Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Webinarreihe Lean Agile Enterprise: 2 - Agile Softwareentwicklung als Basis
    Webinarreihe Lean Agile Enterprise: 2 - Agile Softwareentwicklung als Basis Katja Gibbels. Presales Technical Consultant, Micro Focus Recorded: Jun 22 2018 58 mins
    Live-Webinarreihe:
    Lean Agile Enterprise - erfolgreiche Umsetzung mit dem Scaled Agile Framework SAFe®

    Um die digitale Transformation erfolgreich zu meistern, müssen Organisationen die Fähigkeit haben, den schnellen Wandel und die Veränderungen des Marktes zu antizipieren und für sich zu nutzen. Immer mehr Unternehmen setzen dabei auf agile Vorgehensweise und führen deshalb die weltweit führende Skalierungsmethode zur Agilität, Scaled Agile Framework (SAFe®), ein.
    Erfahren Sie in dieser kostenfreien Webinarreihe, mit welchen Lösungen und Tools wir Sie dabei unterstützen, SAFe® in Ihrem Unternehmen umzusetzen, um damit dauerhaft wettbewerbsfähig und erfolgreich im Markt bestehen zu bleiben.

    Webinar 2: Agile Softwareentwicklung als Basis für Lean Agile Enterprise
    22. Juni 2018 I 10:00 - 11:00 Uhr

    Erfahren Sie in diesem Webinar, wie Sie Lean Agile Enterprise und die agilen Prinzipien in der Softwareentwicklung umsetzen können. Das Scaled Agile Framework (SAFe®) nutzt dabei SCRUM- und Kanban Methoden, die bereits von vielen Entwicklungsteams angewendet werden, als Basis und ermöglicht somit, die Entwicklung zu Lean Agile Enterprise zu optimieren. Das zweite Webinar dieser Reihe wird Ihnen eine tiefere Sicht darauf geben und stellt vor, wie ALM Octane einen Lean Agile Entwicklungsprozess unterstützen kann.
  • The Need For Automated Asset Management in ICS
    The Need For Automated Asset Management in ICS IndegyTV Recorded: Jun 22 2018 3 mins
    Why is automated asset management and discovery needed in industrial networks
  • The Cyber Threat Landscape in K-12 Schools from the FBI’s Perspective
    The Cyber Threat Landscape in K-12 Schools from the FBI’s Perspective Special Agent Michael Morgan, FBI Recorded: Jun 21 2018 61 mins
    While cyber threats are exponentially increasing in volume, diversity and sophistication, they are rapidly outstripping our ability to safeguard critical data, applications and systems. Join this webinar to hear SA Morgan explain how the FBI addresses the cyber threat, discuss the cyber threat landscape in K-12, and provide prevention and mitigation techniques that you can implement on your campus.
  • What to expect when Ansible meets your organization - what we wish we'd known
    What to expect when Ansible meets your organization - what we wish we'd known Ryan Bontreger, associate platform consultant, Red Hat Scott Knauss, architect, Red Hat Recorded: Jun 21 2018 62 mins
    Thinking about automation in your massive enterprise environment? Ansible® is the wave of the future, but is it right for what you need it to do?

    Join this webinar to hear:
    > About the ins and outs of planning for Ansible in your organization.
    > How to integrate Ansible within your workflow.
    > What not to do with Ansible.
  • Network considerations for hybrid cloud
    Network considerations for hybrid cloud Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Recorded: Jun 21 2018 46 mins
    Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.

    Learn how Citrix networking solutions for hybrid cloud can deliver:

    •Contextual and secure access to applications
    •Website and application protection from internal and external threats
    •Application and network visibility and intelligent analytics
    •Flexibility and performance
  • A New Era in Data Storage for Machine Learning and AI Ecosystems
    A New Era in Data Storage for Machine Learning and AI Ecosystems Ashish Gupta Recorded: Jun 21 2018 45 mins
    As enterprises transition their Business Intelligence and Analytics environments to Machine Learning and Artificial Intelligence driven ecosystems, their core data infrastructure has to scale. Focusing only on the compute layers, creates a highly inefficient infrastructure. Vexata with its VX-OS version 3.5 release brings to market transformative economics and breakthrough performance to power these next-generation workloads at scale.e.

    You will learn about:
    • How to scale core data infrastructures for the transition to Machine Learning and Artificial Intelligence workloads
    • What are the key considerations before creating an AI/ML-centric storage infrastructure
    • How Vexata's new VX-OS version 3.5 release addresses these challenges
  • FCoE vs. iSCSI vs. iSER
    FCoE vs. iSCSI vs. iSER J Metz, Cisco; Saqib Jang, Chelsio; Rob Davis, Mellanox; Tim Lustig, Mellanox Recorded: Jun 21 2018 62 mins
    The “Great Storage Debates” webcast series continues, this time on FCoE vs. iSCSI vs. iSER. Like past “Great Storage Debates,” the goal of this presentation is not to have a winner emerge, but rather provide vendor-neutral education on the capabilities and use cases of these technologies so that attendees can become more informed and make educated decisions.

    One of the features of modern data centers is the ubiquitous use of Ethernet. Although many data centers run multiple separate networks (Ethernet and Fibre Channel (FC)), these parallel infrastructures require separate switches, network adapters, management utilities and staff, which may not be cost effective.

    Multiple options for Ethernet-based SANs enable network convergence, including FCoE (Fibre Channel over Ethernet) which allows FC protocols over Ethernet and Internet Small Computer System Interface (iSCSI) for transport of SCSI commands over TCP/IP-Ethernet networks. There are also new Ethernet technologies that reduce the amount of CPU overhead in transferring data from server to client by using Remote Direct Memory Access (RDMA), which is leveraged by iSER (iSCSI Extensions for RDMA) to avoid unnecessary data copying.

    That leads to several questions about FCoE, iSCSI and iSER:

    •If we can run various network storage protocols over Ethernet, what
    differentiates them?
    •What are the advantages and disadvantages of FCoE, iSCSI and iSER?
    •How are they structured?
    •What software and hardware do they require?
    •How are they implemented, configured and managed?
    •Do they perform differently?
    •What do you need to do to take advantage of them in the data center?
    •What are the best use cases for each?

    Join our SNIA experts as they answer all these questions and more on the next Great Storage Debate.
  • How do enterprises use containers? A discussion of 2018 Docker usage.
    How do enterprises use containers? A discussion of 2018 Docker usage. Eric Carter Recorded: Jun 21 2018 45 mins
    What are the top application components running in containers? What is the lifespan of containers, container images, and services? How is orchestrator adoption changing? What keeps container developers and administrators up at night?

    Join us for a discussion of these topics and more in our review of the 2018 Docker Usage Report - based on a sample of 90,000 containers in real-world deployments.
  • Building for a Better Future: Using SD-WAN to Rebuild a Business Network
    Building for a Better Future: Using SD-WAN to Rebuild a Business Network Rick Rader, IT Director with Myron Steves & Scott Turner and David Turner with Meriplex & Rosa Lear with VeloCloud Recorded: Jun 21 2018 29 mins
    In today’s world, undisrupted network connectivity is critical to ensuring business continuity. As the adoption of virtual instances and cloud migration accelerates, dependence on high quality, high speed, high bandwidth connections becomes a necessity. Outages have far reaching implications and can be detrimental to a business as the networks of yesterday are ill-prepared for the business of today and the future. SD-WAN is changing this scenario. In this webinar, Myron Steves discusses how its implementation of SD-WAN transformed their entire network and prepares them for future growth.

    Presenters:
    Rick Rader, IT Director with Myron F Steves
    Scott Turner, Director of Sales with Meriplex Communications
    David Turner, Principal Technologist with Meriplex Communications
    Rosa Lear, Senior Marketing Manager with VeloCloud now part of VMware
  • Network considerations for hybrid cloud
    Network considerations for hybrid cloud Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Recorded: Jun 21 2018 43 mins
    Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.

    Learn how Citrix networking solutions for hybrid cloud can deliver:

    •Contextual and secure access to applications
    •Website and application protection from internal and external threats
    •Application and network visibility and intelligent analytics
    •Flexibility and performance
  • Ask The Experts: Part 1 Using Automation to fight automation
    Ask The Experts: Part 1 Using Automation to fight automation Laurence Pitt, Global Security Strategy Director at Juniper Networks Lee Fisher Recorded: Jun 21 2018 3 mins
    Laurence Pitt, Security Strategy Director at Juniper Networks discuss how cyber criminals are using automation to stay ahead of security experts preventative measures. They're using automation to create malware, resulting in an increasingly regular number of security breaches. Laurence also discusses the need for businesses to automate the simpler aspects of their security processes, to free up time for human intelligence to spot behavioral abnormalities.
  • 『2018 年インターネットセキュリティ脅威レポート』より、脅威の最新動向についてご説明します。
    『2018 年インターネットセキュリティ脅威レポート』より、脅威の最新動向についてご説明します。 髙岡 隆佳, エバンジェリスト, Symantec Japan Recorded: Jun 21 2018 63 mins
    2017 年には、WannaCry と Petya/NotPetya の爆発的な流行や、コインマイナーの急激な増加などが見られました。デジタル世界のセキュリティ脅威は予想もしない新たなところから出現し、それに対する警戒が必要という状況は変わっていません。量的に増えているだけでなく、脅威を取り巻く世界はますます多様化しています。攻撃者は、新しい攻撃の経路を見いだすことにも、攻撃しつつその痕跡を隠すことにも、さらに懸命になってきました。

    シマンテックのエバンジェリストである髙岡 隆佳が、『2018 年インターネットセキュリティ脅威レポート(ISTR)』についての所見をお伝えします。主な内容は、次のとおりです。

    - コインマイニングのゴールドラッシュ到来
    - ランサムウェアの傾向が変化
    - 
数字で見る標的型攻撃
    - 
ソフトウェアサプライチェーンの感染
    - モバイル脅威の急増

    今すぐ登録
  • Creating Collaborative Huddle Rooms—How to Select the Right Tools and Technology
    Creating Collaborative Huddle Rooms—How to Select the Right Tools and Technology Brian Fichter, Director, Video Collaboration, Carousel Industries & Chris Thorson, Sr. Director, Polycom Recorded: Jun 20 2018 46 mins
    While traditional video conference rooms remain an anchor in most organizations, today’s accessible video technology means any space can be turned into a video collaboration space. In fact, With the growth in remote workers, the need for collaborative meeting spaces is on the rise to connect on and offsite workforces.
    Regardless of what solutions you are using today — Polycom, Microsoft, WebEx or GoToMeeting, to keep up with the demands of the modern workforce, you should be able to easily integrate legacy functionality with new capabilities.

    During this webinar, collaboration technology experts from Carousel and Polycom will discuss how you can:

    • Maximize capabilities within multi-vendor platforms for investment protection
    • Design collaborative workspaces with high quality audio, HD content and business-class video
    • Drive adoption with easy to use technology that doesn’t scare people away
  • Webinar: Accelerate Technical Sales through Self-Service Demos
    Webinar: Accelerate Technical Sales through Self-Service Demos Pascal Joly, Dir Techology Partnerships, Quali, Matt Branche, Services Lab Engineer, Broadcom Recorded: Jun 20 2018 37 mins
    Featuring: Industry Experts from Broadcom and Quali
    Are you spending too much time prepping demos? Not enough time running killer customer demos? That’s the challenge with demoing complex technology products: they’re hard to setup.

    Join us with industry experts from Broadcom and learn how to create a self-service catalog of demo environments that can serve your sales team effectively, how these environments can be deployed in minutes with built in orchestration, and how to expose "one-click" commands in the sandbox for demoing complex technology products. To be sure, there will also be a live demo :)
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation
    When the Walls Come Tumbling Down – Network Security for the Cloud Generation Mike Chen, Director of Product Marketing, Symantec and Tim Murphy, Sr. Manager Network Product Marketing, Symantec Recorded: Jun 20 2018 60 mins
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:

    - Why you should embrace cloud-based network security

    - The tools you need to provide protection against a variety of attacks

    - Why a proxy belongs at the center of your cloud service

    - Cloud migration strategies

    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today
  • Learn to Fight Cloud Sprawl and Eliminate Service Outages
    Learn to Fight Cloud Sprawl and Eliminate Service Outages Vid Sista, Director of Technology Solutions Recorded: Jun 20 2018 15 mins
    Adding automation to your IT environment is one of the best ways to fight cloud sprawl and help eliminate service outages. In this 15-minute webinar, Accudata’s Director of Technology Solutions Vid Sista will explain:

    How automation solutions enable you to proactively identify service issues
    Why cloud sprawl is a major threat to IT security – and how you can stop it
    What businesses can do to automate their IT services lifecycle
  • [Ep.17] Ask the Expert: Data Migration and Third Party Maintenance
    [Ep.17] Ask the Expert: Data Migration and Third Party Maintenance Chris Crotteau, Director of Strategic Product Development & Glenn Fassett, GM - EMEA, Curvature Recorded: Jun 20 2018 61 mins
    How easy is it to move data?

    Between traditional, on-premises data centers, hosted/collocated data centers, and infrastructure as a service (IaaS) through the large cloud providers, where to store your data and run your business critical applications is now a source of significant complexity in the IT world. Understanding your application set and business needs, then determining where best to run those applications and store their data presents a host of challenges both old and new.

    So where does Third Party Maintenance fit into all of this? Or better yet….what IS Third Party Maintenance?

    Join us for an engaging discussion with Curvature’s IT infrastructure experts to learn:

    •What Third Party Maintenance (TPM) is and how it has become a vital market segment focused first and foremost on the client’s needs
    •How TPM can cost-effectively extend the life of IT assets and align the lifetime of those assets to your application and software lifecycles
    •How TPM can enable you to manage major IT infrastructure transitions in a much more cost effective manner

    About the experts:

    Chris primarily works in the Services department as a Solutions Architect developing technological solutions and strategies for clients. As a technology expert, Chris leads a team of technical engineers to develop new tactics and processes for clients from development to design. Chris was named Employee of the Year in 2005 and 2009.

    Glenn is responsible for the strategic growth and expansion throughout Europe. Previously, Glenn managed Curvature’s international operations and led the company’s entry into Europe in 2002, successfully launching Curvature’s Asia-Pacific division in 2007. Prior to leading this international expansion, Glenn managed enterprise accounts as a distinguished member of Curvature’s U.S. sales organization beginning in 1996.
  • Secure Datacenters in Space
    Secure Datacenters in Space Dennis Gatens, Jeff Snyder, Alex Pezold,David Morris Recorded: Jun 20 2018 81 mins
    While everyone is talking about Cloud based data centers, the real migration is to outer space, where satellites continuously orbit the Earth. How will this work and what are the security implications. The Goddard Space Flight Center's lists 2,271 satellites currently in orbit.

    Join this panel of experts as we cover:
    •The migration of data centers to satellites
    •The benefits, risks, vulnerabilities and threats posed to a satellite based datacenters

    Dennis R. Gatens: VP Channel Management & Marketing at Cloud Constellation Corporation

    Jeff Snyder: CTO at Cloud Constellation Corporation

    Alex Perzold:Co-Founder and CEO at TokenEx
  • Data-Driven IT in Travel & Tourism: How to Maintain a Competitive Advantage
    Data-Driven IT in Travel & Tourism: How to Maintain a Competitive Advantage Tyson Supasatit, PMM at ExtraHop and Jon Randall, Senior Solutions Architect, EMEA at ExtraHop Recorded: Jun 20 2018 33 mins
    The tourism industry is a highly competitive space; be it for airline operators, hotel booking sites, or travel fare aggregators. It is an industry that has been heavily digitised and in which a 2% profit is considered a good year. In this environment, IT teams in travel & tourism are constantly being asked to provide better, more secure digital experiences at less cost. The key to greater efficiency and performances is visibility into complex IT environments, where a single business transaction could involve 30 different hops across Citrix, Sabre applications, and third-party API calls.


    In this webinar, we'll be looking at real-life examples of how IT teams can leverage enterprise-scale IT analytics backed by AI to:

    - Improve application performance in highly complex IT estates
    - Reveal suspicious activity on their network
    - Provide business intelligence for reducing costs and improving profitability
  • The Time for vCPE is NOW!
    The Time for vCPE is NOW! Eyal Aloni & Philip Jerichower, RAD Recorded: Jun 20 2018 43 mins
    White boxes may be general purpose, low-cost and easy to commoditize, but they lack many OAM functions and connectivity options that cannot always be virtualized, yet are still required by operators. In this webinar, we will explain how to bridge these gaps by supplementing universal CPEs (uCPEs) with universal access, enhanced performance monitoring and diagnostics, legacy TDM service support, and 1588 timing synchronization. We will also share typical use cases based on real-live experience of tier 1 operators using white boxes for virtualized business services today.

    Eyal Aloni Head of Service Provider Line of Business - RAD
    Philip Jerichower, Director of International Training, RAD
  • Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting
    Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Jun 20 2018 77 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Cyber-Espionage and Threat Hunting

    Our Verizon Threat Research Advisory Center presenters will be:
    •Chris Novak, Director, Investigative Response
    •Jihana Clemetson, Senior Analyst, Threat Intelligence
    •Marcus Cymerman, Senior Analyst, Network Forensics
    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas

    For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.

    Following the cyber-espionage insights, we'll cover the following topics:

    •Current Intelligence
    •Attacks & Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Parallel Wireless Public Safety LTE
    Parallel Wireless Public Safety LTE Zahid Ghadialy, David Cullerot and Amir Lugasi Recorded: Jun 20 2018 39 mins
    Public safety is moving from outdated communication systems to 4G LTE to meet the need for data in daily operations and emergency situations. However, public safety cannot move to public safety LTE with current commercial LTE architectures because commercial LTE has coverage gaps in areas that may not be commercially viable.

    Parallel Wireless Public Safety LTE communication solution provides a unified resilient LTE network for police, fire, ambulance, and armed forces in tactical operations, emergencies, and day-to-day communication – all at much lower cost. It can even be deployed instantly in ad hoc scenarios as a deployable/man portable solution!

    Please join us on June 20 at 9:00am EDT for a not-to-be-missed webinar where we will discuss our public safety LTE solution which has been installed in 25+ global military, police, and fire deployments and has been selected by a public safety LTE network in Europe.

    In this webinar, you will learn how Parallel Wireless innovative Public Safety LTE architecture addresses the needs of network control, coverage everywhere, and resilience while allowing graceful and cost-effective migration to LTE.
  • Does BYOD Mean Bring Your Own Dissatisfaction?
    Does BYOD Mean Bring Your Own Dissatisfaction? Mike Marks, Riverbed Product Evangelist Recorded: Jun 20 2018 41 mins
    Improve IT performance across all mobile devices and business-critical apps for complete end-user satisfaction.

    Your workforce is mobile. They need fast, reliable and secure access to corporate resources from their smartphones and tablets to be productive no matter where business takes them.

    Enabling a mobile workforce is a business necessity. But, BYOD and the ever-growing number and types of apps and devices complicate matters. While mobile workspaces provide some level of control, enterprises still struggle to deliver 5-star digital experiences to their mobile end users.

    Attend this webinar to:

    Explore key requirements for mobile application and end-user experience monitoring
    See a demo of how SteelCentral delivers real-time performance analytics from the user’s device to back-end infrastructure
    Move beyond access and control to actually measuring and improving end-user experience
  • Four IT Challenges of Software Development Teams & How to Manage Them
    Four IT Challenges of Software Development Teams & How to Manage Them Ofir Agasi, Director of Product Marketing, Cato Networks Recorded: Jun 20 2018 53 mins
    From India to Belarus, organizations are tapping software development talent in emerging markets. These developers often work outside of company offices, leading to four IT challenges that can undermine developer productivity, render cloud-based versioning systems and repositories unusable, complicate onboarding new developers, and increase risk.

    Learn from the experiences of three IT pros supporting distributed development teams, and how Cato Cloud solves those challenges.
  • Dell EMC PowerMax – Tier-0 хранилище на NVMe
    Dell EMC PowerMax – Tier-0 хранилище на NVMe Игорь Виноградов, старший системный инженер Dell EMC Recorded: Jun 20 2018 60 mins
    На вебинаре мы рассмотрим новую СХД от Dell EMC – PowerMax, объявленную на Dell Technologies World. Основное внимание будет уделено архитектурным особенностям PowerMax и выгоде, которую они дают, основным отличиям от предыдущих моделей СХД, а так же рассмотрены текущие тренды в хранении данных. Вебинар проводится при поддержке компании Intel®