Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Der Anstieg von Cyberattacken auf dem DACH-Markt und wie man ihre Auswirkungen m
    Der Anstieg von Cyberattacken auf dem DACH-Markt und wie man ihre Auswirkungen m
    Flaviu Lang & Maik Pietsch | Cloudflare - Experten für Cyber-Sicherheit | DACH Recorded: Dec 17 2018 27 mins
    Dieses Webinar bietet Ihnen einen Überblick über die Lage der Cyber-Sicherheit in der DACH Region. Thematisiert werden die verschiedensten Formen, die Cyberangriffe einnehmen können, sowie passenden Schutzmechanismen, die Sie in Ihrem Unternehmen implementieren können.
  • Netzwerk Upgrades bereiten Ihnen Kopfschmerzen?
    Netzwerk Upgrades bereiten Ihnen Kopfschmerzen?
    Daniela Fusaro, Senior Solutions Architect Recorded: Dec 14 2018 18 mins
    Trotz der unstillbaren Nachfrage nach Bandbreite müssen Unternehmen die Sicherheitsrichtlinien des Netzwerks immer noch schnell überprüfen und durchsetzen. Das ist besonders schwierig, wenn Sie Netzwerke von 10 Gb auf 40 Gb oder von 40 Gb auf 100 Gb aufrüsten.

    Nehmen Sie teil am Webcast von Daniela Fusaro, Senior Solutions Architect bei Gigamon. Sie erläutert, wie Sie die mit diesen Netzwerkupgrades verbundenen Sicherheitsrisiken lösen, Ihre Sicherheit stärken, die IT vereinfachen und Kosten senken können.

    Sie erfahren folgendes:
    - Erhöhen Sie Ihren ROI für die Sicherheit: Filtern Sie die richtigen Daten aus dem Netzwerkverkehr der physikalischen, virtuellen und Cloud-Infrastruktur und leiten Sie diese an die relevanten Tools weiter
    - Reduzieren Sie Ihr Sicherheitsrisiko: Überdenken Sie Ihre Netzwerksicherheitsarchitektur neu, indem Sie verschlüsselten Datenverkehr nur einmal entschlüsseln und die Überprüfung dieser Daten durch mehrere Sicherheitstools ermöglichen
    - Verbessern Sie die Reaktion auf Bedrohungen: Erkennen Sie Muster und Bedrohungsvektoren in heterogenen Netzwerken schneller

    Finden Sie heraus, wie sowohl Netzwerk- als auch Security-Teams bei Netzwerk-Upgrades schneller und sicherer zusammenarbeiten können, um Sicherheitsbedenken zu lösen - registrieren Sie sich noch heute!
  • Design your hybrid cloud for the end user - or fail
    Design your hybrid cloud for the end user - or fail
    Cameron Wyatt and Ian Tewksbury, Red Hat Recorded: Dec 13 2018 52 mins
    The usual approach to beginning business transformation lies with the cloud, and the benefits of a hybrid cloud are clear and uncontested. So why is it that so many enterprises struggle to adopt this exceedingly prevalent technology? Historically, the problem has been an exclusive focus on the tools instead of the people using the tools.

    In this webinar, we we'll discuss why it's imperative in today’s IT landscape to keep the end user as your primary focus when designing and implementing your hybrid cloud.

    We'll cover:
    - How to build your cloud incrementally to accommodate future fixes and enhancements.
    - Why you need to consider your existing policies and procedures when defining your new cloud experience.
    - How to iteratively design and implement a successful hybrid cloud experience.

    Featuring:
    Cameron Wyatt, Consulting Architect, Red Hat Consulting, Red Hat
    Ian Tewksbury, Consulting Architect, Red Hat Consulting, Red Hat
  • Kong 1.0 and Beyond: Preparing for a Cloud-Native World
    Kong 1.0 and Beyond: Preparing for a Cloud-Native World
    Marco Palladino, CTO & CO-Founder, Kong; Cooper Marcus, Director of Ecosystem, Kong Recorded: Dec 13 2018 49 mins
    With Kong 1.0, we confirm that Kong is a proven, robust, stable, and production-ready API management platform. Kong stands poised as an API gateway, service mesh, and the basis for a control platform that will serve users faithfully as their information exchange needs, and those of the industry, change.

    As the amount of data and services explodes, enterprises must prepare for a cloud-native world that enables them to free and scale their architectures.

    In this presentation, Kong CTO & Co-Founder, Marco Palladino, and Director of Ecosystem, Cooper Marcus, walk us through the journey towards Kong 1.0 and share the vision that positions Kong as a service control platform for all of your data flows, regardless of your chosen architecture or deployment patterns.

    Webinar takeaways:

    - Learn about the three forces leading us towards cloud-native first architectures
    - Understand how we got here – the milestones marking the maturity of Kong
    - Gain visibility into the future of APIs and the implications for your architecture – Cloud-Native First, but hybrid while you get there.
    - Why you need a solution that can support all of your deployment patterns.
  • 9 Steps to Building a Smarter Network
    9 Steps to Building a Smarter Network
    Cherie Martin, Network Solutions Manager - Aruba Recorded: Dec 13 2018 53 mins
    Did you know that over 50% of issues with network experience can be attributed to lack of pre-installation planning? There is a lot to consider, but the effort you put in up front saves time, money, and frustration over the life of your network. Join us as Cherie Martin, Network Solutions Manager, reviews the 9critical steps you should take to ensure your network is smart and reliable.

    Attend and you could qualify for a FREE Access Point and a 90-day trial of Aruba's network cloud-management solution, Aruba Central.
  • Video Case Study: How Indegy Secures A Major Cement Company
    Video Case Study: How Indegy Secures A Major Cement Company
    IndegyTV Recorded: Dec 13 2018 4 mins
  • Zscaler's wealth of capabilities
    Zscaler's wealth of capabilities
    Yogi Chandiramani Recorded: Dec 13 2018 54 mins
    Zscaler constantly innovates its offering and capabilities with the objective to provide best security protection and user experience. Zscaler 5.6 was released in October 2018 and brings a wealth of new capabilities. During this session, you will learn how to best leverage the investment you have made int he Zscaler platform. Our experts will be covering all new security features such as Company Risk Score, Threat Insights Plugin, Threat Library, SCIM authentication and many more.
  • Tear down barriers for a stronger cyber defence with DNS
    Tear down barriers for a stronger cyber defence with DNS
    Gary Cox - Systems Engineering Manager, UK and Ireland - Infoblox Recorded: Dec 13 2018 29 mins
    Businesses today are under an unprecedented level of pressure to ensure they get the balance between agility and security. Enterprise mobility and BYOD has meant there is a vast number of network and security devices – all generating their own incidents, but they don’t always share information.

    According to the ESG research report on Security Operations Challenges, Priorities and Strategies in 2017, keeping up with the volume of security alerts and lack of integration between different security tools are the biggest challenges related to security. Organisations are investing heavily in automation/orchestration of incident response to improve collaboration, prioritize alerts and shorten time for incident response.

    Join Infoblox on December13th to understand how you can enrich your security product stack with the power of IPAM & DNS. The topics we will cover include:

    • Provide better visibility across your entire network and remove silos
    • Improve agility and automate IT workflows
    • Enable faster remediation to threats

    Please join Infoblox for this key discussion on the integrated ecosystem -- taking your organisation to the next level of security.
  • Сетевая фабрика Dell EMC для современных ЦОД
    Сетевая фабрика Dell EMC для современных ЦОД
    Сергей Гусаров, Старший системный инженер Dell EMC Recorded: Dec 13 2018 60 mins
    На этой сессии мы расскажем, как сетевая фабрика Dell EMC помогает решать текущие задачи современных ЦОД. Мы представим облачный сервис Fabric Design Center: помощник в проектировании и развертывании сетевых фабрик Dell EMC. И рассмотрим возможности масштабируемой сетевой фабрики для модульной платформы PowerEdge MX.
  • Containers: accelerating your move to a next-gen, on-demand digital data centre
    Containers: accelerating your move to a next-gen, on-demand digital data centre
    Nathan Vandenberg, General Manager – Data Centre, Dimension Data & Sean Bedford, Cloud Engineer, Google Recorded: Dec 12 2018 47 mins
    Your enterprise is on a journey to become an on-demand digital business. Your data centre must be able to adapt and scale to achieve your desired digital outcomes. Emerging technology such as containers can unlock a myriad of operational and cost benefits to accelerate your move to a next-generation data centre.

    A 451 Research report commissioned by Dimension Data* found that 52% of enterprises are using container technology to transform that way work is done in their data centre.

    Containers solve the problem of portability and getting software to operate reliably when moved from one computing environment to another. In a next-generation data centre, containers achieve benefits including automation of workload provisioning, ability to scale and orchestration across technology.

    Join Dimension Data and Google on this webinar to find out how your business can take advantage of the opportunities presented by containers. We’ll discuss how containers work, the difference between virtualisation and containers, existing barriers in this space, how you can extend containers to the cloud and the benefits for your business.
  • Threats on the Horizon – What to Look for & How to Prepare
    Threats on the Horizon – What to Look for & How to Prepare
    Bob Rudis, Chief Data Scientist & Michelle Martinez, Senior Threat Intelligence Analyst Recorded: Dec 12 2018 47 mins
    Wondering what the top threats are for 2019? Join Rapid7 experts for a discussion of the top threats our team is tracking for the new year. Through extensive research and the engagements of our managed detection and response team, Bob Rudis and Michelle Martinez will share their research to help you protect your organization in the new year. 



    Some of the topics our experts will cover include: 


    1. The most prevalent threats we are tracking for 2019
    2. Top cybersecurity incidents of 2018 and how we expect those to impact 2019
    3. Key takeaways to help you put our research into practice at your organization
  • 3 Key Essentials for Moving AV to the LAN
    3 Key Essentials for Moving AV to the LAN
    Brian Simmons, Copper Product Manager Recorded: Dec 12 2018 52 mins
    AV technologies are advancing rapidly, and the amount of video traffic crossing IP networks is growing at a rate of 25% every year. By 2021, it’s expected that one million minutes of video traffic will cross global IP networks every single second. With that kind of demand, it’s more important than ever to install an AV system that not only delivers flawless image quality with low latency but also delivers the scalability and flexibility needed to expand your system. Attend this webinar to learn best practices for enterprise AV systems.

    This webinar will cover:
    -AV technologies available today and on the horizon
    -Benefits of migrating your AV system to the IP network
    -How to select the right solution to avoid potential pitfalls.
  • Enforcement & Containment with Segmentation
    Enforcement & Containment with Segmentation
    Josh King, Director of Security Solutions; Mark Moretti Vice President of Infrastructure and Security Recorded: Dec 12 2018 55 mins
    You don't have to look far to find a current news story about ransomware taking down networks in record time, or a data breach involving millions of customer records by a malicious actor who has hid in an environment for months.

    In an "Assumption of Breach" world, we accept that it's statistically impossible to keep all the bad guys out. That inevitably at some point, we will receive that phone call or email that says it's happened to our organization. But that doesn’t mean we are powerless against it either. We have the tools and practices to help limit the impact that such an incident can have on our business, we just have to exercise them.

    Segmentation is one of those practices that has the ability to significantly impact your overall security posture, but it's impact depends on how well it's implemented. The industry has been using VLANs for segmentation for decades, but they are combat ineffective when it comes to stopping the spread of ransomware and other malicious threats.

    We need to look at more advanced capabilities like Data Center Next Generation Firewalls, Micro-Segmentation practices, Behavior Analytics, and even Network Access Control (NAC) among others to help us contain, mitigate, and eventually remediate the threats that face us.

    Join Josh King, Carousel's Director of Security Solutions to discuss what an assembly of the right mix of people, process, and technologies might look like to combat this evolving threat landscape.
  • The Evolution and Future of DevOps
    The Evolution and Future of DevOps
    Jonathan Sullivan, CTO Recorded: Dec 12 2018 45 mins
    At NS1, we see DevOps as helping improve scalability and the application delivery process as a whole. Despite its benefits, moving to DevOps can be a challenging undertaking, especially for organizations riddled with legacy applications and technology. Many companies fail to reap the benefits because making the shift requires substantial changes to culture, processes and the resulting toolset.

    As we move into 2019, the emergence of DevOps continues to be a part of a growing number of global enterprises. With the rise of this methodology, what new DevOps trends have yet to appear?

    In this panel we will cover:

    - What DevOps looks like at NS1
    - What has the evolution of DevOps looked like?
    - What are some of the remaining challenges left for DevOps to solve?
    - What we still see as lacking from the DevOps tool belt?
    - What is the future of DevOps?
  • The alchemy of data
    The alchemy of data
    Chris Wigget, Director Insights and Analytics, Britehouse a division of Dimension Data Recorded: Dec 12 2018 52 mins
    Information is the heart of the modern organisation. For many years now business intelligence has been at the forefront of taking data and attempting to turn it into actionable insights.

    The truth is that traditional business intelligence approaches are not able to provide the digital organisation with the level of insight that the modern business environment demands.

    In this talk we’ll examine how traditional business intelligence is failing the modern, agile organisation, how simply embracing ‘the next big thing’ can backfire, and why organisations find themselves in this situation.

    We’ll also show how advanced analytics can help companies escape the information swamp and start turning the data they have into the information they need.
  • Estratégias para extender a vida útil de IPv4 e introduzir IPv6 em provedores
    Estratégias para extender a vida útil de IPv4 e introduzir IPv6 em provedores
    Thiago de Lima, SE Brazil from A10 Networks Recorded: Dec 12 2018 56 mins
    O esgotamento global dos blocos livres de endereços IPv4 disponíveis e a adoção de IPv6, impõem uma série de novos desafios ao crescimento e a rentabilidade dos provedores de serviços. Na maior parte dos casos, os provedores de serviços devem desenhar e implantar estratégias de curto e longo prazo, para preservar recursos extremadamente escasso como são seus endereçamentos IPv4 e migrar sua rede, serviços e assinantes para IPv6.

    Agenda:
    - Preservação de endereços IPv4
    - Migração e coexistência com IPv6
    - Aspectos legais, visibilidade e acessibilidade dos usuários
  • The Ghost in the Machine: Who Will Win the AI Race?
    The Ghost in the Machine: Who Will Win the AI Race?
    Simon Bryden, Consulting Systems Engineer, Fortinet Recorded: Dec 12 2018 44 mins
    In this webinar we will discuss some of the key security events and trends over the last year, drawing on threat intelligence facts and statistics as researched and reported by the FortiGuard Labs.

    As as both cyber criminals and cyber defenders look to new technological advances, we will then consider some emerging threats and defense strategies and discuss how both sides are likely to benefit, and to what extent?
  • Stream Video to Your Global Users Securely and Confidently
    Stream Video to Your Global Users Securely and Confidently
    Derek Yee, PMM, Cloudflare | Cavin Kindsvogel, Stream Product Specialist, Cloudflare | Jon Levine, Stream PM, Cloudflare Recorded: Dec 11 2018 31 mins
    CDNs have played a significant role in successful video delivery, especially across OTT services, publishing, ad tech, gaming, and sporting sites. Cloudflare is building a better Internet, which includes delivering a fast, secure and reliable video experience for consumers anywhere in the world. Cloudflare offers a high performing distribution network that can meet the evolving needs of companies delivering video.

    Join us for this 45-minute webinar where we cover the following:

    - The foundations of building a resilient network to support high traffic video content
    - Advances in Cloudflare’s caching infrastructure for better streaming performance
    - How Cloudflare Workers provides video providers increased control of content distribution and visibility to user analytics
  • Will You Still Love Me When I Turn 64GFC?
    Will You Still Love Me When I Turn 64GFC?
    Dean Wallace, Marvell; Barry Maskas, HPE Recorded: Dec 11 2018 50 mins
    Fibre Channel’s speed roadmap defines a well-understood technological trend: the need to double the bit rate in the channel without doubling the required bandwidth.

    In order to do this, PAM4 (pulse-amplitude modulation, with four levels of pulse modulation), enters the Fibre Channel physical layer picture. With the use of four signal levels instead of two, and with each signal level corresponding to a two-bit symbol, the standards define 64GFC operation while maintaining backward compatibility with 32GFC and 16GFC.

    This advanced technical session will cover the T11 standards which define 64GFC serial Fibre Channel, backwards speed auto-negotiation compatibility, and compatible form factors:

    •New physical layer and specification challenges for PAM4, which includes eye openings, crosstalk sensitivity, and new test methodologies and parameters
    •Transceivers, their form factors, and how 64GFC maintains backward compatibility with multi-mode fibre cable deployments in the data center, including distance specifications
    •Discussion of protocol changes, and an overview of backward-compatible link speed and forward error correction (FEC) negotiation
    •The FCIA’s Fibre Channel speed roadmap and evolution, and new technologies under consideration

    After you watch the webcast, check out the FCIA Q&A blog: https://fibrechannel.org/64gfc-faq/
  • Threat Detection in TLS: The Good, the Bad, and the Ugly
    Threat Detection in TLS: The Good, the Bad, and the Ugly
    Ian Farquhar, Distinguished Sales Engineer, Gigamon Recorded: Dec 11 2018 59 mins
    While TLS (formerly known as SSL) has become the de facto way of encrypting data in motion on networks, it can also hide threats from your InfoSec team. As the volume of encrypted traffic continues to grow, organizations become even more vulnerable to encrypted attacks, hidden command and control threats and data exfiltration exploits that go undetected.

    To make this situation even more complex, the TLS 1.3 draft 28 proposal, ratified at the IETF 101 conference in London and now moving toward official RFC status, has actually removed the visibility which was widely deployed for threat identification in TLS 1.2.

    Once again, InfoSec teams find themselves at the fulcrum of a delicate balancing act. On one hand, encryption is moving toward ubiquity but on the other, we need to detect when threat actors use it too. And in detecting that misuse, we need to acknowledge and address critical management, troubleshooting, legal, regulatory, ethical and technical concerns. For example, we can’t decrypt just at the edge of our networks if we believe “perimeter security is dead.” Proxies on the network edge are a step backwards.

    What can you do? “Threat Detection in TLS: The Good, the Bad and the Ugly” will discuss the necessity of deploying TLS decryption in the core of networks and will explore innovative architectures that deliver that capability while maintaining availability and reliability.

    Learn how organizations can manage growing SSL/TLS traffic volumes by creating a centralized “decryption zone” to decrypt traffic once and give security tools newfound visibility into formerly encrypted traffic and threats.
  • [Ep.24] Ask the Expert: Service Monetization in the XaaS Era
    [Ep.24] Ask the Expert: Service Monetization in the XaaS Era
    Arun Trivedi, Partner, Wipro and Kelly Harris, Senior Content Manager, BrightTALK Recorded: Dec 11 2018 49 mins
    This webinar is part of BrightTALK's Ask the Expert Series.

    Service monetization is sometimes a competitive differentiator or an answer to disruptive competitors. Irrespective of the reason for transformation, service monetization provides a great platform to model business models to improve customer retention and increase revenue in the longer term.

    This session will provide participants with an understanding of service monetization challenges and how companies can transform their overall business process and quote to revenue in particular.

    Join Arun Trivedi, Partner, Wipro Technologies and Kelly Harris, Senior Content Manager, BrightTALK for a live discussion on service monetization and revenue streams from XaaS.
  • Jacked, Extorted and Destroyed - The Threats of 2018 and Beyond
    Jacked, Extorted and Destroyed - The Threats of 2018 and Beyond
    Kevin Haley, Director Security Response, Symantec Recorded: Dec 11 2018 48 mins
    Today’s threats aim to do more than just steal intellectual property. They hijack software updates, destroy devices, steal resources, and take advantage of trusted tools within your network. To top it off, these threats are notoriously difficult to detect.

    Join leading threat expert, Kevin Haley, as he shares insights on trends shaping the threat landscape and how to best-protect your organization.

    Key Learning Objectives:

    • Insights on cryptojacking, fileless threats and ransomware

    • Capabilities you need to protect yourself from these threats

    • Best practices for more efficient and effective endpoint security

    Please Join Us, Register Today
  • Key Considerations for Stretching Your Storage Budget
    Key Considerations for Stretching Your Storage Budget
    Donna Pizarro, Product Manager, Storage; Bill Coker, VP, Hardware Business Unit; Bill Raftery, SVP Global Storage Solutions Recorded: Dec 11 2018 41 mins
    Storage Admins are continually challenged by the revolution in today's storage technology; the expansive growth of storage needs and the balance of getting the best performance and extended life of the storage product to stretch an existing budget.

    Want to learn more? Join us for an informative discussion where we’ll discuss:
    •Available N-1 options for hybrid systems
    •Options you should consider when purchasing a pre-owned N-1 hybrid
    system
    •The pros and cons of purchasing a N-1 storage solution
    •How to save by extending the life of the asset
    •Why performance assessments and health checks are necessary, what is
    involved and what objectives should be expected
  • More Things You Can Do with a Security Policy Management Solution
    More Things You Can Do with a Security Policy Management Solution
    Dania Ben Peretz, Product Manager Dec 17 2018 3:00 pm UTC 45 mins
    Are you getting the most out of your Security Policy Management Solution?

    Today’s security policy management solutions do much more than automate traditional change management tasks. And yet, managing processes is becoming increasingly complex, time consuming and riddled with errors.

    Many professionals believe they need additional sophisticated tools to address these challenges. However, you may already have what you need, up and running in your organization.

    Join us in this webinar to learn how AlgoSec’s solution simplifies and automates security policy management to make the enterprise more agile, more secure and more compliant across your ever-changing network:

    •Gaining visibility of unsecured traffic used by your business applications
    •Closing the gaps in your network map to get your automation in place faster
    •Tying cyberattacks to business impact
    •Being audit-ready all the time
  • Ask the Expert: Everything You Ever Wanted To Know About SD-WAN
    Ask the Expert: Everything You Ever Wanted To Know About SD-WAN
    Ritesh Mukherjee, Vice President Product Management at 128 Technology Dec 17 2018 6:00 pm UTC 60 mins
    Bring your toughest questions and most important SD-WAN challenges to Ritesh Mukherjee, Vice President of Product Management at 128 Technology.
  • VMware vSAN Technology: актуальное решение для гиперконвергентной инфраструктуры
    VMware vSAN Technology: актуальное решение для гиперконвергентной инфраструктуры
    Николай Куликов, менеджер по развитию бизнеса VMware Dec 18 2018 8:00 am UTC 60 mins
    Самые «быстрорастущие» продукты Dell Technologies - VxRail и VxRack - основаны на VMware vSAN, ведущем решении хранения для гиперконвергентной инфраструктуры (HCI). Послушайте экспертов, обсудите, как последние инновации vSAN помогают организациям модернизировать свою инфраструктуру и обеспечить общие операции – от границы до ядра сеит и облаков. Узнайте у экспертов, как работают последние функции vSAN.
  • App and Network Attacks
    App and Network Attacks
    Akhilesh Dhawan, Dir of Prod Marketing- Cloud/Security Citrix & Darshant Bhagat, Dir of Prod Management/Strat Citrix Dec 18 2018 11:00 am UTC 47 mins
    Find out how the Citrix Security approach brings together the entire Citrix portfolio to address internal and external threats by providing holistic visibility and proactive protection of your company assets.

    This webinar deep dives into: protection of applications from on-premise to the cloud, hypervisor protection of servers before the threat hits the operating system, and device and user protection from external threats. Proactively counter internal and external threats through analytics.
  • IoT Series [Ep.1]: Foundations -- Architecture and Framework
    IoT Series [Ep.1]: Foundations -- Architecture and Framework
    Johna Till Johnson, CEO & Founder, Nemertes Research Dec 18 2018 4:00 pm UTC 60 mins
    Everyone talks about IoT, and many organizations are implementing it and reaping the business benefits. But even those who have had IoT projects deployed for years may not have a comprehensive architecture and framework in place to help guide technology decisions and streamline operations.

    Join Nemertes CEO Johna Till Johnson as she reviews the IoT architecture and framework and shares guidance gleaned from leading-edge clients and research study participants.
  • Smart Buildings, Smart Networks
    Smart Buildings, Smart Networks
    Limor Schafman, Mario Blandini, John Toomajon Dec 18 2018 4:00 pm UTC 75 mins
    Smart buildings are the building blocks that will enable society’s digital transformation. This revolution will leverage data from myriad devices to bring new insights and enable new products and services. Around the globe, the smart buildings technology market will explode 16.1% over the next five years from a 2018 market size of $30.5 billion. In this webinar we will look at the changes inherent in the digital evolution as well as the infrastructure solutions that will support them.
  • Flexible Service Orchestration for converging Core and Edge Networks
    Flexible Service Orchestration for converging Core and Edge Networks
    Shay Naeh, Cloudify; Petar Torre, Intel, Telco Lead Architect Dec 18 2018 4:00 pm UTC 60 mins
    Diverse environments between CommSP IT, Core and Edge networks require flexible orchestration to implement multiple design principles from Telco over IT to cloud native. Solving orchestration and platform requirements for edge computing is critical from very small sites to much bigger ones. We will explore much better business and service agility for more performance and cost-optimized Intel(R) Architecture platforms.
  • Top 2018 Cyberattacks and How to Avoid Them in 2019
    Top 2018 Cyberattacks and How to Avoid Them in 2019
    Ethan Smart, Senior Solutions Engineer, Tufin Dec 18 2018 4:00 pm UTC 60 mins
    Breached. Hacked. Cyberattack. These are all words that dominated headlines in 2018.

    While many of the attacks that prompted these headlines may have been avoided in hindsight, enforcing security policy across the legacy physical network is challenging. Furthermore, “cloud first” strategies and the increased adoption of containers introduce new risks to organizations and raise new security concerns that need to be anticipated.

    Join us on December 18 for a webinar with Ethan Smart, Senior Solutions Engineer, to learn from the mistakes of others in 2018 and how to avoid making them – and the headlines – in 2019.

    Key topics include how to:

    - Develop and deploy an enforceable security policy
    - Clear time for proactive security initiatives
    - Mitigate the inherent risk of DevOps’ CI/CD agility
    - Contain malware outbreaks
    - Anticipate security risks of containers
  • How to Build a World Class Monitoring Strategy, Hosted by AWS & LogicMonitor
    How to Build a World Class Monitoring Strategy, Hosted by AWS & LogicMonitor
    Sam Khidhir, AWS Solutions Architect & Sarah Terry, LogicMonitor Sr. Product Manager Dec 18 2018 4:30 pm UTC 44 mins
    When it comes to IT infrastructure, hybrid is the new normal.

    Understanding true performance across cloud-based infrastructure and your on-prem systems can be complex. But with the right monitoring approach, you can expect the same comprehensive insight and quick resolution time from your hybrid environment as you've always enjoyed with your legacy systems.

    Learn from leading industry experts AWS and LogicMonitor as they present the key components of a world-class performance monitoring strategy, along with a framework to improve monitoring effectiveness.

    Join AWS Solutions Architect Sam Khidir and LogicMonitor Sr. Product Manager, as they discuss how to build the ideal framework for monitoring effectiveness in a hybrid IT environment.

    How to Build a World Class Monitoring Strategy will cover:

    • Best practices for viewing performance, availability, and cost across hybrid systems
    • How to ensure the right teams are getting notified of the right issues
    • Tips tips to reduce mean time to resolution in a hybrid environment
  • Q4 2018 Community Update: Data Privacy & Information Management in 2019
    Q4 2018 Community Update: Data Privacy & Information Management in 2019
    Jill Reber, CEO, Primitive Logic and Kelly Harris, Senior Content Manager, BrightTALK Dec 18 2018 5:00 pm UTC 45 mins
    Discover what's trending in the Enterprise Architecture community on BrightTALK and how you can leverage these insights to drive growth for your company. Learn which topics and technologies are currently top of mind for Data Privacy and Information Management professionals and decision makers.

    Tune in with Jill Reber, CEO of Primitive Logic and Kelly Harris, Senior Content Manager for EA at BrightTALK, to discover the latest trends in data privacy, the reasons behind them and what to look out for in Q1 2019 and beyond.

    - Top trending topics in Q4 2018 and why, including new GDPR and data privacy regulations
    - Key events in the community
    - Content that data privacy and information management professionals care about
    - What's coming up in Q1 2019

    Audience members are encouraged to ask questions during the Live Q&A.
  • The Power of Hybrid: Your Data Center’s Untapped Potential w/ Cloud Connectivity
    The Power of Hybrid: Your Data Center’s Untapped Potential w/ Cloud Connectivity
    Dominic Romeo – Senior Product Manager, TierPoint & Christopher Smith – Director of Product Management for CloudLink by Zayo Dec 18 2018 5:00 pm UTC 60 mins
    As businesses embark on IT transformation initiatives, they must ensure their cloud connectivity is secure, reliable and high performing. Low latency from the data center to the edge is crucial. With the rapid growth in IT deployments leveraging public cloud services as well as legacy systems and hosted private clouds, direct cloud connectivity is a key success factor for hybrid and multi-cloud strategies.

    Join TierPoint’s Dominic Romeo and Zayo’s Christopher Smith, for a discussion on cloud connectivity to learn how these solutions can effectively and efficiently bring public cloud capabilities to the edge.
  • Remote Access Tools: The Hidden Threats Inside Your Network
    Remote Access Tools: The Hidden Threats Inside Your Network
    David Pearson, Principal Threat Researcher, Awake Security Dec 18 2018 6:00 pm UTC 24 mins
    Many remote access tools are used legitimately and not considered malware. However, these tools actively bypass network controls, obscuring which parties are communicating, when, and how. This ability to fly under the radar is attractive to malicious insiders and outside attackers alike. This talk will discuss common techniques these tools use and how security teams can find and understand them.

    In this webinar you will:

    1) Gain an understanding of why remote access tools should be on your radar
    2) Learn common techniques used by remote access tools to bypass conventional detections
    3) Learn how to dissect remote access tools within Wireshark
    4) Discover information that is sometimes leaked by these programs
    5) Learn how to abstract out detection capabilities for this class of programs
  • Microservices: The Journey and 3 Challenges You Will Uncover Along the Way
    Microservices: The Journey and 3 Challenges You Will Uncover Along the Way
    Marcelo da Cruz Pinto, Principal Engineer, McAfee; Paul Dickens, Product Manager, Kong Dec 18 2018 6:00 pm UTC 45 mins
    Almost four years ago, McAfee embarked in the transition towards microservices. They needed an API platform that could integrate with a very complex infrastructure built using multiple languages and methodologies. Additionally, they required this solution to be able to scale or contract with services, and the team to be able to integrate and build custom capabilities on top of it.

    Kong is now a critical element of McAfee’s infrastructure, enabling its microservices journey and supporting it as it becomes the largest cyber security solutions provider across the globe.

    During its journey, the team at McAfee identified three challenges that are common to microservices architectures. Marcelo da Cruz Pinto, Principal Engineer at McAfee, shares the strategies he implemented to manage and minimize these challenges.

    Join Marcelo, and Paul Dickens, Principal Product Manager at Kong while they discuss McAfee’s journey and strategies to manage the challenges that arise with microservices architectures.

    Webinar Takeaways:

    - Insights into the microservices journey at McAfee
    - Three strategies to manage challenges that typically arise when deploying microservices architectures
    - The true benefits of microservices
  • Security that Scales: Automating Security and Compliance for DevOps
    Security that Scales: Automating Security and Compliance for DevOps
    Raj Patel: Vice President Cloud Platform Engineering, Symantec and Sameer Vasanthapuram: Partner Solutions Architect,AWS Dec 18 2018 6:00 pm UTC 60 mins
    There is a natural tension between decentralized, distributed DevOps and the traditional command-and-control approach of classic security management. When moving to the cloud, organizations must learn how to decentralize and democratize the security process.

    Join us on December 18th to learn how to automate security into the DevOps toolchain and strike a balance between agility and security in the cloud.

    During this session, you will learn:

    -How DevOps and InfoSec teams can align to the new DevSecOps paradigm

    -Why continuous compliance management is a new business imperative

    -How to build security in to your Continuous Integration/Continuous Development pipeline

    Register Today

    Free Giveaway: Register for this webinar and join the live session for your chance to win a $500 AWS promotional credit. You can use your AWS credit to offset your AWS infrastructure costs when getting started on the marketplace*. Five lucky live attendees will be the winners!

    * subject to the applicable terms and conditions currently available at https://aws.amazon.com/awscredits/.
  • Expanding your private cloud with containers for quick, responsive innovation
    Expanding your private cloud with containers for quick, responsive innovation
    Brent Roskos, Principal Cloud Architect, Red Hat and Raffaele Spazzoli, Senior Architect, OpenShfit, Red Hat Dec 18 2018 7:00 pm UTC 38 mins
    Increasingly, more organizations are looking to easily build cloud-native applications, deploy them, and manage workloads across a hybrid cloud without sacrificing existing investments. The promise of deploying containers to a hybrid cloud is great—delivering a scalable and workload-driven IT platform with installation integration points that facilitate quick, responsive innovation.

    In this webinar, we’ll discuss how you can accelerate your journey to hybrid cloud and get the most value from open source technology platforms.

    We'll cover:
    - How using Red Hat® OpenShift® Container Platform can expand the flexibility of Red Hat OpenStack® Platform to take full advantage of your cloud infrastructure.
    - Integration points, such as load balancers, node scale-out, avoiding double encapsulation, support for containerized development, persistent object and block storage, autoscaling for virtual machines, and bare metal as a potential service for physical servers.
    - How Red Hat Consulting can help you more quickly make these components work with a well-rounded adoption program to speed up your journey to hybrid cloud.
  • Reduce your Attack Surface Marginalise the Breach (APAC)
    Reduce your Attack Surface Marginalise the Breach (APAC)
    Vijay Chauhan, Sr. Director of Product Marketing, at Illumio Dec 19 2018 12:00 am UTC 38 mins
    Reducing your data centre and cloud attack surface decreases your exposure, limits an attacker's mobility, and minimises the impact of a breach.

    In this webinar, you'll learn:

    - How to identify your high-value assets
    - Tools to visualise vulnerabilities
    - Ways to prioritise patching
    - How to detect and stop lateral movement

    About the presenter:

    Vijay Chauhan is Sr. Director of Product Marketing at Illumio, where he leads Product Launches and Content. Prior to Illumio, he spent 4+ years at Splunk running Product Management and Strategic Alliances for Splunk’s Security business. He started his career as a Security Practitioner in Financial Services, spending 7+ years at Barclays Bank handling core information security functions. He has an MS in Computer Science from Stanford.
  • Упрощаем трансформацию ИТ: эволюция конвергентных и гиперконвергентных решений
    Упрощаем трансформацию ИТ: эволюция конвергентных и гиперконвергентных решений
    Никита Степанов, Системный инженер Dec 19 2018 8:00 am UTC 60 mins
    Конвергентные и гиперконвергентные системы - самый быстрый способ достижения результатов в бизнесе. На этой сессии вы узнаете, как конвергентные и гиперконвергентные решения Dell EMC, включая VxRail, VxRack и VxBlock 1000, эволюционировали для поддержки требований современных центров обработки данных по всему миру.
  • Five Simple Ways to Bolster Critical Infrastructure Efficiency
    Five Simple Ways to Bolster Critical Infrastructure Efficiency
    Enzo Greco, Chief Strategy Officer, Nlyte, Kollengode Anand, Segment Leader - DC Solutions, United Technologies Dec 19 2018 9:00 am UTC 53 mins
    In this webinar, Infrastructure experts at UTC and Nlyte Software discuss how you can:

    - Leverage sophisticated data center ecosystems, such as precision cooling
    - Provide insight into your ITSM solution
    - Improve resilience and reduce risk to your critical infrastructure
    - Create tighter integration between facilities and IT
  • Reduce your Attack Surface Marginalise the Breach (EMEA)
    Reduce your Attack Surface Marginalise the Breach (EMEA)
    Vijay Chauhan, Sr. Director of Product Marketing, at Illumio Dec 19 2018 9:00 am UTC 38 mins
    Reducing your data centre and cloud attack surface decreases your exposure, limits an attacker's mobility, and minimises the impact of a breach.

    In this webinar, you'll learn:

    - How to identify your high-value assets
    - Tools to visualise vulnerabilities
    - Ways to prioritise patching
    - How to detect and stop lateral movement

    About the presenter:

    Vijay Chauhan is Sr. Director of Product Marketing at Illumio, where he leads Product Launches and Content. Prior to Illumio, he spent 4+ years at Splunk running Product Management and Strategic Alliances for Splunk’s Security business. He started his career as a Security Practitioner in Financial Services, spending 7+ years at Barclays Bank handling core information security functions. He has an MS in Computer Science from Stanford.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Dec 19 2018 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address prior to December 14, 2018:

    Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Five Simple Ways to Bolster Critical Infrastructure Efficiency
    Five Simple Ways to Bolster Critical Infrastructure Efficiency
    Enzo Greco, Chief Strategy Officer, Nlyte, Kollengode Anand, Segment Leader - DC Solutions, United Technologies Dec 19 2018 5:00 pm UTC 53 mins
    In this webinar, Infrastructure experts at UTC and Nlyte Software discuss how you can:

    - Leverage sophisticated data center ecosystems, such as precision cooling
    - Provide insight into your ITSM solution
    - Improve resilience and reduce risk to your critical infrastructure
    - Create tighter integration between facilities and IT
  • ABCs of AI
    ABCs of AI
    Sudheer Matta, VP of Product, Mist Dec 19 2018 5:00 pm UTC 56 mins
    There's a lot of buzz around Artificial Intelligence and how it can help IT operations. There's also a lot of confusion.

    Watch this on-demand AI:rchitect series webinar where we'll cut through the AI noise. In this interactive session, we'll cover:

    - The need for AI-driven IT
    - The difference between AI, machine learning, deep learning, data science, and other common techniques
    - Ways to implement data science in your Wi-Fi network
    - How to prepare yourself (and your IT team) for the transition to AI-driven IT
  • Reduce your Attack Surface Marginalize the Breach (NA)
    Reduce your Attack Surface Marginalize the Breach (NA)
    Vijay Chauhan, Sr. Director of Product Marketing, at Illumio Dec 19 2018 5:00 pm UTC 38 mins
    Reducing your data center and cloud attack surface decreases your exposure, limits an attacker's mobility, and minimizes the impact of a breach.

    In this webinar, you'll learn:

    - How to identify your high-value assets
    - Tools to visualize vulnerabilities
    - Ways to prioritize patching
    - How to detect and stop lateral movement

    About the presenter:

    Vijay Chauhan is Sr. Director of Product Marketing at Illumio, where he leads Product Launches and Content. Prior to Illumio, he spent 4+ years at Splunk running Product Management and Strategic Alliances for Splunk’s Security business. He started his career as a Security Practitioner in Financial Services, spending 7+ years at Barclays Bank handling core information security functions. He has an MS in Computer Science from Stanford.
  • Leveraging Kubernetes Services & DNS
    Leveraging Kubernetes Services & DNS
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Dec 19 2018 6:00 pm UTC 60 mins
    The Domain Name System (DNS) is used to associate IP addresses with meaningful names. By default, Kubernetes clusters configure internal DNS to provide for service discovery automatically. This makes it easy for workloads to locate and work with each other on Kubernetes clusters.
    In this webinar, learn:

    * How DNS resolution works in Kubernetes with a network security solution like Tigera

    * How services and pods get assigned fully qualified domain names (FQDN)

    * The relationship between services and pods