Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • PoE is Heating Up: What You Need to Know For Best-In-Class PoE Systems
    PoE is Heating Up: What You Need to Know For Best-In-Class PoE Systems Paul Vanderlaan Live 60 mins
    As more devices are made to support PoE, and as applications for PoE continue to emerge, what you know about PoE can help ensure your designers and installers are poised to respond to customer demand, and have the expertise to install best in class systems
  • How secure is your Hybrid Cloud roadmap? (US/EU focus)
    How secure is your Hybrid Cloud roadmap? (US/EU focus) Aaron Sherrill (451 Research) and Avinash Prasad (Tata Communications) Recorded: Apr 27 2017 60 mins
    Hybrid Clouds are expected to gain prominence for hosting diverse enterprise workloads due to a variety of needs. For this model of cloud deployment, there exist broader security and specific privacy concerns driven primarily by data loss, data privacy and compliance to regulatory needs. Although Hybrid Clouds offer a degree of control and security of IT infrastructure, there is a need for unified cloud security management which offers a more holistic view of risk categorisation and standard security policies. How can working with a service provider, who can offer an optimized mix of technology and controls to seamlessly manage Security and Compliance, change the game for the enterprise?
  • From Incident Response to a Continuous Monitoring & Active Threat Hunting
    From Incident Response to a Continuous Monitoring & Active Threat Hunting Stuart Davis, Director, Mandiant & David Grout, Systems Engineering Director, FireEye Recorded: Apr 27 2017 49 mins
    With over 13 years of front-line experience dealing with advanced threat actors from around the globe, our Mandiant team know how the bad guys think and can help you win the battle against cyber attackers.


    In this webinar, Stuart Davis and David Grout will cover:
    - Best practices in regards to Security as a Service
    - How organisations can move from an alert-led security to an intelligence-led security
    - How FireEye can provide the adequate tools, processes and expertise required to build a next generation security program
  • Accelerating NFV, SD-WAN, and SDN adoption for Telcos and Service Providers
    Accelerating NFV, SD-WAN, and SDN adoption for Telcos and Service Providers Jim Pfleger, Architect at Verizon; Pascal Joly, Director at Quali; Aaron Edwards, Dir. TME at CloudGenix Recorded: Apr 26 2017 60 mins
    This educational webinar will include:

    > Verizon’s perspectives on trends in software-defined architectures and NFV
    > CloudGenix's thoughts on SD-WAN trends
    > Quali's cloud sandboxes for NFV and SDN/SD-WAN compliance
    > Demo - NFV certification in action!
  • 5G Today vs. 5G Tomorrow: How it Affects Your Enterprise
    5G Today vs. 5G Tomorrow: How it Affects Your Enterprise David Rush, Cradlepoint; Ken Rehbehn, 451 Research Recorded: Apr 26 2017 59 mins
    With 5G rapidly climbing the hype cycle toward the peak of inflated expectations, many organizations are asking the same question: “Where does 5G stand today, and how long before it can help my business?”

    Carriers in the U.S. are not only talking about it, but claiming their trials are ongoing and deployments are coming soon — in many cases, years earlier than had been thought possible. In reality, 5G has a limited, powerful use case today, but can reach its exceptional potential within the next couple years.

    At 11am PT / 2pm ET on April 26, 2017, join Cradlepoint’s David Rush and Ken Rehbehn of 451 Research to explore the 5G reality today and how 5G can help people and businesses in 2018 and beyond.

    Cradlepoint is the global leader in cloud-based network solutions for connecting people, places, and things over wired and wireless broadband.
  • Ready for Primetime: How Hyperconverged Infrastructure is Evolving to Do More
    Ready for Primetime: How Hyperconverged Infrastructure is Evolving to Do More Tim Stammers, Senior Analyst at 451 Research and George Wagner, Sr. Product Marketing Manager at Pivot3 Recorded: Apr 26 2017 64 mins
    Traditionally, hyperconverged infrastructure (HCI) has been deployed only for specific use cases. However, HCI has the potential to do so much more! With greater economics and simplicity than traditional three-tier infrastructure, HCI can support multiple mixed workloads and latency-sensitive applications, plus scale predictably and efficiently.

    Join Senior Analyst, Tim Stammers, from 451 Research and Sr. Product Marketing Manager, George Wagner, from Pivot3 as they discuss the evolution of hyperconverged infrastructure, architectural considerations for supporting workload consolidation, and how companies like Pivot3 are enabling organizations to do more with HCI with new architecture and policy-based management capabilities.
  • Enhancing Your Security Infrastructure with Infoblox Threat Intelligence
    Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Jonathan Abbe, Security Product Managerment, Infoblox; Sam Kumasarmy, Senior Product Marketing, Infoblox Recorded: Apr 26 2017 39 mins
    If your organization is like many, you've subscribed to external intelligence and/or you're using internal patchwork of threat intelligence within various departments—some information here, some information there that can't be used anywhere else—no way to integrate. And that means, you end up with gaps in your view of the threat intelligence and your defense across your infrastructure.

    Join us for an upcoming webinar and learn how Infoblox Threat Intelligence Data Exchange (TIDE) can help you:

    • Get what you need: Easily create threat intelligence data feeds to combine Infoblox’s high-quality data with the data you already have.
    • Easily deploy data: Obtain, manage and distribute data across your infrastructure from a centralized point.
    • Prevent malicious activity: Deploy threat intelligence directly within Infoblox DNS Firewall and other security technologies.

    Register today and get the complete picture.
  • Defining Virtualization to Power your Network Transformation
    Defining Virtualization to Power your Network Transformation Yves Gagnon, Product Manager, EXFO Recorded: Apr 26 2017 36 mins
    Virtualization brings with it so many promises, changes and so much uncertainty. Will smarter networks actually deliver? Network transformation is imperative if you’re planning to be part of the massive digital transformation sweeping the industry. However, your transformations can’t negatively impact customers, despite the new level of complexity brought on by the virtualization and abstraction technologies required to meet the explosive demand for new, tailored services.

    Your extensive network functions virtualization (NFV) and software-defined networking (SDN) investments must improve your bottom line, competitiveness and service quality. But how can you be sure that such investments will actually deliver on all the promises and improve the quality of experience for your subscribers?

    Join us for this webinar and we’ll help you find the answers to these questions.

    In this webinar, you will learn about:
    - Virtual machine/VNF and a Docker
    - The ETSI model
    - OpenStack
    - Hypervisor
    - Time consideration and hardware acceleration – SR-IOV & DPDK

    Who should attend?
    - Those involved in the rollout of telecommunications networks, with a focus on network and service assurance platforms.
    - This includes network operations, software platforms and back-office systems.
  • How To Document Campus Infrastructure - Hospitals, Offices, Airports, etc.
    How To Document Campus Infrastructure - Hospitals, Offices, Airports, etc. David Cuthbertson Recorded: Apr 26 2017 47 mins
    Multi-building and multi-site IT environments are not simple to document with both legacy and new technology co-existing for many years. Our webinar looks at documentation methods that make multi-building IT infrastructure easier to plan and manage.
  • Cloud-Scale Efficiency for Comm Service Providers through Rack Scale NFVi
    Cloud-Scale Efficiency for Comm Service Providers through Rack Scale NFVi John Wilson, Director. of Market Development for Intel® Rack Scale & Suzanne Kelliher, DCEngine Radisys Product Line Manager Recorded: Apr 25 2017 59 mins
    Communication Service Providers are undertaking a major transformation from networks interconnected with closed, proprietary hardware network elements, to open architectures based on Software Defined Networks (SDN) and Network Functions Virtualization (NFV). Intel® Rack Scale Design (RSD) is a logical architecture for NFV infrastructure (NFVi) requirements that disaggregates compute, storage, and network resources, with the ability to efficiently pool and utilize these resources.

    In this webinar, experts from Radisys and Intel will present the latest developments in applying Intel® RSD to SDN and NFV applications. Webinar participants will learn how the Radisys DCEngine™ hyperscale platforms, an implementation of Intel® RSD and inspired by Open Compute Project (OCP), can deliver the open software flexibility, DevOps deployment efficiencies, with carrier scalability for robust NFV deployments in emerging communication data center applications. The Webinar will include customer deployment examples, including Radisys DCEngine for open source software architectures, Central Office Re-architected as a Datacenter (CORD) projects, as well as Intel® RSD initiatives in telecom networking applications.
  • Dell EMC, Versa, and Wind River Bring Flexibility, Performance, and Reliability
    Dell EMC, Versa, and Wind River Bring Flexibility, Performance, and Reliability Charlie Ashton, Wind River, Gopi Manapragada, Dell EMC, & Robert McBride, Versa Networks Recorded: Apr 25 2017 58 mins
    Your customers look to you to provide routing, security, and SLA backed network connectivity at a competitive price. How you deploy those services (via central office or on premises) depends on the customer’s needs. Now you can provide those services with the carrier grade reliability your customers depend on, and the flexibility and performance you need to drive new revenue streams while keeping your costs down.

    Dell EMC, Versa, and Wind River have teamed up to create a highly efficient, dynamic and reliable service rich virtual enterprise CPE (vE-CPE) reference platform which also has the benefit of being very cost effective. Join us in this web seminar to learn about:
    - Thick and thin branch deployments, and how to choose which is right for you
    - How ease of use, efficiency, and longevity help to make the vE-CPE solution cost effective
    - How the Titanium Cloud ecosystem leverages open solutions to ensure interoperability and breaks vendor lock-in
  • Walk this way - First steps towards firewall automation
    Walk this way - First steps towards firewall automation Erez Tadmor, Senior Product Manager, Tufin & Joe Schreiber, Technical Director, Business Development, Tufin Recorded: Apr 25 2017 61 mins
    Automation systems bring a great deal of value. Having the ability to produce better, faster, and more reliable results can go a long way in improving business agility and simplifying day-to-day tasks. Firewall automation also helps tighten security posture and ensure continuous compliance with internal policies and industry regulations.

    Tufin presents the recommended steps to start your journey towards firewall automation. Join us for the first webinar of the series, focusing on rule decommissioning, to learn how you can initiate an immediate and substantial impact on your organization.
  • Going Beyond His/tory: The Female Storytellers Shaping Immersive Tech
    Going Beyond His/tory: The Female Storytellers Shaping Immersive Tech Luciana Carvalho, VR Evangelist Recorded: Apr 25 2017 48 mins
    Humans have shared gathered around and communicated through stories throughout history. Text, pictures, images and videos have sought to capture our imagination, or portray the non-fictional in a relatable way. Now, as we move beyond the 2D flat screen to new ways of interacting/communicating with the world — virtual and augmented reality, for example — we begin to see the power of immersion in storytelling, and the impact it has, beyond anything we have ever seen, on those in the receiving end. Arguably, the ultimate empathy machine.

    As we shape the next 'Information Age', and given the state of the world today, never before have we been in more need of putting ourselves in other people’s shoes, and empowering diverse and inclusive voices worldwide. Never before have we seen more women jump at the opportunity to lead and make content that is all-encompassing, that touches and inspires, and that aims to build bridges not walls. Here is their story.

    Learner, maker, systems thinker, innovator and tech evangelist, Luciana splits her time between growing the Realities Centre London — a new innovation space, incubator and academy for B2B/enterprise VR, AR, MR and AI — and Unfold UK, promoting women/diversity in future in the UK. Passionate about VR and tech for good, she carries ongoing research on the possibilities and challenges immersive tech presents as re neuroscience, empathy and female empowerment.

    She was elected one of Code First Girls ‘25 Ones to Watch’, 'Top 5 Female Role Models in the Tech Industry', and Virtual Perceptions' 'Heroes of VR' in 2016.
  • What Embedded and IoT Developers Think About IoT Security: A Look at Survey Data
    What Embedded and IoT Developers Think About IoT Security: A Look at Survey Data Stacy Cannady, Cisco Systems and Richard Nass, Embedded Computing Design/OpenSystemsMedia Recorded: Apr 24 2017 60 mins
    Join Stacy Cannady, Cisco Systems and Richard Nass, Embedded Computing Design/OpenSystemsMedia in a webcast Monday, April 24, 10 a.m. Pacific/ 1:00 p.m. East to talk about the hottest issue today in the IoT and embedded design: security.

    With Embedded Computing Design (ECD), the Trusted Computing Group (TCG) conducted an Internet of Things (IoT) Security Survey January to February 2017 to find if and how designers were addressing these concerns.

    The webcast will look at how designers perceive security, whether they’re including security in their designs, challenges to embedded and IoT security, and their awareness and use of trusted computing.

    Attendees will see survey results and hear from our experts on trending security issues and potential solutions to protecting devices, networks and data.
  • Apstra and Ansible: Bridge the DevOps Network Divide
    Apstra and Ansible: Bridge the DevOps Network Divide Damien Garros, Apstra and Andrius Benokraitis, Ansible Recorded: Apr 20 2017 59 mins
    Ansible is a simple, powerful, and agentless open source IT automation framework. The Apstra Operating System (AOS) enables companies to build a vendor-agnostic, intent-based and closed-loop Self-Operating Network™.

    Join Damien Garros​, Customer Enablement Engineer at Apstra and Andrius Benokraitis​, Principal Product Manager for Ansible at Red Hat on Thursday, April 20 at 11:00 AM PST / 2:00 PM EST to discover how Ansible and AOS together bridge the gap between networking and DevOps in a useful and meaningful way!
  • CEO PoV: Take Control of your Cloud Application Experience
    CEO PoV: Take Control of your Cloud Application Experience Praveen Akkiraju, CEO, Viptela Recorded: Apr 20 2017 39 mins
    Enterprises are undergoing a revolution in their infrastructure as the application world is being transformed by cloud technologies. Today your applications can be located in the data center, through IaaS, or in a SaaS cloud. Similarly, users are transforming with mobility; no longer are they tied to one location. Enterprises want to solve the problem of connecting users to their applications in a consistent and secure manner.

    The overarching issue is the connectivity between these two worlds as we're stuck in two-decades old technology. Enterprises are therefore challenged with the requirement to transform their infrastructure while integrating underlying legacy technologies, and for the user to access their applications while maintaining policy and security framework.

    Join our CEO as he discusses how IT infrastructure is being transformed during the era of cloud technologies, and how Enterprises across a number of industries can embrace the network revolution.
  • Easy Ways to Improve Your Security Posture
    Easy Ways to Improve Your Security Posture Kirk Gibbons, System Engineer, Symantec Recorded: Apr 20 2017 28 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 4 of 5: Easy Ways To Improve Your Security Posture

    Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.

    Join use to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:

    •Why tighter integration between the network and endpoint improves security posture
    •How new REST APIs help orchestrate a rapid response at the endpoint
    •What the future plans are for new APIs, integrations, and global threat intelligence

    Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223

    • Symantec Endpoint Protection 14 Webinar Series: Part 3 of 5: Achieving Zero-Day Attacks and What To Do About It http://bit.ly/Part3Webinar0323
  • Building DevOps in the Enterprise
    Building DevOps in the Enterprise Jonah Kowall, VP of Market Development and Insights at AppDynamics Recorded: Apr 20 2017 44 mins
    In this upcoming webinar, Jonah Kowall, VP of Market Development and Insights at AppDynamics, will present his thoughts and opinions on the current and future state of DevOps, specifically targeting enterprises that are undergoing or experimenting with DevOps and agility.

    Jonah will explore the demands for agility in order to remain customer focused and drive digital business. He’ll then share some best practices and ideas to overcome one of the largest challenges to business utilizing DevOps — creating trust across organizations and getting your people on board with the creation of a DevOps culture.

    Key Takeaways:
    - Understand the importance of agility to meet the demands of customers and drive digital business.
    - How to build and execute on cross-functional team building.
    - Best practices for the essential process of collecting and sharing data across all teams.
    - Gain best practices for the cultural change, and how to facilitate ownership, trust, and independent decision making.

    About the presenter:
    Jonah Kowall is the VP of Market Development and Insights at AppDynamics, driving product strategy, roadmap and vision, entry into new markets, and digital evangelism. With 15 years of experience as an IT practitioner at several startups and larger enterprises, Jonah has focused on infrastructure and operations, security, and performance engineering. Jonah also previously worked at Gartner, focusing on availability, performance, and IT operations management (ITOM) and headed their influential APM and NPMD Magic Quadrants as a Research VP.
  • Secure Wi-Fi with Ryan Orsi: Iot Current and Future Threats
    Secure Wi-Fi with Ryan Orsi: Iot Current and Future Threats Ryan Orsi, Secure Wi-Fi Expert Recorded: Apr 20 2017 21 mins
    It's expected that by 2020, annual revenues around IoT solutions could exceed $470 billion. As all things IoT saturate the market (cars, tea kettles, toasters!) what does that mean from a security standpoint? What vulnerabilities aren't included in the fine print of these technologies? Join Ryan Orsi in episode three of our webinar series for a look at the current state of Wi-Fi Iot and what may lay ahead.
  • Test your way to NB-IoT success
    Test your way to NB-IoT success Nisar Sanadi, Product Line Manager, EXFO Wireless Core and Uday Parida, Product Manager, EXFO Wireless division Recorded: Apr 20 2017 64 mins
    The ratification of the 3GPP R13 specifications last year was like the firing of a starting pistol, kicking off the race to deploy NB-IoT networks. NEMs are racing against the clock to support the many changes mandated by these specifications. For their part, MNOs are announcing aggressive schedules to launch their NB-IoT networks and time to market pressures are intense. However, quality and reliability cannot be compromised. Ensuring a successful launch under these conditions requires rigorous and comprehensive testing in a time & cost-effective manner. Not only do compliance, functionality and inter-working need to be verified, but also the ability to handle the load and traffic patterns that can be expected in a live network with several million IoT devices.

    This webinar will delve deeply into what it takes to test IoT network elements and networks in order to get them ready for launch. Whether you are interested in conducting end-to-end testing of the network or isolating certain specific elements for testing, such as the eNodeB, MME, SGW or SCEF, for example, you will gain new insights based on our extensive 3GPP technology testing experience.

    Topics that will be covered:
    -Evolution of 3GPP architecture due to IoT
    -Implication of IoT on functionality, performance, capacity aspects of network elements
    -Potential challenges and pitfalls with IoT deployments

    3 main benefits they will get from attending the webinar:
    -A thorough understanding of the impact of IoT on 3GPP networks
    -A deep dive into key testing use cases and KPIs to ensure quality & reliability
    -A proven methodology for successful deployment

    Who should attend:
    -Test Managers
    -Test Engineers
    -Service Deployment Managers
    -Quality Assurance Personnel
    -Network Planners
    -Anyone responsible for the quality and reliability of the network and services deployed
  • Cyber Threat Visualization and Data Capture Solutions
    Cyber Threat Visualization and Data Capture Solutions Gary Southwell, General Manager, CSPi and William Bent, Product Manager, CSPi Recorded: Apr 20 2017 35 mins
    CSPi's Myricom nVoy Series assists in targeted cyber forensic analysis, and compliance assurance for IT and security resources. In this webinar, you'll learn how the nVoy solution makes it easy no matter if they’re just starting out building their network security capabilities or want to add to the infrastructure they already have in place. With just a few minutes of effort, they can build a cost-effective cyber threat visualization solution and implement better network monitoring, data capture, forensic analysis, and regulatory compliance adherence functionality.
  • Architectural Principles for Networked Solid State Storage Access  - Part 2
    Architectural Principles for Networked Solid State Storage Access - Part 2 Doug Voigt, Chair SNIA NVM Programming Model, HPE, J Metz, SNIA Board of Directors, Cisco Recorded: Apr 19 2017 62 mins
    New solid state storage technologies are forcing the industry to refine distinctions between networks and other types of system interconnects. The question on everyone’s mind is, when is it beneficial to use networks to access solid state storage, particularly persistent memory? The answer to this question involves application, interconnect, memory technology and scalability factors that can be analyzed in the context of a latency budget. In this talk we will explore latency budgets for various types of solid state storage access. These can be used to determine which combinations of interconnects, technologies and scales are compatible with Load/Store instruction access and which are better suited to IO completion techniques such as polling or blocking. In this webcast you’ll learn:

    •Why latency is important in accessing solid state storage
    •How to determine the appropriate use of networking in the context of a latency budget
    •Do’s and don’ts for Load/Store access
  • Large Scale SD-WAN Deployments: 3 Real-Life Use Cases & Solutions
    Large Scale SD-WAN Deployments: 3 Real-Life Use Cases & Solutions Steve Woo, VP of Product, and Mike Wood, VP of Marketing, VeloCloud Networks Recorded: Apr 19 2017 61 mins
    SD-WAN is becoming the defacto standard for wide area network replacement, migration and greenfield deployment. The questions many very large businesses have are whether SD-WAN is ready for the big time and what are the use cases that matter to them.

    Join Steve Woo and Mike Wood for this webinar where they will reveal three real-life large scale SD-WAN customer deployments, the specific use cases involved and the actual solution deployed.
  • No Asset Left Behind: Protect Your Applications Across Physical, Virtual, Cloud
    No Asset Left Behind: Protect Your Applications Across Physical, Virtual, Cloud Faraz Aladin, Director of Marketing for vArmour Recorded: Apr 19 2017 57 mins
    vArmour is extending its patented distributed security platform to protect workloads running on physical servers and legacy systems. This unique solution is an industry first and provides consistent policy enforcement across physical, virtual and cloud assets with its network based controls and an API driven ecosystem.

    Join Faraz Aladin, Director of Marketing for vArmour, as he covers:

    1) How to secure workloads running on Physical servers using application based segmentation and micro-segmentation
    2) How vArmour provides a web-scale solution that is Simple, Actionable and Extensible, covering all assets (Physical, Virtual or Cloud)
    3) How to comply with regulatory requirements

    ABOUT FARAZ ALADIN
    Faraz Aladin is the Director of Marketing for vArmour. He has more than 25 years of industry experience with the last 20 at Cisco. His subject matter expertise spans across Switching, Routing, Wireless and Security. He is a CCIE and holds an engineering degree from Bombay University.
  • Three Ways to Make Your Joomla! Site Speedy
    Three Ways to Make Your Joomla! Site Speedy Robert Jacobi, President, Joomla! and Nabeel Saeed, Product Evangelist, Imperva Incapsula Recorded: Apr 19 2017 34 mins
    When it comes to web page load time and mobile optimization, we’ve found that visitors can get cranky and leave your site if it isn’t fast. Join us as experts from Joomla! and Incapsula give you recipes on how to accelerate the performance of your Joomla! site without spending a lot of time or money. You’ll also learn the basics of how a content delivery network (CDN) can further help and get a quick tour of how a CDN works.

    Benefits of attending the webinar include:
    •Learn easy ways to optimize your Joomla! content.
    •Additional Joomla! details.
    •The basics of a CDN and how to set one up.
  • The Network Security Paradigm Shift – 5 Essential Optimization Strategies
    The Network Security Paradigm Shift – 5 Essential Optimization Strategies Dan Cummins, Senior Security Analyst at 451 Research; Paul Martini, Co-founder & CEO at iboss Apr 27 2017 4:00 pm UTC 60 mins
    Welcome to the last mile of security hardware disruption.

    Join iboss and 451 Research analyst Dan Cummins to learn actionable strategies for overcoming the technical and operational challenges of securing modern networks with remote offices and mobile workers.

    You’ll hear in-depth, real-world customer success stories detailing their move from traditional, appliance-based secure web gateways to a distributed gateway platform.

    No change to network topology. No more buying hardware. No more private network links.
  • Intelligent Threat Response and Risk Reduction for Today's Mobile Workplace
    Intelligent Threat Response and Risk Reduction for Today's Mobile Workplace Kevin Beaver, Information Security Consultant, Principle Logic & Jamie Chiu, Senior Mgr, Intel Security & Trent Fierro, Aruba Apr 27 2017 4:00 pm UTC 60 mins
    Network security is no longer about firewalls and related perimeter protection. It extends all the way to endpoints and the information assets they process and store. At any given time, do you really know what’s on your network, how they got there, and if they might be creating quantifiable business risks? With the complexity of today’s wired and wireless networks, this is becoming an increasingly-difficult question to answer.

    Join information security veteran and writer of 12 books including the highly-popular Hacking For Dummies, Kevin Beaver, along with experts from Aruba and Intel for a discussion on the technical and operational security concerns impacting modern networks. You’ll hear real-world stories and obtain practical insight into what it takes to have a resilient environment that can withstand today’s threats and risks.
  • The NIST Cybersecurity Framework (CSF): A Federal Use Case
    The NIST Cybersecurity Framework (CSF): A Federal Use Case Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Apr 27 2017 5:00 pm UTC 60 mins
    Considered the gold standard for cybersecurity, the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is being utilized by the Federal Government agencies to reduce risk.

    Key Learning Objectives:

    •Overview of the NIST CSF

    •How the NIST CSF is currently being used by the Federal Government to compliment The Federal Information Security Management Act (FISMA )

    •Possible future use cases

    Join this webcast for a review on best practices for the NIST CSF being utilized by Federal, State and Local Government
  • Machine Learning and Malware: What You Need to Know
    Machine Learning and Malware: What You Need to Know Robert Leong, Dir, Prod Mgmt., McAfee Labs; Raf Los, Optiv; Dr. Paulo Shakarian; Brandon Dunlap (Moderator) Apr 27 2017 5:00 pm UTC 75 mins
    The seismic jolt in the Threat Landscape caused by the success of threats like ransomware combined with the geometric rise of so-called zero-day malware (i.e. malware for which no AV signature defenses exist) has given rise to all manner of innovation in the Cybersecurity industry. But a lot of what is being said and presented in the market is really confusing and that’s a problem for practitioners. One of the most-frequently-used phrases in security today is “Machine Learning” or “Math-Based” and “Artificial Intelligence” or “AI”. These phrases are entering the security conversation to describe capabilities, approaches, and strategies, but in reality, they are confusing a great many people. Which begs the question: “What on Earth does it mean?” and “How can Machine Learning be used in Enterprise Security?” Join McAfee and (ISC)2 on April 27, 2017 at 1:00PM Eastern as we clear the confusion, explore the answers to these questions and discuss what this means for dealing with threats.
  • Stop attacks such as ransomware and get HIPAA compliant for Healthcare
    Stop attacks such as ransomware and get HIPAA compliant for Healthcare Sridhar Karnam, Director of Product Marketing at Arctic Wolf Networks Apr 27 2017 6:00 pm UTC 45 mins
    Stop attacks such as ransomware and get HIPAA compliant for Healthcare. Understand the top 3 attacks in Healthcare, how to stop them using simple cloud-based tools and ensure HIPAA compliance for business continuity.
  • Inside Server Evolution and Spending: Insights from 451 Research
    Inside Server Evolution and Spending: Insights from 451 Research Christian Perry, Research Manager, Voice of the Enterprise: Servers and Converged Infrastructure Apr 27 2017 6:00 pm UTC 60 mins
    As workload migration to public cloud continues, IT organizations face a wealth of challenges as they determine the most effective compute ecosystem for their needs. Server technologies are evolving quickly—from converged to hyperconverged to composable—and finding the right fit for on-premises workloads is now a critical component of infrastructure strategies. This webinar will explore the drivers behind enterprise server purchases and how they are planning for the future.

    Join Christian Perry, Research Manager, Voice of the Enterprise: Servers and Converged Infrastructure, for this interactive webinar highlighting analysis of customer spending and adoption trends from 451 Research’s latest survey of IT buyers.

    During the webinar, learn:

    -Drivers of today’s purchases of servers and converged infrastructure
    -Key customer pain points and objectives for servers and converged infrastructure
    -How cloud migration is impacting spending on servers and converged infrastructure
    -Where hyperconverged fits into new infrastructure deployments
    -How vendors are positioning themselves to win in this evolving compute market
  • New York’s New Cybersecurity Regulations: Explained!
    New York’s New Cybersecurity Regulations: Explained! Mihir Mistry, Senior Security Manager Apr 27 2017 6:00 pm UTC 60 mins
    The nation's first state-mandated cybersecurity regulations regarding banking and financial services companies went into effect in New York state on March 1st. However, many businesses subject to the regulations are asking, what are these rules and how will they affect my business operations.

    SecureWorks invites you to join us on April 27th for a webcast designed to help you understand these new mandates and develop an approach to ensure that your organization has a mature and effective security program in place that will not only help you achieve compliance but will improve your overall information security posture.

    What you will learn:
    • Which entities are covered by the mandate and what type of data needs protecting.
    • The five core elements needed to establish a comprehensive cybersecurity program.
    • Critical questions you should be asking your security program partner.
  • CTO series: Episode 2: -What does a Good Strategy look like...?
    CTO series: Episode 2: -What does a Good Strategy look like...? Andrew Bird : Chief Digital Officer & EA Visionary May 2 2017 9:00 am UTC 30 mins
    An organisations strategy should be unique in terms of fit for its business model. In this context, good strategy should show direct linkage to the operating model of the business and the road map of how growth will be achieved.
    In this Episode 2 of the CTO series, we discuss the measure of linkage to the operating model and the tools which can be used to show alignment or otherwise to the business vision.
  • Advanced SD-WAN Monitoring and Management
    Advanced SD-WAN Monitoring and Management Jeremy Rossbach, Sr. Principal Product Marketing Manager and Jason Normandine Sr Principal Product Manager May 2 2017 3:00 pm UTC 60 mins
    How does SD-WAN shift the status quo for Operations teams? SD-WAN technology possesses sophisticated, in-built capability for operations and management, and advanced automation to address network problems in real-time. However, network operations teams need to seamlessly integrate this network and health status intelligence from their new SD-WAN infrastructure into their existing monitoring and management infrastructure. Additionally, monitoring solutions must provide visibility across all network architectures including highly dynamic and complex hybrid clouds and other SDN elements and should:
    - Eliminate visibility gaps between traditional networks and SD-WAN providing administrators with insights to optimize and transform their large hybrid networks
    - Provide relationship mapping of major IT events
    - Visualize physical and logical dependencies in applications and service chains
    - Extend visibility for operators with network performance monitoring across traditional, SDN, NFV, SDDC, SD-WAN, NFV and cloud networks (including service chains)
    - Enable operational insight into how all elements of traditional and overlay networks affect service integrity
  • How to Optimize Cloud App Performance
    How to Optimize Cloud App Performance Rohan Naggi, Technical Marketing Manager May 2 2017 5:00 pm UTC 45 mins
    Cloud-Delivered SD-WAN provides enterprises with enhanced application performance by leveraging secure end-to-end SD-WAN overlay tunnels, enabling direct traffic routing to applications hosted in the cloud or a data center, tightly integrating mobile and wired access media, and monitoring network conditions in real-time to govern forwarding decisions that ensure optimal application response time.

    In this webinar you will learn:
    - How to leverage cloud-delivered gateways to enhance application performance and security
    - How cloud applications gain increased performance on mobile devices with an SD-WAN
    - How to monitor and measure the performance of cloud applications
  • Virtual Load Balancer Challenges and How to Conquer Them
    Virtual Load Balancer Challenges and How to Conquer Them Ashish Shah May 2 2017 5:00 pm UTC 45 mins
    While virtual appliances for load balancing, long thought of as the answer for software-driven infrastructure, have existed since the advent of virtualization, they inherit most of the architectural challenges of legacy solutions, including limited scalability, lack of central management and orchestration, and performance limitations. Instead, what is needed is an application delivery architecture based on software-defined principles that logically separates the control plane from the data plane delivering the application services.

    Join us for this 30 minute webinar with Q&A to learn how to overcome the challenges of using virtual load balancers.
  • Making Container Orchestration Easy
    Making Container Orchestration Easy Bich Le - Chief Architect, Co-founder May 2 2017 5:30 pm UTC 45 mins
    Picking up where our last container-focused webinar, "Learn How SaaS-Managed Kubernetes Takes Containers to the Next Level", left off, Bich seeks to provide more visibility on the path down containerization. In this webinar, he'll go over deploying Kubernetes on-prem vs public infrastructures, walk through cluster creation, and how to dynamically expand the capacity of an on-prem cluster with public cloud resources.
  • Modernizing Security Operations: Preparing to Better Secure Your Organization
    Modernizing Security Operations: Preparing to Better Secure Your Organization Travis Wiggins, Principal Cyber Security Operations Consultant, SecureWorks May 2 2017 6:00 pm UTC 60 mins
    According to a recent SANS report, more than 60 percent of large-company CISOs brief the board at least annually and by the end of 2018, 70 percent of all boards will require CISOs to brief them quarterly.^

    Deciding to what degree your security operations should be in-house vs outsourced is a major decision with significant cost and resource ramifications. Currently organizations globally face persistent security challenges, which collectively require people, process, technology, and strategy to address. This collection of challenges are further complicated by evolving business needs; expanding toolsets and platform options; and staffing retention and attrition. Join us to learn how a modern approach to security operations can help address these challenges.

    SecureWorks Principal Cyber Security Operations Consultant and former Security Operations Center (SOC) manager, Travis Wiggins, will discuss how security leaders and practitioners can leverage his experience to more clearly define the requirements and make informed decisions about protecting your organization.

    You Will Learn:
    • Why making the right security operations decisions is critical to reduce business risk
    • What to consider when planning a SOC and how to position the plan to leaders
    • How to address talent retention, accountability, and scalability
    • Why strategy and proper tools are key components in a successful SOC implementation

    ^ Cyber Security Trends: Aiming Ahead of the Target to Increase Security in 2017 - https://www.sans.org/reading-room/whitepapers/analyst/cyber-security-trends-aiming-target-increase-security-2017-37702
  • Automated Compliance Assessment for RBI Cyber Security Guidelines
    Automated Compliance Assessment for RBI Cyber Security Guidelines Shailesh Athalye, Senior Manager, Compliance Research & Analysis, Qualys May 3 2017 5:30 am UTC 60 mins
    Perimeterless IT infrastructure and its security is now an integral part of the operational strategies of India’s financial institutions. But the number, frequency, and impact of cyber attacks on Indian financial institutions have increased manifold, underlining the urgent need for banks to develop robust cyber security measures, and assess their security posture on a continuous basis.

    The RBI Guidelines for Cyber Security assist financial institutions to achieve this through a new-era preventative security baseline.

    During this webcast, Shailesh Athalye, Qualys Senior Manager, Compliance Research and Analysis, will discuss how financial institutions can easily address both the technical & procedural elements of the RBI Guidelines for Cyber Security in an automated manner using the highly scalable Qualys Cloud Platform.

    This webcast will include a live Q&A session.
  • Tech Talk: WAN Op on Tap
    Tech Talk: WAN Op on Tap Derek Granath and Chris Rogers May 3 2017 6:00 pm UTC 60 mins
    This webinar will clear up a common misconception that SD-WANs obsolete the need for WAN optimization. All the bandwidth in the world doesn’t diminish physical distance and therefore the latency across long distances. WAN opt is all about improving application performance over distance and transporting large data sets efficiently. No longer is it necessary to have WAN opt deployed across the entire network – just selectively where and when you need it.
  • Briefings Part 3: The Future of BYOD Security
    Briefings Part 3: The Future of BYOD Security Amish Kohli, Solutions Engineer, Bitglass; Brandon Dunlap, Moderator May 4 2017 5:00 pm UTC 75 mins
    Enabling secure BYOD has long been a challenge for IT. Attempts to secure these devices with agents and device management tools like MDM have been met with widespread employee concerns about privacy and usability, and as a result, organizations see low rates of adoption. Requiring that employees use these install these cumbersome device management tools or access data solely from managed devices are solutions fraught with issues. Employees need the flexibility to work from any device, anywhere. Join Bitglass and (ISC)2 for the 3rd part of our 3-part Briefings series on May 4, 2017 at 1:00PM Eastern where n this we discuss the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.
  • How Cylance Prevents Ransomware Attacks
    How Cylance Prevents Ransomware Attacks Brian Robison, Senior Director, Technical Marketing at Cylance® May 4 2017 6:00 pm UTC 60 mins
    Many of our customers sought out Cylance because it is highly effective in preventing ransomware attacks. We have learned firsthand how ransomware is affecting organizations of all sizes, and across all industries. In this live demonstration, Brian Robison, Senior Director, Technical Marketing at Cylance® will show how ransomware works. He will launch several attacks on unprotected machines to deliver a real-world view into how ransomware compromises systems, and how Cylance prevents ransomware attacks.

    Brian will provide a live demonstration of CylancePROTECT® blocking attacks, and will discuss:

    •Different ransomware types
    •Delivery methods, including drive-by downloads and fileless malware
    •Why launching attacks is cheap and easy with ransomware-as-a service
    •How Cylance prevents both file-level and disk-level encryption
  • Gain Visibility & Control of IT Assets in a Perimeterless World
    Gain Visibility & Control of IT Assets in a Perimeterless World Jimmy Graham, Director, Product Management, AssetView and Darron Gibbard, Chief Technical Security Officer EMEA, Qualys May 4 2017 6:00 pm UTC 60 mins
    In today’s perimeterless world, enterprise security teams are challenged with maintaining visibility and control over the exploding number of assets on their networks.

    The IT assets that pose the greatest risk to your organization’s security are the ones you don’t know are there. Lack of visibility into your IT environment undermines the foundations of your enterprise security and compliance infrastructure and puts your organization at serious risk of a breach. Without knowledge of which software and devices exist in your network — whether on-premises, on endpoints, or in elastic clouds — InfoSec professionals are unable to enact proper security and protection.

    During this webcast, Jimmy Graham, Director of Product Management for Qualys AssetView and Darron Gibbard, Chief Technical Security Officer for Qualys EMEA will cover the six key elements of an ideal cloud-based IT asset inventory system:

    1. Complete visibility of your IT environment
    2. Deep visibility into assets
    3. Continuous and automatic updates
    4. Asset criticality ranking
    5. Interactive, customizable dashboarding and reporting
    6. Integration with your CMDB


    Those of you in the EU will also be interested to learn about asset inventory for GDPR compliance.

    This webcast will include a live Q&A session.
  • Using Authentication and Identity Management to Secure a Financial Network
    Using Authentication and Identity Management to Secure a Financial Network Patrick Grillo, Senior Director, Security Solutions, Fortinet May 9 2017 11:00 am UTC 45 mins
    Using Authentication and Identity Management to Secure a Financial Network:
    The Door is Still Open and the Horse is Almost out of the Barn

    Carbanak. JP Morgan/Chase. Dyre Wolf. Bank of America. Bangladesh. Tesco Bank. This roll call should be proof enough of the attractiveness of the FSI to the hacker/cyber criminal community. While not all of them can be associated with Authentication and Identity Management issues, it’s undeniable that they have played a prominent role.

    An increased focus on authentication and identity management is a right step forward but just confirming a user’s identify is only half the task. With the concept of Zero Trust gaining momentum, authentication and identification must be reinforced by the network itself through policy based access and segmentation.

    This session will look back at some of the data breaches that have been attributed to weak authentication methods and how they might have been prevented. At the same time, the concept of internal network segmentation will be presented to show how both halves of the equation need to be brought together to effectively close off this common attack vector.
  • Why C-RAN deployments will give you more headaches than D-RAN
    Why C-RAN deployments will give you more headaches than D-RAN Jean-Sébastien Tassé, Product Manager, EXFO May 9 2017 3:00 pm UTC 60 mins
    On the road to 5G, centralized radio access network (C-RAN) architecture is a key stepping stone. C-RAN is the next logical evolution in fiber-to-the-antenna (FTTA) networks, or distributed RAN (D-RAN), and involves centralizing several baseband units (BBUs) in a location away from the towers and antennas, rather than collocating BBUs with the remote radio head (RRH) on the antenna site.

    In this whiteboard video, we will explore 2 specific challenges of C-RAN networks, namely the attenuation issues induced by the long distance between the BBU and the RRH, and the interconnection problems – and finally how to solve them.

    This webinar will conclude with a live Q&A session!
  • vCPE One, Two, Launch: Facilitating Practical NFV Deployment
    vCPE One, Two, Launch: Facilitating Practical NFV Deployment Dr. Yuri Gittik, head of Innovation Ron Insler, AVP R&D, Head of Innovation May 9 2017 3:00 pm UTC 60 mins
    As communications service providers are figuring out their way towards wide-scale deployment of network functions virtualization, they need a practical approach to engineer their network and service architecture with the new technologies. In this webinar, RAD’s Dr. Yuri Gittik, Head of Strategic Developments and Innovation, and Ron Insler, AVP R&D, Head of Innovation Labs, will discuss the challenges and deployment scenarios of virtualized business services in 2017, for SD-WAN, security and other value added capabilities. They will explore various vCPE implementation options enabled by x86 to allow network operators to increase service agility and revenues..
  • Everything You Wanted To Know about Storage: Getting from Here to There
    Everything You Wanted To Know about Storage: Getting from Here to There Chad Hintz, Cisco, Fred Zhang, Intel, John Kim, Mellanox, Alex McDonald, NetApp May 9 2017 5:00 pm UTC 75 mins
    As part of the successful “Everything You Wanted To Know About Storage But Were Too Proud To Ask” series, we’ve discussed numerous topics about storage devices, protocols, and networks. As we examine some of these topics further, we begin to tease out some subtle nuances; subtle, yet important nevertheless.

    In Part Sepia, we’re going to take a look at some of the terms and concepts that affect Storage Architectures as a whole. In particular, we’ll be looking at those aspects that can help or hinder storage systems inside the network:

    •Encapsulation versus Tunneling
    •IOPS vs Latency vs Jitter
    •Quality of Service (QoS)

    Each of these topics has a profound impact on storage designs and performance, but they are often misunderstood. We’re going to help you become clear on all of these very important storage concepts so that you can grok storage just a little bit more.
  • Aktuelle Trends bei Sicherheitsverletzungen und Cyberangriffen in D/A/CH
    Aktuelle Trends bei Sicherheitsverletzungen und Cyberangriffen in D/A/CH Sven Schriewer, Director, FireEye May 10 2017 12:00 pm UTC 45 mins
    Cyberkriminelle entwickeln ihre Taktiken, Techniken und Prozesse stets weiter und sind dabei häufig schneller als die Sicherheitsteams. Die Angreifer sind bestens organisiert und ihre Methoden werden von Jahr zu Jahr raffinierter – 2016 war da keine Ausnahme.

    In diesem Live-Webinar stellt Sven Schriewer, Director, FireEye, die Beobachtungen und Schlussfolgerungen der Experten von Mandiant aus der Untersuchung einiger der schwerwiegendsten Cyberangriffe und Sicherheitsverletzungen des vergangenen Jahres vor.

    Melden Sie sich noch heute an, um sich über die folgenden Themen zu informieren:
    •Neue Trends bei Phishing-Angriffen auf Unternehmen
    •Neue Entwicklungen in der Angriffstelemetrie und -methodologie
    •Datengestützter Überblick über neue Bedrohungen weltweit
    •Moderne Abwehrstrategien zum besseren Schutz von Unternehmen und Institutionen
    •Auswirkungen der Datenschutz-Grundverordnung auf Unternehmen in EMEA
    •Trends in EMEA, Nordamerika und APAC im Vergleich
    Neben den Untersuchungsergebnissen in der Regionen EMEA mit Schwerpunkt auf Deutschland, Österreich und Schweiz, enthalten Sie in diesem Webinar auch Informationen wie Sie eine proaktive Strategie zur Stärkung Ihrer Sicherheitsinfrastruktur entwickeln.