Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Moving towards XaaS: Could the Public versus Private Cloud debate be over?
    Moving towards XaaS: Could the Public versus Private Cloud debate be over? Rory Duncan, Research Director at 451 Research; Dan Havens, SVP, WorldWide Sales at Ormuco Recorded: Aug 23 2017 44 mins
    The cloud promises to enable organisations to be more flexible, agile and responsive to the needs of their business and the demands of customer and partners. As physical infrastructure has become invisible to end-users, the role of service providers and channel partners has changed. Faced with public and private options, many firms are taking a XaaS approach, embracing the best of both private and public worlds - implementing hybrid architectures to deliver on-demand access to compute resources, capacity, and services, while also providing greater levels of control, security, and visibility of data and applications. In this webinar, Rory Duncan, Research Director with 451 Research will outline the opportunities for Service Providers and channel partners delivering cloud services, examining topics such as support, managed services, data protection and data sovereignty for facilitating cloud consumption.
  • An interview with Michael Ludwig
    An interview with Michael Ludwig IT Chronicles Media Recorded: Aug 22 2017 11 mins
    10 in Tech hosts Carlos Casanova and Shane Carlson sat down with Michael Ludwig from Blazent at Knowledge17 where they discussed discovery, the CMDB and data quality. Getting the CMBD right is critical to success in a ServiceNow implementation. Listen to this episode to find out how Blazent deals with data quality and the CMDB.
  • Watch the Cloud: Monitoring Your Migration
    Watch the Cloud: Monitoring Your Migration Mike Langdon, Product Manager Recorded: Aug 22 2017 24 mins
    Migrating your infrastructure from on-premises to the cloud requires extensive monitoring to ensure your IT operations don't suffer along the way. For many organizations, garnering this insight can be difficult -- if not impossible. Join Blue Medora's Mike Langdon to learn key best practices to monitor your infrastructure during migration, helping you simplify the process and ensure optimal performance from migration to decommissioning.
  • Learn how the NIST Cybersecurity Framework Benefits State and Local Governments
    Learn how the NIST Cybersecurity Framework Benefits State and Local Governments Renault Ross, Chief Cybersecurity Business Strategist North America, Symantec Recorded: Aug 22 2017 34 mins
    The NIST Cybersecurity Framework (CSF) provides an excellent guide for state and local governments looking to improve their overall cybersecurity posture.

    Join our webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross, where he reveals how to apply the CSF to state and local government.

    Learn to:

    •Identify where sensitive data is and who is accessing it.

    •Protect that data with universal policies to ensure stability of networks and infrastructure.

    •Detect cyber threats quickly and reduce the chance of breaches.

    •Respond to threats with automated actions.

    •Recover after a threat to produce reports to prove compliance.

    Register Today
  • Virtual Network Insight: Installation, Configuration & Microsegmentation
    Virtual Network Insight: Installation, Configuration & Microsegmentation Karl Hauck (Sr. Systems Engineer) and Brian Wilson (Staff Systems Engineer) Recorded: Aug 22 2017 41 mins
    Looking to solve the puzzling visibility gap across the virtual and physical network? Trying to find the elusive answer to ensuring health and availability while also enhancing security and compliance? Need to deliver faster time to value?

    See how you can quickly and easily design and deploy micro-segmentation across the network with an intuitive and easy-to-use UI with natural language search. Optimize network performance and availability with visibility and analytics across virtual and physical networks. And get troubleshooting and operational views to quickly and confidently manage and scale VMware NSX deployments. This session will provide you an overview of vRealize Network Insight (vRNI) product and capabilities.
  • Driving Change in IT Ops through Automation
    Driving Change in IT Ops through Automation Justin Nemmers, General Manager, Ansible by Red Hat Recorded: Aug 22 2017 68 mins
    Given the sheer pace of innovation and ever-increasing competition in today’s marketplace, organizations are leaning on the CIO more than ever before to lead a lean, agile enterprise. For IT teams, this has translated into delivering faster, at greater scale, and more efficiently.

    These same demands have also catalyzed a demand for new applications that are delivered both more nimbly and more quickly. This places further stress on the IT Operations team, as they are now tasked with providing a scalable, on-demand infrastructure that can service both developers and the business.

    As these expectations converge, IT leaders can no longer focus solely on a management strategy – they must also consider, “What is our automation strategy?” Red Hat and Intel are bring together senior IT executives from across industries for this webinar: Driving Change in IT Ops through Automation. Join us for a brief presentation that will explore how automation can help transform IT operations for the next generation of IT management, followed by a panel of senior IT executives as they discuss the challenges and best practices related to these topics and more.
  • How to Choose Your Next Database Audit Solution
    How to Choose Your Next Database Audit Solution Terry Ray, Chief Technology Officer at Imperva Recorded: Aug 22 2017 64 mins
    Data is the lifeblood of today's business. As the volume of generated data continues to grow, so does the number of data breaches. It's more critical than ever for organizations to adopt database audit and protection solutions. But not all solutions are created equal.

    What are the key capabilities that IT and security teams should evaluate? Join Terry Ray as he discusses key considerations for selecting a database audit and protection solution.

    About the Presenter:

    Terry Ray is the Chief Technology Officer for Imperva, Inc., the leading provider of data security solutions. Terry works directly with Imperva’s largest customers to educate on industry best practices, challenges and regulations. He also, operates as an executive sponsor to strategic customers who benefit from a bridge between both company’s executive teams. During his 12 years at Imperva, he has deployed hundreds of data security solutions to meet the requirements of customers and regulators from every industry. Terry is a frequent speaker for RSA, ISSA, OWASP, ISACA, Gartner, IANS and other professional security and audit organizations in the Americas and abroad.
  • Smart Load Balancer vs Legacy Load Balancer: Overprovisioning
    Smart Load Balancer vs Legacy Load Balancer: Overprovisioning Chris Heggem Recorded: Aug 21 2017 1 min
    Capacity planning is painful and expensive if you use legacy load balancers. Never over-provision again. Visit https://avinetworks.com/.
  • Challenges in Building Connected Communities
    Challenges in Building Connected Communities Kate Garman, Jascha Franklin-Hodge, Peter Marx, Limor Schafman Recorded: Aug 21 2017 76 mins
    Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more.

    This webcast will discuss such questions as:
    > What issues are city officials prioritizing for resolution through smart community applications?
    > How are communities planning for and deploying small cell infrastructure?
    > Which departments are involved in communications infrastructure?
    > How can suppliers navigate the multiple departments involved in decision making?
    > What business models are cities negotiating with their technology product partners?
    > What are some of the lessons learned from cities that you can translate into your own business offering?

    Speakers:
    Jascha Franklin-Hodge, CIO, Boston, MA
    Kate Garman,Smart City Coordinator, Seattle, WA
    Peter Marx, former CTO, City of Los Angeles, currently in the position of VP, GE Digital
  • An interview with Brian Uhelski
    An interview with Brian Uhelski IT Chronicles Media Recorded: Aug 21 2017 9 mins
    10 in Tech hosts Shane Carlson and Kirstie Magowan talked with Brian Uhelski from Accorio at Knowledge17. Brian talked about setting vision and strategy and how important this is to a successful ServiceNow implementation. Do one thing and do it really well. Brian stressed the importance of being involved in the community as this helps customers to make the right decisions.
  • DDoS Attacks and Application Hacks
    DDoS Attacks and Application Hacks Jonathan George, Jonathan Binick, Scott Altman, Martin Brewer, David Remington Recorded: Aug 18 2017 59 mins
    Are you prepared to deal with attacks against your network or applications?
    Join us for an interactive panel discussion and challenge our experts with the questions that keep you up at night.
    During this panel, you will learn:
    •How to bolster your defenses and ensure mitigation consistency through a Managed Service model
    •How to protect your applications and your organization
    •What questions you should be asking as you develop your plan
    Featured F5 Speakers:
    •Jonathan George – Senior Product Marketing Manager
    •Scott Altman – Director, Business Development Silverline
    •David Remington – Security Solution Architect
    •Martin Brewer – Senior Manager, Product Management
    •Jonathan Binick – Manager, Security Operations Center
  • An interview with Britt Champeau
    An interview with Britt Champeau IT Chronicles Media Recorded: Aug 18 2017 8 mins
    ServiceNow’s Britt Champeau, chatted with Kirstie Magowan and Shane Carlson from 10 in Tech about champion enablement. She helps organizations spread the value of ServiceNow to the enterprise. Britt concentrates on the ‘soft side’ of a ServiceNow implementations. She emphasizes the value of organisational change management.
  • Full Stack Network Monitoring for Traditional to SDx Architectures
    Full Stack Network Monitoring for Traditional to SDx Architectures Jeremy Rossbach, Product Marketing Manager Recorded: Aug 18 2017 43 mins
    What does full stack network coverage look like? From fault, inventory, topology, performance, availability and logs, a comprehensive Network Operations and Analytics platform should cover the entire stack from traditional to SDx environments.
  • The Blurring of Boundaries in a Software-Defined Data Center
    The Blurring of Boundaries in a Software-Defined Data Center JR Rivers, Co-Founder & CTO, Cumulus Networks Recorded: Aug 17 2017 34 mins
    The software-defined data center has been a heavily touted concept over the past few years, and heralded by some as the next step in the evolution of virtualization and cloud computing. Having a data center that is governed by software, rather than dictated by hardware, can lead to more fully automated and intelligent operations. Having infrastructure elements such as networking, storage and security conceived of as a services is, indeed, an attractive concept to many.

    In this webinar we will be joined by JR Rivers, Co-Founder and CTO of Cumulus Networks, to talk about how he (and Cumulus) define the concept of a software-defined data center. He will present how the definition of a software-defined data center has evolved since its inception, and how tools like VXLAN, EVPN, Ansible and more can help organizations further their journey to a “software-defined” state and simplify network operations.
  • The Foundation for Data Center Modernization and Open Source Operations
    The Foundation for Data Center Modernization and Open Source Operations Dan Courcy, Red Hat Enterprise Linux, Andre Pitanga, Service Delivery Manager, Red Hat Recorded: Aug 17 2017 41 mins
    No matter what level of modernization you are evaluating, any effort should start with a solid foundation.

    A standardized environment based on an enterprise-ready, open source operating system like Red Hat® Enterprise Linux®, and a hardware platform based on Intel, is key to the modern data center.

    Learn how organizations like yours approached server consolidation projects and migrations from proprietary systems to Linux, to improve efficiency and create a consistent foundation for current and cloud-future IT environments.
  • Top 10 Secrets to a Successful Virtualization Upgrade
    Top 10 Secrets to a Successful Virtualization Upgrade Dan Richardson, Systems Engineer, and Bo Busillo, Senior Technical Account Manager Recorded: Aug 17 2017 43 mins
    Upgrading your IT operations -- even with the industry's leading virtualization platform -- is an unpredictable process. During this webcast, our technical experts will share common do's and don'ts for an easier virtualization upgrade execution for your DevOps and IT teams.
  • GDPR and What It Means for Security Teams
    GDPR and What It Means for Security Teams Cheryl Tang, Director Data Security Products, Imperva Recorded: Aug 17 2017 37 mins
    The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.

    Join us to learn:

    - What is GDPR
    - Deep dive into relevant data security articles of the GDPR
    - Review how different technology can address some of the GDPR data security requirements
  • An interview with Chris Pope
    An interview with Chris Pope Kepner-Tregoe Recorded: Aug 17 2017 11 mins
    10 in Tech’s Kirstie Magowan and Shane Carlson chatted with Chris Pope of Service Now at Knowledge17. There were 15,000 attendees at Knowledge17 and Chris talked about how ServiceNow is sticking to its roots of understanding how people work and what they want and need to do.
  • Detecting a Healthcare Breach with the NIST Cybersecurity Framework
    Detecting a Healthcare Breach with the NIST Cybersecurity Framework Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Recorded: Aug 17 2017 55 mins
    Part 4 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    Put on your detective hats with the DETECT function of the NIST CSF. Too often healthcare organizations are breached without ever knowing it.

    In this webinar, we’ll look at how the NIST CSF helps healthcare organizations set up technologies and policies to make sure they know, in a timely manner, when they’ve been breached, how they were breached and, most importantly, what they can do to mitigate this risk in the future.

    We will take a deeper dive into the core components of the DETECT function, including the categories of anomaly/event detection, continuous monitoring and effective detection processes.

    It can be difficult to learn that your organization has been breached, but that knowledge is crucial to improving overall cybersecurity operations.

    Register Today

    To view upcoming NIST Cybersecurity Framework for Healthcare Webinar Series Part 5-7 https://resource.elq.symantec.com/LP=4235
  • SDN/NFV Interoperability – Challenges & Opportunities
    SDN/NFV Interoperability – Challenges & Opportunities Dimetis - Bruce Katzel, VP of Sales for North America; Glenn Booth, VP of Marketing Recorded: Aug 17 2017 50 mins
    SDN/NFV Interoperability testing presents many challenges and opportunities. In this webinar, we will explore many interoperability testing organizations, test plans and results and how standardization can move faster. We’ll explore the dreaded ‘hybrid phase’, where CSPs are in the middle of transition from fully physical networks to physical + virtualized networks, and what can be done to minimize complexity and service disruption.
  • Keeping up with High Speed MIgration in the Data Center
    Keeping up with High Speed MIgration in the Data Center Anthony Haupt, CommScope, Data Center Solutions Architect Recorded: Aug 17 2017 58 mins
    The volume of data streaming into the data center has been growing exponentially for decades. Bandwidth requirements are expected to continue growing 25 percent to 35 percent per year. At the same time, lower latency requirements continue to escalate. As a result, the design of services and applications—and how they are delivered—is rapidly evolving.

    Instead of a single dedicated server, information requests coming into the data center are now fulfilled by multiple servers cooperating in parallelThe traditional three-tier network is quickly being replaced by spine-and-leaf networks. As a result, the physical infrastructure must be able to support higher link speeds and greater fiber density while enabling quick and easy migration to new more demanding applications.

    This webinar will address:

    Solutions, support & decisions
    40G or 25G lanes?
    Preterminated vs field-terminated cables
    Modulation schemes
    Duplex or Parallel transmissions
    Singlemode, multimode or wideband multimode fiber?



    Attendees with earn one BICSI Continuing Education Credit for attending.
  • Software-Defining More than Just the WAN
    Software-Defining More than Just the WAN Robert McBride, Director of Enterprise and Telco Solutions Recorded: Aug 17 2017 29 mins
    Software-defining the WAN is just one component to simplifying and cost reducing the enterprise branch. But why limit your transformation to just the WAN? Are you aware of the additional appliance and service consolidation that you can achieve when you look beyond just WAN connectivity? Have you considered the implications of security when it comes to direct Internet access (DIA), and the complexity that it can add?

    Join us for this live webinar as we discuss how a software-defined branch (SD-Branch) is the logical step in your WAN/branch transformation.

    In this webinar, you will come to understand:

    •Implications of security due to SD-WAN-enabled direct Internet access
    •Operational and financial benefits of virtualizing the full branch
    •How SD-WAN is only one part of your next-generation branch and WAN architecture
  • [Panel] Software-Defined in the Digital Transformation Era
    [Panel] Software-Defined in the Digital Transformation Era Arturo Suarez, Canonical; Idjiwa Adjido, Extrahop; Johna Till Johnson, Nemeretes; Haidee McMahon, Intel; Bob Crooks Recorded: Aug 17 2017 60 mins
    The ICT sector is moving us inexorably towards a software-enabled digital world, but many still fail to understand the power of this trend, how it is going to impact/benefit the ICT Industries and infrastructures delivering them.

    Among topics discussed will be:
    - Present and future impact of Software Defined technologies on IT (challenges and opportunities)
    - How Software-Defined is enabling the digital transformation
    - Best practices and recommendation on adopting software-defined technologies with the future in mind.

    This Webinar is aimed at IT professionals and CIOs/CDOs/CTOs seeking to understand more about how software-defined impacts the present and future of enterprises.
  • BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018?
    BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018? Josh Downs, BrightTALK; Stuart McKenzie, Mandiant; Sian John, Symantec; Nigel Tozer, Commvault & Tim Hickman, White & Case Recorded: Aug 17 2017 63 mins
    9 months until the GDPR deadline - are you completely up-to-speed?

    Our panel of data protection experts will be discussing the compliance considerations that you need to be assessing for May 2018 along with suggesting next steps from a cyber and general security standpoint.

    We'll also be asking YOU at what stage you're at in terms of your preparations via a series of interactive benchmarks as we go through the session to get a sense of where the security community is at in terms of preparations.

    -------------

    GDPR and its May 2018 deadline are now fully the minds of the vast majority of security professionals and with massive fines on the horizon for non-compliance, now is a better time than ever to get to grips with the legislation and ensure that your organisation is secure and compliant.

    It’s vital that your business has carried out the relevant preparations for compliance by then to make sure you don’t get whacked with a huge fine of up to £15m or 4% of your organisation’s global annual turnover.

    Not only are there potentially huge financial repercussions, but leaving your business open to attack and your customers at risk can cause serious reputational damage.
  • Upgrade Your Website Performance and Security: Migrate from Akamai to Incapsula
    Upgrade Your Website Performance and Security: Migrate from Akamai to Incapsula Dvir Shapira, Director of Product Management & Robert Hamilton, Director of Product Marketing, Imperva Incapsula Aug 24 2017 4:00 pm UTC 45 mins
    If your Akamai cloud-based platform is no longer meeting your company’s need for security and application delivery, consider a switch to Imperva Incapsula.

    The Incapsula cloud service helps you deliver applications securely and efficiently. With a single interface that integrates content delivery, website security, DDoS protection, and load balancing, you can accelerate the delivery of your web content and protect your site from external threats.

    Here's just some of what you'll learn during this webinar:

    •The differences in functionality between the two platforms
    •Operational advantages and cost savings from a switch to Incapsula
    •How to plan and execute a successful migration from Akamai to Incapsula

    And just for attending this live webinar, you’ll get a free migration guide to help you transition easily from Akamai to Incapsula.

    With PCI compliance, a robust engine with customizable security rule setting, 24/7 support, and significant cost savings, why wouldn’t you consider a switch to Incapsula? Find out if the Incapsula cloud security platform is right for you.
  • Shoring up Your Defenses by Leveraging Analytics and Machine Learning
    Shoring up Your Defenses by Leveraging Analytics and Machine Learning Mark McGovern, VP, Product Mgmt., CA; John Carnes, Infosecurity Senior Adviser, Anthem; Erik Von Geldern, FXCM Aug 24 2017 5:00 pm UTC 75 mins
    Attackers are getting quicker and more sophisticated. Today's enterprise defenders aren’t able to withstand the pace and complexities of the threats they face. Automated tools and intelligence are being deployed to breach your IT infrastructure and access your priceless data by targeting privileged accounts. In playing defense, security teams must become proactive, not reactive and use data and analytics in a meaningful way, being more effective and agile in detecting attackers and quickly thwarting them. Join CA Technologies and (ISC)2 on August 24, 2017 at 1:00PM Eastern for a discussion on emergence of machine learning and security analytics as tools that organizations can leverage to defend their data and some practical ways it can be used to protect key assets such as privileged accounts.
  • Modeling and Pricing Cloud Migration Scenarios
    Modeling and Pricing Cloud Migration Scenarios Chris Grossmeier, Senior Director of Product, CloudPhysics Aug 24 2017 5:00 pm UTC 45 mins
    Learn how to appropriately model your future state environment for both instance and cluster-based cloud hosting. Learn how outliers and dependencies make major impacts on capacity and costing your future environment. Look at groupings, clusters, and dependencies to ensure all workloads move together to avoid ingress/egress charges for large IO resources.
  • VMware vRealize Operations: Installation, Sizing & Day 1 in the Cloud
    VMware vRealize Operations: Installation, Sizing & Day 1 in the Cloud Mike Eisenberg Aug 24 2017 6:00 pm UTC 90 mins
    During this session a VMware Cloud Specialist Engineer will show you how to install and configure vRealize Operations (vROps) to quickly make it functional within your environment. We will begin with a brief review of the vRealize Operations Architecture and its different server configuration options.

    This session will also cover:
    -Sizing considerations and guidelines for pre-installation planning
    -Installation wizard walk through including setup options and their effect on the environment
    -Connection options of vROps to a vCenter(s) and the process of discovering and collecting data
    -Steps to verify the system is collecting data once installation is complete

    To wrap things up we will review the user environment and how to start using vROps to proactively manage your environment.
  • IoT is Wildly Insecure – Who is watching over your wall?
    IoT is Wildly Insecure – Who is watching over your wall? Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Aug 24 2017 6:00 pm UTC 45 mins
    In today’s interconnected world of IoT devices, security is the #1 challenge. Between self-driving cars, Nest thermostats, and talking refrigerators, the Internet of Things has grown at a staggering rate. It’s estimated that there will be an 50B IoT devices in use by 2020, most of which will have exploitable vulnerabilities.

    Manufacturing, healthcare, and information sectors have all embraced IoT devices because of their increased functionality, but at what cost to network hygiene? As your organization begins to incorporate more connected devices, how do you protect your network?

    Attend this webinar to learn about:
    1)  Top 5 IoT Security Challenges
    2)  Disconnect between Operations and Information Technology
    3)  Cyber security best practices that includes IoT security

    You are the shield that guards your realm. Don’t let IoT penetrate your wall.
  • Success Factors in Threat Intelligence: Part 4 - Connecting the Dots
    Success Factors in Threat Intelligence: Part 4 - Connecting the Dots Allan Thomson, Chief Technical Officer Aug 24 2017 6:00 pm UTC 45 mins
    This series describes a comprehensive “business technical approach” to the justification, definition, design and execution of Threat Intelligence Programs.

    What do we mean by “business technical approach’ to Threat Intelligence?

    Much in the industry is focused solely on one technical aspect or another of threat intelligence data that indicates information about a specific malware family, a set of indicators that can be used to block malicious sites, campaign information that highlights a threat actors profile, their tactic, techniques and procedures. But much of the technically focused content do not discuss how organizations can gather or construct that information themselves, and even more so, how an organization would organize themselves to respond to such data. Much of the output of the industry is providing the fish to organizations rather than teaching the organizations how to fish themselves.

    A ‘business technical approach’ is one where we define an approach focused on the business needs, the organization personnel, organizational roles & responsibilities, team structure and those elements’ interaction with technology to address the challenge of successful threat intelligence operations. Our goal is to help organizations build effective Threat Intelligence programs.

    In this final part of the CSO Series, we will describe how successful TI Programs can fully deliver on reducing risk in organizations. What does success look like for an effective TI Program when it is fully integrated into organizations security framework.
  • Six foresights for the SDN – ensuring security, connectivity, and compliance
    Six foresights for the SDN – ensuring security, connectivity, and compliance Amnon Even Zohar Director of Cloud Product Management, Tufin & Dan Rheault, Sr. Product Marketing Manager, Tufin Aug 29 2017 3:00 pm UTC 45 mins
    Despite the rampant adoption of cloud computing, some companies are hesitant to move entirely to the public cloud. Instead, they rely on the higher degree of control of the SDN in the private cloud, or utilize a hybrid approach. While the private cloud offers more control and manageability, ensuring that applications are deployed successfully, securely, and within the parameters of compliance can pose challenges without proper visibility and the foresight for auditability.

    Organizations that are using a SDN need to employ best practices at the start to ensure that they are successful in the future.

    Please join members of Tufin cloud team for an informal product-agnostic discussion on how network security policy management (NSPM) solutions can ingrain best practices in deploying and managing applications in the SDN, ensure connectivity, and enforce security. Topics for discussion include how to:
    •Build a zero-trust policy in the private cloud
    •Ensure compliance across all access changes
    •Design and deploy network segmentation efficiently
    •Deploy business applications with access continuity
    •Ingrain preparedness for audits
  • Acceleration with the Universal Data Plane - FD.io
    Acceleration with the Universal Data Plane - FD.io Ed Warnicke, FD.io Technical Steering Committee chair, Cisco & John DiGiglio, FD.io Marketing Committee, Intel Aug 29 2017 4:00 pm UTC 60 mins
    The Fast Data Project, FD.io, is relentlessly focused on data IO speed and efficiency for more flexible and scalable networks and storage. As the universal data plane, FD.io is helping enable the developer community achieve the highest performance, throughput, and resource efficiency in cloud networking, container networking, NFVI, bare metal networking, and SmartNic acceleration. Recently FD.io extended its lead as the fastest most scalable software data plane on earth by demonstrating terabit throughput levels with multi-million fib table entries on standard high-volume server platforms utilizing the new Intel® Xeon® Scalable Processor. Hear from host Ed Warnicke (Technical Steering Committee chair and Distinguished Engineer at Cisco) on the benefits of FD.io, including key functionality offered in the latest release (17.07), providing key features to enable commercial-ready solutions for software-defined infrastructures. Also hear from host John DiGiglio (Packet Processing SW Product Manager at Intel) on how recent architectural improvements in Intel’s newest platform have doubled performance without modification to the FD.io software.
  • Modern Data Center Virtualization for Securing Tomorrow's Cloud Applications
    Modern Data Center Virtualization for Securing Tomorrow's Cloud Applications Jon Benedict, technical product marketing manager, Red Hat Virtualization Aug 29 2017 4:00 pm UTC 105 mins
    Even with the advent of cloud and containers, virtualization will continue to be key to the efficient data center. But is your virtualization technology able to handle today’s demands for hybrid, modern applications?

    Red Hat® Virtualization provides the performance, security, and scale required for virtualized workloads that pave the way for streamlined operations, increased productivity, and ultimately more modern applications. Learn about approaches for consolidating, upgrading, or migrating virtualization resources and unifying and automating management of heterogeneous environments.

    The OpenStack® Word Mark and OpenStack Logo are either registered trademarks / service marks or trademarks / service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation or the OpenStack community.
  • Dive Deep into NVMe over Fibre Channel (FC-NVMe)
    Dive Deep into NVMe over Fibre Channel (FC-NVMe) Curt Beckmann, Brocade, Craig Carlson, Cavium, J Metz, Cisco Aug 29 2017 5:00 pm UTC 60 mins
    As FC-NVMe (NVMe over Fibre Channel) is preparing for it’s official launch, there have been numerous questions about how the technology works, how it gets implemented, and what makes it special when compared to traditional, SCSI-based Fibre Channel.

    When we did our first webinar on FC-NVMe [link], we got lots of questions about more details, more technical aspects, and more thorough explanations. So here we are!

    This presentation is going to be a more thorough analysis of the bits and bytes of FC-NVMe, where you will learn:

    •What are the key differences and similarities between NVMe and SCSI Fibre Channel structures
    •What are the main architectural differences between NVMe and SCSI deployments
    •Impact on Queue Depth
    •How to cross-connect legacy and future flash arrays with FC-NVMe

    Please join us on August 29th for this advanced, deep dive on FC-NVMe.
  • Getting Started with IT Automation and Self Service Provisioning
    Getting Started with IT Automation and Self Service Provisioning Ryan Kelly, Staff Systems Engineer, Cloud Management BU, VMware Aug 29 2017 6:00 pm UTC 90 mins
    We all know how important automation is for the delivery of IT services. And a self-service provisioning, the key feature of the cloud, comes hand in hand with automation. But many customers, even those who already have vRealize Automation in their environment, don’t know where to start or how to move forward in the most effective way. If you are one of them, this webcast is for you.

    Through practical demonstrations, whiteboards, and technical tutorial, we will show you how to quickly become the automation guru in your team!

    In this technical, hands-on webinar we will cover the following topics:
    -Overview of vRealize Automation setup and configuration
    -Identifying and catering to your end users
    -Blueprint design (Machine Lifecycle Whiteboard session)
    -Overview of vRealize Automation extensibility
    -Tying it all together
  • Executive Cyber Protection
    Executive Cyber Protection Chris Bullock, SecureWorks Managing Principal Aug 29 2017 6:00 pm UTC 60 mins
    In a world where physical attack vectors are no longer the preferred way to attack a person of notoriety or a chief executive sta¬tus individual, the need for cyber executive protection to enhance existing cybersecurity programs and traditional executive protection has become greater than ever. With expanded use of information sharing through social media and use of technologies such as home automation, Executive’s habits, families and close personnel staff are being monitored, targeted and shared via the dark web for a number of reasons such as disruption of business, personal or brand embarrassment and financial gain just to name a few.

    In this webcast, Chris Bullock, SecureWorks Managing Principal, will cover a new approach to mitigating risk to this emerging threat that encompasses:

    • Analyzing ten domains of risk to an Executive, their family and close staff
    • How to assess potential risk and exposure to the brand or reputational damage
    • Guidance on which specific risk factors to monitor regularly to ensure preparedness
    • How to implement the most effective and appropriate safeguards
  • The Profound Effect Wireless will Have on Your Network Infrastructure
    The Profound Effect Wireless will Have on Your Network Infrastructure Jim Frey, Director of Marketing Aug 30 2017 3:00 pm UTC 30 mins
    Explosive growth in the number of wireless devices being used, combined with advancing wireless technology, will eventually lead to big changes to your network infrastructure. This 30-minute webinar will review the evolution of network technology and the associated bandwidth requirements of each new generation. It will also discuss how next generation WAPs (only a few years away) will affect your horizontal network infrastructure, and eventually, your fiber backbone too. The webinar will close with some recommended network infrastructure solutions you should consider for your next WiFi project.

    You should attend this webinar if you want to:
    - Minimize the total cost of ownership (TCO) for your next WiFi project
    - Learn how wireless technology is advancing
    - Be prepared for the next generation of wireless will be here in just a few years
  • Comprehensive Protection and Visibility into Advanced Email Attacks
    Comprehensive Protection and Visibility into Advanced Email Attacks Nirav Shah, Product Mktg Mgr for Email Security.Cloud, Symantec & Naveen Palavalli, Director Product Mktg., Symantec Aug 30 2017 5:00 pm UTC 60 mins
    The latest version of the Symantec Cloud Email Security solution provides the strongest protection against Business Email Compromise with new, automated impersonation controls.

    In addition, this release offers the deepest visibility into targeted & advanced attacks with advanced email security analytics that now includes insights into both clean and malicious emails with 60+ data points on each email.

    Join this webcast to learn more about these new capabilities in and see them in action! Find out how Symantec Cloud Email Security can help you:

    • Defend your business from Business Email Compromise, spear phishing, spoofing attacks, and other scams

    • Accelerate response to targeted and advanced email attacks with more visibility than ever into email threats

    • Quickly correlate and respond to threats by exporting advanced email security analytics to your Security Operations Center
  • Have Your Cake and Eat It Too With R, Python + SAS®
    Have Your Cake and Eat It Too With R, Python + SAS® Wendy McHenry, SAS; Rachel Hawley, SAS; Jesse Luebbert, SAS Aug 30 2017 6:00 pm UTC 60 mins
    R and Python are used by many data scientists, often bringing together teams with varied backgrounds and experiences to solve complex problems in new ways. But R and Python often lack the scalability, governance and support needed for enterprise analytics deployment. In this webinar, you'll see a demo on how SAS integrates with R and Python to increase productivity, value, maturity, and scalability of your data science efforts. Key takeaways:

    • How to use R and Python with SAS while meeting statistical analysis requirements within your organization and with external regulatory agencies.
    • How SAS offers the scalability, governance and support organizations require for production and operational analytics.
    • When and how SAS is used with R and Python.
  • Getting Sign-off for Your SD-WAN Business Case
    Getting Sign-off for Your SD-WAN Business Case Tim Sullivan, CEO, Coevolve & Sasha Emmerling, Sr. Director of Marketing, VeloCloud Aug 31 2017 1:00 am UTC 60 mins
    Coevolve and VeloCloud had a great response to our Webinar: “Building an SD-WAN Business Case – Part 1”. Now it is time to expand on that information about building a compelling business case to adopt SD-WAN and share a next level of experience.

    In“Part 2 – Getting sign off for your SD-WAN Business Case” Tim Sullivan, CEO of Coevolve and Sasha Nunke, Sr. Director of Marketing, VeloCloud will discuss details on the following:

    - The SD-WAN business case headlines required for C-level approval
    - What commercial due diligence is required and how do you evaluate it?
    - What are the most persuasive operational benefits of SD-WAN?
    - What TCO and rate of return metrics typically achieved by other enterprise SD-WAN achieving?
  • Making the Transition From Physical to Virtual Networks - Challenges & Solutions
    Making the Transition From Physical to Virtual Networks - Challenges & Solutions Bruce Katzel, VP of Sales for North America, Dimetis Kai Bechtold, VP of Sales for the D-A-CH region Aug 31 2017 4:00 pm UTC 60 mins
    What are the top issues to address when a CSP is making a transition from physical networks to virtual networks? In this webinar, we will address the operations challenges, tools, planning/implementation, PNF/VNF inventory, automation and orchestration required to move the service providers business from physical networks to hybrid, then fully virtualized.
  • Security Briefings Part 1: GDPR - Using Technology for Compliance
    Security Briefings Part 1: GDPR - Using Technology for Compliance Jacob Serpa, Product Marketing Manager, Bitglass; Brandon Dunlap, Moderator Aug 31 2017 5:00 pm UTC 75 mins
    The General Data Protection Regulation (GDPR) is designed to ensure the privacy and security of European citizens’ personal data. The regulation takes a comprehensive approach to guaranteeing that organizations protect personal data completely and consistently as it is collected, stored, and used. As GDPR comes into effect May 2018, organizations are scrambling to reach compliance with its many requirements - particularly as they relate to the cloud. Fortunately, there are technology solutions that can address a breadth of GDPR-related concerns. Join Bitglass and (ISC)2 on August 31, 2017 at 1:00PM Eastern for the first in a three part Security Briefings series where we will discuss how the components of a cloud access security broker (CASB) can help organizations meet the regulation’s various requirements.
  • Smart Governance: Defining Your IT Strategy
    Smart Governance: Defining Your IT Strategy Route Fifty | Underwritten by: Symantec Aug 31 2017 6:00 pm UTC 60 mins
    Now more than ever, IT leaders are dealing with changing policies, new and varying risks, increasing demands and restricted budgets, but they must continue to operate their information technology services responsibly and with transparency. Strong IT governance is an integral component for state governments across the country in tackling today’s challenges while also innovating for the future.

    During this digital viewcast, we’ll speak with state technology officials about how to build and execute a strategic IT governance framework that allows for agility, provides secure and efficient services, modernizes processes and technologies, optimizes resources and ultimately ensures mission success.


    Click "Attend" to confirm your registration.
  • Worried about security breaches: Discover why endpoint visibility is not enough
    Worried about security breaches: Discover why endpoint visibility is not enough Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Aug 31 2017 6:00 pm UTC 45 mins
    Traditional Endpoint Protection (EPP) products have failed to detect advanced malware that easily evade signature-based antivirus solutions. To counteract this problem, Gartner reports that 100% of EPP solutions will incorporate Endpoint Detection and Response (EDR) capabilities, focused heavily on security analytics and incident response.

    Even so, customers are realizing that protecting endpoints alone is not enough to prevent security breaches. That’s where a managed detection and response (MDR) service comes into play. MDR provides 360-degree visibility into endpoints and security devices, and offers 24/7 network monitoring.

    In this webinar, you will learn:
    - What EDR vendors offer beyond EPP solutions
    - Why Endpoint Detection and Response alone is not enough
    - How Managed Detection and Response (MDR) makes up for EDR shortcomings
  • Adapter votre SI pour saisir de nouvelles opportunités business
    Adapter votre SI pour saisir de nouvelles opportunités business Franck Jaffre (Business Technology Architect), Florent Martin (Expert Cyber sécurité), Philippe Cuvecle (Architecte) Sep 5 2017 9:30 am UTC 45 mins
    Dans un monde de plus en plus connecté, il est primordial pour les entreprises performantes de capter les opportunités en provenance de l’ensemble des canaux numériques : web et mobile. Dans ce contexte, les entreprises doivent adapter leur processus et leur système d’information (SI). Au travers de ce webinar, CA Technologies et ELCA vous présentent le rôle des architectures micro-services et des solutions d’API Management dans ce processus de transformation.
  • Virtualization: Impacts on Performance Assurance and Business Models
    Virtualization: Impacts on Performance Assurance and Business Models Moderated by Limor Schafman, TIA Sep 6 2017 3:00 pm UTC 60 mins
    The push to virtualize communication networks, control centers, and data centers through NFV and SDN technologies offers both great opportunity for management, speed to market, scale and business, and also brings many challenges. Efficiency, cost management, ensuring SLAs, managing OPED and CAPEX, reducing product production costs are all business concerns faced by communications providers as they convert their networks to be increasingly software driven. What are the new business models that software enables? What are the customer expectations for new service deliverables? How can service providers, data centers and others guarantee quality of service? What tests are being conducted and what industry practices are being established? This webcast will review how companies are meeting the challenge of operating with new processes and with new requirements.
  • In-Vehicle Network Solutions Overview
    In-Vehicle Network Solutions Overview Todd Kelly, VP Solutions Engineering, Cradlepoint Sep 6 2017 4:00 pm UTC 60 mins
    As the digital transformation in IT continues to create the need for an Elastic EdgeSM, traditional tethers to the central office have all but vanished. Physical boundaries continue to decrease in importance, and organizations of all types require constant and dependable in-vehicle connectivity to keep up with changing business imperatives.

    Dependable mobile connectivity keeps vehicles on the road longer, helps enterprises better manage their fleets, and allows businesses and organizations to better serve their customers. Forward thinking IT and fleet managers in nearly every industry are implementing in-vehicle networks at a fraction of the cost and with less complexity. By taking advantage of cloud-managed, software-defined solutions, IT teams are evolving enterprise networks to reach improved productivity, reduce costs, and create operational efficiencies.

    Join Cradlepoint for a live webinar on Wednesday, September 6, 2017, at 9 am PT / 12 pm ET to learn how networks on the move are staying always connected and protected.

    Attendees will learn how:

    •Reliable 4G LTE network solutions keep fleets connected

    •To cut costs & create operational efficiencies

    •Cloud management and software-defined technologies enables always-on networks

    •To choose the best solution for networks on the move
  • Hybrid & Multi-cloud environments: Strategies for migration & app modernization
    Hybrid & Multi-cloud environments: Strategies for migration & app modernization Jay Lyman, Principal Analyst, 451 Research with Shashi Kiran, CMO, Quali Sep 6 2017 5:00 pm UTC 60 mins
    Hybrid clouds are important for enterprises having on-premise deployments as well as legacy applications. Likewise, multi-cloud scenarios appeal to organizations that want the flexibility to move between different clouds and not get locked-in into either one public or private clouds architecture. While over 70% of enterprises have expressed a need to deploy hybrid and/or multi-cloud architectures, as they modernize their application architectures the rollouts are complex and time consuming causing budget overruns and delays. The complexity is largely associated with the lack of common tooling, mismatched cloud architectures and expertise. These can be significantly overcome by providing access to on-demand, self-service IT environments (on-premise as well as public cloud, or a combination thereof), that would allow for more predictable application performance and security, thereby allowing for faster cloud migration and rollout, with reduced cost and risk.

    Join this webinar with 451 research and Quali to learn:
    •Current trends in hybrid and multi-cloud deployments and enterprise requirements
    •How incorporating sandboxes and self-service environments in the workflow can smoothen cloud migration, hybrid deployments and the flexibility of multi-cloud deployment. Demo included.
    •Sample case study of an enterprise undergoing cloud migration with best practice recommendations