Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Food retailer Dennree strengthens security with SonicWall
    Food retailer Dennree strengthens security with SonicWall SonicWALL Recorded: Nov 23 2017 4 mins
    Learn how German organic food company Dennree improves its security posture with SonicWall and Data-Sec. https://www.sonicwall.com/en-us/solutions/industry/retail-hospitality
  • APTs - Cómo funcionan y cómo protegerse
    APTs - Cómo funcionan y cómo protegerse Ferran Orosola, Solutions Architect FireEye; Alvaro Culebras Sanchez & Noa Blanco Fernandez, Cybersecurity Engineers, Minsait Recorded: Nov 23 2017 49 mins
    Crees que estas protegido frente a las APTs? Te explicamos cómo funcionan y como protegerse

    Los ataques de hoy en día se han vuelto cada vez más sofisticados, lo que ha provocado que las medidas de seguridad tradicionales ya no sean eficaces. Las organizaciones deben adoptar nuevas estrategias de Ciberseguridad que permitan una mayor protección, adaptándose a estas nuevas amenazas.

    En este webinar FireEye y Minsait, la unidad de negocio de Indra encargada de la transformación digital de las empresas, muestran qué son las Amenazas Persistentes Avanzadas (Advanced Persistent Threats), cómo funcionan y qué medidas se deben implementar en las organizaciones para protegerse ante las APTs que utilizan el correo electrónico como principal vector de ataque.
  • Intel's Data Center Game Changer
    Intel's Data Center Game Changer Ofer Lior BDM, Intel Data Center Management Solutions - Dror Shenkar, Chief Architect, Intel Data Center Management Solutions Recorded: Nov 23 2017 49 mins
    A rapid rate of change complicates every facet of datacenter management, and server-centric compute models are too cumbersome for today’s highly variable workloads. Is it possible to optimize resources and operations in such dynamic environments? In this presentation, learn how to replace manual, hardware-defined application provisioning and management with a highly automated, software-defined resource model and orchestration layer that enables flexibility, simplified on-demand capital efficiency, and lower TCO. Find out how to compose more agile pools of datacenter resources, and simultaneously drive up IT efficiency, optimize energy requirements, increase datacenter resilience, and strengthen disaster recovery plans.
  • SonicWall Capture Labs
    SonicWall Capture Labs SonicWALL Recorded: Nov 22 2017 5 mins
    In 2016, the SonicWall Capture Threat Network observed 60 million unique malware samples, 7.9 billion malware attack attempts, 638 million ransomware attacks and showed that 62% of SonicWall customer internet sessions were encrypted using SSL/TLS.
    The SonicWall Capture Labs Threat Research Team:
    •Gathers, analyzes, and vets cross-vector threat information from more than one million sensors around the world,

    • Performs rigorous testing and evaluation,
    • Establishes reputation scores for email senders and content
    • Identifies new threats in real-time.

    Get the most up-to-date protection against new attacks with real-time information from SonicWall Capture Labs.
  • Preparing for Converged Future: Virtualizing Your fixed & Mobile Access Network
    Preparing for Converged Future: Virtualizing Your fixed & Mobile Access Network Robin Ku, CableLabs and Gibson Ang, Casa Systems and Eric Heaton, Intel Recorded: Nov 21 2017 48 mins
    In our future 5G world, your users will not only need to be connected all the time, they will also require access to fast, agile services. The question is: Will your network be ready to support multiple best-in-class wired and wireless access technologies?

    “Technology Convergence: Support Multiple Wired and Wireless Access Technologies” explores how virtualization allows for a converged access platform that simplifies management of your access network and lowers your overall system total cost of ownership. The webinar walks you through a working proof of concept developed by Intel, Casa Systems, and Kyrio that brings together vCCAP, vWAG, vEPC, and other VNFs running within an open-source NFVI. Addressed as well is how this solution can be expanded for other operator needs through flexible and generalized SDN/NFV principles.
  • How GoDaddy Uses AIOps to Automate Incident Response
    How GoDaddy Uses AIOps to Automate Incident Response Tom Duran, Site Reliability Manager, GoDaddy Recorded: Nov 21 2017 17 mins
    Throughout rapid expansion, globalization and going public, GoDaddy was challenged to scale operational and incident response framework in new ways.

    In this detailed talk, join Tom Duran, Site Reliability Manager at GoDaddy, as he takes you through the transformation from a largely manual incident process to a fully automated lights-out incident response model.
  • The Enterprise UC Reality – and Cisco’s UC Approach
    The Enterprise UC Reality – and Cisco’s UC Approach Bill Haskins Sr. Analyst and Partner, UC, Chad Elford Global Director UCaaD Cisco Collab Slutions at TATA Communications Recorded: Nov 21 2017 61 mins
    Enterprises have a variety of choices when it comes to adopting new Unified Communications (UC) solutions. The current reality is that very few enterprises come close to unlocking the full potential of their UC platform to achieve the ideal experience. The UC landscape is evolving and the buying decision is becoming increasingly complex. IT teams need to constantly re-evaluate their strategy keeping in mind the numerous UC and UCaaS solutions, the end-user behavior, and growing expectations from the platform.

    In this webinar, Bill Haskins from Wainhouse Research provides his expert analysis of the current UC market. Bill will discuss the pros and cons of leading enterprise UC solutions. Having observed the evolution of the UC industry closely, Bill will coverkey considerations for enterprise IT teams as they prepare their UC roadmaps for current and future needs. As most mid and large organizations have a considerable Cisco UC infrastructure footprint, Bill will also talk about Cisco’s approach to UC.

    Bill will be joined by Chad Elford from Tata Communications who will discuss the UC approach taken by many leading enterprises globally. Chad will provide insights on business collaboration through UCaaS solutions and how it helps enterprises achieve their goals.

    If you are currently deciding the UC strategy for your organization or mid-way through executing one, this webinar will provide you with valuable intelligence to help you fine tune/pivot your UC roadmap for your organization’s digital transformation.

    Key Learning Objectives
    •Understand the enterprise UC and UCaaS landscape today with an analyst perspective of the leading solutions
    •Gain strategic insights which would help in planning and/or optimize current enterprise UC plans
    •Learn how enterprises can achieve the full potential of their UCaaS platform to drive digital transformation for the organization
  • Digital Transformation Enablers: IoT Analytics and Autonomic Actuation
    Digital Transformation Enablers: IoT Analytics and Autonomic Actuation Kevin Curtis, Distinguished IoT Architect - Connected Cities, Verizon Enterprise Solutions (VES) Recorded: Nov 21 2017 25 mins
    Listen to Kevin Curtis, Distinguished IOT Architect – Connected Cities, Verizon Enterprise Solutions (VES) talk about how digital transformation occurs when information technology (IT) and operational technology (OT) data assets are effectively integrated, to realize new business outcomes and to create transformative value, not previously possible.
  • AOC/DAC Cable Testing in Data Centers
    AOC/DAC Cable Testing in Data Centers Guylain Barlow, Viavi Recorded: Nov 20 2017 60 mins
    Data Centers vary widely in nature and can be roughly classified as hyperscale, multi-tenant, and private. A critical and common component in the operation of such data centers is the installation and maintenance of the physical cabling infrastructure. A fundamental change taking place is the evolution from cables using classic connectors on copper (RJ-45) or fiber optics (LC) to cables terminated by pluggables such as SFP or QSFP. This represents a new challenge as these cables, called Active Optical Cable (AOC) or Direct Attach Copper (DAC), are not easily validated and tested.

    Attendees will earn 1 BICSI CEC for attending.
  • Benefits of Engaging with an Open Source Project
    Benefits of Engaging with an Open Source Project Dave Neary, NFV/SDN Community Strategist, Red Hat Recorded: Nov 17 2017 22 mins
    Listen to Dave Neary, SDN and NFV with Open Source at Red Hat talk about the benefits of engaging with an open source project as a user and what we can expect to see next for NFV and SDN standards.
  • Freeport-McMoRan - Putting the Pedal to the Metal with SD-WAN
    Freeport-McMoRan - Putting the Pedal to the Metal with SD-WAN Stein Ericsson, Manager, Global Network Operations at Freeport-McMoRan and Rachna Srivastava, Sr. Director Product Marketing Recorded: Nov 17 2017 41 mins
    Freeport-McMoRan faced immense connectivity and bandwidth issues in its copper mines located in remote locations. Moreover, this S&P 500 company was also looking to revolutionize their IT infrastructure by bringing secure access to cloud-based applications on Microsoft Azure.

    Join this webinar to hear directly from the experts at Freeport-McMoRan on how it leveraged VeloCloud SD-WAN to greatly improve user experience with assured Application Performance and simplified access to Microsoft Azure.

    Attend this webinar to learn:
    - How Freeport-McMoRan quadrupled its bandwidth to support terabyte-sized file transmissions
    - Dramatically improved the network user-experience with VeloCloud SD-WAN
    - How legacy issues, such as non-performing circuits, can easily be fixed and optimized with VeloCloud SD-WAN
    - How Virtual VeloCloud Edge can easily run on Microsoft Azure to optimize access to cloud applications
  • Virtualizing Media Broadcast: TV Transformed
    Virtualizing Media Broadcast: TV Transformed Steve Reynolds - Imagine Communications, Limor Schafman - TIA Recorded: Nov 17 2017 46 mins
    Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.

    Speakers:
    Steve Reynolds, CTO, Imagine Communications

    Steve Reynolds is Chief Technology Officer at Imagine Communications and responsible for the technical strategy and roadmap of the company, as well as managing business development, partner relationships, and M&A activity. Reynolds brings 20 years of technology leadership in the cable industry to Imagine Communications. At Comcast, he served as Senior Vice President of Premises Technology overseeing the strategy, roadmap and development of all technologies employed in service delivery to the customer premises. Prior to Comcast, Reynolds was Senior Vice President of Technology at OpenTV Incorporated, a world leader in digital and interactive television technology.

    Host: Limor Schafman, Content Development Director, TIA


    NOT BICSI accredited.
  • How to Eliminate Inefficiencies in Your IT Organization with DevOps
    How to Eliminate Inefficiencies in Your IT Organization with DevOps Gary Gruver, Francesco Colavita, Syed Husain, Ron Franklin Recorded: Nov 17 2017 62 mins
    This webinar is brought to you by the Vivit DevOps Special Interest Group.

    Businesses need to be more responsive to market changes and meeting customer demand for improved services and better user experiences. In order to meet such high expectations and be competitive in your market, it requires great flexibility and speed throughout the organization. DevOps enables your software development, infrastructure and operations teams to identify and eliminate inefficiencies through communication, collaboration, and automation.

    Join us for this webinar to learn:

    •How you can build a culture of DevOps
    •Accelerate time-to-market
  • Software Defined Technologies: Building tomorrow’s digital infrastructure
    Software Defined Technologies: Building tomorrow’s digital infrastructure Phil Lees, Chief Technical Officer, WhiteSpider Recorded: Nov 17 2017 49 mins
    To create greater competitive advantage and better customer experience, organisations need to build their digital capabilities with innovative solutions and initiatives.

    WhiteSpider is an expert in Software Defined Technologies - the building blocks of a digital infrastructure - and one of Cisco's leading partners in designing and delivering Application Centric Infrastructure

    In this webinar we will be looking at how Software Defined Technologies are supporting organisations as they create digital capabilities through:

    1. Enabling Scalability and Agility: Be able to rapidly scale, and react quickly to the changes in business requirements.
    2. Delivering intelligence: Detailed, predictive and actionable analytics
    3. Developing automation: Solutions that enable orchestration and automation reducing the need for, and cost of, human intervention.
    4. Promoting collaboration: Simplifying and unifying the communication between IT and Business.

    We will be looking at specific examples of where WhiteSpider has enabled these capabilities through solutions we have delivered in Motor Racing, Healthcare and Manufacturing.
  • What does the Cloud mean for the Future of Cybersecurity?
    What does the Cloud mean for the Future of Cybersecurity? Darius Goodall, Director, Product Marketing - Security Products, Barracuda Recorded: Nov 16 2017 52 mins
    The growing migration of business critical applications to SaaS based solutions and public cloud platforms signals a fundamental shift in IT infrastructure. The cloud requires organizations to take a fresh look at their security posture in the light of new threats and an expanding deployment surface. We will discuss the emerging security requirements as results of these shifts and provide recommendations to securely operate in cloud environments
  • Post-Soviet Bank Heists: A Hybrid Cybercrime Study
    Post-Soviet Bank Heists: A Hybrid Cybercrime Study Abdullah Sheikh, AD, Customer Solutions, Singtel & Thanassis Diogos, Incident Response Team Leader, Trustwave SpiderLabs Recorded: Nov 16 2017 59 mins
    Cyberattacks are getting more sophisticated, using a combination of strategies to penetrate the organisation and often for financial gain. Tune in to hear from Singtel's Abdullah Sheikh and Trustwave SpiderLabs researcher Thanassis Diogos as they describe the latest multi-vector attacks uncovered just recently in the financial industry, a modern ‘bank heist’ that uses technical and non-technical methods, with potential to expand across the globe.

    The webinar will show you the steps taken by this criminal network and how easy it was for them to divert on average USD$5 million in cash for every target they reached. Understand what measures our experts recommend to ensure your organisation doesn’t become a victim of a similar attack in 2018.
  • Governance, Compliance & Print Security
    Governance, Compliance & Print Security Ron Chestang GCIH, CEH, CISM Print Security Advisor, HP Inc. & Michael Mayberry Technology Account Executive, Staples Recorded: Nov 16 2017 37 mins
    HP and Staples Business Advantage present:
    Governance, Compliance & Print Security - Three keys to protecting business
    • The rise of IoT and its evolving role in Security Challenges
    • IoT Standards & Framework Developments in CyberSecurity
    • Governance and its role in mitigating risk
    • And More: Influential Mega Trends, Risks & Hidden Costs

    Ron Chestang – GCIH, CEH, CISM
    Print Security Advisor
    HP Inc.
    Ron joined HP, Inc. from one of the big four consulting firms where he performed IT Security consulting in Oil and Gas Industry in Houston, Texas. Ron also has over 15 years’ experience as a Cyber Officer in the US Air Force where he received the nation’s most comprehensive cyber security training and the highest level AF security certifications. During his tenure with the AF, Ron participated in numerous cyber exercises and operations including wartime cyber efforts coordinating defense of the nation’s top secret information and coordinating offensive efforts.
    Ron has numerous industry Cyber Security Certifications including the EC Council Certified Ethical Hacker, SANS GIAC Certified Incident Handler, and the ISACA Certified Information Security Manager Certification.

    Michael Mayberry
    Technology Account Executive
    Staples Business Advantage
    Mike Mayberry our Staples Technology Solutions Healthcare Technology Account Executive has been part of the Staples family for 10 years. Mike started with Staples on our Small Business Account sales team before moving to our retail team as a Sales Manager. Mike joined the Technology Commercial Contract team in 2011 providing IT solutions to our Mid-Market customer. After spending two and a half years with the Mid Market team Mike transitioned to the Commercial team working with F-500 customers. Recently Mike helped launch the new Healthcare team within Staples Technology Solutions and is now working to provide relevant IT solution thought-out our Healthcare base.
  • Endpoint Security: The Final Frontier
    Endpoint Security: The Final Frontier Ed Metcalf, Senior Director Product Marketing, Cylance Recorded: Nov 16 2017 46 mins
    Whether it is a new ransomware campaign or stealthy targeted attack, your endpoints are being attacked and are often the last line of defense in your fight against the cybercriminals. In this webinar, you will understand how endpoints are the final frontier for security and how you must be resilient in using the latest prevention and protection technologies.

    Learn how the power of machine learning and artificial intelligence are changing the endpoint protection landscape. Gone are the days of daily signature updates, maxed out performance impact, and the lack of security effectiveness against both known and unknown threats. It is time explore the new world of endpoint security.
  • NVMe & Oracle Database: Making Hybrid Transaction/Analytical Processing Possible
    NVMe & Oracle Database: Making Hybrid Transaction/Analytical Processing Possible Ganesh Balabharathi, Principal Database Architect Recorded: Nov 16 2017 38 mins
    Hybrid transaction/analytical processing (HTAP) refers to capabilities to perform OLAP (online analytical processing) and OLTP (online transaction processing) at the same time on a same database system. Oracle Database has always held the edge in HTAP because its version-based concurrency model means that analytical workloads do not block transactional workloads. In this webcast, we will examine how Vexata Scalable Storage Systems utilize technologies such as NVMe Flash and Intel Optane (3D XPoint) can be used to take HTAP to the next level. This webcast will include a demonstration of HTAP running on Oracle 12c with the Vexata VX-100 Scalable Storage System.

    You will learn about:
    - Detailed explanation of Hybrid transactional/analytic environments
    - Best practices for architecting Oracle Hybrid database systems
    - How Vexata maximizes transactional and analytic workloads
  • Three Steps to Eliminating Storage Silos
    Three Steps to Eliminating Storage Silos Storage Switzerland, Nexsan Recorded: Nov 16 2017 51 mins
    As an organization grows the number of use cases the data center needs to support increases with it. What starts out as a NAS for file sharing, moves to a SAN for database applications, and then storage for data protection. As the organization hits full stride it might look at arching to limit growth and a mobility solution to support a distributed workforce. The problem is each one of these storage types are silo’ed and have to be implemented, operated and maintained separately. As a result, storage ends up consuming a large chunk of the IT budget.
  • Microservices AMA: Load Balancing and Service Discovery
    Microservices AMA: Load Balancing and Service Discovery Charles Pretzer, Technical Architect; Floyd Smith, Technical Marketing Writer Recorded: Nov 16 2017 61 mins
    Learn how NGINX Plus supports service discovery and load balancing in the NGINX Microservices Reference Architecture (MRA).

    More specifically, join this webinar to learn:

    - Get the latest answers to your questions about implementing microservices
    - Learn about the challenges others are facing in development and deployment
    - Ask questions about converting monolithic apps to microservices
    - Get an update on the NGINX Microservices Reference Architecture
  • Taking the Path to Real Time Big Data Analytics
    Taking the Path to Real Time Big Data Analytics Paul Krein, Red River; Joe Paiva, Commerce; Linda Powell, Protection Bureau; Ashok Sankar, Splunk; Nick Psak, Pure Storage Recorded: Nov 16 2017 64 mins
    The shift to the cloud is modernizing government IT, but are agencies' storage models keeping up with that transition? When it comes to big data, the proper system is necessary to avoid major data bottlenecks and accessibility challenges, allowing agencies to get the right information to the right people at the right time. Flash storage is the latest technology that improves scale, speed, and efficiency of data storage. Join us for a panel discussion on the challenge of scale, increased demand for user-focused data management tools, and security and risk reduction with sensitive data.

    Featured Speakers:

    - Paul Krein, Chief Technology Officer, Red River
    - Joe Paiva, Chief Information Officer, International Trade Administration, U.S. Department of Commerce
    - Linda Powell, Chief Data Officer, Consumer Financial Protection Bureau
    - Ashok Sankar, Director, Solutions Strategy, Public Sector and Education, Splunk
    - Nick Psaki, Principal, Office of the CTO, Pure Storage
  • vCPE and vPE: Gateway to Service Agility and Virtualization
    vCPE and vPE: Gateway to Service Agility and Virtualization Shaji Nathan, VP, Product Marketing, IP Infusion and Srikanth Krishnamohan, Director, Business Development, IP Infusion Recorded: Nov 16 2017 39 mins
    This webinar will provide attendees an overview of capabilities of VirNOS virtual network function (VNF) and the use cases. We will cover virtualizing services at the customer edge and how service providers can enable services such as VPN and IPSec to their end customers at lower OPEX. The presenter will also discuss vPE/vRouter running at the data center or cloud providing MPLS WAN services.
  • Flying into Edge Cloud
    Flying into Edge Cloud Eric van Villet, Platform Application Engineer & Paul Stevens, Marketing Director, Network & Communication Group, Advantech Nov 28 2017 4:00 pm UTC 45 mins
    5G will bring several groundbreaking new technologies into play with its new air interface and Radio Access Network (RAN) architecture extensions. It will also need an emerging software defined infrastructure, one that provides greater topology flexibility, essential to deliver on the promises of high availability, high coverage, low latency and high bandwidth connections that will open up new parallel industry opportunities.

    Edge Cloud unlocks many new doors and one of the keys to its enablement lies in the elasticity and flexibility of the underlying infrastructure. This webinar will discuss several use cases for edge computing along the road to 5G including VR/AR, autonomous cars and IoT, and how Multi-Access Edge Computing solutions allows testing and trials of solutions today.
  • The Race for 5G
    The Race for 5G Peter Jarich, Chief Analyst, Global Data Nov 28 2017 6:00 pm UTC 30 mins
    Listen to GlobalData's Peter Jarich – VP, Consumer Services and Service Provider Infrastructure talk about who is in the lead for 5G test trials and deployments and what regions of the world we can expect the next generation of network communications?
  • Container-Driven Data Centers: Bringing Docker & Kubernetes to the Enterprise
    Container-Driven Data Centers: Bringing Docker & Kubernetes to the Enterprise Steve Bohac, Senior Manager, Product Marketing, Red Hat Nov 28 2017 6:00 pm UTC 45 mins
    Container technology is impacting how we think about persistent storage for applications and microservices. In turn, software-defined storage will impact how storage is dynamically provisioned and managed for containerized applications.

    Red Hat® OpenShift Container Platform is the container application platform that brings Docker and Kubernetes to the enterprise. Closely integrated with Red Hat® Gluster Storage, together they advance seamless, containerized storage that is uniquely differentiating the future of storage in a container-driven datacenter.
    Join this webinar to learn how container-native storage built with Red Hat Gluster Storage, and tightly integrated with Red Hat OpenShift Container Platform, can help you:
    - Gain autonomy and control over the storage provisioning experience.
    - Persist registries, logging, and metrics on a single storage platform.
    - Support file, block, and object storage on a single storage platform for your container orchestration platform.
    - Hear from a customer who uses Red Hat Gluster Storage as their container storage solution.
  • Solving the IoT Security Challenge with AI and Machine Learning
    Solving the IoT Security Challenge with AI and Machine Learning Ryan Martin, Principal Analyst at ABI Research, and Sanat Kamal Bahl, Director of Product Marketing at Cisco IoT Cloud Nov 28 2017 6:00 pm UTC 60 mins
    The ability to intelligently monitor, manage, and control both IT and OT assets represent huge value drivers for companies looking to onboard IoT solutions. But the factors behind IoT strategy decisions are complex; different parties seek to scale their connected endpoint infrastructure, yet lack a common set of tools to operationalize intended efficiency improvements. In this webinar, we’ll focus on the realm of security, where IT tools (i.e. DNS security) have direct applicability to OT (IoT) applications. The challenge is implementing an integrated model at IoT scale, which requires ML/AI.

    Join Ryan Martin, Principal Analyst at ABI Research, and Sanat Kamal Bahl, Director of Product Marketing at Cisco IoT Cloud, as they examine the technologies in each domain that—when deployed successfully—improve agility and decision-making, build in security, and increase the exchange of ideas between departments. In doing so, we will explore success metrics for improving the intelligence of enterprise systems and the trends underpinning the convergence of IT and OT.
  • 진화하는 봇(Bot)의 공격을 방어하라
    진화하는 봇(Bot)의 공격을 방어하라 정덕진, Technical Project Manager II, Akamai Korea Nov 29 2017 5:00 am UTC 60 mins
    Bot은 자동화된 프로그램으로, 웹사이트의 정보를 수집하거나, credential abuse와 같은 악성행위를 수행합니다. Bot으로 인한 피해는 IT 측면의 퍼포먼스 저하 뿐만 아니라, 매출 감소, 경쟁력 저하, 비즈니스 기회 상실과 같이 비즈니스에 심각한 영향을 끼치는 경우까지 퍼져 있습니다. Bot을 운영하는 쪽은 심지어 차단을 회피하기 위한 여러 가지 기술까지 활용하여 지속적으로 대응하기 때문에, 차단만이 모든 문제를 해결해 주는 방법은 아닙니다. 점점 다양해지고 지속적으로 변화하고 발전하는 Bot의 공격 방법 등을 알아보고, 이를 효과적으로 관리하기 위한 접근방법 및 기술에 대해 알아봅니다.
  • Secure your data with IBM Cloud to simplify GDPR Readiness
    Secure your data with IBM Cloud to simplify GDPR Readiness Richard Hogg and Heather Hinton Nov 29 2017 11:00 am UTC 60 mins
    The clock is ticking and it’s time to act as Europe’s most demanding and far reaching Data Security regulation to date has been published. This webinar from IBM Cloud will examine the key requirements of GDPR, and look at how we can IBM's Cloud and Data security capabilities to simplify your GDPR Readiness journey.

    What You Will Learn
    The impact of the Regulation and its key principles
    What data protection by design and by default means for organisations
    The foundational principles of data protection
    Practical application of data protection by design and by default in the Cloud - Data security, encryption capabilities, data breach notification, Multi Cloud SaaS offerings, IBM Cloud services and our Technical and Operational Measures.
    What does signing of 24 IBM Cloud infrastructure and PaaS services means in terms of data protection adherence under GDPR.
  • Webinar in italiano - The Next Level of Smarter Endpoint Protection
    Webinar in italiano - The Next Level of Smarter Endpoint Protection Marco Rottigni, Senior Manager, Product Marketing, FireEye Nov 29 2017 1:30 pm UTC 45 mins
    Per decenni, la protezione antivirus (AV) è stata la base per la sicurezza degli endpoint, nonostante tutti i suoi limiti. Per affrontare le minacce sempre piu evolute, le organizzazioni devono dotarsi di una soluzione integrata di endpoint che possa migliorare le loro difese.
     
    Il 29 novembre, Marco Rottigni, Senior Manager, Product Marketing di FireEye, offrirà una panoramica di dettaglio sui seguenti punti:
    • Perché i prodotti per la sicurezza degli endpoint non sono sufficienti a fornire una protezione efficace
    • Le funzionalità necessarie per dotarsi di una soluzione completa per la protezione degli endpoint:
    -AV con Threat Intelligence
    -Detection e Response
    -Behaviour e Exploit
    -Visibilità e automazione
    • Come la soluzione FireEye Endpoint Security consente di passare rapidamente dall'individuazione all'indagine e alla remediation, tutto con un solo agente
     
    Partecipa a questo webinar come primo passo verso un approccio più intelligente e flessibile alla sicurezza degli endpoint.
  • Data Breach Under GDPR: How threat intelligence can reduce your liabilities
    Data Breach Under GDPR: How threat intelligence can reduce your liabilities Nahim Fazal and Pedro López Nov 29 2017 3:00 pm UTC 45 mins
    There has been an important clarification around what constitutes a data breach listen in to update yourselves and ensure you don’t fall foul of the regulation.

    When the legislation comes into effect in May 2018, compromised data will be among the most seriously regulated and highly penalized issues a company can face, so a practical and coherent understanding of the regulation is critical to mitigating any penalties your organization will face.

    In our latest webinar, Blueliv’s Head of Cyber Threat Intelligence, Nahim Fazal, and Legal Expert Pedro López will be providing specialist insight and guidance around aspects of GDPR specifically relating to a data breach. Building on our recent whitepaper, they will explain how to plan and manage the impact of the incoming updated legislation on your business.

    Pedro López is an expert in legislation relating to cybersecurity. When it comes to GDPR, the devil is truly in the detail, and he’ll be explaining how to ensure compliance without getting lost in jargon.

    Nahim Fazal’s experience in the industry enables him to explain not just how to mitigate the consequences of a data breach, but how to reduce the risk of exposure and ensure that any losses – from customers to financial to reputational – are minimal.

    The webinar will be followed by a short Q&A and demonstration of how threat intelligence can shield your organization from the worst impact of the updated GDPR.

    Presenters:
    Pedro López, Legal Advisor and GDPR expert at Martin Andino Law firm
    Nahim Fazal, Cyber Security Development Manager at Blueliv
  • Adapting the 12-Factor Application for Microservices
    Adapting the 12-Factor Application for Microservices Eduard Borges, Software Developer, NGINX; Floyd Smith, Director of Content Marketing, NGINX Nov 29 2017 5:00 pm UTC 60 mins
    Learn how to adapt the core ideas in the classic 12-factor application model to a modern microservices architecture optimized for continuous delivery.

    More specifically, join this webinar to learn:

    - The history of the 12-factor app and the problems it solves
    - Industry changes that have happened since the 12-factor app was introduced
    - What each of the current 12 factors are
    - How each of the 12 factors needs to be updated to fit microservice needs
  • Network Teams, Need A Wingman? Why ExtraHop Addy won the EMA Innovator’s Award
    Network Teams, Need A Wingman? Why ExtraHop Addy won the EMA Innovator’s Award Shamus McGillicuddy, Senior Analyst at EMA Research and Isaac Roybal, Product Director at ExtraHop Networks Nov 29 2017 6:00 pm UTC 60 mins
    Network administrators and engineers function as “human middleware” for their monitoring tools, according to Shamus McGillicuddy, Senior Analyst at EMA Research. Skilled humans still need to do much of the heavy lifting in terms of analyzing data.

    That’s the problem holding back many network operations teams from achieving greater productivity. But there’s hope! EMA recently bestowed its Innovator’s Award on ExtraHop’s Addy machine learning offering for its ability to remove much of the burden from human operators. Join this webinar to learn how machine learning can help under-resourced network teams do more with less.
  • Intel's Data Center IT Agility and Control
    Intel's Data Center IT Agility and Control Ajay Garg, Senior Director & George Clement, Senior Application Engineer, Intel Data Center Management Solutions Nov 29 2017 7:00 pm UTC 60 mins
    A rapid rate of change complicates every facet of datacenter management, and server-centric compute models are too cumbersome for today’s highly variable workloads. Is it possible to optimize resources and operations in such dynamic environments? In this presentation, learn how to replace manual, hardware-defined application provisioning and management with a highly automated, software-defined resource model and orchestration layer that enables flexibility, simplified on-demand capital efficiency, and lower TCO. Find out how to compose more agile pools of datacenter resources, and simultaneously drive up IT efficiency, optimize energy requirements, increase datacenter resilience, and strengthen disaster recovery plans.
  • Rethinking Application Delivery in the Cloud Era
    Rethinking Application Delivery in the Cloud Era Brad Casemore, Research Director, Datacenter Networks, IDC & George McGregor, Senior Director, Product Marketing, Citrix Nov 30 2017 3:30 pm UTC 60 mins
    Today, multi-cloud is the new norm for cloud adopting organizations. The organizations that thrive will be those that can adapt their multi-cloud and hybrid-cloud architecture to simply and reliably deliver applications. According to IDC, 94% of organizations are already reassessing, modifying, or overhauling their network to facilitate app delivery for a cloud-first world. Wanting to dive deeper, Citrix commissioned IDC to conduct a custom survey of 900 organizations to uncover how enterprises were meeting the network requirements for cloud adaptation.

    Join guest speaker Brad Casemore, IDC’s Research Director, Datacenter Networks and George McGregor, Citrix Senior Director of Product Marketing, as we present the results of this unique survey, which delves into the infrastructure required to deliver applications and what changes are needed from the traditional datacenter approach as apps move to the cloud.

    Attend this on-demand webinar and discover: 

    •How your peers adapt application delivery network and infrastructure for cloud
    •Data to support what’s working and not working
    •The top concerns preventing successful cloud adoption
  • 5 Questions your CIO must Face: The New “Normal” in Modern Enterprise Operations
    5 Questions your CIO must Face: The New “Normal” in Modern Enterprise Operations Marty Jackson, Director, Product Evangelist, xMatters & Sahil Khanna, Sr. Product Marketing Manager, Moogsoft Nov 30 2017 4:00 pm UTC 60 mins
    IT Ops and DevOps for the modern enterprise offers many benefits — increased agility and productivity, leaner operations, and hybridized hosting options — but digital transformation isn’t easy, especially if you’re not asking the right questions, addressing the right issues.

    Creating a culture that embraces modern operations is still a challenge, especially when maintaining reliability and security is a paramount requirement for decentralized business IT models. Not to mention justifying the costs of transformation to your CIO.

    Dive into the “new normal” for enterprise Modern Ops with this informative Moogsoft / xMatters webinar event, and find out the 5 questions that every CIO needs to ask in 2018.
  • Campus & Data Centers Why Ribbon Technology Works for You
    Campus & Data Centers Why Ribbon Technology Works for You Loren Rapp Nov 30 2017 4:00 pm UTC 90 mins
    This webinar will review the advantages that ultra high fiber count ribbon cables can bring to data centers and campuses. Also covered will be splicing and connectivity options.

    This webinar is approved by BICSI for one CEC.
  • Reaping the Benefits of Software Defined Industrial Control Systems
    Reaping the Benefits of Software Defined Industrial Control Systems Mike Meyer, Product Manager, Artesyn Embedded Computing and Charlie Ashton, Senior Director, Business Development, Wind River Nov 30 2017 5:00 pm UTC 45 mins
    Over the past thirty years, not much has changed in the architecture of industrial control systems. During this time, however, there have been fundamental transformations in the world of Information Technology (IT). In this webinar, we explain the business benefits that can be derived by implementing software defined industrial control systems that leverage software-based techniques from the IT industry. We describe a straightforward process for transitioning to this new architecture, managing the risks and reaping the benefits.
  • Extending the Enterprise WAN into AWS
    Extending the Enterprise WAN into AWS David Klebanov, Director of Technical Marketing at Viptela Nov 30 2017 6:00 pm UTC 45 mins
    As companies shift towards the cloud for their application environments, IT organizations are tasked with finding the most effective methods and solutions to quickly and securely connect their corporate networks to external cloud environments while maintaining the integrity of their corporate security models. Digital transformation and software-defined options are driving IT teams to re-think the existing direction of their WAN to cost-effectively connect to multiple and geographically diverse VPCs. In this session, we outline a solution we’ve recently implemented which includes the adoption of an SDN methodology when securely connecting to geographically diverse VPCs with AWS Direct Connect and transit VPCs.
  • Take Control of Your Data Center Power & Server Health
    Take Control of Your Data Center Power & Server Health Russ Sprunger, Senior BDM, Intel Data Center Management Solutions and Jason Sherman, Engineering and Support Manager Nov 30 2017 6:00 pm UTC 60 mins
    You’re constantly making decisions based on power consumption. How much power is each rack using...and which piece of equipment goes where? You’re dealing with power and cooling costs that are going up...not down. You’re spending money and time on server failures you simply couldn’t see coming.

    Data center managers face a common problem: too many assets, too little time, and not enough information that’s easy to access and act upon. You’ve got many different pieces...in many different places.

    With DCIM paired with Environmental Monitoring software, you have one centralized repository from which you can easily pull up the information you need to put all the pieces together, take action, and gain control.

    In this webinar with Graphical Networks & Intel DCM, you’ll learn how you can:

    Stay on top of server health and make necessary changes before failures occur.
    Find your zombies servers and kick them to the curb.
    Lower your power and cooling costs by as much as 30%.
    Easily access and organize your data center info from one central place.

    Stop fielding power costs (and preventable server failures) and say adios to all the related headaches and hassle. Substantially lower costs, keep everything chugging along smoothly, and get more out of your time, money, and hard work...and watch the software pay for itself in the first year alone.
  • Your Proxy Just Got Smarter with Web Isolation
    Your Proxy Just Got Smarter with Web Isolation Timothy Chiu - Senior Director of Product Marketing, Symantec Nov 30 2017 6:00 pm UTC 30 mins
    Did you know millions of hosts (Domains, Subdomains, or IP Addresses) pop up every day and many of these have lifespans of less than 24 hours.

    Many organizations choose to set Secure Web Gateway policies to block users from going to uncategorized sites because of the risk they represent, even though many may be legitimate destinations for business purposes.

    In a similar fashion, many enterprises choose to block sites that have a heightened risk rating, but are not conclusively risky. This leads to website over-blocking and unhappy end users. Some sites are known to be good, others are known to be bad, the problem comes for those in the middle where insight/information is lacking.

    Key Learning Objectives:

    •Learn about the world’s largest civilian threat intelligence service and how it will protect you from Malware attacks

    •Learn how to set policies to send any traffic with inconclusive risk or uncategorized by Global Intelligence Network down a Web Isolation path.

    •Learn how to boost productivity for businesses without incurring any additional risk.

    Register Today
  • Cutting Through the FUD Factor – The Reality of Machine Learning
    Cutting Through the FUD Factor – The Reality of Machine Learning Seth Geftic, Dir Product Mgmt, Sophos; Dr. Paulo Shakarian, ASU; Brandon Dunlap, Moderator Nov 30 2017 6:00 pm UTC 75 mins
    Machine learning (aka Artificial Intelligence) can be found in the marketing literature of a number of new solutions and offerings in the marketplace. But what exactly is it? FUD? Magic Dust? The “Next Big Thing”? There’s a lot of confusion and a lot of questions around this topic. What’s the false positive detection rate? How often does it need to be updated? Does it scale well? Join Sophos and (ISC)2 to explore these questions and more on November 30, 2017 at 1:00PM Eastern in our next ThinkTank webcast.
  • Re-Engineering Enterprise IT: A Blueprint for the Modern Infrastructure
    Re-Engineering Enterprise IT: A Blueprint for the Modern Infrastructure Russ white, Tarak Modi, and Bala Kalavala Dec 5 2017 4:00 pm UTC 60 mins
    A whole new era of cloud-native applications is here. From blockchain and IoT, to AI and machine learning, AR/VR, containers and microservices, the possibilities for modernizing your IT infrastructure are endless.

    With these advanced technologies and the widespread adoption of open source comes greater security risks, the explosion of firewall, and implications on IT teams to adopt, integrate, transition, and digitize at lightning speed.

    Join this expert panel with Russ White, Network Architect at LinkedIn, Tarak Modi, President & CTO of TekNirvana, and Bala Kalavala, Founder & CIO of Adiya, Inc. as they discuss and explore in-depth the most important technology trends and how to apply them in 2018.

    Topics include:
    - Decentralized applications - a closer look at containers and microservices, blockchain, AI, VR and IoT
    - Network disaggregation and the changing engineering landscape
    - DevOps, agile and software-defined networking
    - A technical deep dive into cloud, open source and security in 2018 and beyond
    - Challenges in adapting to modernization of enterprise IT - People and Process
  • Re-imagining Networks - NFWare’s High-Performance Virtual Networking Solutions
    Re-imagining Networks - NFWare’s High-Performance Virtual Networking Solutions Vyacheslav Morozov, CTO, NFWare; Alexandra Yartseva, CMO, NFWare Dec 5 2017 4:00 pm UTC 60 mins
    One of the main aims of the NFV-concept is to replace dedicated proprietary network hardware with flexible and scalable software-based solutions. However, all but one of today’s VNF solutions demonstrate benefits in terms of flexibility and scalability, but not the levels of performance that the industry demands.

    NFWare, an innovative network software vendor, has risen to meet the challenge by developing virtual networking products to provide hardware-like performance alongside all the benefits of a virtual solutions. NFWare’s product line includes three products: vCGNAT (up to 200 Gbps per VM), vADC (up to 40M CPS per VM) and vURL-Filtering (up to 20M CPS and 100M concurrent sessions per VM).

    At the webinar, NFWare will tell more about technologies that allowed to achieve outstanding performance levels, as well as discussing what this new technology means for an industry that is always in search of faster, better ways of working.
  • VMware and Tufin: Extending the Automation Journey to the SDN
    VMware and Tufin: Extending the Automation Journey to the SDN NSX Partner Solution Technical Architect Simon Hamilton-Wilks and Tufin’s Senior Product Manager Amnon Even-Zohar Dec 5 2017 4:00 pm UTC 45 mins
    VMware NSX is a visionary solution for successfully delivering a comprehensive SDN. Amid significant adoption across all industries that prioritize the scalability of the cloud with control over security, NSX has found an established place in securing the enterprise network.

    The addition of NSX to the physical network and public cloud providers have complicated the effective management of the enterprise network. The Tufin Orchestration Suite™ offers a single pane of glass solution that delivers immediate insight into the current state of compliance, provides policy-driven automation including change design and provisioning across the network, and ensures the connectivity of applications during access modifications.

    Join this co-sponsored webinar with Tufin and VMware to understand how your organization can fully capitalize on the SDN benefits of NSX while ensuring comprehensive network security policy management across the hybrid cloud environment.
  • Interpreting Fiber Test Results and How to Identify Common Mistakes
    Interpreting Fiber Test Results and How to Identify Common Mistakes Jim Davis, Fluke Networks Dec 5 2017 4:00 pm UTC 90 mins
    Learn how to read the many fields on a fiber optic certification report generated by a field tester and understand how they will affect the applications you are planning to run.

    Viewers will earn one BICSI CEC