Network infrastructure professionals understand that a reliable and secure infrastructure is crucial to enabling business execution. Join the network infrastructure community to interact with thousands of IT professionals. Browse hundreds of on-demand and live webinars and videos to learn about the latest trends in network computing, SDN, WAN optimization and more.
Join this webinar to understand the benefits of a unified view of your infrastructure and comprehensive security that keeps up with changing network requirements and technologies like cloud services and smart devices.
The rapid adoption of enterprise cloud-based solutions brings data integration as one of the greatest challenges. The challenge grows on increasingly numerous SaaS applications with lack of suitable connectors that fit your business needs. Join this webinar led by Primitive Logic team to see how data integration can be simplified for your cloud. This talk introduces the generic declarative zero-coding approach using Informatica Cloud Rest Connector as an example and illustrates its practical features, as well as best practices and hidden gems.
Moderator: Jill Reber, CEO, Primitive Logic
Panelists: JayJay Zheng, Technical Director & Eric Greenfeder, Chief Architect, Primitive Logic
At Berk-Tek, we put the customer at the heart of everything we do. This statement stands true in the TEK Center’s research and development labs. A network is only as strong as the cables used to connect it and the applications lab works to ensure that every Berk-Tek cable performs beyond your expectations. By employing industry-leading research, advanced testing procedures and sophisticated modeling for emerging technologies, the applications lab translates expanding network requirements into leading edge cabling solutions that perform beyond the standard.
ADCs have largely become commoditized, and the services they provide are fairly indistinguishable from the sea of competitors on the market today. With many data center architects faced with modernizing their infrastructure, what are the considerations when transitioning applications to new automation frameworks and topologies in the cloud?
This webinar will focus on key challenges faced by the enterprise when transitioning their load balancers to the cloud.
What you will learn:
•The shift to cloud native, software and service-based offerings
•Support for new application architectures
•Operational complexities and scale at production
•Flexibility and support for hybrid topologies in transition
The move to requiring encryption on all websites is picking up speed, with browsers starting to show UI warnings for unencrypted websites. Roughly 60% of internet page loads already "https", and the number of sites switching to encryption grows every month. This trend is helped by the availability of anonymous, free Domain Validated (DV) SSL certificates from several Certification Authorities (CAs), which include no identity information about the website owner.
While increased encryption is good for connection security and combating “man-in-the-middle” (MITM) attacks, many phishing and malware fraudsters are using DV certificates to imitate login pages for top sites such as PayPal.com, banking sites, etc. and steal user information. Unfortunately, these fake DV login pages receive a favorable green padlock “Secure” security indicator in the Chrome UI, causing some users to believe Chrome is vouching for the phishing website as safe or trustworthy.
Join Entrust Datacard's Chris Bailey and Kirk Hall as they discuss:
• The difference between DV, OV, and EV
• The issues with current browser UIs to do with certificate information
• A proposed new UI security indicator to help users and enhance security
In the new enterprise network reality, boundaries have blurred: the internet is central and out of your control. A modern approach to network analytics is now more important than ever. The good news is that it’s possible to get vastly better insights from network traffic data than ever before, due to the power of cloud and big data systems. The key is to link that network traffic data and show the benefit to the broader business. In this webinar guest speaker Forrester analyst Andre Kindness and Kentik Co-founder and CEO Avi Freedman will help you understand:
- The changes in enterprise networks that make modern network analytics a must-have
- Why it’s so important to combine network data with business context
- Examples of business intelligence driven by network data in IT organizations today
- How you can gain the business advantage that modern network analytics offers
Avi Networks has launched a new intelligent web application firewall (iWAF) that performs 50X faster than legacy appliances, processing hundreds of Gbps of throughput and over a million transactions per second. As a software-only solution, iWAF operates as a centrally managed fabric across data centers, private clouds, and public clouds. Register for this webinar to learn about the unique capabilities of Avi Networks’ iWAF include:
Highest-performance web application security
● Elastic, automatic scale-out across data centers and clouds
● Scalable per-application deployments allow each mission-critical app to get its own WAF
Analytics-driven, accurate security policies
● Real-time security insights eliminate false positives
● Visual policy checks prior to enforcement
Central, simplified policy management
● Central management and automation of all distributed iWAF instances
● Point-and-click policy configurations, with pre-defined templates for OWASP Core Rule Set
Solving the most sophisticated security challenges requires an advanced approach that is built upon a proxy-based architecture. This approach allows you to leverage best of breed security technologies to provide a safe and confident cloud and network experience.
Symantec secure web gateway solutions deliver strong proxy-based security in the form factor your organization needs: on-premises appliance, virtual appliance, in the cloud, or in a unified hybrid combination of these solutions.
The solution’s unique proxy architecture allows it to effectively monitor, control, and secure traffic to ensure a safe web and cloud experience.
In this webinar learn:
• Why Proxy architecture is more important than ever as a critical security component of your network
• How a web proxy can serve as a platform for advanced threat detection and data protection
• Why pre-filtering your sandbox with proxy architecture is a smart move for both your SOC and your bottom line.
Successful analytics and transactional systems start with proper architectural principles and considerations. This webinar will be a detailed walkthrough of all the software and hardware infrastructure below the database server. It will explain how each layer affects database workloads as well as give tools and metrics for determining optimal architectural configurations.
From this webinar you will learn:
• How to design SQL server infrastructures for optimal performance
• How the software and hardware infrastructure affect database performance
• Tools and metrics to determine appropriate hardware allocations. For example, how many CPU cores, data volumes, tempdb files or GBs of memory are needed for your workload.
• Tools and metrics to find current bottlenecks, inside and outside of the database server
• Tools and best practices for monitoring all layers
Presented by Matt Henderson, who has over two decades of experience in designing high-performance database platforms and over five years working with the latest all-flash storage technologies. He currently is the Director of Microsoft Technologies at Vexata where he helps customers optimize and scale their mission-critical databases.
From how to organise developers to transforming operations and prioritising workloads, running highly scalable cloud-native applications doesn’t have to be done alone. The flexibility and freedom of the Oracle Cloud can help accelerate the journey to agile development.
Watch this webinar to hear from Oracle’s EMEA Senior Director of Product Management, James Allerton-Austin, on what you need to consider in going cloud-native.
Responsible for AppDev, Containers, Blockchain, Mobile and Integration, James serves as the primary representative for Product Development in these areas for EMEA. As part of Oracle's Development team, he is responsible for driving strategy and adoption, as well as implementation and customer success.
Contracting is becoming more and more popular among professionals. In this episode Travis O’Rourke, Head of Hays Talent Solutions in Canada, discusses how you can determine if contracting is the right career path for you.
For more contracting tips and careers advice, visit our blog Viewpoint: www.haysplc.com/viewpoint
More and more enterprises are moving their applications into public and private cloud infrastructure. The cloud is becoming more appealing for enterprises as it facilitates business growth due its agility, resiliency and scalability. The advent of a variety of technologies and processes such as containers, micro-services, and DevOps has made rolling out new applications into the cloud very quick and desirable for development teams. Join Imperva and (ISC)2 for an examination of how enterprises move applications to the cloud without forgetting to put security first.
With the proliferation of cloud deployment options and platforms, management of application security across platforms has become a major problem for security teams. In this webinar, we address challenges posed by cloud proliferation, and how to approach development of a consistent security posture across platforms to better manage risks.
This Modern Security episode introduces a security based chaos testing tool and methodology. ChaoSlingr is a Security Chaos Engineering Tool focused primarily on the experimentation on AWS Infrastructure to bring system security weaknesses to the forefront.
By now, the majority of us have likely been inundated with stories about third party data breaches and how one vendor’s vulnerability can cost your organization millions. But how do you know if you’re doing enough to stop third party risk?
As we enter 2018, new U.S. and European cyber regulations are going into effect, and organizations can no longer check the box when it comes to their vendors’ cybersecurity. You are not only liable for knowing where you are most at-risk, but now you must also understand how that risk affects your organization and identify a solution for mitigating that risk.
This webinar features guest speaker Nick Hayes, Senior Analyst at Forrester and LookingGlass VP of Intelligence Operations Eric Olson. They will delve into the third party risk landscape: our current state of affairs, and where the industry is moving, as well as how you can take a different approach to third party risk prevention, including:
• How to see where your vendors are already compromised
• The importance of actionable intelligence for real-time mitigation
• Why a continuous monitoring solution is the future of third party risk
With so many users and devices on the network at any given time, universities and colleges struggle to keep up with the demand for always-on connectivity. What can you do to optimize your network infrastructure to tackle these challenges?
Join our networking experts for a webinar that will discuss how Aruba solutions:
* Provide always-on connectivity with features including RF optimization and controller hitless failover
* Secure the network and identify risk with with IoT devices pre-authentication and user and entity behavior analytics (UEBA)
* Provide deeper and predictive network insights
* Address campus wired pain points with a unified wired AND wireless solution
Michael Dickman, VP of Global PLM Campus Networking
Peter Lane, Aruba WLAN PLM
Danny Jump, Aruba ClearPass PLM
Dan Comfort, Aruba Cloud PLM
Join Jack Hamm and Simon Gibson from the Gigamon SecOps as they demonstrate how to use automation and visibility to take the boredom out of repetitive tasks. One of the featured use case will be how to automate tasks to find and block Kaspersky in government organizations.
Security practitioners use a variety of tools and information sources to spot potential threats, evaluate each event and then act to mitigate. They are challenged by little interoperability between security tools, plus the cost of these tools across the network and cloud can be prohibitive.
During this lively webinar, hosted by Security Solutions leader, Graham Melville, you will see how Gigamon and the Phantom security automation and orchestration platform can help you reduce mean time to resolution. The team will show how you can provide wider visibility and automate the tasks your security staff repeats on a frequent basis.
Simon and Jack will demonstrate:
•How to generate indicators of compromise to trigger Phantom to execute customized playbooks with specific actions.
•How to automate tasks to find and block the use of Kaspersky in government organizations.
•How to streamline dozens of sources to gain insight into security events.
•How to gain visibility to the necessary traffic from all segments of your networks without buying more security tools.
•How you can reduce the load and turn on more features on your security tools such as Next Gen Firewalls.
Enterprises are seeking ways to reduce the scope and complexity of securing their Network’s Edge. Data breaches can cost companies millions of dollars in reduced revenue, shareholder value, fines, and diminished brand loyalty.
IT managers concerned about their connected-network systems have turned to Parallel Networking to create application-specific networks to protect cardholder data while enabling customer engagement and improving operations.
Parallel Networking enables organizations with hundreds or thousands of distributed locations to enhance security and PCI Compliance at the Network’s Edge.
Join Cradlepoint for a webinar to learn about the benefits of Parallel Networking, real customer success examples, and best practices for greater security at the Elastic EdgeSM.
Join us for a fast-paced and informative 60-minute roundtable as we discuss the latest—and potentially most game-changing—technology disruptors to traditional storage architectures since flash: NVMe over fabric and Storage Class Memory.
It was just five years ago that Flash technology transformed the traditional storage market forever. Modern flash-first arrays are now the new normal for traditional storage. Will a new shared storage access protocol called NVM express over Fabric (NVMe-oF) combined with the advent of storage class memory (SCM) be equally disruptive to traditional storage over the next five years as NAND flash technology was in the past?
Vendors are now announcing new products and future architectures to enable them to support these new technologies. With the help of a lively panel of experts from HPE, Pivot3, and Mellanox, we will unpack this topic and explore how their innovative approaches to leveraging Storage Class Memory and NVMe-oF can radically improve storage products and solutions.
Howard Marks looks ahead at the storage trends rolling into IT Operations in the new year.
Today’s data center is a much more dynamic environment than ever before leaving IT organizations struggling to compete, and or integrate, with public cloud services with tools and hardware designed for the much more static datacenter of yesteryear. In this webinar long time industry observer Howard Marks will examine five of the trends that IT operators should pay attention to in the coming year.
Our discussion will focus on the promise, tools and challenges involved in moving to hybrid architectures that bridge private data centers and cloud resources to shift workloads, support data-intensive compute operations, manage unstructured data growth, build affordable archives, and prepare for disaster recovery. These technologies will consider macro-level trends as well as solving operational challenges that come with the growth of cloud.
Infrastructure architects, systems engineers, storage engineers, data strategists, HPC specialists and other enterprise IT professionals will learn:
- Current environment and challenges in building hybrid infrastructures that support traditional and object storage
- Five not-to-be-ignored trends ripe for adoption in 2018
- How compute and storage can mix in the new cloud-enabled world
How much visibility do you have via Secure Access end-points – from the Data Center, to the Cloud, to Devices and Applications hitting your network?
Join Pulse Secure for a compelling Webinar Centered on Pulse One – its’ leading edge Monitoring-Visibility Solution. Configured correctly, Pulse One also enhances compliance alliance, segmentation and pro-active management and consolidation for Secure Access at the front-edge of your network.
As more workloads are moved to cloud infrastructure, unique security challenges arise. Join Imperva and (ISC)2 for this webinar where we'll discuss some of the tradeoffs for on-prem and cloud app security, strategies for approaching security in hybrid environments, and the importance of flexible deployment models.
Part 6 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series
The final piece to the puzzle is the RECOVER function, which is arguably the most important area of the NIST CSF. How quickly can you return to business and clinical operations after a cyberattack occured?
This webinar will focus on the measures required for a timely recovery and return to normal operations to reduce the impact from a cybersecurity event, with a focus on:
• Recovery Planning: Processes and procedures are executed and maintained to ensure timely restoration of systems or assets.
• Improvements: Planning and processes are improved by incorporating lessons learned.
• Communications: Restoration activities are coordinated with internal and external parties.
To view upcoming NIST Cybersecurity Framework for Healthcare Series Part 7 https://resource.elq.symantec.com/LP=4235
Cloud adoption is a reality today, every company is moving applications and businesses in the cloud to get more flexibility, agility and to potentially reduce their costs.
Security operations need to enable this transformation and help the business to activate capabilities in the cloud infrastructure. Risks exist and cannot be ignored if companies want to provide a sustainable and secure environment for themselves and their customers.
During this webinar, we will describe the main risks associated with cloud adoption and cover how to mitigate those risks.
2017 has been another year of endless headlines featuring words like "breached," "hacked," and "cyberattack" – many of which were avoidable. Enforcing security policy across the legacy physical network is already challenging, and the addition of virtualized networks including the SDN and public cloud introduce new risks to organizations.
Join this webinar to learn how to avoid the headlines by making security policy continuously enforceable. Having served in network security roles at Wells Fargo, General Dynamics, St. Jude Medical, and the Army National Guard, Tufin's Senior Solutions Engineer, Christofer Sears, CISM, will share his insight garnered throughout 10 years of experience.
Key topics include how to:
• Develop and deploy an enforceable security policy
• Mitigate the inherent risk of DevOps’ CI/CD agility
• Contain malware outbreaks like WannaCry
• Effectively design implementation
• Create time for proactive security projects
Welcome to the Cloud Generation, where employees demand flexibility and access wherever they are, but can expose your most sensitive data to risk.
Distributed environments—like mobile and distributed workforces—introduce new attack surfaces that must be protected and increased use of SaaS Cloud Apps are driving the need for new compliance and security controls. The result? Security and IT teams are being forced to rethink network designs to better answer questions like:
- How do we effectively govern access to data, apps and systems?
- How can we combat advanced threats targeting our business through the web, cloud and e-mail?
- How should we secure information that is moving between our network, endpoints and the cloud?
Join Gerry as he discusses the key Cloud Generation security challenges facing Symantec’s enterprise customers and learn how Symantec’s Cloud-delivered security solutions can be used to protect users, devices and corporate data, wherever it resides.
Join leading independent product assessment group, Miercom and technical experts from Silver Peak as they discuss the performance expectations of today’s networks and how the right SD-WAN solution can improve application availability across the WAN using any type of transport. They will disclose how Silver Peak’s SD-WAN solution, Unity EdgeConnect fared in their aggressive stress test environment and provide a live demo on its performance capabilities.
Delivering an exceptional user experience to a retail customer is more than just having the right product on-hand. An omni-channel environment will become commonplace and retail organizations must deliver or be replaced by competitors who will. Having the right network to support growth and expansion, while keeping costs under check, is critical.
In the second session of our Retail Revolution webinar series, VeloCloud will dive deeper with a take on how Cloud-Delivered SD-WAN can help retailers ensure security at each touch point with segmentation and PCI compliance, enhancing the customer engagement anytime, anywhere, and using real-world examples of how customers have used SD-WAN to improve their retail organizations.
Key takeaways include:
- Best practices on delivering an exceptional retail customer experience with Cloud-Delivered SD-WAN.
- Guidance on how to stay secure with a range of features from VeloCloud, along with PCI
- Optimizing your retail environment to ensure bottlenecks are removed and performance is optimized
- Simplifying the PCI audit process with the VeloCloud PCI Certified Solution
Are you concerned about the advancement of AI and cloud technology and how they will impact your business communications? Or perhaps you’re looking for ways to get your business communications AI ready? If you answered yes to either of these, then save your spot at this webinar now.
The hype surrounding AI and its imminent take-over of the business world is creating a sense of panic. But whereas AI, just like cloud technology, is sure to become a driving force as we look to the future of business communications, there is no need to jump in at the deep end and throw all your resources at it just yet.
Join us for this webinar in which we’ll explain the current state of play for AI (spoiler alert: humans are not going anywhere for a while) and cloud technology and impart some useful ways you can prepare your business communications.
Chris Peterson, SVP of Operations at RingCentral, will talk you through:
- Key trends in cloud communications
- The importance of cloud communications
- Team collaboration
- Open platforms
- AI hype vs. reality
- How your business can create value with AI
This presentation details how to leverage technologies such as Hadoop, MapReduce, Pig and Sqoop to massively scale cloud integrations to services such as Salesforce.com. Attendees will learn how to overcome API limitations, throughput latency and infrastructure scaling challenges to significantly increase integration performance.
Most businesses are rapidly moving to the cloud to be fast and nimble, reduce their cost structure, and reach more customers anywhere, anytime. These new architectures have powerful new capabilities—but also expose businesses to a new universe of risk.
When dealing with outsourced infrastructure like AWS, or a SaaS solution like Office365, it is easy for IT managers to assume that security is out of their hands, for better or worse. But, this assumption may not always be true. Businesses must develop an active cloud security strategy as they pursue their migrations, and become a proactive security partner with their cloud providers—or they will find themselves vulnerable to attack.
In this upcoming webinar, hear from security experts at Arctic Wolf Network (AWN), on:
- The top cybersecurity risks and best practices for securing cloud deployments
- How AWN security monitoring compliments the native security features in AWS and Office365
- The role of AWN cloud security in integrating observations from cloud and on-premise systems
To see how AWN CyberSOC™ can secure your cloud, register now.
About our speakers:
Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with in-depthexpertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.
Louis Evans is a new member of the Arctic Wolf team. He’s passionate about cybersecurity, defeating the next generation of threats, and Alan Turing.
A rapid rate of change complicates every facet of datacenter management, and server-centric compute models are too cumbersome for today’s highly variable workloads. Is it possible to optimize resources and operations in such dynamic environments? In this presentation, learn how to replace manual, hardware-defined application provisioning and management with a highly automated, software-defined resource model and orchestration layer that enables flexibility, simplified on-demand capital efficiency, and lower TCO. Find out how to compose more agile pools of datacenter resources, and simultaneously drive up IT efficiency, optimize energy requirements, increase datacenter resilience, and strengthen disaster recovery plans.
The cloud is upon us and with accelerating adoption, it’s impacting the way the world does business. As the cloud has changed the world, products are evolving to meet the challenges. Security solutions like Next Generation Firewalls, Web Application Firewalls and Secure Email Gateways must evolve for this new frontier.
Join Klaus Gheri, VP Network Security, to discuss how to ensure your organisation can prepare for the cloud generation. During this webinar, he will discuss:
1. Knowing your security responsibility when it comes to public cloud
2. How cloud service utilization can cause pressure on your current network architecture and how to alleviate it
3. How cloud native does not come naturally with many of today’s security products and how to adapt to this new generation
FireEye Security Orchestrator helps you improve response times, reduce risk exposure, and maintain process consistency across your security program. It unifies disparate technologies and incident handling processes into a single console that codifies experiences from the frontlines to deliver real-time guided responses.
In this technical session we hear from an orchestration expert on best practices to simplify and automate security tools and processes. We will look at real-life examples of providing teams with greater control of incident response process for improved efficiency, thus saving time & resources and increasing efficiency and performance. We will also look at orchestration services with incident response playbooks, plug-in development, automation and workflow deployment.
The promise of achieving Service Level Agreements (SLAs) while also lowering Monthly License Charges (MLC) has quickly captured the attention of global business and IT leaders across multiple industries.
The dilemma: IT must provide the best possible service to the business, while the business must prioritize cost containment strategies. It's a paradoxical situation.
Now is the time to move from hype to reality.
This webcast features a panel of CA and user subject experts that will examine real use-cases. The payoff? How automated, dynamic capacity intelligence helps remove the guesswork from MLC pricing – helping to better predict capacity spikes across the IT landscape - leading to significant savings.
Against the ever-changing and complex hybrid IT landscape, 451 Research surveyed more than 450 colocation customers globally – to understand the changing facets driving colocation demand and how colocation providers can be positioned for success today, and in the future. This research shows that the role of the colocation provider has never been more important – but the threats and challenges will intensify, and the opportunities will be uneven. Led by 451 Research’s Rhonda Ascierto, Research Director – Data Centers, and hosted by Greg Jones, VP Strategy – Cloud & Service Provider segment, Schneider Electric, this webinar will reveal the findings of this research along with actionable guidance colocation providers can use to plan for the future.
For virtually any enterprise, the number of sites, devices, vehicles, and people needing network access is rapidly growing. Digital transformation is affecting everyone from small, family-run businesses to large multi-national corporations. Thus, it is more important than ever to ensure your networks are secure, flexible, and dynamic enough to respond to ever-changing business needs and constantly emerging threats.
Join the Cradlepoint team for a live webinar on Oct. 25, 2017, about cloud security issues and trends that apply to modern businesses.
Topics will include:
— IoT security (including the implications of Mirai malware)
— Proprietary vs. standard management protocols
— Remote office and Point-of-Sale security
— Tips on how best to manage a dynamic, flexible network.
Gain valuable insight from our expert speakers.
Webinar topics include:
Cross Company Platform Adoption
-How IT Managers can make every department happy
-How to deal and adapt when everything changes
Multi- Communication Solutions
Communication is Key
-What to consider when looking at a new communication plan
Simon Dudley, Director of Product Strategy, Logitech
Simon Dudley is Director of Product Strategy for Logitech’s Video Collaboration business. Dudley joined Logitech in August 2016. Prior to that, he operated Excession Events, where he consulted organizations on optimizing their use of video collaboration. Dudley also spent a number of years working in sales, marketing, and product management at companies like LifeSize and Polycom, which has given him a holistic view of the video conferencing market.
Dudley is an expert in the design, implementation and use of visual collaboration tools. He is a sought-after speaker in the collaboration industry, a published author, and the recipient of two patents. A native of the United Kingdom, Dudley currently resides in Austin, Texas.
Zane Carroll, Product Development Manager, Staples Business Advantage
Zane Carroll leads the Product Development Office at Staples Technology Solutions. He is collegiately trained as an Audio engineer with a passion for all things technology and quality sound. Throughout his time at Staples, he has supported our Computing & Printing hardware, managed services, and supported the launch of many new product categories, including the tablet, mobility, and most recently Device as a Service offerings here at Staples.
Rapid adoption of cloud apps and services is driving the need for Cloud Access Security Brokers (CASB)
It is time for CASB systems to weave into your overall security infrastructure. There are many intersections to consider, such as DLP, Advanced Malware Protection, Web Security and Endpoint where organizations are navigating how to best integrate cloud security solutions into their environment to improve security and reduce operational overhead.
This talk will explore this next frontier of CASB solutions.
Cloud computing is redefining the way organisations across EMEA do business. In addition to Cloud, many are also looking to Software-as-a-Service solutions, such as Office 365, to level the playing field with their better-funded counterparts and access computing resources that were previously beyond their financial means.
However, given the substantial increase in Ransomware attacks and high-profile data breaches, concerns over IT security, data protection and business continuity remain significant barriers to Cloud adoption.
During this live webinar, attendees will learn:
- Why it’s YOUR responsibility to backup & secure YOUR data in the Public Cloud!
- How to uncover hidden cyber threats that are already lurking within your Office 365 environment
- Why you need a layered data protection, archiving & security strategy
- How to fully protect, archive and secure your data
- How Barracuda has helped thousands of organizations on their journey to the Cloud
Presenter: Phil Maynard, Sr. Director, Technical Sales EMEA at Barracuda who has over 30 years of experience in Data Storage, Data Protection, BC/DR, Virtualization, Cloud and IT Security.
2017 est d’ores et déjà une des années les plus prolifiques en ce qui concerne l’activité des groupes APT. On a en effet depuis le début de l’année plusieurs exemples d’attaques majeures, d’extorsions ou de tentatives d’influences relayées dans la presse.
Prenons une pause et regardons plus attentivement les TTPs de ces groupes, les techniques Outils et procédures qu’ils utilisent.
Pendant 45mn nous regarderons dans le détails leurs motivations, leurs approches et nous en définirons les moyens possibles à mettre en place pour limiter voire éviter leur attaques.
Nous couvrirons plusieurs domaines incluant les groupes sponsorisés par des états avec des volontés de prises d’avantages économiques voir de destructions de l’adversaire comme APT32 ou 33. Nous étudierons aussi les groupe jouant d’influence géopolitique et de fake news comme APT28 ou 29 et nous finirons sur le cyber espionnage (APT10) et les cybers criminels spécialisés dans l’extorsions de fond.
In a cloud-first world, providing a seamless application experience for users can be challenging for IT. Is there a problem with the network or is it the server? Is there an issue with the cloud provider, or is it an issue on the other side? If these scenarios sound familiar, then this webinar is for you!
What you will learn:
•Key requirements for application delivery networking in a cloud-first world
•Common enterprise application delivery use cases and challenges
•How Citrix is evolving NetScaler to meet the app delivery needs of the cloud-enabled enterprise
Next Generation applications like IoT, MBB, AR, VR, V2X, etc. generates wide variety of traffic and with different QoS needs. Today's network is not designed to handled the ever growing varied traffic which chokes the network. Since each of these traffic may have a different QoS needs, one size fit all solution will not work in long run.
Network slicing is one of the key capabilities than enables flexibility which allows service providers to deploy multiple logical netwok on shared physical infrastructure. It also extensively uses the concept of Network function virtualization (NFV) and Software Defined Network (SDN) to bundle the virtualized network functions into tailored made logical network to handle varied requirement like low latency network, high bandwidth network, reliability, etc. This optimization helps to monetize the investment better and also opens up new revenue streams.
This session talks about
- What is network Slicing?
- How it is related to 5g?
- What will it do?
- Who is driving it?
- TCS Experimentation
In an age where malicious ransomworms shut down hospitals, sneaky nation-state malware disrupts international shipping companies, and banks lose tens of millions to network breaches, to protect themselves, organizations MUST stay current on the adversary’s latest attack techniques, tools, and trends.
With in-depth threat analysis from the Firebox Feed – a network of more than 33,500 UTM appliances across the world – the Threat Lab team delivers insight into the big security stories making headlines, and the key solutions for defense. Join the Threat Lab’s Corey Nachreiner and Marc Laliberte on October 26 as they share their latest findings and the tips you need to defend your network.
Whether using an on-premises or cloud based UC solution, reliable and SLA driven connectivity is critical to ensure that your enterprise business productivity and presence is not impacted.
Join Versa Networks and S-NET Communications as we provide insights into how a software-defined WAN (SD-WAN) delivers the improved and reliable secure connectivity for your enterprise voice and video services. S-NET Communications is an industry expert in cloud communications solutions, removing complexity from IT and enabling enterprises and SMBs to collaborate and connect from any location and any device.
Learn from their experience in integrating SD-WAN into their portfolio to deliver more secure and reliable services so their customers can attain faster data transfers and a more positive user experience for their business voice services.
When considering a transition to SD-WAN, there are several important capabilities needed to suit an enterprise-grade network infrastructure. This webinar will cover critical SD-WAN features and how they translate to common deployment scenarios in different industries.
These features include:
- Overlay capability over MPLS, Broadband and LTE
- Unified and centralized management of the infrastructure
- Network segmentation with per-segment topologies
- Predictable Application SLA with centralized policies and real-time traffic steering
- Mature routing capabilities with BGP, OSPF, VRRP, and IGMP
- Robust zero-trust WAN security