, media and entertainment

    - How edge computing is rapidly evolving to provide content anywhere and everywhere through the IoT and soon across 5G networks
     
    - What mobile edge computing means for production, processing and video distribution
     
    - How new consumer experiences, VR, AR, UHD streaming will be driven by the availability of edge infrastructure
     
    - Protecting the physical and digital assets. How to secure the critical IT infrastructure which will house valuable content at the edge of the network

    Speakers:
    Steven Carlini, Senior Director Data Centre Global Solutions, Schneider Electric
    Damon Neale, Chief Technology Office, BASE Media Cloud
  • 30 minutes to a more secure, predictable, and stable infrastructure
    30 minutes to a more secure, predictable, and stable infrastructure Amaya Gil Pippino, senior technical marketing manager, Red Hat Jul 26 2018 3:00 pm UTC 30 mins
    To keep pace with digital transformation and the rapid changes it brings, modern IT infrastructures have become increasingly complex. However, this complexity often equals added risk. To succeed, businesses must reduce downtime—and ultimately help their stakeholders succeed.
    If you are using the management and provisioning capabilities of Red Hat® Satellite, you may find additional benefit from adding Red Hat Insights to monitor your IT environment. Insights helps to reduce complexity by proactively identifying and remediating issues before business operations are affected.

    In this short webinar, you'll learn:

    > Why Red Hat Insights might be of interest to your team.
    > How to quickly and easily get your team started with Red Hat Insights.
    > How to use Red Hat Ansible® Automation to streamline large and small deployments.
    > The answers to your question from Red Hat experts.
    > Get proactive infrastructure management by viewing your entire Red Hat ecosystem from one Satellite dashboard—to quickly view risks to stability, security, availability, and performance and get clear, prioritized, and actionable remediation instructions.
  • Unleash the Power of NVMe Fabrics
    Unleash the Power of NVMe Fabrics Rick Walsworth, Venky Nagapudi Jul 26 2018 5:00 pm UTC 60 mins
    This webcast will provide an architectural view of the NVMe over Fabrics, the different technology approaches, and best practices to consider when evaluating this technology. During this session, you’ll be provided with real-world use cases and examples as well as the benefits of NVMe for the following key areas:
    -How to migrate services from standard SCSI based to NVMe-oF based
    solutions using FC
    -Detailed architectural analysis and benefits achieved by deploying NVMe-
    oF via GbE.
    -Tradeoffs and decision to utilize mixed mode FC and GbE deployments.

    In addition to the presentation, there will be a brief demo of the Vexata
    NVMe-oF solution presented to show how the system performs for high frequency, enterprise use cases.
  • Best practices for Forensics and Incident Response in Containers
    Best practices for Forensics and Incident Response in Containers Knox Anderson Jul 26 2018 5:00 pm UTC 30 mins
    Almost 5 years, 48,000+ github stars, and tens of thousand of production deployments later we can safely say containers are a technology that is a here to stay. Theyre developer friendly, easy to operationalize, and allow organizations to provide stable and secure services to their customers.

    While there are clear best practices for what it takes to build and run containers, there isn't as much knowledge around the performing forensic analysis of incidents that occur inside your containers.

    In this webinar we'll cover:

    - How containers change incident response and forensics

    - Best practices around forensic data collection in container environments

    - Compare opensource and commercial forensics options

    - A live demo of multiple forensics investigations using Sysdig Inspect: an opensource container forensics tool
  • Operational Insights: How a Security Expert Defends Your Network's Blind Spots
    Operational Insights: How a Security Expert Defends Your Network's Blind Spots Sam McLane, Head of Security Engineering, Arctic Wolf Networks; Narayan Makaram, Sr. Director of Product Marketing Jul 26 2018 5:30 pm UTC 45 mins
    With an ever-changing threat landscape, the need for skilled security experts who can address your real business risks is at an all-time high. IT organizations who do not have the budget to hire security experts, are looking for help to hunt and triage advanced attacks, weed out false-positives, and address cyber threats that truly matter to their business.

    In this upcoming webinar, get key insights from Sam McLane, CTSO, at Arctic Wolf Networks (AWN), on the importance of having a Concierge Security Engineer(CSE) on your side, who can act as your trusted advisor for your IT team.

    By attending, you will:

    - Discover the role of a CSE in AWN's SOC-as-a-service offering
    - Understand how a CSE-based service is different from other managed-SIEM/SOC services
    - Explore real life examples of how a CSE tackles security issues proactively for our customers

    About our speaker:

    Sam McLane leads CTSO at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University. Sam holds a master of science in mathematics from Temple University and a bachelor of science in mathematics from Washington and Lee University.
  • Keys to Achieving Secure Multitenancy: Isolation, Encryption & Disaster Recovery
    Keys to Achieving Secure Multitenancy: Isolation, Encryption & Disaster Recovery David Hines, TierPoint - Vice President of Architecture and Engineering Jul 26 2018 6:00 pm UTC 60 mins
    Multitenancy in cloud is nothing new. Providers and organizations have long leveraged this model to manage costs and complexity as well as enable access to the latest releases and technology. Within a multitenant environment, resources are shared with all the other users of the cloud which leads to concerns about control and confidentiality of data and workloads. In a recent study, over two thirds of IT professionals say security is their most significant concern in adopting an enterprise cloud computing strategy.

    In this live webinar, TierPoint Vice President of Architecture and Engineering, David Hines will address some key considerations for tackling security concerns in a multitenant environment including:
    • Ensuring each layer of the environment is designed with strong isolation properties
    • Leveraging encryption to create logical isolation from other tenants and data protection
    • Understanding how the environment is protected from outages or high-volume usage

    Register Today!
  • Shift Happens! Future-Proof Your Business by becoming product-centric
    Shift Happens! Future-Proof Your Business by becoming product-centric Inxeption VP of Sales David Judd, Primitive Logic Senior Director Ethan Silvers and President Kevin Moos Jul 26 2018 6:00 pm UTC 60 mins
    Join Inxeption’s David Judd and Primitive Logic’s Ethan Silvers as they discuss the important role of product digitization on B2B sales and marketing as a way to future-proof your business.

    This webinar will cover the critical shift in business to become a product-centric organization:

    Bring together all your product data to develop a product-centric strategy

    Create a process to build speed, efficiency, and flexibility into your marketing campaigns

    Attain greater scalability to easily make changes and add more products and new sale channels

    Optimize the performance of your products across all sales channels

    Learn how blockchain can allow you to quickly react to market changes by connecting your digital asset and marketing systems to your product delivery supply chain.
  • Technical Education Series: Preventing Data Loss in the Office 365 Model
    Technical Education Series: Preventing Data Loss in the Office 365 Model Daphne Zhao Jul 26 2018 6:00 pm UTC 60 mins
    In today’s cloud era, organizations must adapt to new cloud based solutions quickly in order to enable their business. Unfortunately, securing data becomes an afterthought. This technical webinar will teach you how to utilize the Symantec DLP solution to secure your data.
  • Сетевая фабрика для сценариев гиперконвергенции, конвергенции и Fibre Channel
    Сетевая фабрика для сценариев гиперконвергенции, конвергенции и Fibre Channel Сергей Гусаров, старший системный инженер Dell EMC Jul 31 2018 8:00 am UTC 60 mins
    Мы расскажем о применении коммутаторов Dell EMC S-серии для сценариев гиперконвергенции, конвергенции FCoE, а также фабрик Fibre Channel. Мы подробнее поговорим, как применяются в этих сценариях конвергентные коммутаторы S4148U-ON и новые коммутаторы S4112. Мы рассмотрим, что нового появилось в облачном сервисе Fabric Design Center и как он может помочь при проектировании и развертывании сетевых фабрик Dell EMC. Вебинар проводится при поддержке компании Intel®