Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • ExtraHop + ServiceNow = Seamless IT Service Management ExtraHop + ServiceNow = Seamless IT Service Management ExtraHop Networks Recorded: Mar 23 2017 3 mins
    See how ExtraHop and ServiceNow combine for deeper insight, greater security, and automated remediation!
  • Quantifying DevOps Outcomes - Increasing Speed Quantifying DevOps Outcomes - Increasing Speed George Miranda, Technical Strategy Recorded: Mar 22 2017 31 mins
    This webinar is part three of a four part series that focuses on the steps you should take to bring about digital transformation in your organization. In this webinar, we talk about how to increase the rate at which you can deploy new software.

    High-performing organizations that have undergone digital transformation are agile. They respond to market pressures by shipping new features quickly, safely, and reliably. A key requirement of that agility is that these companies can experiment with small-batch incremental changes. But how do you accomplish that and know your efforts are succeeding?

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey.

    Join us to:
    - Explore why continuous delivery is about more than just having build pipelines
    - Learn which industry metrics demonstrate that you’re shipping faster successfully
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you
  • Detect and Block Apache Struts Bug Across Your Enterprise Detect and Block Apache Struts Bug Across Your Enterprise Vikas Phonsa Director Product Management Web App Firewall and Frank Catucci Director Product Management Web App Scanning Recorded: Mar 22 2017 62 mins
    A critical vulnerability has been found in Apache Struts 2, and it is being actively attacked in the wild, as hackers jump at the chance to hit high-profile targets by exploiting this critical bug.

    Apache has issued an emergency security alert, classifying this as a high-risk vulnerability. If left unaddressed, organizations are at risk of remote code execution attacks, which could lead to complete system compromise.

    During this webcast, Qualys Product Management Directors Vikas Phonsa (Web Application Firewall) and Frank Catucci (Web Application Scanning) will show you how Qualys' complete, end-to-end security solutions can detect and patch the vulnerability so that you can keep your business-critical information safe from attackers.

    With Qualys Vulnerability Management, Web Application Scanning, and Web Application Firewall, you can find Struts in your environment quickly, comprehensively, and at scale, as well as shield your organization from Struts attacks while you identify and patch vulnerable systems.

    This webcast will include a live demo and Q&A session.
  • Top 10 Barriers for DevOps – and How to Avoid them for your 2017 rollout Top 10 Barriers for DevOps – and How to Avoid them for your 2017 rollout Shashi Kiran, Chief Marketing Officer at Quali. Recorded: Mar 22 2017 58 mins
    What are the top 10 barriers to DevOps adoption and best practices to overcome these barriers.
    Quali conducted a survey of 2045 professionals to gauge the state of DevOps and Cloud adoption, pain points and best practices. The survey concluded on Dec 31st 2016. This presentation will share the key insights from the survey, top 10 barriers to DevOps adoption as well as best practices that can help overcome these barriers. This will be an informative session for DevOps and Cloud architects, application owners, technologists as well as IT infrastructure professionals that are responsible for planning and deployment of DevOps tools and processes.
    Quali builds software to create cloud sandboxes – these are on-demand, self-service environments that can automate and orchestrate Cloud and DevOps deployments.
  • How to Identify a Mirai-Style Attack: Watch the Demo or Get the Recording How to Identify a Mirai-Style Attack: Watch the Demo or Get the Recording Andy Shoemaker, Founder and DDoS Expert, NimbusDDoS and Nabeel Hasan Saeed, Product Marketing Manager, Imperva Incapsula Recorded: Mar 22 2017 49 mins
    The DDoS testing expert from NimbusDDOS joins us again to share their analysis of the Mirai botnet source code. Join their founder, Andy Shoemaker, for a live webinar where you will learn the capabilities of the Mirai botnet based on forensic analysis of the source code.

    In this webinar you will learn:
    - Mirai botnet propagation methods
    - Methods for detecting infected devices
    - Attack capabilities and vectors of Mirai
    - How to protect your organization from a Mirai-style attack
  • OPNFV Overview: Navigating Its Many Projects OPNFV Overview: Navigating Its Many Projects Amar Kapadia, NFV Specialist, John Jainschigg, Technical Solutions Marketing at Mirantis Recorded: Mar 22 2017 59 mins
    NFV continues to gain prominence in both the telecom industry and enterprises. OPNFV is an open source systems integration project to create and test open source to help create a complete NFV stack as defined by the ETSI reference architecture. However, the unique nature of the project makes it difficult to understand than "traditional" open source software development projects. In this webinar, we will look at the OPNFV project as a whole and through a high-level review of its roughly 60 projects. Suitable for both practitioners and decision makers, you will learn:
    * An overview of the OPNFV project
    * An introduction to create-integrate-test categories
    * Upstream and OPNFV projects that belong to the above categories
    Join us on March 22 as Amar Kapadia and Nick Chase help you navigate through the various OPNFV projects.
  • 20/20 vision into your cloud security: CISO interview and case study 20/20 vision into your cloud security: CISO interview and case study Maurice Stebila, CISO, IT Security, HARMAN International & Ralf Buchroth, RWE Supply and Trading Recorded: Mar 22 2017 55 mins
    With the growing adoption of private and public cloud platforms, many security teams feel that they are losing visibility and control. From the very basics of identifying which cloud services are being used, to the monitoring of security policies and potential violations, new solutions and procedures are required to regain control.

    Join us for this discussion of cloud security challenges and how they can be addressed. The webinar will feature an expert interview with Maurice Stebila, CISO at HARMAN International, who will share his insights and experience around security challenges in the cloud, much like he did recently at RSA conference in San Francisco.

    In the second half of the webinar, you will learn how one of Tufin’s customers, Ralf Buchroth, IT Infrastructure and Provider Management at RWE Supply and Trading, has deployed Tufin to address challenges of visibility and control in the cloud and across a hybrid network environment.
  • 3 Proven Workflows for A Successful Windows 10 Migration 3 Proven Workflows for A Successful Windows 10 Migration Aimee Simpson, Product Marketing Manager, Code42 Recorded: Mar 22 2017 28 mins
    Watch this webinar to explore three distinct migration approaches taken by real businesses. We'll help you identify the best approach for your business, users and timeline. During the session we will cover:

    *The facts on enterprise adoption of Windows 10
    *Planning considerations for your Windows 10 migration project
    *Three distinct approaches to performing device replacements—and the pros and cons associated with each

    About the speaker:

    Aimee Simpson, Product Marketing Manager – Code42
    Aimee is a product marketing manager at Code42 where she helps internal audiences understand what’s happening in the category and influences product decisions through customer and market research. She has always worked in the technology industry, launching her career at data storage company Compellent Technologies at the age of 19. In her free time, she enjoys traveling with her Aussie husband in an attempt to balance her TV addiction.
  • Giga IoT: What You Need to Know About Low Power Wide Area Network Solutions Giga IoT: What You Need to Know About Low Power Wide Area Network Solutions Sanjay Khatri, Head of Platform Product Marketing at Cisco Jasper Recorded: Mar 22 2017 33 mins
    The age of Giga IoT has arrived. Characterized by millions and even billions of connected devices, small data volumes, low-cost devices and stringent requirements on energy consumption, Giga IoT turns the conversation from usage and cost to value and scale.

    LPWAN technology, like NB-IoT (Narrowband IoT) enables this shift, but today’s businesses need more than technology. This webinar looks at business solutions needed to transform technology into operational reality to deliver bottom-line growth.

    Join Sanjay Khatri, Head of Platform Product Marketing at Cisco Jasper, to discuss giga IoT business drivers and benefits including:
    - Massive scalability of connected devices
    - Simplified operations via cloud-based IoT platforms
    - New business models for monetizing IoT services

    Register for the webinar: Wednesday, March 22 at 4pm GMT | 11am EST | 8am PST
  • Migrating Existing Applications with Containers Migrating Existing Applications with Containers Scott McCarty Recorded: Mar 21 2017 26 mins
    Many organizations have dabbled with Linux® containers. After a small, successful project, an epiphany happens and you ask: What else can we containerize? Can we put everything in containers? How do we get traditional applications into containers? Learn about technical and architectural considerations when moving existing applications to containers. From systemd, to storage to backups, to debugging applications in production, there are a lot of things to think about when migrating existing applications to containers and running them in production.

    Join this session to:
    Gain operational confidence if you’re on the fence about, or just dabbling in, containers.
    Have a shared experience with a bigger community this is running containers with actual workloads in their organizations.
    Learn how to optimally containerize new applications and migrate existing ones.
    Start collecting and discussing best practices to widen container adoption.
  • March 2017 Product Enhancements March 2017 Product Enhancements Cradlepoint Product Management Team Recorded: Mar 21 2017 32 mins
    In March 2017 Cradlepoint is enhancing its SD-WAN and Extensibility Platform with the release of Firmware 6.3, which extends and enhances our SD-WAN offering for People (remote and mobile workers), Places (branch offices, vehicles, pop-up venues, etc.) and Things (M2M and IoT).

    Cradlepoint will also be launching new enhancements to Enterprise Cloud Manager (ECM), part of the NetCloud Platform, with Client Analytics. New LAN Client Analytics enhance network visibility and provide insights to what is connected to your network and how your network is being used.

    The new features in Firmware 6.3:
    — Smart WAN Selection (SWANS): Smart, automated failover when primary connection degrades
    — Automatic Quality of Service (Auto-QoS): Optimizes real-time (voice and video) application experience when network traffic congestion occurs
    — IKEv2 Support: Enhanced authentication with X.509 certificates, improved encryption policies and security, and mobility support
    — Enhanced Supportability Features: Better IPsec status and logging, Firewall Hit Counter, Support Page

    Enhancements to the Extensibility Platform offering with SDK-Extensible UI:
    — Build in configuration or status for your SDK application
    — Leverage existing web server functionality of the router
    — Customize landing pages

    Enhancements to Enterprise Cloud Manager (ECM) with Client Analytics:
    — Client Analytics: Visibility and management of usage by individual network client

    Join the Product Management Team for a live webinar to learn more about the new enhancements to Cradlepoint’s networking solutions for today’s agile enterprise.
  • Performance Management - Webinar 3: Testen von mobilen Applikationen Performance Management - Webinar 3: Testen von mobilen Applikationen Andreas Widmann, Technical Consultant, HPE Software Recorded: Mar 21 2017 45 mins
    Systemleistung und Zeitverhalten spielen in den meisten IT-Anwendungen eine bedeutende Rolle. Sie beeinflussen nachhaltig den Erfolg eines Unternehmens. Im internen Geschäftsbetrieb können lange Wartezeiten ein Unternehmen erhebliche Summen kosten. Noch schwerwiegender ist jedoch mangelnde Performance in der Kundenbeziehung, da Nutzer eine nicht performante Anwendung schneller verlassen oder gar deinstallieren. Das Ergebnis: unzufriedene Kunden und potenzielles Geschäft bleibt aus. Gute Performance ist also nicht optional, sondern geschäftskritisch und lohnenswert.

    Erfahren Sie in unserer kostenfreien Webinarreihe, wie moderne Last- und Performance Testing-Lösungen Sie dabei unterstützen, leistungsstarke Anwendungen, unabhängig von der Umgebung, kontinuierlich bereitzustellen und zugleich eine Transparenz über die Performance im gesamten Anwendungslebenszyklus zu erhalten. Egal ob es sich um eine mobile App, eine Website oder eine komplexe Multi-Tier SAP Umgebung handelt.

    Webinar 3: Performance Management & Testen von mobilen Applikationen:
    Mobile Applikationen sind in unserer digitalen Welt nicht mehr wegzudenken. Qualität und Performance einer App werden durch soziale Netzwerke für jeden transparent. Erfahren Sie in diesem Webinar, wie sie mobile Apps performant hochwertig entwickeln, testen und diese stetig überwachen können - mit dem Ziel, eine durchgängig positive User Experience zu erzeugen.
  • CTO Series - Episode 1: How to know where you are...? CTO Series - Episode 1: How to know where you are...? Andrew Bird : Chief Digital Officer & EA Visionary Recorded: Mar 21 2017 34 mins
    As part of our CTO Series for BrightTALK. We start at the beginning: Where are we. Any organisation needs to know where it is....Here is a unique matrix for understanding where you are .... each segment has its traits and which are obvious one you know where you are!
  • How to integrate Voice Quality Monitoring into SD-WAN How to integrate Voice Quality Monitoring into SD-WAN Lin Huang, Sr. Solution Engineer, APAC at VeloCloud Networks, Inc. Recorded: Mar 21 2017 33 mins
    Voice quality monitoring is essential for anyone, whether Service Provider or Enterprise, with voice deployed in their network. It is an indispensable capability – from either a business or operational viewpoint – in the network infrastructure, and is often costly and complex. VeloCloud VQM allows you to monitor, diagnose and proactively troubleshoot network issues before they impact business-critical voice communications.

    This webinar discusses:


    - The tangible benefits of the VeloCloud VQM solution
    - Explains how VeloCloud integrates VQM with SD-WAN architecture
    - Provides details on the licensing models to enable VeloCloud VQM in your network
    - Diagnosing and solving your voice quality challenges with VeloCloud VQM
  • Data Protector zum Wochenstart – Neuigkeiten zu DP und Backup Navigator Data Protector zum Wochenstart – Neuigkeiten zu DP und Backup Navigator Sprecher ist ein Technical Consultant im Bereich Information Management mit Spezialisierung auf Data Protection. Recorded: Mar 20 2017 72 mins
    Hier werden in bewährter Weise die Neuerungen in Theorie und Praxis vorstellen. Bleiben Sie auf dem Laufenden mit unserer Übersicht und freuen Sie sich auf hilfreiche Informationen, Demo’s und Empfehlungen zum Data Protector.
    Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb.
    Ein Blick in die Zukunft wird ebenfalls dazugehören.
  • How to Integrate your Software-Defined Network and Cloud Communications How to Integrate your Software-Defined Network and Cloud Communications Fan Gu, Sr. Product Manager, VeloCloud Networks Recorded: Mar 16 2017 24 mins
    Voice quality monitoring is essential for anyone, whether Service Provider or Enterprise, with voice deployed in their network. It is an indispensable capability – from either a business or operational viewpoint – in the network infrastructure, and is often costly and complex. VeloCloud VQM allows you to monitor, diagnose and proactively troubleshoot network issues before they impact business-critical voice communications.

    This webinar discusses:

    - The tangible benefits of the VeloCloud VQM solution
    - Explains how VeloCloud integrates VQM with SD-WAN architecture
    - Provides details on the licensing models to enable VeloCloud VQM in your network
    - Diagnosing and solving your voice quality challenges with VeloCloud VQM
  • CTO PoV: Enterprise Networks (Part 2) CTO PoV: Enterprise Networks (Part 2) Khalid Raza, CTO & Co-Founder, Viptela & Danny Johnson, Director, Product Marketing: Network Services, Verizon Recorded: Mar 16 2017 45 mins
    In Part 2, the CTO PoV will focus on Security for IoT and Cloud in Enterprise Networks.

    IoT, Cloud and Mobile devices are stretching the traditional limits of IT security. As enterprise applications change and technology advances, the fundamental network infrastructure needs to support a robust security framework.

    Khalid Raza (CTO, Viptela) & Danny Johnson (Director, Verizon) share their Point of View on why current WAN infrastructures are not designed to support new enterprise traffic patterns, and how emerging security approaches designed around segmentation and policy can help organizations adapt to these changes. Enterprises can protect their Cloud and enterprise against attacks and data leaks while migrating to a cost-effective Hybrid architecture.

    In this webinar, we will cover:

    - The security threats around Cloud and IoT
    - Applications that are stressing enterprise network security requirements

    View Part 1 On-Demand: https://www.brighttalk.com/webcast/14779/247749
  • Building a Blueprint for an Insider Threat Program Building a Blueprint for an Insider Threat Program Jadee Hanson, Dir of Security, Code 42; Joji Montelibano, Rockwell; Chris Walcutt, Black & Veatch; Brandon Dunlap (Moderator) Recorded: Mar 16 2017 58 mins
    While infosecurity teams are playing defense against external threats, they cannot lose sight of the threat that insiders at their organization pose. Employees, contractors and business associates can all have accounts which provide them legitimate access to systems within the enterprise, but that access can carry significant risk. Detecting, monitoring and preventing such unauthorized access and exflitration is critical. Building an Insider threat program to manage such functions can help an organization get visibility into the problem and streamline these efforts. But where does an organization start when building such a program? What underpinnings need to be in place in order to have success with a program? Get an inside scoop on what it is really like to build and run these types of programs; what are insiders really doing and what are they stealing. Join Code42 and (ISC)2 on March 16, 2017 at 1:00PM Eastern for a discussion on how to construct an effective insider threat program.
  • Performance Management - Webinar 2: Testen von SAP Anwendungen Performance Management - Webinar 2: Testen von SAP Anwendungen Thomas Koeppner, Senior Principal Technical Consultant, HPE Software Recorded: Mar 16 2017 55 mins
    Systemleistung und Zeitverhalten spielen in den meisten IT-Anwendungen eine bedeutende Rolle. Sie beeinflussen nachhaltig den Erfolg eines Unternehmens. Im internen Geschäftsbetrieb können lange Wartezeiten ein Unternehmen erhebliche Summen kosten. Noch schwerwiegender ist jedoch mangelnde Performance in der Kundenbeziehung, da Nutzer eine nicht performante Anwendung schneller verlassen oder gar deinstallieren. Das Ergebnis: unzufriedene Kunden und potenzielles Geschäft bleibt aus. Gute Performance ist also nicht optional, sondern geschäftskritisch und lohnenswert.

    Erfahren Sie in unserer kostenfreien Webinarreihe, wie moderne Last- und Performance Testing-Lösungen Sie dabei unterstützen, leistungsstarke Anwendungen, unabhängig von der Umgebung, kontinuierlich bereitzustellen und zugleich eine Transparenz über die Performance im gesamten Anwendungslebenszyklus zu erhalten. Egal ob es sich um eine mobile App, eine Website oder eine komplexe Multi-Tier SAP Umgebung handelt.

    Webinar 2: Performance Management & Testen von SAP Anwendungen:
    Einfach, smart und skalierbar, so sollte Performance Management und -Testing für SAP HANA, SAP Fiori, SAP Portal oder ERP aussehen. Wir zeigen Ihnen in diesem Webinar, wie Sie die Performance von SAP Anwendungen schnell und einfach validieren können. Erfahren Sie, wie Sie realistische Lastszenarien über unterschiedliche Netzwerkstrecken und SAP Clients (z.B. SAP GUI/ Mobile/Web) lokal oder aus der Cloud simulieren, Backend-Systeme vermessen sowie Performance-Engpässe finden und diagnostizieren können und wie sich die getesteten Geschäftsprozesse ohne weiteren Aufwand in der Produktion überwachen lassen.
  • [Live Panel] Threat Hunters in Action [Live Panel] Threat Hunters in Action Josh Downs, BrightTALK (moderator), Jens Monrad, FireEye & Amar Singh, Cyber Management Alliance Recorded: Mar 16 2017 59 mins
    Cybercriminals have refined their attacks to increase frequency, efficiency and profits. Cybercrime costs will reach $6 trillion per year globally by 2021, up from $3 trillion in 2015. Every industry and government is at risk, highlighting the need for stronger cyber defence.

    This live panel will focus on the tools and techniques threat hunters use to patrol your networks, mitigate threats and remove unwanted presence.
  • BrightTALK at RSA - Chris Roberts: Cyber Lessons for Trump's Administration BrightTALK at RSA - Chris Roberts: Cyber Lessons for Trump's Administration Chris Roberts, Chief Security Architect at Acalvio Technologies and Josh Downs, Community Manager at BrightTALK Recorded: Mar 16 2017 17 mins
    BrightTALK caught up with Acalvio Technologies security expert Chris Roberts for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The Yahoo breach and steps to take to avoid it happening to other companies
    - Communication between the techies and senior management
    - Cyber security lessons that the Trump administration could learn
    - The Russian hack of the US election
    - AI & Machine learning in Cyber Security
    - The need for regulation in the growing world of the IoT
    - Improving equality in the cyber security industry

    About the Speaker:
    Regarded as one of the world’s foremost experts on counter threat intelligence within the cyber security industry, Chris Roberts is the chief security architect for Acalvio Technologies, helping to drive technology innovation and product leadership. Roberts directs a portfolio of services within Acalvio designed to improve the physical and digital security posture of both enterprise, industrial and government clients. In addition, Roberts works to shape the next generation of deception platforms and helps companies with their maturity modeling and overall security solutions.
  • Insights on 5G & IoT from Mobile World Congress 2017 Insights on 5G & IoT from Mobile World Congress 2017 Jeff Mucci, RCR Wireless; Lindsay Notwell, Cradlepoint; Ken Hosac, Cradlepoint Recorded: Mar 15 2017 15 mins
    Jeff Mucci, CEO & Head of Industry Insights and Enterprise IoT at RCR Wireless interviews Lindsay Notwell, VP of Worldwide Carrier Operations and Ken Hosac, VP of Business Development at Cradlepoint on the state of 5G, the proliferation of IoT, and the digital transformation in networking on the show floor from Mobile World Congress 2017 in Barcelona, Spain.
  • Hybrid Cloud Networking | Extend your Private Data Center to the Public Cloud Hybrid Cloud Networking | Extend your Private Data Center to the Public Cloud Asang Cooc Recorded: Mar 15 2017 24 mins
    “Traditionally, Enterprises deployed business critical applications in their private data centers. To leverage the scale, agility and cost efficiency offered by the public clouds, Enterprises are migrating the workloads to public clouds like - Amazon AWS, Microsoft Azure and Google Cloud Platform. Seamless access to critical workloads needs a hybrid cloud network that has datacenter extended to the public cloud”.
  • Performance Management - Webinar 4: Teil von Continuous Testing Performance Management - Webinar 4: Teil von Continuous Testing Amir Khan, Presales Consultant, HPE Software Mar 23 2017 1:00 pm UTC 60 mins
    Systemleistung und Zeitverhalten spielen in den meisten IT-Anwendungen eine bedeutende Rolle. Sie beeinflussen nachhaltig den Erfolg eines Unternehmens. Im internen Geschäftsbetrieb können lange Wartezeiten ein Unternehmen erhebliche Summen kosten. Noch schwerwiegender ist jedoch mangelnde Performance in der Kundenbeziehung, da Nutzer eine nicht performante Anwendung schneller verlassen oder gar deinstallieren. Das Ergebnis: unzufriedene Kunden und potenzielles Geschäft bleibt aus. Gute Performance ist also nicht optional, sondern geschäftskritisch und lohnenswert.

    Erfahren Sie in unserer kostenfreien Webinarreihe, wie moderne Last- und Performance Testing-Lösungen Sie dabei unterstützen, leistungsstarke Anwendungen, unabhängig von der Umgebung, kontinuierlich bereitzustellen und zugleich eine Transparenz über die Performance im gesamten Anwendungslebenszyklus zu erhalten. Egal ob es sich um eine mobile App, eine Website oder eine komplexe Multi-Tier SAP Umgebung handelt.

    Webinar 4: Performance Management - wesentlicher Bestandteil von Continuous Testing:
    Continuous Integration/Testing ist eine etablierte Technik in agilen Software-Projekten, um kontinuierlich die Änderungen seitens Funktionalität, Performance als auch Stabilität zusammenzuführen. Dabei muss die Performance einer agil entwickelten Anwendung bei jeglicher Änderung im Code der Last im Betrieb Stand halten. Erfahren Sie, wie Sie diese Herausforderungen durch das Zusammenspiel innovativer Performance Management-Lösungen erfolgreich meistern können.
  • Top Reasons Why Your Antivirus Isn’t Working Anymore Top Reasons Why Your Antivirus Isn’t Working Anymore Ed Metcalf, Director of Product Marketing and Brian Robison, Senior Director of Field Technical Marketing at Cylance Mar 23 2017 5:00 pm UTC 75 mins
    Are you weary from fighting malware, ransomware, and other threats that your ineffective and tired antivirus software can’t stop?

    If so, join us for our webinar, “Top Reasons Why Your Antivirus Isn’t Working Anymore” to hear why it’s time to rise up and overthrow traditional, reactive antivirus solutions in favor of proactive endpoint protection powered by artificial intelligence (AI).

    During this webinar, you will see a live demo of AI in action with CylancePROTECT®, and cover the key reasons why your current antivirus solution probably isn’t working anymore:

    - It’s Reactive: Legacy, signature-based antivirus products cannot prevent malware from executing. Cylance AI technology protects before the machine is infected.
    - It’s Ineffective: Legacy security tools perform at a 70 – 90% success rate. Cylance routinely performs with near perfect efficacy, at 99%+.
    - It’s Burdensome: On average, traditional endpoint security products use 50% to over 70% of CPU cycles during intensive scans. CylancePROTECT is outstandingly lightweight at just 1% – 3% CPU utilization.
    - It’s Costly: Signature-based antivirus solutions impact the bottom line with more layers of unproductive technology. Cylance protects with a single agent and a single cloud-based management tool, and that translates into big cost savings.
  • Using Elastic as your Analytics Foundation Using Elastic as your Analytics Foundation CA Technologies: Bryan Whitmarsh Sr. Principal Product Manager; Himanshu Pande, Senior Director of Product Management Mar 23 2017 5:00 pm UTC 60 mins
    The collection of performance, usage, and error/crash data is a critical first step in building an application or infrastructure based analytics engine. Once collected, the normalization of this data into a proficient repository, that makes the data available to be analyzed, becomes the foundation of your Analytics initiatives.
    In this interactive webcast, experts from CA Technologies will facilitate some key topics related to using the ELK stack as a basis for their Analytics engine, sharing their lessons learned and best practices. The ELK stack is a set of products (Elasticsearch, Logstash, and Kibana) provided by Elastic used to log, store, and visualize both structured and unstructured data. We’ll answer these questions, and more in this webcast:
    •Why leverage the ELK Stack as part of your analytics strategy?
    •Lessons learned in running Elasticsearch at scale (Master Nodes + Client Nodes + Hot Nodes + Warm Nodes)
    •How to best support multi-tenant SaaS solutions with ELK
    •Elasticsearch is just one component of a Lambda Architecture, what else can/should be used?
    •How you can leverage CA’s new Agile Ops analytics platform to predict performance anomalies, end alert storms and false positives and leverage machine learning for faster root cause analysis.
  • Storage Refresh? 3 Capabilities Primary Storage Must Have (but probably doesn't) Storage Refresh? 3 Capabilities Primary Storage Must Have (but probably doesn't) Charlie Hodges, Storage Switzerland Mar 23 2017 5:00 pm UTC 60 mins
    If your organization is embarking on a refresh of your primary storage system this year, this is the one webinar that you will want to attend. IT evaluators that haven't looked at storage in a few years, will be impressed the use of flash to improve performance, while many claim to integrate file (NFS, SMB) and block (iSCSI, Fibre) protocols. These features though are now table stakes for the modern storage solution.

    While all of these features are important (and not created equal), IT professionals should demand capabilities that solve today's organizational challenges like eliminating shadow IT, improving multi-site productivity and long term data retention as well as meeting increasingly strict compliance standards. IT professionals should look for not only high performance and universal protocol support but also enterprise file sync and share, inter-data center sync and secure archive with compliance.
  • Zero-Day Attacks and What To Do About It? Zero-Day Attacks and What To Do About It? Chris Candaffio, System Engineer, Symantec Mar 23 2017 5:00 pm UTC 30 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 3 of 5: Zero-Day Attacks and What To Do About It?

    All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains unpatched, the greater the risk of a breach, potential loss of information, and damage to reputation.

    Join us to learn what can be done to block exploit attacks on day zero:

    • What behaviors and techniques are used to block attacks
    • Why exploit prevention plays a critical part in endpoint protection
    • How Memory Exploit Mitigation works

    Then see Memory Exploit Mitigation in action with a demo Symantec Endpoint Protection.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223
  • Overcoming eTail Challenges to Deliver Exceptional Customer Experiences Overcoming eTail Challenges to Deliver Exceptional Customer Experiences Michael Milligan, Sr. Director Product & Solution Marketing and Charlie Kraus, Sr. Product Marketing Manager Mar 23 2017 6:00 pm UTC 60 mins
    Online retailing is no longer as simple as duplicating the in-store experience. It is about so much more. Online retailers are expected to deliver fast, personalized shopping experiences featuring rich media and video, to customers on any device, wherever and whenever they choose.

    These realities have introduced a host of challenges for retailers, but they also offer significant opportunities to improve customer conversion and retention.

    What does this mean for retailers trying to deliver exceptional online experiences that maximize revenue and build customer loyalty?

    Join us as we review the technical challenges that impact your ability to deliver exceptional e-tail customer experiences, and strategies for overcoming them.

    Some of the topics that will be covered, include:
    · What customers expect from their online shopping experience;
    · What it takes to deliver a compelling omnichannel experience to reach customers;
    · How to support traffic spikes and seasonal demand;
    · Why website performance is key to improving conversion rates;
    · How best to safeguard your website against malicious attacks.
  • How Tableau pairs Jamf with Code42 to provide a better device choice experience How Tableau pairs Jamf with Code42 to provide a better device choice experience Matt Peterson, Tableau - Aimee Simpson, Code42 - Tad Johnson, Jamf Mar 23 2017 6:00 pm UTC 45 mins
    Today, end users and IT alike understand the role technology plays in powering productivity. Employee success hinges on having the right tools and technology to work smarter and faster. As a result, businesses have found themselves with a mixture of device types and operating systems in their organization. So how can you adapt to efficiently support and enable employees through device choice?

    In this webinar, we’ll explore how Tableau Software succeeds in a cloud-first, mixed device environment that allows employees to choose their preferred operating system.

    Watch this 30-minute webinar to learn:

    *The benefits and challenges associated with Tableau’s mixed device environment
    *How Tableau performs data migrations for users who are switching platforms
    *Recommendations and considerations for offering Macs to your users


    Speakers:

    Matt Peterson,Technical Support Specialist,Tableau
    Aimee Simpson, Product Marketing Manager, Code42
    Tad Johnson, Solutions Architect, Jamf
  • Beyond the WAN: Networking the Enterprise Data Center to the Cloud Beyond the WAN: Networking the Enterprise Data Center to the Cloud Jim Davis, 451 Research; Josh Snowhorn, CyrusOne; Ramsey El-Fakir, Fi-Tek Mar 23 2017 6:00 pm UTC 75 mins
    Enterprises are using a variety of cloud and SaaS services to remain competitive, but can lose out when their network architecture either becomes a deployment bottleneck or impedes application performance. Network interconnection has often taken a back seat to other issues in application design and deployment, but enterprises should not continue to ignore this critical component of infrastructure.

    In this webinar, we examine how today’s interconnection services can break what used to be the tight links between distance, capacity and cost. Indeed, a rethink of networking strategies in the datacenter can help unlock more agility and efficiency in digital enterprise transformation efforts.

    This session will look at issues affecting enterprise use of datacenter networking services, including:

    -Changing cloud consumption patterns by enterprises, employees, partners and customers
    -The different types of interconnection offered by multi-tenant datacenters, including datacenter interconnect, and cloud exchange
    -Real world experiences of enterprises who have leveraged interconnection to solve application performance and availability issues
    -How datacenter interconnect services can be used for disaster recovery, enhanced application performance, and access to partner and vendor ecosystems
  • Celent & INETCO: Is Real Time Data Necessary in Retail Banking? Celent & INETCO: Is Real Time Data Necessary in Retail Banking? Daniel Latimore, Senior Vice President - CELENT and Stacy Gorkoff - INETCO Mar 28 2017 5:00 pm UTC 75 mins
    Real time is rapidly becoming more important to retail banks. Payments, customer responsiveness, and fraud detection must all become faster. Powering them all is data in its many facets.

    Join banking analyst firm Celent, and real time transaction monitoring and analytics company INETCO, as they explore real time’s current progress, its implications for financial institutions, and how banks should respond.
  • Using Ansible Container to build your Images Using Ansible Container to build your Images Greg Dekoenigsberg Mar 28 2017 7:00 pm UTC 30 mins
    If you have invested time in building Ansible infrastructure and knowledge, it makes sense to get as much out of that investment as possible. That's why we created the Ansible Container project—to help you move from the world of Ansible to the world of OpenShift.

    Join this session to learn:
    1. The conceptual similarities between Ansible roles and microservices.
    2. The proper construction of an Ansible role to be deployable to VMs or containers.
    3. The usage of Ansible Container to turn Ansible roles into container images.
    4. How to integrate Ansible Container and OpenShift seamlessly.
  • How to Integrate Cloud Security into SD-WAN How to Integrate Cloud Security into SD-WAN Ray Wong, Sr. Solutions Engineer, EMEA Mar 29 2017 8:00 am UTC 30 mins
    In recent times speed has become the currency of business, and security threats have multiplied and soared in sophistication—often rendering traditional security deployments insufficient or ineffective. Cloud-delivered security provides a great opportunity for enterprises to strengthen security posture, to quickly deploy the latest defense mechanisms, while at the same time reducing latency and costs.

    Join this webinar to learn how to transition to cloud security in a complex distributed enterprise environment, address the challenges and preserve application performance.

    Topics covered include:
    - Challenges faced when introducing cloud security into a legacy network
    - Key considerations to ensure a successful migration
    - A guide to how an SD-WAN solution simplifies the transition from on-premise security to cloud security
  • Faster, Wider and Stronger Cyber Security with SIEM Faster, Wider and Stronger Cyber Security with SIEM Dan Hanman, Consulting Systems Engineer SIEM Mar 29 2017 9:00 am UTC 45 mins
    Locks, barriers and traps will eventually be broken and overcome. The enterprise security infrastructure must continuously evolve in order to continue to protect the enterprise’s assets and provide mitigation in case of a breach.

    Security operations tools can play a critical role in maintaining the enterprise security posture through internal and external evolution.

    During this presentation, we will explore the role of SIEM as an enabler and how FortiSIEM can be a catalyst for a more efficient, effective and complete cybersecurity infrastructure.
  • Simplifying your journey to the Hybrid Cloud: SilverPeak SD-WAN Simplifying your journey to the Hybrid Cloud: SilverPeak SD-WAN Daniel Cook Mar 29 2017 12:00 pm UTC 45 mins
    Almost all enterprises use a blend of public cloud and enterprise data centre applications. This webinar looks at how such enterprises can simplify and control the connectivity to the Hybrid Cloud and Public Cloud, whilst dramatically reducing costs and enabling scalability.
  • SQL Server: Understanding Your Options for Disaster Recovery & High Availability SQL Server: Understanding Your Options for Disaster Recovery & High Availability Matt Aslett, 451 Research; Midd Carmack and Mike Donaghey, TierPoint Mar 29 2017 3:00 pm UTC 45 mins
    Join Midd Carmack, Product Manager and Mike Donaghey, Manager of Database Administration at TierPoint along with Matt Aslett, Research Director for Data Platforms and Analytics at 451 Research, as they discuss the latest high availability capabilities in SQL Server 2016, how to architect to take full advantage of those features, and implications for a robust disaster recovery plan.

    Midd brings over 20 years of IT Infrastructure, Operating System and Database administration and product management experience to the discussion and will provide an overview of TierPoint as a Managed Services Provider and the company’s Hybrid IT strategy.

    Matt will explore the latest high availability capabilities in SQL Server 2016, including database mirroring, log shipping, availability groups, and failover clustering. In addition to reviewing the capabilities of each of these approaches, this session will also include a perspective on their relative merits and use-cases. Matt will also explore the drivers for managed database services, versus hands-on database administration, in delivering the goals of a database high availability strategy.

    Mike’s experience spans 15 years working with managed database clients to design and manage SQL implementations for a variety of industries, including healthcare, financial and manufacturing. Mike will offer technical perspective on implementing SQL capabilities to optimize disaster recovery protection and budget considerations. He will use case study examples describing the challenges and business requirements for a variety of SQL installs, along with strategies for solving those problems using the DR/HA features available with SQL Server today.
  • Adopting MEF’s SAT Power Play for Improved Testing Efficiency Adopting MEF’s SAT Power Play for Improved Testing Efficiency Bruno Giguere - MEF; Eric Leser - Spectrum Enterprise; Mike Bencheck - Siama Systems Mar 29 2017 4:00 pm UTC 75 mins
    Service Activation Testing (SAT) plays an important role in MEF’s Third Network vision of delivering agile, assured, and orchestrated connectivity services. MEF 48 (SAT), MEF 46 (Latching Loopback) and MEF 49 (SAT Control Protocol and PDU Formats) specifications make up a framework for standardized testing and troubleshooting of Carrier Ethernet-based services for service providers. Collectively these specifications are known as the MEF SAT Power Play. These specifications can be used all together or individually to comprehensively test Carrier Ethernet-based services. The webinar will discuss the important relationship between MEF’s SAT specifications and the work of other standards developing organizations (SDOs), such as IETF RFC 2544 and ITU-T Y.1564. Discover the many benefits of MEF’s SAT Power Play including improved testing efficiency for retail and wholesale Ethernet service deployments, boosting customer satisfaction by reducing the number of faulty turn ups, and accelerating the interconnection process between peer operators.
  • All-Flash Storage Technology & High Performance Workloads: The Latest Innovation All-Flash Storage Technology & High Performance Workloads: The Latest Innovation Ravi Poddar, Ph.D., Director of HPC and EDA Solutions for FlashBlade, Pure Storage Mar 29 2017 4:00 pm UTC 15 mins
    This webinar discusses how advances in all-flash storage technology can help improve the acceleration of Electronic Design Automation (EDA) and high performance workloads. It highlights current issues with storage bottlenecks in these environments and its impact on productivity. And then it covers a quick overview of FlashBlade, a revolutionary new storage system for high performance and high concurrency workloads that will drive tomorrow's next generation chip designs.
  • The Hybrid IT Balancing Act: Is Your Cloud Provider Tipping the Scale? The Hybrid IT Balancing Act: Is Your Cloud Provider Tipping the Scale? Bob Hicks, SVP and General Manager, TierPoint Mar 29 2017 6:30 pm UTC 45 mins
    Are you employing a balanced approach to Hybrid IT in the changing multi-cloud landscape? In this webinar, Bob Hicks, Senior Vice President, Operations discusses four cornerstones to consider to reduce risk. Through his 30-year career in IT and data center operations management, Bob has accumulated a deep understanding of the forces affecting hybrid infrastructures and has helped demystify the complexities surrounding Hybrid IT and cloud environments for organizations of all sizes.
  • Redefining the Link: New Year, New Benefits Redefining the Link: New Year, New Benefits Mike Connaughton, Market Segment Manager, Data Center Mar 30 2017 2:30 pm UTC 30 mins
    “Own the Link” is a revolutionary approach to specifying the transceivers used in data links. Since its launch in 2016, new tools and products have been added to the program, delivering more benefits than ever before. This short webinar will demonstrate how Own the Link can help you maximize your network, and we’ll look towards the future with a peek at what tomorrow might bring.

    * The first 100 people to pre-register for this webinar will receive a $5 Starbucks gift card via email on 3/29.
  • FireEye in 2017 FireEye in 2017 Kevin Taylor, EMEA VP; Grady Summers, EVP & CTO Mar 30 2017 3:00 pm UTC 45 mins
    Over the years the security market has evolved, as has the threat landscape. The threats have changed from being a nuisance, to ones that are specifically targeted to carry out activity such as theft of intellectual property, exposure of sensitive customer data, or holding the victim to ransom. Organisations need to keep evolving their security program to keep up.

    There are several challenges that FireEye has observed that reduce the ability to self-discover and operationalise response to breaches: lack of visibility, lack of intelligence, too many tools, too many alerts or not enough expertise.

    Join us in a live webinar and listen to Grady Summers, FireEye’s CTO and Kevin Taylor, FireEye’s VP for EMEA, as they describe how FireEye in EMEA can support organisations in overcoming all these challenges, learn about the new platforms FireEye has to offer and the intelligence required to build a next generation security program.
  • How Are You Managing Cyber Risk From Your Third-Party Relationships? How Are You Managing Cyber Risk From Your Third-Party Relationships? Ryan Curran, Senior Sales Engineer Mar 30 2017 6:00 pm UTC 45 mins
    Outsourcing and strategic partnerships have become a staple in today's business climate, enabling organizations to drive business value and stay ahead of the competition. However, moving company information outside of its own defense perimeter opens an organization up to a myriad of cybersecurity vulnerabilities. Organizations need to have the tools and resources to determine the risk from 3rd party relationships and manage that risk in a timely and consistent manner.

    In this webinar, Senior Sales Engineer Ryan Curran will help you learn how to:
    ~ Identify and monitor threats targeting your extended ecosystem
    ~ Use a threat intelligence platform for third-party risk management workflows
    ~ Leverage Threat Indicator Confidence Scoring and pre-packaged threat intelligence to start monitoring 3rd parties within minutes
  • Making the Case for Lithium-Ion Batteries in the Data Center Making the Case for Lithium-Ion Batteries in the Data Center Peter Panfil, VP Global Power, Vertiv; Tony Gaunt, Senior Director, Vertiv Asia; Thomas McKinney, Forsythe Data Centers Mar 30 2017 7:00 pm UTC 60 mins
    This one-hour webinar will examine the advantages of lithium-ion as well as concerns data center managers may have. The presentation will focus on:

    > Footprint
    > Battery life
    > Cooling costs
    > Safety

    Attendees will be provided with key takeaways to help them effectively evaluate real-life applications of lithium-ion batteries within critical spaces.

    Register now.
  • How to Extend SD-WAN to AWS How to Extend SD-WAN to AWS Ray Wong, Sr. Solutions Engineer, EMEA Apr 4 2017 8:00 am UTC 45 mins
    Enterprises are trending towards deploying inexpensive Internet broadband links to enable bandwidth-intensive applications, but public transport links are “best-effort”, insecure and susceptible to damaging attacks. A cloud-delivered SD-WAN delivers ubiquitous security and enterprise-grade application performance independent of the transport medium, enabling a cost-effective solution for organizations increasingly moving data center workloads to IaaS, such as Amazon Web Services (AWS).

    In this seminar, you learn ways to reduce operational complexity and optimize application performance to cloud data centers, including:

    - The challenges inherent in access to IaaS workloads such as AWS and Azure
    - Seamlessly including IaaS workloads in your SD-WAN architecture with only a few clicks
    - How to secure and optimize IaaS access in your SD-WAN
    - A live demonstration of cloud-delivered SD-WAN capabilities
  • LAN Standards, News & Trends: 2017 Update LAN Standards, News & Trends: 2017 Update Cindy Montstream, Legrand Apr 4 2017 3:00 pm UTC 90 mins
    Get the latest information about Cabling Standards from FOTC Standards Chair Cindy Montstream.

    Attendees will earn one BICSI CEC for attending.
  • Hybrid IT: How to Simplify & Manage Multiple Enterprise Cloud Environments Hybrid IT: How to Simplify & Manage Multiple Enterprise Cloud Environments Kelly Morgan 451 Research and Kevin Leahy Dimension Data Apr 4 2017 3:00 pm UTC 60 mins
    How can your enterprise better manage multiple cloud and non-cloud IT environments to accelerate your digital business?

    Join us, along with Dimension Data, as we discuss:

    -The most common challenges faced when managing multiple IT environments
    -The types of challenges enterprises face in different countries
    -Which applications should be hosted in which environment
    -How to manage these environments more easily
  • Protecting your all-flash FlashStack Converged Infrastructure platform Protecting your all-flash FlashStack Converged Infrastructure platform Mayur Dewaikar, Product Management: Solutions & Integrations, Pure Storage Sunil Polepalli, Head of Cisco Alliance, Commvault Apr 4 2017 6:00 pm UTC 60 mins
    Are you considering converged infrastructure, but unsure how it can be protected? Look no further. Cisco has just released an end-to- end, Cisco Validated Design (CVD), leveraging Commvault Data Protection. FlashStack now offers industry-leading Commvault data protection running on UCS Servers, for protection of all FlashStack supported applications.

    According to IDC, Commvault Data protection software delivers:

    1. 42–52% reduction in annual spending on data infrastructure, software, services, and compliance

    2. 47–62% reduction in weekly administrative hours across cloud, disaster recovery (DR), backup, snapshots, discovery, reporting, and scripts

    3. 15–30% reduction in data management point solutions

    4. 55% reduction in annual unplanned downtime

    Join us on April 4th for an exclusive webinar hosted jointly by Pure Storage and Commvault where you’ll learn:

    1 How FlashStack compares to other converged infrastructure platforms.

    2 What applications can be deployed and protected on FlashStack, combined with Commvault Data Protection.