Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • RSA 2017 — Security and Availability RSA 2017 — Security and Availability Bryan Embrey, Senior Product Marketing Manager, Cradlepoint Recorded: Mar 23 2017 1 min
    At RSA 2017, Cradlepoint Senior Product Marketing Manager Bryan Embrey discusses security and five-nines availability that is cloud-monitored and cloud-managed through a single pane of glass.
  • RSA 2017 — SDN for IoT RSA 2017 — SDN for IoT Todd Kelly, SVP for Emerging Technologies, Cradlepoint Recorded: Mar 23 2017 2 mins
    At RSA 2017, Cradlepoint SVP for Emerging Technologies Todd Kelly discusses the influx of the Internet of Things, and how a Software-Defined Perimeter approach can foster single-pane-of-glass management of networks, applications, and workloads.
  • RSA 2017 — All-in-One Solutions in Branches & Vehicles RSA 2017 — All-in-One Solutions in Branches & Vehicles Kevin Johnson, Solution Architect, Cradlepoint Recorded: Mar 23 2017 2 mins
    At RSA 2017, Cradlepoint Solution Architect Kevin Johnson talks about all-in-one network connectivity and security through Cradlepoint routers — both at the branch and in vehicles.
  • Overcoming eTail Challenges to Deliver Exceptional Customer Experiences Overcoming eTail Challenges to Deliver Exceptional Customer Experiences Michael Milligan, Sr. Director Product & Solution Marketing and Charlie Kraus, Sr. Product Marketing Manager Recorded: Mar 23 2017 55 mins
    Online retailing is no longer as simple as duplicating the in-store experience. It is about so much more. Online retailers are expected to deliver fast, personalized shopping experiences featuring rich media and video, to customers on any device, wherever and whenever they choose.

    These realities have introduced a host of challenges for retailers, but they also offer significant opportunities to improve customer conversion and retention.

    What does this mean for retailers trying to deliver exceptional online experiences that maximize revenue and build customer loyalty?

    Join us as we review the technical challenges that impact your ability to deliver exceptional e-tail customer experiences, and strategies for overcoming them.

    Some of the topics that will be covered, include:
    · What customers expect from their online shopping experience;
    · What it takes to deliver a compelling omnichannel experience to reach customers;
    · How to support traffic spikes and seasonal demand;
    · Why website performance is key to improving conversion rates;
    · How best to safeguard your website against malicious attacks.
  • How Tableau pairs Jamf with Code42 to provide a better device choice experience How Tableau pairs Jamf with Code42 to provide a better device choice experience Matt Peterson, Tableau - Aimee Simpson, Code42 - Tad Johnson, Jamf Recorded: Mar 23 2017 37 mins
    Today, end users and IT alike understand the role technology plays in powering productivity. Employee success hinges on having the right tools and technology to work smarter and faster. As a result, businesses have found themselves with a mixture of device types and operating systems in their organization. So how can you adapt to efficiently support and enable employees through device choice?

    In this webinar, we’ll explore how Tableau Software succeeds in a cloud-first, mixed device environment that allows employees to choose their preferred operating system.

    Watch this 30-minute webinar to learn:

    *The benefits and challenges associated with Tableau’s mixed device environment
    *How Tableau performs data migrations for users who are switching platforms
    *Recommendations and considerations for offering Macs to your users


    Speakers:

    Matt Peterson,Technical Support Specialist,Tableau
    Aimee Simpson, Product Marketing Manager, Code42
    Tad Johnson, Solutions Architect, Jamf
  • Beyond the WAN: Networking the Enterprise Data Center to the Cloud Beyond the WAN: Networking the Enterprise Data Center to the Cloud Jim Davis, 451 Research; Josh Snowhorn, CyrusOne; Ramsey El-Fakir, Fi-Tek Recorded: Mar 23 2017 48 mins
    Enterprises are using a variety of cloud and SaaS services to remain competitive, but can lose out when their network architecture either becomes a deployment bottleneck or impedes application performance. Network interconnection has often taken a back seat to other issues in application design and deployment, but enterprises should not continue to ignore this critical component of infrastructure.

    In this webinar, we examine how today’s interconnection services can break what used to be the tight links between distance, capacity and cost. Indeed, a rethink of networking strategies in the datacenter can help unlock more agility and efficiency in digital enterprise transformation efforts.

    This session will look at issues affecting enterprise use of datacenter networking services, including:

    -Changing cloud consumption patterns by enterprises, employees, partners and customers
    -The different types of interconnection offered by multi-tenant datacenters, including datacenter interconnect, and cloud exchange
    -Real world experiences of enterprises who have leveraged interconnection to solve application performance and availability issues
    -How datacenter interconnect services can be used for disaster recovery, enhanced application performance, and access to partner and vendor ecosystems
  • Proving the Business Value of Network Transformation Proving the Business Value of Network Transformation DCD, Juniper Recorded: Mar 23 2017 1 min
    A short video from DCD, that covers the key findings from an IDC paper, whereby 9 companies were interviewed to provide their insight and analysis on how Juniper Networks have helped them.
  • Top Reasons Why Your Antivirus Isn’t Working Anymore Top Reasons Why Your Antivirus Isn’t Working Anymore Ed Metcalf, Director of Product Marketing and Brian Robison, Senior Director of Field Technical Marketing at Cylance Recorded: Mar 23 2017 68 mins
    Are you weary from fighting malware, ransomware, and other threats that your ineffective and tired antivirus software can’t stop?

    If so, join us for our webinar, “Top Reasons Why Your Antivirus Isn’t Working Anymore” to hear why it’s time to rise up and overthrow traditional, reactive antivirus solutions in favor of proactive endpoint protection powered by artificial intelligence (AI).

    During this webinar, you will see a live demo of AI in action with CylancePROTECT®, and cover the key reasons why your current antivirus solution probably isn’t working anymore:

    - It’s Reactive: Legacy, signature-based antivirus products cannot prevent malware from executing. Cylance AI technology protects before the machine is infected.
    - It’s Ineffective: Legacy security tools perform at a 70 – 90% success rate. Cylance routinely performs with near perfect efficacy, at 99%+.
    - It’s Burdensome: On average, traditional endpoint security products use 50% to over 70% of CPU cycles during intensive scans. CylancePROTECT is outstandingly lightweight at just 1% – 3% CPU utilization.
    - It’s Costly: Signature-based antivirus solutions impact the bottom line with more layers of unproductive technology. Cylance protects with a single agent and a single cloud-based management tool, and that translates into big cost savings.
  • Zero-Day Attacks and What To Do About It? Zero-Day Attacks and What To Do About It? Chris Candaffio, System Engineer, Symantec Recorded: Mar 23 2017 32 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 3 of 5: Zero-Day Attacks and What To Do About It?

    All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains unpatched, the greater the risk of a breach, potential loss of information, and damage to reputation.

    Join us to learn what can be done to block exploit attacks on day zero:

    • What behaviors and techniques are used to block attacks
    • Why exploit prevention plays a critical part in endpoint protection
    • How Memory Exploit Mitigation works

    Then see Memory Exploit Mitigation in action with a demo Symantec Endpoint Protection.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223
  • Storage Refresh? 3 Capabilities Primary Storage Must Have (but probably doesn't) Storage Refresh? 3 Capabilities Primary Storage Must Have (but probably doesn't) Charlie Hodges, Storage Switzerland Recorded: Mar 23 2017 59 mins
    If your organization is embarking on a refresh of your primary storage system this year, this is the one webinar that you will want to attend. IT evaluators that haven't looked at storage in a few years, will be impressed the use of flash to improve performance, while many claim to integrate file (NFS, SMB) and block (iSCSI, Fibre) protocols. These features though are now table stakes for the modern storage solution.

    While all of these features are important (and not created equal), IT professionals should demand capabilities that solve today's organizational challenges like eliminating shadow IT, improving multi-site productivity and long term data retention as well as meeting increasingly strict compliance standards. IT professionals should look for not only high performance and universal protocol support but also enterprise file sync and share, inter-data center sync and secure archive with compliance.
  • Using Elastic as your Analytics Foundation Using Elastic as your Analytics Foundation CA Technologies: Bryan Whitmarsh Sr. Principal Product Manager; Himanshu Pande, Senior Director of Product Management Recorded: Mar 23 2017 59 mins
    The collection of performance, usage, and error/crash data is a critical first step in building an application or infrastructure based analytics engine. Once collected, the normalization of this data into a proficient repository, that makes the data available to be analyzed, becomes the foundation of your Analytics initiatives.
    In this interactive webcast, experts from CA Technologies will facilitate some key topics related to using the ELK stack as a basis for their Analytics engine, sharing their lessons learned and best practices. The ELK stack is a set of products (Elasticsearch, Logstash, and Kibana) provided by Elastic used to log, store, and visualize both structured and unstructured data. We’ll answer these questions, and more in this webcast:
    •Why leverage the ELK Stack as part of your analytics strategy?
    •Lessons learned in running Elasticsearch at scale (Master Nodes + Client Nodes + Hot Nodes + Warm Nodes)
    •How to best support multi-tenant SaaS solutions with ELK
    •Elasticsearch is just one component of a Lambda Architecture, what else can/should be used?
    •How you can leverage CA’s new Agile Ops analytics platform to predict performance anomalies, end alert storms and false positives and leverage machine learning for faster root cause analysis.
  • Performance Management - Webinar 4: Teil von Continuous Testing Performance Management - Webinar 4: Teil von Continuous Testing Amir Khan, Presales Consultant, HPE Software Recorded: Mar 23 2017 41 mins
    Systemleistung und Zeitverhalten spielen in den meisten IT-Anwendungen eine bedeutende Rolle. Sie beeinflussen nachhaltig den Erfolg eines Unternehmens. Im internen Geschäftsbetrieb können lange Wartezeiten ein Unternehmen erhebliche Summen kosten. Noch schwerwiegender ist jedoch mangelnde Performance in der Kundenbeziehung, da Nutzer eine nicht performante Anwendung schneller verlassen oder gar deinstallieren. Das Ergebnis: unzufriedene Kunden und potenzielles Geschäft bleibt aus. Gute Performance ist also nicht optional, sondern geschäftskritisch und lohnenswert.

    Erfahren Sie in unserer kostenfreien Webinarreihe, wie moderne Last- und Performance Testing-Lösungen Sie dabei unterstützen, leistungsstarke Anwendungen, unabhängig von der Umgebung, kontinuierlich bereitzustellen und zugleich eine Transparenz über die Performance im gesamten Anwendungslebenszyklus zu erhalten. Egal ob es sich um eine mobile App, eine Website oder eine komplexe Multi-Tier SAP Umgebung handelt.

    Webinar 4: Performance Management - wesentlicher Bestandteil von Continuous Testing:
    Continuous Integration/Testing ist eine etablierte Technik in agilen Software-Projekten, um kontinuierlich die Änderungen seitens Funktionalität, Performance als auch Stabilität zusammenzuführen. Dabei muss die Performance einer agil entwickelten Anwendung bei jeglicher Änderung im Code der Last im Betrieb Stand halten. Erfahren Sie, wie Sie diese Herausforderungen durch das Zusammenspiel innovativer Performance Management-Lösungen erfolgreich meistern können.
  • ExtraHop + ServiceNow = Seamless IT Service Management ExtraHop + ServiceNow = Seamless IT Service Management ExtraHop Networks Recorded: Mar 23 2017 3 mins
    See how ExtraHop and ServiceNow combine for deeper insight, greater security, and automated remediation!
  • Quantifying DevOps Outcomes - Increasing Speed Quantifying DevOps Outcomes - Increasing Speed George Miranda, Technical Strategy Recorded: Mar 22 2017 31 mins
    This webinar is part three of a four part series that focuses on the steps you should take to bring about digital transformation in your organization. In this webinar, we talk about how to increase the rate at which you can deploy new software.

    High-performing organizations that have undergone digital transformation are agile. They respond to market pressures by shipping new features quickly, safely, and reliably. A key requirement of that agility is that these companies can experiment with small-batch incremental changes. But how do you accomplish that and know your efforts are succeeding?

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey.

    Join us to:
    - Explore why continuous delivery is about more than just having build pipelines
    - Learn which industry metrics demonstrate that you’re shipping faster successfully
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you
  • Top 10 Barriers for DevOps – and How to Avoid them for your 2017 rollout Top 10 Barriers for DevOps – and How to Avoid them for your 2017 rollout Shashi Kiran, Chief Marketing Officer at Quali. Recorded: Mar 22 2017 58 mins
    What are the top 10 barriers to DevOps adoption and best practices to overcome these barriers.
    Quali conducted a survey of 2045 professionals to gauge the state of DevOps and Cloud adoption, pain points and best practices. The survey concluded on Dec 31st 2016. This presentation will share the key insights from the survey, top 10 barriers to DevOps adoption as well as best practices that can help overcome these barriers. This will be an informative session for DevOps and Cloud architects, application owners, technologists as well as IT infrastructure professionals that are responsible for planning and deployment of DevOps tools and processes.
    Quali builds software to create cloud sandboxes – these are on-demand, self-service environments that can automate and orchestrate Cloud and DevOps deployments.
  • How to Identify a Mirai-Style Attack: Watch the Demo or Get the Recording How to Identify a Mirai-Style Attack: Watch the Demo or Get the Recording Andy Shoemaker, Founder and DDoS Expert, NimbusDDoS and Nabeel Hasan Saeed, Product Marketing Manager, Imperva Incapsula Recorded: Mar 22 2017 49 mins
    The DDoS testing expert from NimbusDDOS joins us again to share their analysis of the Mirai botnet source code. Join their founder, Andy Shoemaker, for a live webinar where you will learn the capabilities of the Mirai botnet based on forensic analysis of the source code.

    In this webinar you will learn:
    - Mirai botnet propagation methods
    - Methods for detecting infected devices
    - Attack capabilities and vectors of Mirai
    - How to protect your organization from a Mirai-style attack
  • Detect and Block Apache Struts Bug Across Your Enterprise Detect and Block Apache Struts Bug Across Your Enterprise Vikas Phonsa Director Product Management Web App Firewall and Frank Catucci Director Product Management Web App Scanning Recorded: Mar 22 2017 57 mins
    A critical vulnerability has been found in Apache Struts 2, and it is being actively attacked in the wild, as hackers jump at the chance to hit high-profile targets by exploiting this critical bug.

    Apache has issued an emergency security alert, classifying this as a high-risk vulnerability. If left unaddressed, organizations are at risk of remote code execution attacks, which could lead to complete system compromise.

    During this webcast, Qualys Product Management Directors Vikas Phonsa (Web Application Firewall) and Frank Catucci (Web Application Scanning) will show you how Qualys' complete, end-to-end security solutions can detect and patch the vulnerability so that you can keep your business-critical information safe from attackers.

    With Qualys Vulnerability Management, Web Application Scanning, and Web Application Firewall, you can find Struts in your environment quickly, comprehensively, and at scale, as well as shield your organization from Struts attacks while you identify and patch vulnerable systems.

    This webcast will include a live demo and Q&A session.
  • OPNFV Overview: Navigating Its Many Projects OPNFV Overview: Navigating Its Many Projects Amar Kapadia, NFV Specialist, John Jainschigg, Technical Solutions Marketing at Mirantis Recorded: Mar 22 2017 59 mins
    NFV continues to gain prominence in both the telecom industry and enterprises. OPNFV is an open source systems integration project to create and test open source to help create a complete NFV stack as defined by the ETSI reference architecture. However, the unique nature of the project makes it difficult to understand than "traditional" open source software development projects. In this webinar, we will look at the OPNFV project as a whole and through a high-level review of its roughly 60 projects. Suitable for both practitioners and decision makers, you will learn:
    * An overview of the OPNFV project
    * An introduction to create-integrate-test categories
    * Upstream and OPNFV projects that belong to the above categories
    Join us on March 22 as Amar Kapadia and Nick Chase help you navigate through the various OPNFV projects.
  • 20/20 vision into your cloud security: CISO interview and case study 20/20 vision into your cloud security: CISO interview and case study Maurice Stebila, CISO, IT Security, HARMAN International & Ralf Buchroth, RWE Supply and Trading Recorded: Mar 22 2017 55 mins
    With the growing adoption of private and public cloud platforms, many security teams feel that they are losing visibility and control. From the very basics of identifying which cloud services are being used, to the monitoring of security policies and potential violations, new solutions and procedures are required to regain control.

    Join us for this discussion of cloud security challenges and how they can be addressed. The webinar will feature an expert interview with Maurice Stebila, CISO at HARMAN International, who will share his insights and experience around security challenges in the cloud, much like he did recently at RSA conference in San Francisco.

    In the second half of the webinar, you will learn how one of Tufin’s customers, Ralf Buchroth, IT Infrastructure and Provider Management at RWE Supply and Trading, has deployed Tufin to address challenges of visibility and control in the cloud and across a hybrid network environment.
  • 3 Proven Workflows for A Successful Windows 10 Migration 3 Proven Workflows for A Successful Windows 10 Migration Aimee Simpson, Product Marketing Manager, Code42 Recorded: Mar 22 2017 28 mins
    Watch this webinar to explore three distinct migration approaches taken by real businesses. We'll help you identify the best approach for your business, users and timeline. During the session we will cover:

    *The facts on enterprise adoption of Windows 10
    *Planning considerations for your Windows 10 migration project
    *Three distinct approaches to performing device replacements—and the pros and cons associated with each

    About the speaker:

    Aimee Simpson, Product Marketing Manager – Code42
    Aimee is a product marketing manager at Code42 where she helps internal audiences understand what’s happening in the category and influences product decisions through customer and market research. She has always worked in the technology industry, launching her career at data storage company Compellent Technologies at the age of 19. In her free time, she enjoys traveling with her Aussie husband in an attempt to balance her TV addiction.
  • Giga IoT: What You Need to Know About Low Power Wide Area Network Solutions Giga IoT: What You Need to Know About Low Power Wide Area Network Solutions Sanjay Khatri, Head of Platform Product Marketing at Cisco Jasper Recorded: Mar 22 2017 33 mins
    The age of Giga IoT has arrived. Characterized by millions and even billions of connected devices, small data volumes, low-cost devices and stringent requirements on energy consumption, Giga IoT turns the conversation from usage and cost to value and scale.

    LPWAN technology, like NB-IoT (Narrowband IoT) enables this shift, but today’s businesses need more than technology. This webinar looks at business solutions needed to transform technology into operational reality to deliver bottom-line growth.

    Join Sanjay Khatri, Head of Platform Product Marketing at Cisco Jasper, to discuss giga IoT business drivers and benefits including:
    - Massive scalability of connected devices
    - Simplified operations via cloud-based IoT platforms
    - New business models for monetizing IoT services

    Register for the webinar: Wednesday, March 22 at 4pm GMT | 11am EST | 8am PST
  • Migrating Existing Applications with Containers Migrating Existing Applications with Containers Scott McCarty Recorded: Mar 21 2017 26 mins
    Many organizations have dabbled with Linux® containers. After a small, successful project, an epiphany happens and you ask: What else can we containerize? Can we put everything in containers? How do we get traditional applications into containers? Learn about technical and architectural considerations when moving existing applications to containers. From systemd, to storage to backups, to debugging applications in production, there are a lot of things to think about when migrating existing applications to containers and running them in production.

    Join this session to:
    Gain operational confidence if you’re on the fence about, or just dabbling in, containers.
    Have a shared experience with a bigger community this is running containers with actual workloads in their organizations.
    Learn how to optimally containerize new applications and migrate existing ones.
    Start collecting and discussing best practices to widen container adoption.
  • March 2017 Product Enhancements March 2017 Product Enhancements Cradlepoint Product Management Team Recorded: Mar 21 2017 32 mins
    In March 2017 Cradlepoint is enhancing its SD-WAN and Extensibility Platform with the release of Firmware 6.3, which extends and enhances our SD-WAN offering for People (remote and mobile workers), Places (branch offices, vehicles, pop-up venues, etc.) and Things (M2M and IoT).

    Cradlepoint will also be launching new enhancements to Enterprise Cloud Manager (ECM), part of the NetCloud Platform, with Client Analytics. New LAN Client Analytics enhance network visibility and provide insights to what is connected to your network and how your network is being used.

    The new features in Firmware 6.3:
    — Smart WAN Selection (SWANS): Smart, automated failover when primary connection degrades
    — Automatic Quality of Service (Auto-QoS): Optimizes real-time (voice and video) application experience when network traffic congestion occurs
    — IKEv2 Support: Enhanced authentication with X.509 certificates, improved encryption policies and security, and mobility support
    — Enhanced Supportability Features: Better IPsec status and logging, Firewall Hit Counter, Support Page

    Enhancements to the Extensibility Platform offering with SDK-Extensible UI:
    — Build in configuration or status for your SDK application
    — Leverage existing web server functionality of the router
    — Customize landing pages

    Enhancements to Enterprise Cloud Manager (ECM) with Client Analytics:
    — Client Analytics: Visibility and management of usage by individual network client

    Join the Product Management Team for a live webinar to learn more about the new enhancements to Cradlepoint’s networking solutions for today’s agile enterprise.
  • Performance Management - Webinar 3: Testen von mobilen Applikationen Performance Management - Webinar 3: Testen von mobilen Applikationen Andreas Widmann, Technical Consultant, HPE Software Recorded: Mar 21 2017 45 mins
    Systemleistung und Zeitverhalten spielen in den meisten IT-Anwendungen eine bedeutende Rolle. Sie beeinflussen nachhaltig den Erfolg eines Unternehmens. Im internen Geschäftsbetrieb können lange Wartezeiten ein Unternehmen erhebliche Summen kosten. Noch schwerwiegender ist jedoch mangelnde Performance in der Kundenbeziehung, da Nutzer eine nicht performante Anwendung schneller verlassen oder gar deinstallieren. Das Ergebnis: unzufriedene Kunden und potenzielles Geschäft bleibt aus. Gute Performance ist also nicht optional, sondern geschäftskritisch und lohnenswert.

    Erfahren Sie in unserer kostenfreien Webinarreihe, wie moderne Last- und Performance Testing-Lösungen Sie dabei unterstützen, leistungsstarke Anwendungen, unabhängig von der Umgebung, kontinuierlich bereitzustellen und zugleich eine Transparenz über die Performance im gesamten Anwendungslebenszyklus zu erhalten. Egal ob es sich um eine mobile App, eine Website oder eine komplexe Multi-Tier SAP Umgebung handelt.

    Webinar 3: Performance Management & Testen von mobilen Applikationen:
    Mobile Applikationen sind in unserer digitalen Welt nicht mehr wegzudenken. Qualität und Performance einer App werden durch soziale Netzwerke für jeden transparent. Erfahren Sie in diesem Webinar, wie sie mobile Apps performant hochwertig entwickeln, testen und diese stetig überwachen können - mit dem Ziel, eine durchgängig positive User Experience zu erzeugen.
  • Celent & INETCO: Is Real Time Data Necessary in Retail Banking? Celent & INETCO: Is Real Time Data Necessary in Retail Banking? Daniel Latimore, Senior Vice President - CELENT and Stacy Gorkoff - INETCO Mar 28 2017 5:00 pm UTC 75 mins
    Real time is rapidly becoming more important to retail banks. Payments, customer responsiveness, and fraud detection must all become faster. Powering them all is data in its many facets.

    Join banking analyst firm Celent, and real time transaction monitoring and analytics company INETCO, as they explore real time’s current progress, its implications for financial institutions, and how banks should respond.
  • Using Ansible Container to build your Images Using Ansible Container to build your Images Greg Dekoenigsberg Mar 28 2017 7:00 pm UTC 30 mins
    If you have invested time in building Ansible infrastructure and knowledge, it makes sense to get as much out of that investment as possible. That's why we created the Ansible Container project—to help you move from the world of Ansible to the world of OpenShift.

    Join this session to learn:
    1. The conceptual similarities between Ansible roles and microservices.
    2. The proper construction of an Ansible role to be deployable to VMs or containers.
    3. The usage of Ansible Container to turn Ansible roles into container images.
    4. How to integrate Ansible Container and OpenShift seamlessly.
  • How to Integrate Cloud Security into SD-WAN How to Integrate Cloud Security into SD-WAN Ray Wong, Sr. Solutions Engineer, EMEA Mar 29 2017 8:00 am UTC 30 mins
    In recent times speed has become the currency of business, and security threats have multiplied and soared in sophistication—often rendering traditional security deployments insufficient or ineffective. Cloud-delivered security provides a great opportunity for enterprises to strengthen security posture, to quickly deploy the latest defense mechanisms, while at the same time reducing latency and costs.

    Join this webinar to learn how to transition to cloud security in a complex distributed enterprise environment, address the challenges and preserve application performance.

    Topics covered include:
    - Challenges faced when introducing cloud security into a legacy network
    - Key considerations to ensure a successful migration
    - A guide to how an SD-WAN solution simplifies the transition from on-premise security to cloud security
  • Faster, Wider and Stronger Cyber Security with SIEM Faster, Wider and Stronger Cyber Security with SIEM Dan Hanman, Consulting Systems Engineer SIEM Mar 29 2017 9:00 am UTC 45 mins
    Locks, barriers and traps will eventually be broken and overcome. The enterprise security infrastructure must continuously evolve in order to continue to protect the enterprise’s assets and provide mitigation in case of a breach.

    Security operations tools can play a critical role in maintaining the enterprise security posture through internal and external evolution.

    During this presentation, we will explore the role of SIEM as an enabler and how FortiSIEM can be a catalyst for a more efficient, effective and complete cybersecurity infrastructure.
  • Simplifying your journey to the Hybrid Cloud: SilverPeak SD-WAN Simplifying your journey to the Hybrid Cloud: SilverPeak SD-WAN Daniel Cook Mar 29 2017 12:00 pm UTC 45 mins
    Almost all enterprises use a blend of public cloud and enterprise data centre applications. This webinar looks at how such enterprises can simplify and control the connectivity to the Hybrid Cloud and Public Cloud, whilst dramatically reducing costs and enabling scalability.
  • SQL Server: Understanding Your Options for Disaster Recovery & High Availability SQL Server: Understanding Your Options for Disaster Recovery & High Availability Matt Aslett, 451 Research; Midd Carmack and Mike Donaghey, TierPoint Mar 29 2017 3:00 pm UTC 45 mins
    Join Midd Carmack, Product Manager and Mike Donaghey, Manager of Database Administration at TierPoint along with Matt Aslett, Research Director for Data Platforms and Analytics at 451 Research, as they discuss the latest high availability capabilities in SQL Server 2016, how to architect to take full advantage of those features, and implications for a robust disaster recovery plan.

    Midd brings over 20 years of IT Infrastructure, Operating System and Database administration and product management experience to the discussion and will provide an overview of TierPoint as a Managed Services Provider and the company’s Hybrid IT strategy.

    Matt will explore the latest high availability capabilities in SQL Server 2016, including database mirroring, log shipping, availability groups, and failover clustering. In addition to reviewing the capabilities of each of these approaches, this session will also include a perspective on their relative merits and use-cases. Matt will also explore the drivers for managed database services, versus hands-on database administration, in delivering the goals of a database high availability strategy.

    Mike’s experience spans 15 years working with managed database clients to design and manage SQL implementations for a variety of industries, including healthcare, financial and manufacturing. Mike will offer technical perspective on implementing SQL capabilities to optimize disaster recovery protection and budget considerations. He will use case study examples describing the challenges and business requirements for a variety of SQL installs, along with strategies for solving those problems using the DR/HA features available with SQL Server today.
  • All-Flash Storage Technology & High Performance Workloads: The Latest Innovation All-Flash Storage Technology & High Performance Workloads: The Latest Innovation Ravi Poddar, Ph.D., Director of HPC and EDA Solutions for FlashBlade, Pure Storage Mar 29 2017 4:00 pm UTC 15 mins
    This webinar discusses how advances in all-flash storage technology can help improve the acceleration of Electronic Design Automation (EDA) and high performance workloads. It highlights current issues with storage bottlenecks in these environments and its impact on productivity. And then it covers a quick overview of FlashBlade, a revolutionary new storage system for high performance and high concurrency workloads that will drive tomorrow's next generation chip designs.
  • Adopting MEF’s SAT Power Play for Improved Testing Efficiency Adopting MEF’s SAT Power Play for Improved Testing Efficiency Bruno Giguere - MEF; Eric Leser - Spectrum Enterprise; Mike Bencheck - Siama Systems Mar 29 2017 4:00 pm UTC 75 mins
    Service Activation Testing (SAT) plays an important role in MEF’s Third Network vision of delivering agile, assured, and orchestrated connectivity services. MEF 48 (SAT), MEF 46 (Latching Loopback) and MEF 49 (SAT Control Protocol and PDU Formats) specifications make up a framework for standardized testing and troubleshooting of Carrier Ethernet-based services for service providers. Collectively these specifications are known as the MEF SAT Power Play. These specifications can be used all together or individually to comprehensively test Carrier Ethernet-based services. The webinar will discuss the important relationship between MEF’s SAT specifications and the work of other standards developing organizations (SDOs), such as IETF RFC 2544 and ITU-T Y.1564. Discover the many benefits of MEF’s SAT Power Play including improved testing efficiency for retail and wholesale Ethernet service deployments, boosting customer satisfaction by reducing the number of faulty turn ups, and accelerating the interconnection process between peer operators.
  • The Hybrid IT Balancing Act: Is Your Cloud Provider Tipping the Scale? The Hybrid IT Balancing Act: Is Your Cloud Provider Tipping the Scale? Bob Hicks, SVP and General Manager, TierPoint Mar 29 2017 6:30 pm UTC 45 mins
    Are you employing a balanced approach to Hybrid IT in the changing multi-cloud landscape? In this webinar, Bob Hicks, Senior Vice President, Operations discusses four cornerstones to consider to reduce risk. Through his 30-year career in IT and data center operations management, Bob has accumulated a deep understanding of the forces affecting hybrid infrastructures and has helped demystify the complexities surrounding Hybrid IT and cloud environments for organizations of all sizes.
  • How to avoid the Citrix blame game How to avoid the Citrix blame game ExtraHop & Kedron Mar 30 2017 1:00 pm UTC 60 mins
    When applications and desktops are delivered over Citrix, the Citrix administration team becomes the front-line for responding to complaints about slow performance. But more than 60% of the time, the root cause of the problem lies outside of the Citrix environment.

    In this webinar, you’ll learn how wire data analytics can enable Citrix administrators to not only see end-user experience for ICA sessions, but also dig into application and infrastructure performance to uncover the real reason for slowdowns.

    Hope to see you there!
  • Redefining the Link: New Year, New Benefits Redefining the Link: New Year, New Benefits Mike Connaughton, Market Segment Manager, Data Center Mar 30 2017 2:30 pm UTC 30 mins
    “Own the Link” is a revolutionary approach to specifying the transceivers used in data links. Since its launch in 2016, new tools and products have been added to the program, delivering more benefits than ever before. This short webinar will demonstrate how Own the Link can help you maximize your network, and we’ll look towards the future with a peek at what tomorrow might bring.

    * The first 100 people to pre-register for this webinar will receive a $5 Starbucks gift card via email on 3/29.
  • FireEye in 2017 FireEye in 2017 Kevin Taylor, EMEA VP; Grady Summers, EVP & CTO Mar 30 2017 3:00 pm UTC 45 mins
    Over the years the security market has evolved, as has the threat landscape. The threats have changed from being a nuisance, to ones that are specifically targeted to carry out activity such as theft of intellectual property, exposure of sensitive customer data, or holding the victim to ransom. Organisations need to keep evolving their security program to keep up.

    There are several challenges that FireEye has observed that reduce the ability to self-discover and operationalise response to breaches: lack of visibility, lack of intelligence, too many tools, too many alerts or not enough expertise.

    Join us in a live webinar and listen to Grady Summers, FireEye’s CTO and Kevin Taylor, FireEye’s VP for EMEA, as they describe how FireEye in EMEA can support organisations in overcoming all these challenges, learn about the new platforms FireEye has to offer and the intelligence required to build a next generation security program.
  • How Are You Managing Cyber Risk From Your Third-Party Relationships? How Are You Managing Cyber Risk From Your Third-Party Relationships? Ryan Curran, Senior Sales Engineer Mar 30 2017 6:00 pm UTC 45 mins
    Outsourcing and strategic partnerships have become a staple in today's business climate, enabling organizations to drive business value and stay ahead of the competition. However, moving company information outside of its own defense perimeter opens an organization up to a myriad of cybersecurity vulnerabilities. Organizations need to have the tools and resources to determine the risk from 3rd party relationships and manage that risk in a timely and consistent manner.

    In this webinar, Senior Sales Engineer Ryan Curran will help you learn how to:
    ~ Identify and monitor threats targeting your extended ecosystem
    ~ Use a threat intelligence platform for third-party risk management workflows
    ~ Leverage Threat Indicator Confidence Scoring and pre-packaged threat intelligence to start monitoring 3rd parties within minutes
  • Making the Case for Lithium-Ion Batteries in the Data Center Making the Case for Lithium-Ion Batteries in the Data Center Peter Panfil, VP Global Power, Vertiv; Tony Gaunt, Senior Director, Vertiv Asia; Thomas McKinney, Forsythe Data Centers Mar 30 2017 7:00 pm UTC 60 mins
    This one-hour webinar will examine the advantages of lithium-ion as well as concerns data center managers may have. The presentation will focus on:

    > Footprint
    > Battery life
    > Cooling costs
    > Safety

    Attendees will be provided with key takeaways to help them effectively evaluate real-life applications of lithium-ion batteries within critical spaces.

    Register now.
  • How to Extend SD-WAN to AWS How to Extend SD-WAN to AWS Ray Wong, Sr. Solutions Engineer, EMEA Apr 4 2017 8:00 am UTC 45 mins
    Enterprises are trending towards deploying inexpensive Internet broadband links to enable bandwidth-intensive applications, but public transport links are “best-effort”, insecure and susceptible to damaging attacks. A cloud-delivered SD-WAN delivers ubiquitous security and enterprise-grade application performance independent of the transport medium, enabling a cost-effective solution for organizations increasingly moving data center workloads to IaaS, such as Amazon Web Services (AWS).

    In this seminar, you learn ways to reduce operational complexity and optimize application performance to cloud data centers, including:

    - The challenges inherent in access to IaaS workloads such as AWS and Azure
    - Seamlessly including IaaS workloads in your SD-WAN architecture with only a few clicks
    - How to secure and optimize IaaS access in your SD-WAN
    - A live demonstration of cloud-delivered SD-WAN capabilities
  • LAN Standards, News & Trends: 2017 Update LAN Standards, News & Trends: 2017 Update Cindy Montstream, Legrand Apr 4 2017 3:00 pm UTC 90 mins
    Get the latest information about Cabling Standards from FOTC Standards Chair Cindy Montstream.

    Attendees will earn one BICSI CEC for attending.
  • Hybrid IT: How to Simplify & Manage Multiple Enterprise Cloud Environments Hybrid IT: How to Simplify & Manage Multiple Enterprise Cloud Environments Kelly Morgan 451 Research and Kevin Leahy Dimension Data Apr 4 2017 3:00 pm UTC 60 mins
    How can your enterprise better manage multiple cloud and non-cloud IT environments to accelerate your digital business?

    Join us, along with Dimension Data, as we discuss:

    -The most common challenges faced when managing multiple IT environments
    -The types of challenges enterprises face in different countries
    -Which applications should be hosted in which environment
    -How to manage these environments more easily
  • Webinar:  Software-Defined Infrastructure & Data Center Health Monitoring Webinar: Software-Defined Infrastructure & Data Center Health Monitoring George Clement, Sr. Application Engineer, Intel Corporation Jonathan Gould, Software Sales Manager, Schneider Electric Apr 4 2017 6:00 pm UTC 60 mins
    Rapid change complicates every facet of data center management. Data center managers need ways to monitor, manage, and maintain the health and efficiency of their facility in real-time. They want complete visibility into power, performance, thermals, utilization, location, latency, durability, and security through a single pane of glass. Server-centric compute models are too cumbersome for today’s highly variable workloads. Enter Intel and Schneider Electric’s integrated DCIM solution.

    In this webinar, you’ll see how Intel and Schneider Electric have worked together to offer an automated, software-defined resource model and support the data center managers with the IT agility and control they need.

    We’ll showcase how Intel® and Schneider Electric can optimize your data center:

    •Asset Tracking
    •Identify potential failure throughout your power, cooling, and virtual architectures
    •Monitor Power, Cooling and Physical Security in your critical spaces
    •Aggregate KPIs on Power, Cooling, Space, and Network
    •Bridge from facilities and IT
    •Integrate into ITSM (ServiceNow and Remedy)
    •Merge the physical layer with the virtual layer
    •Monitor Power, Cooling and Physical Security in your critical spaces
  • Protecting your all-flash FlashStack Converged Infrastructure platform Protecting your all-flash FlashStack Converged Infrastructure platform Mayur Dewaikar, Product Management: Solutions & Integrations, Pure Storage Sunil Polepalli, Head of Cisco Alliance, Commvault Apr 4 2017 6:00 pm UTC 60 mins
    Are you considering converged infrastructure, but unsure how it can be protected? Look no further. Cisco has just released an end-to- end, Cisco Validated Design (CVD), leveraging Commvault Data Protection. FlashStack now offers industry-leading Commvault data protection running on UCS Servers, for protection of all FlashStack supported applications.

    According to IDC, Commvault Data protection software delivers:

    1. 42–52% reduction in annual spending on data infrastructure, software, services, and compliance

    2. 47–62% reduction in weekly administrative hours across cloud, disaster recovery (DR), backup, snapshots, discovery, reporting, and scripts

    3. 15–30% reduction in data management point solutions

    4. 55% reduction in annual unplanned downtime

    Join us on April 4th for an exclusive webinar hosted jointly by Pure Storage and Commvault where you’ll learn:

    1 How FlashStack compares to other converged infrastructure platforms.

    2 What applications can be deployed and protected on FlashStack, combined with Commvault Data Protection.
  • Rockin’ and Rollin’ with SMB3 Rockin’ and Rollin’ with SMB3 Ned Pyle, SMB Program Manager, Microsoft, John Kim, SNIA-ESF Chair, Mellanox, Alex McDonald, SNIA-ESF Vice Chair, NetApp Apr 5 2017 5:00 pm UTC 75 mins
    Server Message Block (SMB) is the core file-transfer protocol of Windows, MacOS and Samba, and has become widely deployed. It’s ubiquitous - a 30-year-old family of network code.

    However, the latest iteration of SMB3 is almost unrecognizable when compared to versions only a few years old. Extensive reengineering has led to advanced capabilities that include multichannel, transparent failover, scale out, and encryption. SMB Direct makes use of RDMA networking, creates block transport system and provides reliable transport to zetabytes of unstructured data, worldwide.

    SMB3 forms the basis of hyper-converged and scale-out systems for virtualization and SQL Server. It is available for a variety of hardware devices, from printers, network-attached storage appliances, to Storage Area Networks (SANs). It is often the most prevalent protocol on a network, with high-performance data transfers as well as efficient end-user access over wide-area connections.

    In this SNIA-ESF Webcast, Microsoft’s Ned Pyle, program manager of the SMB protocol, will discuss the current state of SMB, including:

    •Brief background on SMB
    •An overview of the SMB 3.x family, first released with Windows 8, Windows Server 2012, MacOS 10.10, Samba 4.1, and Linux CIFS 3.12
    •What changed in SMB 3.1.1
    •Understanding SMB security, scenarios, and workloads
    •The deprecation and removal of the legacy SMB1 protocol
    •How SMB3 supports hyperconverged and scale-out storage
  • Quantifying DevOps Outcomes - Efficient Service Stability Quantifying DevOps Outcomes - Efficient Service Stability George Miranda, Technical Strategy Apr 5 2017 5:00 pm UTC 30 mins
    This webinar is part four of a four part series that focuses on the steps you should take to bring about digital transformation in your organization. In this webinar, we talk about how to decrease change failure rates.

    High-performing organizations that have undergone digital transformation have very low rates of failure when introducing changes. Key to this resiliency is that these organizations focus on improving how quickly they recover from failures rather than trying to prevent failures from happening. By emphasizing recovery over prevention, they achieve a substantially higher rate of service resiliency. Industry metrics prove that this capability is part of an overall approach to outperforming your competitors.

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey.

    Join us to:
    - Explore how to achieve resiliency by optimizing for failure recovery
    - Learn which industry metrics demonstrate that resiliency
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you
  • Upgrade Your Website Performance and Security: Migrate from Akamai to Incapsula Upgrade Your Website Performance and Security: Migrate from Akamai to Incapsula Dvir Shapira, Director of Product Management & Robert Hamilton, Director of Product Marketing, Imperva Incapsula Apr 5 2017 5:00 pm UTC 45 mins
    If your Akamai cloud-based platform is no longer meeting your company’s need for security and application delivery, consider a switch to Imperva Incapsula.

    The Incapsula cloud service helps you deliver applications securely and efficiently. With a single interface that integrates content delivery, website security, DDoS protection, and load balancing, you can accelerate the delivery of your web content and protect your site from external threats.

    Here's just some of what you'll learn during this webinar:
    •The differences in functionality between the two platforms
    •Operational advantages and cost savings from a switch to Incapsula
    •How to plan and execute a successful migration from Akamai to Incapsula

    And just for attending this live webinar, you’ll get a free migration guide to help you transition easily from Akamai to Incapsula.

    With PCI compliance, a robust engine with customizable security rule setting, 24/7 support, and significant cost savings, why wouldn’t you consider a switch to Incapsula? Find out if the Incapsula cloud security platform is right for you.
  • Triple Threat:  Protecting Data Throughout its Lifecycle Triple Threat: Protecting Data Throughout its Lifecycle Don Vilen, Joel Rubinson Apr 5 2017 5:00 pm UTC 45 mins
    Marketers have never seen a challenge like this: unprecedented amounts of data, transferred at unprecedented rates, with data breaches doubling in just the past year. Many solutions have protected data in its various states, but no solution has secured data at rest, in use, and in motion – until now.

    In Triple Threat: Protecting Data Throughout its Lifecycle, IIS Chief Data Scientist Don Vilen and Strategic Advisor Joel Rubinson show you how to utilize the most advanced algorithms, format-preserving encryption to protect PII, and tokenization.

    About the presenters:
    Don Vilen - Formerly a Data Scientist at AOL and Chief Data Scientist at Buysight, IIS Chief Data Scientist Don Vilen brings over 30 years of software development and data analytics experience to this webinar. He has worked on some of the most groundbreaking database and web advertising products the industry has seen.

    Joel Rubinson - Joel is an adjunct professor of marketing at New York University. A published author and marketing analytics consultant, Rubinson has allowed IIS to streamline the conversation between its customers’ marketing and IT departments.
  • Machine Learning: The what, how, and why you need it now Machine Learning: The what, how, and why you need it now Stewart Rogers, Dir. of Marketing Technology, VentureBeat Apr 5 2017 5:00 pm UTC 60 mins
    The short answer is that machine learning is the enemy of a post-truth world: Set loose on large data sets, it’s used to uncover patterns and deliver key insights that help predict how things will unfold in the future. The long answer is that from the transformation of forecasting and predictive analytics to the development of self-driving cars to Microsoft working to prevent blindness in children, machine learning has quickly become the kind of technology that transforms the world, from impactful business use cases to powerful social change.

    McKinsey’s 2016 data and analytics study found 120 potential machine learning applications in 12 industries—and the evolution is accelerating. Join our latest VB Live interactive event for a deep dive into how to measure, understand, and mobilize the data that matters the most for your business using machine learning.

    In this webinar you’ll:

    * Learn how cognitive technologies scale across mobile devices (including cars)
    * Evaluate the value of a machine learning product to your organization
    * Tailor your data structure to optimize for future machine learning initiatives


    Speakers:


    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Wendy Schuchart, Moderator, VentureBeat
  • TOP 10 Pragmatic Tests TOP 10 Pragmatic Tests Andrew Bird : Chief Digital Officer & EA Visionary Apr 6 2017 8:00 am UTC 15 mins
    Rarely if ever is there any priority to testing....
    Here is the list which works well.
    Very simple... but will change how you prioritise....