Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • New Insights into Iranian Cyber Espionage Group
    New Insights into Iranian Cyber Espionage Group Stuart Davis, Director, Mandiant; Nick Carr, Senior Manager, TORE Detection & Analysis Recorded: Sep 21 2017 49 mins
    Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2013. 
     
    Join us in a live webinar as we discuss this threat group whom we asses to be involved in a long-term, resource intensive cyber espionage operation motivated by the prospect of collecting strategic intelligence, including information related to the aviation and energy industries, which would ultimately benefit a nation-state or military sponsor.
     
    Register today to gain deeper insights into this threat group!
  • CA UIM Best Practices: Custom App Infra. Discovery & Monitoring Configuration
    CA UIM Best Practices: Custom App Infra. Discovery & Monitoring Configuration Umair Khan, Product Marketing; Jared Schwader, Software Engineer; Jake Meacham, Software Engineer - CA Technologies Recorded: Sep 20 2017 68 mins
    Watch this webcast to learn about how recently added auto-application infrastructure discovery capabilities within CA Unified Infrastructure Management allows you to automate discovery and speed monitoring deployment. We will cover how you can create your own scripts for automatically discovering and configuring custom application infrastructure elements or technologies.
  • Protect Your Hybrid Cloud Workloads from a Single Console
    Protect Your Hybrid Cloud Workloads from a Single Console Dan Frey, Senior Manager, Product Marketing, Symantec & Deepak Dalvi, Product Manager, Symantec Recorded: Sep 20 2017 57 mins
    The public cloud offers undeniable benefits for organizations including agility, cost savings, and competitive advantages. In fact, some enterprises are choosing to abandon their on-premises data centers altogether and go “all-in” with the public cloud. The reality, however, is that most companies are pursuing a “hybrid” approach, using a combination of public cloud, private cloud, and on-premises resources and infrastructure to deliver applications and services to their employees and customers. But how can you efficiently protect all of your workloads against the latest data breach threats and ransomware attacks across such diverse environments and infrastructures? Tune in to our webcast and learn:

    •How to discover, secure, and monitor all of your hybrid cloud workloads from a single console

    •How to respond to alerts and update policy across your hybrid cloud without hiring an army of experts

    •How to manage virtualized and physical on-premises servers protected by Symantec Data Center Security (DSC) agents from the Cloud Workload Protection (CWP) console
  • Scale vs. Services: Finding, Funding & Valuing Assets for the Digital Future
    Scale vs. Services: Finding, Funding & Valuing Assets for the Digital Future Kelly Morgan, 451 Research, Bank Street, Deutsche Bank Recorded: Sep 20 2017 39 mins
    As enterprises evolve their digital infrastructure, service providers need to piece together offerings that will differentiate themselves without breaking the bank. In this panel we will discuss how M&A can provide some missing pieces and what those pieces may be. Join our distinguished panel of finance experts as we discuss key questions such as: Who is likely to go shopping? What firms will be targets? Are networks and datacenters more or less sought after than services and software providers? How are assets being valued? What financing is available and on what terms? We will debate these and more as we explore trends impacting this dynamic sector.

    Leadership Panel Session Featuring:
    James Henry, Senior Managing Director, Bank Street
    Andrew Bartrop, Global Investment Banking, Deutsche Bank Securities, Inc.
  • How to pick a winning IoT business model
    How to pick a winning IoT business model Mike Bell Canonical, Ian Hughes 451 Research Recorded: Sep 20 2017 63 mins
    Getting started on an IoT project? Are you going to build a business or a liability for yourself? Canonical commissioned a research of 361 IoT professionals to find out how their projects are progressing. The findings were compiled in a report titled Defining IoT Business Models, which explored the practices of organisations currently implementing IoT projects. You can read it for yourself at http://ubunt.eu/vkTPIW

    In this webinar, Canonical's EVP of Devices & IoT and 451 Research's IoT Analyst will discuss our findings as well as the challenges and opportunities businesses will face with the internet of things!

    Join our webinar to find out...
    >How businesses can monetise the internet of things in the long term
    >What skills they need and where to find them
    >How to address fundamental security considerations.
  • DNS: From Achilles Heel to Secret Weapon
    DNS: From Achilles Heel to Secret Weapon Liam Eagle, Research Manager of Hosting & Cloud at 451 Research; Jonathan Sullivan, Co-founder & CPO at NS1 Recorded: Sep 20 2017 52 mins
    DNS plays a central role in all online services but for many enterprises, DNS is inhibiting efforts to modernize infrastructure and boost online performance. In this webinar, Liam Eagle from the 451 Group and Jonathan Sullivan, co-founder of NS1 discuss the role of DNS in how applications are deployed and delivered. Learn the results of the latest 451 research and discover how a modern, intelligent DNS delivers positive business results for online enterprises. Topics include:
    1.How the application deployment landscape is changing: DevOps, automation, infrastructure as code.
    2.Application performance and new techniques for getting more value at less cost from your cloud, CDN and network providers.
    3.How enterprises are leveraging intelligent DNS to gain better results from their top IT initiatives.
  • High-Value Partnering: Why 'Sell With' is the New 'Sell Through'
    High-Value Partnering: Why 'Sell With' is the New 'Sell Through' Rory Duncan, 451 Research, HPE, OnApp, Ormuco Recorded: Sep 20 2017 61 mins
    In the era of cloud, the significance of distribution to the supply chain is changing dramatically. Channel partners have moved-on from ‘tin shifting’ commoditized IT, instead working in tandem with vendors and providers to supply new kinds of complex cloud services to meet enterprise demand. As the focus moves from cloud construction to cloud consumption, the importance of these relationships increases, shifting the market opportunity to an ecosystem of connected specialists. Modern systems integrators, managed service providers and VARs are bringing higher-value, niche and vertical offerings to market that traditional ‘sell through’ models however, do not address. In this session, Rory Duncan, Research Director for Managed Services & Hosting, will outline the revised ‘sell with’ strategies that vendors and service providers alike must adopt in order to facilitate the delivery of high-growth services - including managed private cloud, security and disaster recovery – in partnership with their channel ecosystem.

    Leadership Panel Session Featuring:
    •Xavier Poisson Gouyou Beauchamps, Vice President, Indirect Digital Services, HPE
    •Caroline Paine, Sales Director - Service Providers, OnApp
    •Dan Havens, SVP of World Wide Sales, Ormuco
  • 10 inTech with Gerry Sweeney, CEO & CTO Hornbill ( @gerrysweeney )
    10 inTech with Gerry Sweeney, CEO & CTO Hornbill ( @gerrysweeney ) IT Chronicles Media Recorded: Sep 20 2017 13 mins
    Gerry talks to the Ten inTech team about the direction Hornbill have taken to address the changes being seen in many IT organizations to increase collaborative ITSM across the enterprise
  • Key Requirements for Automating Service Delivery in Hybrid Cloud Environments
    Key Requirements for Automating Service Delivery in Hybrid Cloud Environments Derek Yee, Citrix, Chiradeep Vittal,Citrix, & Paul Parker-Johnson, ACG Research Recorded: Sep 20 2017 57 mins
    Many organizations are choosing a hybrid approach to managing application delivery, balancing investments in on-premise and private cloud infrastructure with those in the public cloud. This can present challenges for IT to ensure application reliability, performance and security across a heterogeneous cloud topology.

    Join SDX Central and Citrix to learn how to:

    • Deploy a software-based application delivery proxy that ensures application health and security.
    • Automate application network services and resources across multi-cloud topologies.
    • Provide visibility and management beyond what your public cloud provider can offer.
    • Integrate service discovery in a Kubernetes environment to support new clustered containerized applications.

    Presenters:

    Derek Yee, Senior Product Marketing Manager, Citrix

    Chiradeep Vittal, Distinguished Engineer, Citrix

    Paul Parker-Johnson, Principal Analyst, ACG Research
  • IoT and Smart Buildings: The New Construct
    IoT and Smart Buildings: The New Construct Yann Palmore, JLL; Ray Moya, COO/CTO, Argent Associates, Inc., Moderated by Limor Schafman, TIA Recorded: Sep 20 2017 61 mins
    Real estate developers, owners and tenants are rethinking the office building experience. Not only are buildings becoming increasingly efficient in in-door energy management and operations, they are also beginning to interact with the people who work within the walls, and with the out of doors environment.

    This type of sentient building design is making use of increased connectivity to and in buildings, as well as the use of sensors and IoT applications. This webcast will discuss communications and connectivity infrastructure that is being deployed in and to current real estate developments; what buiding owners, operators and tenants expect; the impact smart community development is having on smart buildings; and sample smart building IoT applications.

    Speakers:
    Yann Palmore, Vice President, Smart Building Solutions, JLL
    Ray Moya, COO/CTO, Argent Associates, Inc.

    >> Yann Palmore helps CRE investors, owners, and operators understand how to rethink building system infrastructure to support Internet of Things (IoT) technologies and drive smart building strategies. Yann’s key responsibilities are to guide clients through a structured process that prioritizes program goals, defines specific smart building strategies, specifies appropriate technologies, and oversees program implementation.

    >> Ray Moya has over 25 years of network engineering and organizational management experience. His specializations include, wireline and wireless voice and data networks, network security, software development, and finance. He has designed, engineered and installed hundreds of Fortune 500 Company and Government networks. He leads network-consulting teams in LAN/WAN, software development, wireless technologies, and Network security.

    For more about the speakers, please visit: http://www.tiaonline.org/webcast-iot-and-smart-buildings-new-construct
  • Digital Transformation: How Europe will turn disruption into differentiation
    Digital Transformation: How Europe will turn disruption into differentiation Nick Patience 451 Research, Matt Leonard CenturyLink Recorded: Sep 20 2017 59 mins
    Join 451 Research and CenturyLink on the 20th September at 3:00pm UK time, 4:00pm CET, to discuss how enterprises are choosing and deploying digital transformation initiatives for business gain. This webinar will focus on the strategies and actions impacting the European market.

    Organisations of all sizes and in every sector are busy redefining their IT priorities for a digital future, identifying the goals of enhanced customer experience, operational efficiency, business agility and improved risk management as four key pillars for their digital transformation strategies.

    Digital transformation can play out differently depending on a company’s maturity, the vertical sector in which it operates, its employees, its infrastructure, and its ability to innovate. Knowing where to start, and how to maintain momentum is critical.

    Join 451 Research and CenturyLink to learn how European enterprises are making assured first steps, and discover the following:

    - Understand how companies with more progressive digital transformation strategies are prioritising their efforts for competitive differentiation, changing the nature of their business with innovative technologies, and making service provider choices to accelerate results.

    - Gain insights and recommendations from a major survey of the IT priorities of enterprises in Europe.

    - Identify the key shifts in business context that will continue to shape digitisation efforts, and how these need to be reflected in a digital transformation roadmap for IT organisations.
  • Barracuda Networks | Small Business Advice Week Event – 2017
    Barracuda Networks | Small Business Advice Week Event – 2017 Chris Ross - Sales Vice President Barracuda Recorded: Sep 20 2017 2 mins
    Small Business Advice Week is here to help the country's 4.5 million SMEs thrive in tough times, with advice from both leading experts and businesses across Britain.

    Barracuda Networks is here to help SMEs prevent cyber security breaches.
  • SAP-Systeme testen – lückenlos, automatisch & schnell
    SAP-Systeme testen – lückenlos, automatisch & schnell Thomas Koeppner, Senior Principal Technical Consultant Recorded: Sep 20 2017 47 mins
    SAP-Umgebungen gehören zu den wichtigsten IT-Systemen in Unternehmen. Treten Fehler auf, stehen wichtige Unternehmensbereiche wie Einkauf, Vertrieb oder Finanzbuchhaltung still. SAP-Systeme müssen also vor der Einführung und nach jeder Aktualisierung gründlich getestet werden, bevor sie in den Produktivbetrieb gehen. Manuell durchgeführt sind solche Tests jedoch sehr aufwändig. Oft übernehmen die Fachanwender diese Aufgabe und werden so von ihren eigentlichen Verpflichtungen abgehalten. Zudem lassen sich manche Services, etwa Kreditkartenzahlungen oder Zugriffe auf Produktivdatenbanken, nicht ohne weiteres im laufenden Betrieb überprüfen und die meist zahlreichen Schnittstellen erschweren den Aufbau einer stabilen Testumgebung.

    Unzureichende Tests sind die Folge und so kommt es, dass 10 bis 20 Prozent der Fehler in einem neuen Release erst entdeckt werden, wenn dieses bereits im Produktivbetrieb ist.

    Doch das muss nicht sein. Automatisierte Verfahren und die Simulation von Services, auf die man nicht direkt zugreifen kann, erlauben es, ein SAP-System schnell, durchgängig und gründlich zu testen.

    Wie das geht, erfahren Sie in diesem kostenfreien on-demand Webinar anhand ausgewählter Praxis-Beispiele und spannender Live Demos. Informieren Sie sich in 45 Minuten unter anderem:

    Wie Sie sämtliche Testanforderungen abdecken – von Funktions- über Integrations- und Regressionstests bis hin zu Last- und Performancetests sowie Sicherheitstests.

    Wie mithilfe von Servicevirtualisierung eine stabile Testumgebung aufgebaut werden kann, die zuverlässig wiederholbare Tests ermöglicht.

    Wie Sie den Zeit- und Ressourcenaufwand für SAP-Tests um bis zu 50 Prozent verringern.

    Wir freuen uns auf Ihr Interesse!
  • Intel's Data Center Game Changer
    Intel's Data Center Game Changer Noel John BDM, Intel Data Center Management Solutions - Dror Shenkar, Chief Architect, Intel Data Center Management Solutions Recorded: Sep 20 2017 51 mins
    A rapid rate of change complicates every facet of datacenter management, and server-centric compute models are too cumbersome for today’s highly variable workloads. Is it possible to optimize resources and operations in such dynamic environments? In this presentation, learn how to replace manual, hardware-defined application provisioning and management with a highly automated, software-defined resource model and orchestration layer that enables flexibility, simplified on-demand capital efficiency, and lower TCO. Find out how to compose more agile pools of datacenter resources, and simultaneously drive up IT efficiency, optimize energy requirements, increase datacenter resilience, and strengthen disaster recovery plans.
  • What's on Your Network?
    What's on Your Network? Jon Garside, Product Marketing Manager at Aruba, a Hewlett Packard Enterprise Company Recorded: Sep 19 2017 42 mins
    Today’s businesses are embracing anywhere, anytime connectivity. But what often gets ignored is the need for secure network access control. Some are using a “laid back NAC” solution while others choose the same vendor for both security and network infrastructure. The danger of these approaches is that they give the illusion of security and compliance, but in reality leave extensive security gaps.

    What is your business doing to protect your network?

    Ask yourself:
    •What’s on my network?
    •How do I simplify mobile security?
    •Can I limit mobile devices without limiting productivity?
    •How do I unify internal and external security tools?

    View this webinar to learn how you can improve the end-to-end security across your enterprise.
  • Thinking of SD-WAN? Critical Factors for a Successful Network Transformation
    Thinking of SD-WAN? Critical Factors for a Successful Network Transformation Jim Duffy 451Research, Karim Eljai NTT Recorded: Sep 19 2017 55 mins
    In a rapidly evolving and digitized economy, the adoption of cloud services is accelerating for companies both small and large who want to remain competitive and relevant to their market and clients. Network transformation becomes critical for enterprises to support these cloud initiatives and in this context the emergence of SD-WAN is very timely. If you are considering SD-WAN to access cloud applications and leverage the Internet for your wide area network, this webinar will provide insight into real life SD-WAN deployment considerations. This knowledge will help you fast track your SD-WAN decision-making process and avoid costly mistakes.

    Join this webinar to learn:
    • How connectivity and security need to be a critical consideration of SD-WAN deployment, both at the data center and small branch office level
    • How SD-WAN network analytics can provide you with detailed visibility into the behavior of your network and can help your IT organization better manage workload and performance
    • Why it’s important to select a partner who is flexible and can offer choices from the design, deployment and management of the transformation
    • And more
  • Prevent Malware Attacks by Adding the Power of Web Isolation
    Prevent Malware Attacks by Adding the Power of Web Isolation Gerry Grealish, Senior Director – Product Marketing, Cloud Security, Symantec Recorded: Sep 19 2017 31 mins
    Web Isolation gives you safe access to uncategorized and potentially risky websites, without risk of malware infection.

    This powerful category of technology, predicted by Gartner to be adopted by 50% of enterprises by 2021. Web Isolation creates a secure execution environment between end-users and the web, sending only a safe visual stream to users’ browsers.

    Since no code is actually executed on endpoint machines, Symantec Web Isolation eliminates web-borne threats from ever reaching their devices.

    Find out how Symantec is integrating Web Isolation with other products in its Web and Cloud Security portfolio to keep you safe from ransomware and other advanced threats.

    Register Today
  • Navigating a Multi-Cloud World: Application Solutions for Tomorrow's IT
    Navigating a Multi-Cloud World: Application Solutions for Tomorrow's IT Sam Barnett, Director of Solutions Marketing, John Giacomoni, Senior Director of Product Development Recorded: Sep 19 2017 43 mins
    The cloud has transformed business and IT. By moving to the cloud, businesses are rapidly changing to become faster, innovative, and more connected. Many organizations are starting to embrace a multi-cloud world. However, this has added architectural complexity in ways not previously considered. Where and how you choose to deploy an application in the cloud could become an advantage or a liability.

    Join us for an informative webinar where you will learn:
    •The emerging challenges of multi-cloud environments
    •How to reduce complexity with consistent application services for any environment
    •Solutions to manage your applications in a multi-cloud world
  • An end-to-end problem solving approach for Incident and Problem Mgmt.
    An end-to-end problem solving approach for Incident and Problem Mgmt. David Frank, Client Relationship Manager and Consultant Recorded: Sep 19 2017 45 mins
    David will talk about the “pressure cooker” that is IT Operations and how it relates to (Major) Incident and Problem Management. He will introduce the value of consistent, quality troubleshooting and an end-to-end IT support approach.

    Key take-always:

    IT stability and the challenges of achieving it in IT Operations
    The role of structured thinking and quality troubleshooting – the Kepner-Tregoe approach
    An end-to-end view of Incident, Problem and Change Management
    Understand how your people fuel the processes
  • Tufin takes firewall automation to the Next Gen level with R17-2 GA
    Tufin takes firewall automation to the Next Gen level with R17-2 GA Karen Crowley, Sr. Product Marketing Manager, Tufin & Erez Tadmor, Sr. Product Manager, Tufin Recorded: Sep 19 2017 48 mins
    As a valued Tufin customer, we invite you to learn about the latest release of Tufin Orchestration Suite R17-2 that includes new features to automate firewall administration tasks and includes new support for Cisco Firepower, VMware NSX, Microsoft Azure, Check Point R80.10, and Palo Alto Networks Panorama solutions.

    We will explain how these Tufin features will improve the management of your network and security through:
    •The addition of server decommissioning to the previously released rule decommissioning for more efficient firewall administration
    •Integration with Cisco Firepower Management Center – the first NSPM vendor to add support!
    •Support for Check Point R80.10, Microsoft Azure Resource Manager, and updated change automation for Palo Alto Networks Next-Generation Firewall policies
    •Automation of VMware NSX in Palo Alto Networks environments
  • Learn how to detect and prevent malicious files with SonicWall Capture ATP
    Learn how to detect and prevent malicious files with SonicWall Capture ATP Dmitriy Ayrapetov Recorded: Sep 19 2017 3 mins
    SonicWall Exec. Director, Product Management, Dmitriy Ayrapetov explains how you can maximize zero-day threat protection with SonicWall Capture ATP, a cloud-based multi-engine solution.
    https://www.sonicwall.com/capture
  • 10 inTech An interview with Mark Kennedy, CEO Celtx
    10 inTech An interview with Mark Kennedy, CEO Celtx IT Chronicles Media Recorded: Sep 18 2017 13 mins
    Mark talks to the Ten inTech team about the Celtx media production platform and tool set, that enable media creators to work on projects on-line collaboratively.
  • PenTeleData Keeps DDoS at Bay with Kentik
    PenTeleData Keeps DDoS at Bay with Kentik PenTeleData & Kentik Recorded: Sep 18 2017 2 mins
    How did PenTeleData, a leading provider of voice, video and broadband services in Pennsylvania and New Jersey, get 30 percent more accurate DDoS protection? Find out in this short video.
  • What Do Companies Think of Network Traffic Intelligence?
    What Do Companies Think of Network Traffic Intelligence? Kentik Customers Recorded: Sep 18 2017 2 mins
    Hear what Kentik customers have to say about how they benefit from real-time network traffic intelligence.
  • Pandora Drives Superior Network Performance with Kentik
    Pandora Drives Superior Network Performance with Kentik James Kelty, Sr. Director of Network Operations & Engineering, Pandora Recorded: Sep 18 2017 3 mins
    How do network operations teams at leading web companies like Pandora maintain the highest possible user experience? By relying on Kentik's big data analytics to gain insight, drive automation and deliver performance.
  • Protecting the business with SD-WAN segmentation
    Protecting the business with SD-WAN segmentation Robert McBride, Director of Enterprise and Telco Solutions Sep 21 2017 3:00 pm UTC 30 mins
    Guest Wi-Fi services, partner networks and multi-tenancy all are drivers to segment the branch and WAN infrastructure to secure and prevent unauthorized access of corporate assets. However, what is segmentation when it comes to the next-generation branch architecture and SD-WAN? Is it really only VLANs and encrypted traffic?

    Attend this webinar to understand what is segmentation and how it is applied to software-defined WAN to address:

    •Optimal application experience
    •Secure and authorized connectivity
    •Third party network access and integration
    •Local guest services like Wi-Fi
  • Solving the last encryption problem. Never exposing keys in memory!
    Solving the last encryption problem. Never exposing keys in memory! Steve Pate – HyTrust Chief Architect & Hari Tadepalli - Security Architect, Intel Sep 21 2017 3:00 pm UTC 60 mins
    It wasn’t long ago that encryption projects were thwart with problems. The performance was terrible. Key management was a nightmare. Encryption was only implemented as a “must have” for compliance or national security. Around 10 years ago, performance started to be addressed with the introduction of AES acceleration in modern Intel processors. A new range of key management solutions started to appear to simplify encryption projects. Coupled with a “move to the cloud” the demand for encryption is now at an all-time high. But there is still one problem left to be solved. To perform encryption, even with hardware acceleration that AES-NI provides, encryption keys need to be memory resident. As such, the keys are vulnerable to attack.

    With the introduction of Intel QuickAssist and Key Protection Technology and, in conjunction with HyTrust DataControl, this webinar will introduce you to some new and exciting technology where encryption keys are never exposed in memory and high-performance encryption is performed by the QuickAssist hardware. We’ll also be exploring the use of SGX in conjunction with QuickAssist to build secure, distributed HSMs.
  • Architecting your Software: How Cloud & Containers Impact Data Center Networks
    Architecting your Software: How Cloud & Containers Impact Data Center Networks Andre Kindness, Forrester analyst and Brian O'Sullivan, Cumulus Networks Sep 21 2017 3:00 pm UTC 60 mins
    Join Cumulus Networks and guest speaker Andre Kindness from Forrester as we explore the latest technology shifts in data centers today. As cloud, containers, microservices and other technologies become more and more mainstream, software must be architected in new ways to address these smaller components.

    All of this is impacting the the data center network, and we will talk through some of the ways that organizations can address the changes in the ever more complex data center. If you are an I&O professional, watch this webinar to see how you can simplify deployment and maintenance in the modern data center.
  • FirstNet/Band 14 & the Future of Public Safety Networks
    FirstNet/Band 14 & the Future of Public Safety Networks David Rush, Senior Product Manager, Cradlepoint Sep 21 2017 4:00 pm UTC 60 mins
    There’s a lot of buzz among public safety agencies about the potential for FirstNet (First Responder Network Authority) and a nationwide public-safety broadband network (NPSBN) to ensure first responders have optimal levels of operational capabilities during natural disasters and other emergencies.

    AT&T has won the bid to build out this network, and states now have the opportunity to opt in or out. However, how it works today is a different story than what it will look like in the coming months and years. Other key factors to consider include Verizon’s announcement that it will build its own public safety network core.

    Join David Rush, a senior product manager at Cradlepoint, for a live webinar on Sept. 21, 2017, as he explains and navigates FirstNet/Band 14 and other elements of the still-evolving public safety network landscape.
  • The New Frontier: How IoT is Changing Business As We Know It
    The New Frontier: How IoT is Changing Business As We Know It Theresa Bui Revon, Head of Enterprise Product Marketing, IoT Cloud Business Unit, Cisco Jasper Sep 21 2017 5:00 pm UTC 45 mins
    The Internet of Things (IoT) is empowering businesses with unprecedented ways to serve customers, rapidly solve problems, and optimize operations. Using IoT, savvy companies are transforming their products to enable the delivery of connected services that deliver new customer experiences and unlock new sources of revenue.

    From enabling leaders in agribusiness to increase crop yields, to amplifying connected car innovation, Cisco Jasper Control Center cloud platform powers more than 5,000 companies in dozens of industries. Leveraging learnings from a decade of IoT experience, we’ll look at how real-world businesses are using IoT innovation to capture their share of this multi-billion-dollar opportunity.

    Key takeaways:

    - How IoT helps you drive successful business outcomes

    - Best practices for accelerating your IoT service business

    - Lessons from leaders that can help you work smarter and scale faster
  • Risk in the Cloud: Measuring and Mitigating with an Expert
    Risk in the Cloud: Measuring and Mitigating with an Expert Maurice Stebila, CISO, Harmon International, Dan Rheault, Sr. Product Marketing Manager, Tufin Sep 26 2017 3:00 pm UTC 45 mins
    The public cloud is a critical asset for enabling business agility, but the new rapid pace of cloud deployments cannot come at the expense of security. In a time when risks are regularly introduced through the diffusion of ownership of the cloud, security teams need to develop ways to identify the risks introduced to their network, understand how to measure those risks, and devise and employ risk mitigation strategies.

    This Tufin-hosted webinar will feature Maurice Stabila, CISO of Harmon International, a Fortune 500 company. Maurice is an award-winning, published, and internationally renowned leader in IT security. Attendees of this webinar will gain a better understanding of what risks are persistent in the public cloud, how your organization can measure cloud-specific risk, and gain exposure to some techniques for successfully managing cloud risk.

    Join us to hear an industry expert’s approach to solving these new security problems.
  • 6WIND & Intel Deliver 50%  Performance Increase for SW-based Security Gateways
    6WIND & Intel Deliver 50% Performance Increase for SW-based Security Gateways Kelly LeBlanc, VP of Marketing for 6WIND Sep 26 2017 3:00 pm UTC 60 mins
    Data centers and managed network operators looking for performance-oriented IPsec applications can now turn to Intel® Xeon® Platinum 8170 processors and 6WIND Turbo IPsec™ network software on commercial-off-the-shelf (COTS) servers.

    In this Webinar, attendees will learn how 6WIND Turbo IPsec performance tests on servers based on Intel® Xeon® Platinum processors demonstrate a 50% increase in processing power for common applications such as multi-site VPNs and backhaul security gateways. This performance benefit also scales in conjunction with the addition of cores. These applications are designed for today’s multi-core processor environments, driving a significant price/performance value proposition over legacy hardware.
  • Is Your Institution Cyber Ready?
    Is Your Institution Cyber Ready? Tim Gallo, Symantec Cyber Security Engineer and Author Sep 26 2017 6:00 pm UTC 60 mins
    The goal of higher education is “to create prepared minds”. But recently, universities and colleges are finding that they have to defend themselves from cyber-attacks that put everything at risk— their brand, reputation, and intellectual property.

    The ability to respond quickly and effectively is incredibly important, especially for higher education organizations that need to protect a huge amount of confidential data which ranges from proprietary research projects to personally identifiable information. Adding to the complexity is the fact that many end users are accessing networks with personally owned devices, which are not managed by the IT/security teams.

    How prepared is your team to prevent detect and respond to these cyber threats?

    In this webcast you will hear from Tim Gallo, a sales engineer on the Cyber Security Services team, who works with organizations to strengthen their cyber defense.

    Register for this webcast to:

    • Hear about the threats and challenges facing higher education

    • Learn about the stages of the attack lifecycle and how to prepare for each stage

    • Understand how to increase your resiliency and train your team

    • Discover how to optimize your cyber security operations with expertise and threat intelligence
  • Optimize Incident Response in the Age of Ransomware
    Optimize Incident Response in the Age of Ransomware Tom Clavel, Senior Manager, Security Product at Gigamon Sep 26 2017 6:00 pm UTC 60 mins
    Organizations face increasing volumes of network data across their expanding physical, virtual and cloud networks. At the same time, dangerous malware, data breaches and ransomware continue to successfully penetrate their networks. Yet, network security, monitoring and analysis tools are overloaded, Security Operations teams are understaffed and overwhelmed and incident response is becoming more cumbersome and time-consuming.

    Learn how Gigamon, the industry leader in network visibility solutions, can help you optimize incident response and effectively secure your organization’s network using your existing security and monitoring tools.
  • 4 Reasons Next-Generation Antivirus Should Be Your Next Managed Service
    4 Reasons Next-Generation Antivirus Should Be Your Next Managed Service John Collins, SecureWorks Counter Threat Unit Principal Architect | Mike Viscuso, Carbon Black CTO Sep 26 2017 6:00 pm UTC 60 mins
    There seems to be no shortage of threats these days with attackers constantly innovating and combining different techniques with classic malware. New ransomware variants, targeted espionage campaigns, and attacks that don’t use malware at all are just a few threats that put your organization at risk. As each new attack generates global headlines, it can feel a bit overwhelming.

    It’s increasingly clear that the signature-based approach of traditional antivirus (AV) can no longer provide the protection needed to keep attackers off your endpoints. Join John Collins, SecureWorks Counter Threat Unit Principal Architect and Mike Viscuso, Carbon Black CTO, as they discuss how managed Next-Generation Antivirus (NGAV) goes beyond malware prevention to ensure that organizations of all sizes stay out of the security headlines and one step ahead of emerging cyber threats.

    You will learn:
    • What are the indicators that I need NGAV?
    • How do I know when it is time to make the move from traditional AV to NGAV?
    • Why is managed NGAV better able to address Ransomware, PowerShell and WMI threats?
    • What managed NGAV can do for you
  • 了解安全威胁态势和凭证盗用(撞库)攻击
    了解安全威胁态势和凭证盗用(撞库)攻击 演講人: 李文涛, 阿卡迈(Akamai)大中华区解决方案部门总经理, 萧锦明, Akamai亚太高级企业安全系统架构师; 主持人: 阎光,(ISC)² 上海分会主席,德勤风险咨询副总监 Sep 27 2017 6:00 am UTC 60 mins
    安全威胁态势不断变化,并且极为迅速。因此,组织应持续了解最新的攻击信息,以此来确定在当前的威胁态势下应该寻找的应对方式并预计攻击在未来变化的方式,从而免受该类威胁的影响。这一点至关重要。

    在今天的会议当中,Akamai 将基于已发布的《2017 年第二季度互联网安全现状》报告,与大家分享有关安全威胁态势的深度见解。

    近些年来,凭据滥用(撞库)攻击已成为一种普遍的威胁,而且复杂性正日益增加。我们也将对此进行详细介绍。凭据滥用(撞库)攻击活动一旦成功,用户将遭受无法访问、数据泄露或欺诈性交易等损失。Akamai 将揭示这些攻击活动中使用的技术以及难以检测出这些活动的原因。我们还将展示抵御此类攻击的方法和解决方案,从而使您的组织不再遭受此类攻击的影响。

    参加Akamai 和 (ISC)² 在09月27日下午2:00至3:00的在线论坛《了解安全威胁趋势和凭证盗用(撞库)攻击》,聆听专家对时下安全威胁的解读,还等什么?赶紧加入我们吧。
  • Virtualizing Media Broadcast: TV Transformed
    Virtualizing Media Broadcast: TV Transformed Steve Smith, Limor Schafman Sep 27 2017 3:00 pm UTC 75 mins
    Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.

    Speakers:
    Steve Smith, CTO, Cloud, Imagine Communications
    Stephen Smith is the CTO, Cloud, for Imagine Communications, where he leads the transformation of solutions to support media and entertainment markets in a future defined by IP, software, virtualization and cloud. Previously, Smith was the Executive Director of Media Systems at Starz Entertainment in Colorado, where he was responsible for the technology, implementation and operation of their Media Asset Management and Content Processing platforms. With 20+ years in the industry, Stephen has extensive experience in architecting, deploying, owning and operating complex media processing, origination and distributions systems.

    Host: Limor Schafman, Content Development Director, TIA
  • How to Simplify Network Security with Automation
    How to Simplify Network Security with Automation Ron Kehoe CISSP, CISA, CISM, GCIH Senior Solutions Engineer & Karen Crowley, Sr. Product Marketing Manager, Tufin Sep 27 2017 3:00 pm UTC 45 mins
    Automation is a journey that begins at the Firewall and then extends to your greater network. For the greatest results, you need to start small and build on your success.
    Join us as we take you on the Automation Journey with Tufin automation expert, Ron Kehoe.
    Simplifying Network Security with the Automation Journey
    September 27th
    11:00 EST
  • How Governments Can Adapt - Making Digital Transformation a Reality
    How Governments Can Adapt - Making Digital Transformation a Reality Keith Dawson - Principal Analyst, 451 Research, Michael Mueller- Director - Solutions Management, CenturyLink Sep 27 2017 5:00 pm UTC 60 mins
    Can government institutions use modern tools and technologies to become more flexible and responsive to their constituents? What should they be looking at, and how should they adapt to the challenges of data security, privacy, and reliance on legacy systems? Digital transformation is an ambitious project for any organization; government decision-makers are hoping it will provide a path to broader citizen engagement, empowered employees, and new digital infrastructures that will provide better access to data and services.

    In this webinar we will discuss the results of a survey on the challenges and imperatives of digital transformation, including the perspectives of government managers on their technology and operational challenges and expectations.
  • Detect Threats Faster and Advance Your Network Security
    Detect Threats Faster and Advance Your Network Security Greg Mayfield, Sr. Director of Product Marketing at Gigamon Sep 27 2017 6:00 pm UTC 60 mins
    Current network security architectures are rapidly becoming inefficient. Dangerous malware, data breaches and ransomware often go unseen in enterprise networks, putting the business and their customers at risk. When a data breach occurs, Security Operations teams often struggle to pinpoint and resolve the problem. Lack of sufficient visibility, silo’d, disparate tools combined with manual processes, can weaken your organization's overall security posture.

    Join this interactive webinar to discover a better way to defend your network against cyber threats. Learn how to enable your existing security and monitoring tools to expedite threat detection and mitigation using advanced network intelligence, automation and more.
  • Privacy and Protection in the Changing World of SSL
    Privacy and Protection in the Changing World of SSL Scott Register, VP of Product Management, Ixia Sep 27 2017 7:00 pm UTC 60 mins
    SSL encryption is one of the key enabling technologies of the Internet. We use it for e-commerce, collaborating with partners, and even email. But increasingly, encryption is also used to shield malicious activities – such as malware and ransomware downloads – from detection by network security devices.

    Join this interactive webinar to learn:
    - How the new TLS1.3 standard increases both privacy and the difficulty in detecting malware and data leak
    - Understand best practices for adapting to the changing environment
  • Die digitale Transformation erfolgreich meistern - ein Point of View
    Die digitale Transformation erfolgreich meistern - ein Point of View Christian Schütz, Business Development Manager Application Delivery Management (ADM) Sep 28 2017 8:00 am UTC 60 mins
    Sie wird wohl nicht mehr wegzureden sein: Die digitale Transformation oder besser Revolution. Und das bedeutet eine Menge an Herausforderungen für Applikationsentwicklungs-, Test- und Operations-Verantwortliche:
    Wie unterstütze und adaptiere ich Continuous Integration / Testing- und DevOps-Ansätze?
    Wie behalte ich den Überblick in einer agilen Anwendungswelt, die geprägt ist von Microservices,
    Composite Apps sowie hybriden Cloud-Architekturen und multiplen Anwendungsportfolien? Und wie stelle ich bei alldem ein überragendes Benutzererlebnis (UX) sicher, das gewährleistet, dass meine Anwendungen auch einen Geschäftsbeitrag leisten können?

    Darauf gibt es sicher keine einfachen Antworten. In dem kostenfreien Live Webinar am 28. September möchten wir Ihnen von daher aufzeigen, wie unser Ansatz ist, all diese Herausforderungen erfolgreich zu meistern.
    Seien Sie dabei und nutzen Sie die Gelegenheit, Ihre Fragen an unseren Experten zu stellen.
    .
  • Protect Your Retail Business, Network, and Reputation: Top Trends and Tips
    Protect Your Retail Business, Network, and Reputation: Top Trends and Tips Tracy Hillstrom, director of product marketing Sep 28 2017 3:00 pm UTC 60 mins
    With the prevalence of social media and networking tools, consumers are always just a hop, skip, and a “click” away from leaving your business a glowing review or one that damages your reputation for weeks and months to come. But while factors like customer service have obvious influence on your business’s standing, have you considered the impact of your network security? You should.
    The consequences of network security vulnerabilities can cause devastating harm to a company’s brand, the likes of which some will never recover from. Retail businesses in particular remain a top target for cyber criminals – in fact, nearly one in three retailers have already suffered revenue losses due to a cyber attack. With your business’s reputation on the line, do you feel confident that you’ve really checked 'security' off your network shopping list?
    Join WatchGuard Technologies Director of Product Marketing, Tracy Hillstrom, on September 28 for a look at the top threats and trends impacting retail today, and the key solutions to protecting retail networks and reputations.
  • Take PoE and PoE+ to New Distances
    Take PoE and PoE+ to New Distances Teresa Hoffman, Fiber Optic Product Manager Sep 28 2017 3:00 pm UTC 30 mins
    Corporations across all industries face the challenge of taking power and data to new distances while meeting higher bandwidth demand. Frequently combined with this challenge is the requirement to provide local power in excess of 100 meters for remote IP-based devices, such as security cameras, wireless access points, emergency blue-light phones and card readers. Learn how OneReach™, a Berk-Tek PoE extender system, combines optical fiber for long-distance gigabit transmission and copper conductors in a single system.

    Register for this BrightTALK™ to learn how you can:

    - Take PoE and PoE+ to distances further than ever before (3,600 ft and 2,400 ft respectively)
    - Simplify your network and device management through centralized IT infrastructure
    - Leverage this game-changing technology to reliably and cost-effectively power remote devices

    Who should attend: IT and Security Professionals
  • The Increasing Risk of DDoS Attacks – Are You Adequately Prepared?
    The Increasing Risk of DDoS Attacks – Are You Adequately Prepared? Tom Bienkowski Director of DDoS Product Marketing Arbor Networks + John Pearson Founder and Chief Strategist IP Networks Inc. Sep 28 2017 4:00 pm UTC 60 mins
    The data is crystal clear. DDoS attacks are dramatically increasing in size, frequency and complexity. Unfortunately, many organizations have been severely impacted by DDoS attacks simply because they either assumed they would never be the target or they thought they had adequate protection in place. Join IP Networks and Arbor Networks - the industry leader in DDoS attack protection products and services to learn:

    -The latest trends in DDoS attacks
    -The importance of proper network visibility for anomaly & DDoS attack detection.
    -Best practices in DDoS attack defense; including an intelligent combination of in-cloud and on-premises attack protection solutions - which offers the most comprehensive form of protection.
  • CEO Insights on Overcoming Ransomware
    CEO Insights on Overcoming Ransomware Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks Sep 28 2017 4:00 pm UTC 45 mins
    With the changing nature of the cyber-threat landscape, companies are now looking at ransomware differently than your typical malware attack. Ransomware can attack your company's infrastructure which in turn can debilitate your day-to-day operations and cause billions of dollars in losses annually. Ransomware is hardly new, but continues to be a very dangerous trend.

    With over 30 years of experience, tune into this intriguing fireside chat to hear insights from Arctic Wolf's CEO, Brian NeSmith. In this webinar, Brian will discuss the following:

    - Why traditional backup strategies fail
    - 5 Things IT should do if exposed
    - Preventative measures to ensure your company's data security

    Security solutions and users now have to be more smarter than ever before, so don't let a ransomware attack outsmart you. Register today to learn how!

    About the Speaker
    Brian NeSmith brings more than 30 years of experience, most recently as former CEO of Blue Coat Systems, where he increased company revenues from $5M/year to over $500M/year as the industry’s leading web proxy platform. Prior to Blue Coat Brian was the CEO of Ipsilon Networks (acquired by Nokia) which became the leading appliance platform for Check Point firewalls. His early career includes product management, marketing, and general management at Newbridge Networks. He was also a consultant for Network Strategies, Inc. Brian graduated from Massachusetts Institute of Technology with a bachelors of science in electrical engineering.
  • Dark Cloud Network Security With Software-Defined Perimeter
    Dark Cloud Network Security With Software-Defined Perimeter Josh Flinn, Principal Solutions Architect, Cradlepoint Sep 28 2017 4:30 pm UTC 60 mins
    How do you ensure your organization’s data is protected — even over public Internet, with more devices and users than ever before needing connectivity? Create a Virtual Cloud Network that the public Internet doesn’t even know exists.

    You can’t hack what you can’t see, which is why dark cloud security through Software-defined Perimeter services is the best way to secure IoT devices that live on today’s Elastic Edge.

    Join Josh Flinn, a principal solutions architect at Cradlepoint, for a live webinar on Sept. 28, 2017, as he explores how Cradlepoint’s NetCloud platform creates completely secure, private, invitation-only IoT networks in minutes.

    Attendees will learn how SD-Perimeter:

    + Offers LAN-like performance to remote users on virtually any device
    + Secures all transactions with an invitation-only network
    + Micro-segments users, groups, applications, and resources with simple policies
    + Is enabling customers to simplify their network architecture
  • Powering Active Data Infrastructure: Vexata & 451 Research
    Powering Active Data Infrastructure: Vexata & 451 Research Matt Aslett, Research Director, Data Platforms and Analytics (451) & Rick Walsworth, VP, Product (Vexata) Sep 28 2017 5:00 pm UTC 60 mins
    Transactional applications and high speed analytics have previously been reserved for in memory applications but recent advancements in solid state technology and active data infrastructure have delivered performance that remove I/O wait times that are prevalent with the current generation of all flash arrays. Attend this webinar to learn more about how Vexata delivers solutions that unlock application performance to deliver strategic business outcomes.
  • Take Control of the Cloud Chaos
    Take Control of the Cloud Chaos Gerry Grealish, Senior Director, Product Marketing, Symantec Sep 28 2017 5:00 pm UTC 30 mins
    Securing Web Access & Protecting Data with Cloud-Delivered Enterprise Security

    Increased cloud adoption, mobile device use, and the dramatic growth in the number of remote and home workers is putting pressure on existing security infrastructures.

    In this environment, enterprise security teams are wrestling with questions like:

    - How can I consistently enforce policies governing the use of the web and cloud?
    - How can I effectively protect my users from web-based threats?
    - How can I secure my sensitive data and comply with legal regulations?

    Enterprises are turning to a comprehensive cloud-delivered security solution to tackle these challenges.

    Join us to learn how Symantec’s Cloud Security Services can be leveraged to protect users, data and devices, addressing the challenges of the cloud generation.

    Register Today
  • Everything You Wanted to Know About Storage - Cyan: Storage Management
    Everything You Wanted to Know About Storage - Cyan: Storage Management Richelle Ahlvers, Broadcom, Mark Rogov, Dell EMC, Alex McDonald, NetApp, J Metz, Cisco Sep 28 2017 5:00 pm UTC 75 mins
    Storage can be something of a “black box,” a monolithic entity that is at once mysterious and scary. That’s why we created “The Everything You Wanted To Know About Storage But Were Too Proud to Ask” webcast series. So far, we’ve explored various and sundry aspects of storage, focusing on “the naming of the parts.” Our goal has been to break down some of the components of storage and explain how they fit into the greater whole.

    This time, however, we’re going to open up Pandora’s Box and peer inside the world of storage management, uncovering some of the key technologies that are used to manage devices, storage traffic, and storage architectures. In particular, we’ll be discussing:

    •Storage networking management protocols
    •SMI-S – The bread-and-butter of vendor-neutral storage management
    •SNIA Swordfish – The new storage management solution gaining widespread momentum
    •Software-Defined Storage – the catch-all term for storage that includes architectures and management

    There’s so much to say on each of these subjects we could do a full webcast on any one of them, but for a quick overview of many of the technologies that affect storage in one place, we think you will find your time has been well spent.

    Join us on September 28th, 2017, for our continuation of the “Too Proud To Ask” series with Cyan, the Storage Management Pod.