Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Setup WAN: SD-WAN vs. Legacy WAN - IT Olympics
    Setup WAN: SD-WAN vs. Legacy WAN - IT Olympics Riverbed Technology Recorded: Mar 23 2018 1 min
    In the IT event of setting up a WAN, who will win? Will it be the legacy WAN using CLI or the SD-WAN with rules-based policy creation and deployment? Watch to see who takes the gold in the IT Olympics!
  • Assure the Network. Assure the Patient.
    Assure the Network. Assure the Patient. John Moyer, Cerner - Network Solutions Leader and Ryan Davis, ExtraHop - Product Marketing Recorded: Mar 22 2018 23 mins
    Every hospital room is a datacenter. By the year 2020, Internet-connected medical devices will outnumber people 2:1. There will be 13 devices per staffed bed, not just per room. And, an average of 89 vendors will access a hospitals network every week. These increasing trends will create unique challenges for healthcare institutions, such as:

    -Increased complexity due to siloed departments
    -Lack of visibility into east-west traffic
    -Security around the increasing amount of medical devices

    There’s a better way for hospitals to build a sustainable business model focused on lower costs and better outcomes. Cerner and ExtraHop can help IT health organizations prepare for this shift, by keeping their systems online and providing the quality care patients expect. ExtraHop and Cerner provide the ability to see, in real time and down to the transactional level, exactly what’s happening across your healthcare IT and clinical systems. This visibility isn’t just a nice to have, it is a must-have to keep your IT healthy.
  • Enterprise reality with Cisco and Microsoft Unified Communications (UC)
    Enterprise reality with Cisco and Microsoft Unified Communications (UC) Bill Haskins, Sr Analyst, Chad Elford, Global Director UCaaS Cisco Powered Solutions, David Spears, Director Microsoft Cloud Recorded: Mar 22 2018 61 mins
    Each year, Microsoft and Cisco take center stage at Enterprise Connect, delivering an avalanche of Unified Communications (UC) updates and announcements and this year will be no different! From Microsoft Teams to Cisco Spark, from enterprise Voice to the Broadsoft mashup – there are many messages to unpack.

    Join this webinar to understand Microsoft and Cisco’s key messages and current focus, balanced with a dose of enterprise reality. Bill Haskins, Wainhouse Research UC Analyst, will lead this lively discussion along with Tata Communications product leaders Chad Elford, Director of Cisco Powered UCaaS Solutions, and David Spears, Director of Microsoft Cloud Solutions.

    They’ll explore hybrid deployments, and a dual Microsoft and Cisco environment. There’s a lot to unpack on the state of play in UC - Microsoft Teams, Cisco Spark and everything from enterprise Voice to the Broadsoft mashup. Cisco and Microsoft are at the forefront of change that’s happening in the enterprise communications and collaboration space. The webinar will explore what each companies’ vision is for the future of UC.

    Takeaways from this webcast:

    • Microsoft and Cisco Talking Points from Enterprise Connect 2018
    • Microsoft Messaging vs. Enterprise Reality
    • Cisco Messaging vs. Enterprise Reality
    • What are Microsoft and Cisco Customers Asking for Right Now?
    • How do Hosting Partners Address the Challenges Associated with Hybrid Vendor Environments?
    •UC Announcements, Challenges and Trends
  • Demystifying the move to MS Azure, how to easily implement a cloud strategy
    Demystifying the move to MS Azure, how to easily implement a cloud strategy Larry Cimbalista, Product Manager, Verizon; Jaime Schmidtke, Cloud Networking Specialist, Microsoft Recorded: Mar 22 2018 49 mins
    Learn how easy it can be to bring up applications in the MS environment simply, securely and reliably.

    In this session you’ll learn how MS Azure is helping large enterprises quickly add cloud connections locally, regionally and globally to drive sales, grow revenue and compete.
  • Protect Your Network and Apps from Cyber Threats
    Protect Your Network and Apps from Cyber Threats Mike Spanbauer, NSS Labs, George McGregor, Citrix, Darshant Baghat, Citrix, and Lena Yarovaya, Citrix Recorded: Mar 22 2018 44 mins
    Discover how a Web Application Firewall (WAF) can protect your applications and infrastructure

    Attackers have moved up the stack, and network firewall technology is no longer sufficient to combat the application level threats to your infrastructure and your business. This webinar, brought to you by NSS Labs and Citrix, will explore how to assess WAF solutions in terms of security effectiveness, performance, stability, reliability, and TCO.

    Join this webinar to learn how Citrix WAF:

    • Has the best price-performance ratio
    • Provides “pay-as-you-grow” capability
    • Is available on a range of appliance, in software, or as a cloud service


    Mike Spanbauer, Vice President of Research Strategy,NSS Labs

    George McGregor, Senior Director, Product Marketing, Citrix

    Darshant Bhagat, Director, Product Manager, Networking & Cloud, Citrix

    Lena Yarovaya, Director, Products, Citrix
  • Deploy Deep Learning rapidly, with IBM GPU Accelerated Systems
    Deploy Deep Learning rapidly, with IBM GPU Accelerated Systems Michael Gschwind, Chief Engineer, Machine Learning and Deep Learning, IBM Corp. Recorded: Mar 22 2018 59 mins
    Rapid Deployment. Flexible Frameworks. Blazing Performance.

    Though much is made of the potential of Deep learning, architecting and deploying a Deep Learning platform is a daunting proposition, especially when trying to leverage the latest GPUs and I/O technologies.

    By attending this webinar, you'll learn about:

    • Implementation Hurdles - We'll provide an overview of avoidable hurdles associated with why Deep Learning initiatives, especially with newer accelerated (GPU) architectures.
    • Comparing Common Frameworks - We'll compare and contrast popular Deep Learning architecture(s) and tools might be useful for your organization, to assist you in choosing the one that's most appropriate.
    • Performance Considerations - Explore the unprecedented Deep Learning performance gains that are possible, utilizing POWER8 with NVLink, along with the NVIDIA P100 GPU.
  • GDPR: durante e dopo le 72 ore
    GDPR: durante e dopo le 72 ore Marco Rottigni, Senior Manager, Product Marketing, FireEye Recorded: Mar 22 2018 61 mins
    Sebbene il GDPR sia soprattutto una questione legale e di compliance, un evento di "data breach" evidenzia la presenza di carenze nel sistema aziendale di protezione dei dati e più in generale nella security posture.
    L'articolo 33 del GDPR richiede la notifica delle brecce informatiche entro 72 ore dalla scoperta.
    Un tempo decisamente limitato per notificare la natura della breccia, il numero di record e soggetti coinvolti e le possibili conseguenze. Ogni ora conta ed è fondamentale disporre di una visibilità del proprio ambiente completa ed approfondita.
    In questo scenario, la rapidità di risposta diventa un fattore critico. Per questo è necessario potersi affidare ad un partner che abbia un'elevata competenza nell'incident response, che disponga di soluzioni di threat intelligence di qualità e di tecnologia atta non solo a garantire una prima notifica rapida, ma anche a supportare le notifiche successive sullo stato di avanzamento del processo di risposta e di rimedio all'incidente.

    Ne parliamo il 22 marzo con Marco Rottigni, Sr. Product Marketing Manager EMEA, per comprendere come FireEye possa:
    "aiutarti a soddisfare il requisito di notifica incidente entro le 72 ore dalla scoperta della breccia
    "ridurre il rischio e l'impatto di una potenziale breccia con la messa in sicurezza di dati sensibili e confidenziali, migliorando le capacità di risposta agli incidenti prima, durante e dopo un cyber attack
  • Accelerate Your Digital Transformation: A Unified Data Centre Platform
    Accelerate Your Digital Transformation: A Unified Data Centre Platform Ashton Soh, Associate Director of Managed Hosting in Singtel Recorded: Mar 22 2018 48 mins
    Enterprise applications and business processes are enabled by ICT solutions deployed within the data centre facility, while reliable connectivity unifies all your presence across different geographies. Meanwhile, let’s not forget the increasing reliance of cloud services that helps enterprises to reduce capital expenses and increases agility. Sounds like a disparate, complex environment? Well, it is.

    In this session, Ashton Soh, Associate Director of Managed Hosting in Singtel, will lend insights how Singtel’s DC.DX platform, with the data centre at the heart of it, can help enterprises mitigate the complexity and gain the right expertise for their digital transformation initiatives.
  • Fighting Cybercrime: Seven Popular DDoS Myths Debunked
    Fighting Cybercrime: Seven Popular DDoS Myths Debunked Dima Bekerman, Security Research Specialist, Imperva Incapsula Recorded: Mar 21 2018 29 mins
    DDoS attacks can be damaging; especially for an online business that depends on valuable client relationships and reliable user experiences. But business organizations aren’t the only targets of malicious web bots. Banking institutions, governments, hospitals and schools have all suffered from debilitating attacks in the past few years.

    There are still a lot of misconceptions when it comes to DDoS attacks. We take some of the most common ones and address misleading information. One thing is certain: Knowing the facts will help you keep your website safe.
  • Making Threat Intelligence Affordable for the Mid-Market
    Making Threat Intelligence Affordable for the Mid-Market Vice President of Customer Support James Carnall and Vice President of Intelligence Operations Eric Olson Recorded: Mar 21 2018 58 mins
    Phishing, ransomware, and data breaches plague organizations of all sizes and industries, but the financial services market has always had the largest target on its back. As a mid-market financial organization, how do you fend off these attacks when you don’t have the budget for everything you need: data feeds, tools, analysis and mitigation?

    The answer: “Threat Intelligence-as-a-service.” This, robust, cost-effective option, brings together dozens of structured threat intelligence feeds, online monitoring of social media and the dark web, and round-the-clock human review to give you vetted, relevant intelligence specific to your organization. Even better, there is no hardware or software to install, this is a completely managed service that can be up and running in hours or days. It finally puts “big bank” threat intelligence capabilities within the reach of smaller organizations.

    Join LookingGlass’ Vice President of Customer Support James Carnall and Vice President of Intelligence Operations Eric Olson on Wednesday, March 21 @ 2pm ET as they discuss how threat intelligence can be affordable for mid-market organizations with LookingGlass’ Information Security-as-a-Service package, a new offering tailor made for your organization’s cybersecurity needs.
  • State of Cyber-Security Arms Race: Preparing for what's coming in 2018
    State of Cyber-Security Arms Race: Preparing for what's coming in 2018 Ken Dang Recorded: Mar 21 2018 61 mins
    Examining 2017 to prepare for what's coming in 2018

    The modern cyber war — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. The SonicWall 2018 Cyber Threat Report provides exclusive data that highlights advances by both the security industry and cyber criminals.

    Attend this webinar to gain a better understand the current State of Cyber-Security Arms Race. We’ll share our findings, intelligence, analysis and research to help you improve your security preparations and posture going forward.
  • WiFi vs 5G: Is the end of wireless on the horizon?
    WiFi vs 5G: Is the end of wireless on the horizon? Paul Vanderlaan, Technical Manager - Standardization & Technology Recorded: Mar 21 2018 59 mins
    Now that 802.11ac Wi-Fi has established itself in the market, we’re already looking at what’s in development for the next generation of wireless communications. Will communication speeds continue on their rapid upward trend and, if so, what new applications could emerge as a result? And with 5G cellular garnering a lot of attention lately, will it make a play to obsolete Wi-Fi? Register for this webinar to learn:
    -The status of 802.11ax and ay
    -An overview of 5G cellular and how it will effect wireless
    -How infrastructure will adapt to support these new developments
  • GDPR Compliance: Leveraging Technology for Breach Detection and Response
    GDPR Compliance: Leveraging Technology for Breach Detection and Response Ken Durbin, CISSP, Senior Strategist: Global Government Affairs & Cybersecurity, Symantec Recorded: Mar 21 2018 30 mins
    Does your organization have a process in place for breach detection under the General Data Protection Regulation (GDPR)? Are you aware of what types of breaches must be reported within the 72hr notification period and the impact to the EU Data Subject?

    With the enhanced data security and breach notification standards defined in the GDPR, many organizations are looking to build out an effective incident response strategy to meet the notification requirements.

    Join us to learn about the GDPR breach notification procedures and uncover ways to help reduce the impact of a breach while improving your existing security process.

    Key Takeaways:

    - What are the requirements for reporting a breach under the GDPR?

    - How to leverage technology to identify a breach in real time.

    - Preemptive steps you can to take now to ensure a breach does not trigger the notification requirement later.

    View Now
  • Advanced Analytics: Modernizing Enterprise Networks
    Advanced Analytics: Modernizing Enterprise Networks Jim Meehan, Head of Product Marketing, Kentik Recorded: Mar 21 2018 36 mins
    Enterprise networks are changing fast. Traffic volumes are growing relentlessly, applications are increasingly dynamic and distributed, and some of them have moved outside of IT’s direct control. On top of these challenges, every category of business process is moving to digital — the network is now both your supply chain and your delivery vehicle. IT and network teams are feeling more squeezed than ever as their traditional tools fall further behind these modern requirements.

    Is your enterprise network facing one or more of these challenges?

    Join Kentik’s Jim Meehan to learn how network traffic intelligence provides:

    --Pervasive visibility within the data center, across the WAN, and into public cloud
    --Proactive alerting and anomaly detection for both NetOps and SecOps
    --Single-pane-of-glass visibility across all applications regardless of where they run
    --And much more for modernizing your enterprise network
  • Top 7 Docker Vulnerabilities & Threats
    Top 7 Docker Vulnerabilities & Threats Knox Anderson, Product Marketing Manager, Sysdig Recorded: Mar 21 2018 35 mins
    Docker comes bundled with some neat security safeguards by default: isolation, a smaller attack surface, and task specific workloads.

    There are, however, some specific parts of Docker based architectures which are more prone to attacks. In this webinar we are going to cover 7 fundamental Docker security vulnerabilities and threats.

    Each section will be divided into:
    -Threat description: Attack vector and why it affects containers in particular.
    -Docker security best practices: What can you do to prevent this kind of security threats.
    -Proof of Concept Example(s): A simple but easily reproducible exercise to get some firsthand practice.
  • Protecting IoT Devices & Networks From Cyber Crime
    Protecting IoT Devices & Networks From Cyber Crime Cradlepoint's Ken Hosac, VP of IoT Strategy and Business Development, and Brandon Ashey, Infrastructure and Security Manager Recorded: Mar 21 2018 60 mins
    The potential of widely distributed IoT devices to enable new business opportunities, streamline operations, and reduce costs is vast, but so are the security implications. With IoT playing an increasingly big role at branch offices, within vehicles and in the wild, larger attack surfaces are giving IT teams more to worry about than ever before.

    Well-publicized attacks such as Mirai botnets and WannaCry grabbed headlines, but they're just the tip of the iceberg. IoT threats are becoming too prevalent and advanced to address with traditional security tools. Now is the time for software-defined, policy-based security solutions that isolate IoT devices and protect organizations' most valuable data - regardless of the WAN source.

    Join Cradlepoint's Ken Hosac, VP of IoT strategy and business development, and Brandon Ashey, infrastructure and security manager, for a live webinar on March 21, 2018, at 9 am PT. Learn about IoT security challenges and best practices for mitigating risk, including Software-Defined Perimeter technology that creates micro-segmented device-to-cloud overlay networks that are completely cloaked from other networks.
  • Data: Don't Let Your Greatest Asset Become a Liability
    Data: Don't Let Your Greatest Asset Become a Liability Laurence Pitt, Global Security Strategy Director at Juniper Networks Recorded: Mar 21 2018 42 mins
    A discussion around the role and the evolution of data. We will also cover the importance of protecting data throughout its lifecycle.

    We will look at:
    - Fundamental changes in the way we live, work and communicate
    - How we have become highly reliant on data, so it means more to us
    - The increasing value of data and why we need to protect it

    Presenter: Laurence Pitt, Global Security Strategy Director at Juniper Networks
  • IBM Power Systems simplifies SAP HANA Migration
    IBM Power Systems simplifies SAP HANA Migration Peter Rutten, Analyst, Servers and Compute Platforms Recorded: Mar 21 2018 56 mins
    According to IDC, only IBM Power Systems servers are designed specifically to work with data-intensive workloads such as SAP HANA.

    Organizations that have the most to gain using SAP HANA on IBM Power Systems are:

    • Businesses with SAP HANA appliances due for a refresh
    • Organizations on commodity architecture moving to SAP HANA
    • Businesses with a traditional database and SAP applications on IBM Power Systems
    • Businesses on IBM Power Systems that currently do not have SAP

    This webinar featuring IDC Research Analyst Peter Rutten's details the findings and how using IBM Power Systems can reduce migration risks and broaden your options for a hybrid cloud infrastructure.
  • Verizon Threat Research Advisory Center - Protected Health Information
    Verizon Threat Research Advisory Center - Protected Health Information John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Mar 21 2018 77 mins
    Fellow Cybersecurity Practitioner:
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape.
    This month's theme: Protected Health Information
  • How to Secure Your Web, Mobile, and API-Based Applications
    How to Secure Your Web, Mobile, and API-Based Applications Gemma Allen, Barracuda; Dinah Barret, AWS Recorded: Mar 21 2018 53 mins
    A cloud-based DevOps environment on AWS can benefit from a security solution that is as agile as you are.

    In this webinar Barracuda and AWS will show you leading-edge application security techniques for creating secure application environments, embedding security into continuous deployment, and scaling security to perfectly fit your operations. We will do a demo to show you the power of automating security on AWS.

    Learn about the challenges of application security when moving to the cloud, how to secure your web, mobile, and API-based applications, and to view a demonstration of the Barracuda WAF securing an AWS application.

    Harness the power of cloud and DevOps for security that leaves traditional infrastructures behind.

    Join our specialists:

    - Dinah Barrett - Partner Solution Architect, AWS
    - Gemma Allen - Cloud Solution Architect, Barracuda
    - Chris Hill - Public Cloud Director, Barracuda
  • GDPR Compliance: The Operational Impact of Cross-Border Data Transfer
    GDPR Compliance: The Operational Impact of Cross-Border Data Transfer Ken Durbin, CISSP, Senior Strategist: Global Government Affairs & Cybersecurity, Symantec Recorded: Mar 20 2018 38 mins
    In today's world, information needs to move quickly and freely wherever it is needed. Yet, with the impending General Data Protection Regulation (GDPR), many organizations struggle to understand if data sharing is allowed and what data protections are required to avoid non-compliance.

    Join us for an On-Demand webinar focusing on the transfer of personal data across borders. During this session we will cover best practices for protecting your information against physical and virtual threats in order to maintain data integrity and confidentiality.

    Key Takeaways:

    - Understand what impact the GDPR has on Cross-Border Data Transfers

    - Understand the requirements for protecting EU personal data under your control

    - Learn how Symantec Solutions can assist you in protecting your personal data

    View Now
  • Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For
    Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Mar 20 2018 40 mins
    With the major cyber-attacks headlining the news, many of these cyber threats fall into five different attack vectors. Whether it's user credentials, personally identifiable information (PII), payment card information, health care information, intellectual property, or another form of data, nothing is safe from these bad actors. So, how do you protect you and your business from these debilitating attacks?

    In our upcoming webinar, we arm you with the essential components needed to defend your business against the top five attack vectors we see in a Cyber Security Operations Center (SOC).

    After attending you will:

    - Recognize what are the top 5 attack vectors and the counter-measures you can take
    - Understand the importance of detection and response in the kill-chain for each attack vector
    - Discover how Arctic Wolf Networks (AWN) CyberSOC works to provide the essential components to protect against each of them

    Register now to understand the different ways an attacker may cause harm to you and your business and how to defend yourself moving forward.
  • Phish me not! Stop Sophisticated Phishing Attacks with Email Threat Isolation
    Phish me not! Stop Sophisticated Phishing Attacks with Email Threat Isolation Naveen Palavalli, Director, Product & GTM Strategy & Anant Vadlamani, Principal Product Manager, Symantec Corporation Recorded: Mar 20 2018 60 mins
    Advanced phishing attacks and ransomware continue to plague Organizations with a 55% increase according to Symantec threat research. Users continue to be easily social engineered into opening phishing emails which can steal confidential data like credentials. In addition, email continues to be the number one vector for malware including ransomware. Combating these insidious threats requires a powerful combination of advanced protection and user security awareness.

    This webinar introduces email threat isolation, a paradigm shift in the fight against phishing attacks and ransomware.

    Join us to learn how Symantec Email Security can:

    - Isolate malicious threats in links and attachments to prevent malware payloads and credential theft.

    - Pre-empt phishing attacks with real-world simulations and built-in user security awareness tools, tracking readiness over time.

    - Anticipate future campaigns with comprehensive security analytics gathered from previous attacks against your organization.

    - Fully secure your Office 365 or Google G Suite apps with integrated DLP and CASB for both advanced data and threat protection.

    In addition, we will show you Symantec Email Threat Isolation, in action, with a demo that showcases safe rendering of links.
  • Five Dangers that Can Sink Your Data Center Migration
    Five Dangers that Can Sink Your Data Center Migration Tyson Supasatit, PMM at ExtraHop; Eric Thomas, Director of Cloud Solutions at ExtraHop Recorded: Mar 20 2018 40 mins
    If you have a data center or application migration on the horizon, you need to be aware of the pitfalls. Out-of-date CMDBs, reliance on tribal knowledge, lack of performance reporting, and other gotchas can lead to project overruns and application performance issues.

    Thankfully, you can use data pulled from the network to discover assets, map dependencies, measure before-and-after baselines, and validate your project's success.

    Register for this webinar to learn more about how to overcome the common challenges in your data center migration project.
  • Healthcare Embraces Transformation through SD-WAN to Better Service the Patient
    Healthcare Embraces Transformation through SD-WAN to Better Service the Patient Rachna Srivistava, Director Product Marketing Recorded: Mar 20 2018 37 mins
    Healthcare is strictly regulated and fraught with laws that seek to protect the patient as well as the healthcare provider. In today's modern world, technology plays a huge part in the ability to serve patients but must be able to consistently adhere to current industry regulations and flexible enough to accommodate its evolution.

    In this webinar, VeloCloud takes a look at how SD-WAN plays a key role in ensuring that providers are able to deliver care through:

    * Segmenting traffic such as relevant patient records or internet traffic
    * Ensuring constant network uptime for non-disruptive access to patient records
    * Shift to cloud storage of health records requires constant network uptime and connectivity
    * Case studies: specific uses by healthcare customers
  • Benefits of Running SAP HANA on IBM Power Systems
    Benefits of Running SAP HANA on IBM Power Systems Volker Haas, SAP HANA on IBM Power Systems Sales Manager, Europe Mar 26 2018 2:00 pm UTC 45 mins
    Running SAP HANA is undoubtedly a sound business decision, but not enough thought is given to the platform being run on. Most people think of the infrastructure as a box to be added to the hardware pool. But not all platforms are born equal.

    IBM’s Power Systems bring to the table a radically different approach to the way SAP HANA is being used. There are significant benefits in the flexibility, cost of operation and the performance delivered by the IBM solution, as well as future options for growth compared to the traditional x86 servers.

    This free webinar goes in depth, detailing the ways in which the Power architecture delivers benefits across the board.
  • 2018 Guide to WAN Architecture and Design
    2018 Guide to WAN Architecture and Design Dr. Jim Metzler, WAN Expert and Ofir Agasi, Director of Product Marketing at Cato Mar 27 2018 1:00 pm UTC 75 mins
    Enterprises of all sizes are awakening to a big shift in their legacy Wide Area Networks (WANs). Emerging technologies like SD-WAN are targeting the cost and complexity of established approaches like MPLS and Site-to-Site VPNs. Globalization, the move to cloud datacenters and applications, and the increasing velocity of security threats, demands IT to move faster and do more with less resources.

    In this webinar, WAN expert, Jim Metzler founder of Ashton, Metzler & Associates will discuss his recent research “The 2018 Guide to WAN Architecture and Design: Key Considerations when Choosing new WAN and Branch Office Solutions”. Ofir Agasi, Director of Product Marketing at Cato will review pertinent case studies and strategies used by global and regional enterprises to adapt their networks to meet today’s business challenges.
  • The Role of Colocation in a Multi-Cloud World
    The Role of Colocation in a Multi-Cloud World Melanie Posey & Dan Thompson of 451 Research & Charisse Richards of Iron Mountain Mar 27 2018 5:00 pm UTC 60 mins
    The business imperatives fueling digital transformation are changing not just where enterprise IT is located but how it gets used to support business innovation and reinvention. As a result, enterprises are embracing new, heterogeneous IT deployment models that combine on-premises and off-premises, cloud and non-cloud; and public cloud/private cloud resources. Colocation plays a key role in the increasingly complex workload placement decision process, helping organizations get out of the business of managing their own datacenters while also facilitating access to the expanding array of services offered by cloud providers.

    Join 451 Research’s Melanie Posey, Research Vice President and General Manager Voice of the Enterprise and Dan Thompson, Senior Analyst, and Iron Mountain’s Charisse Richards, Senior IT Leader for Iron Mountain Data Centers to explore how colocation is evolving into an important foundation of hybrid IT, integrating the security and compliance of private IT infrastructure with the flexibility and agility of public clouds.
  • 5 reasons why containers change PCI compliance
    5 reasons why containers change PCI compliance Knox Anderson, Product Marketing Manager, Sysdig Mar 27 2018 5:00 pm UTC 60 mins
    As more and more containerized applications get moved into production environments security & compliance become greater concerns. In this webinar we'll review PCI compliance initiatives, talk about how containers change your compliance lifecycle, and how to stay compliant while maintaining the benefits of containers.

    Specifically we'll cover
    - Live examples of user activity auditing
    - Managing dynamic network maps of your containerized infrastructure
    - Container Intrusion detection
    - Forensic analysis of unauthorized data access
  • The Path of DevOps Enlightenment for InfoSec
    The Path of DevOps Enlightenment for InfoSec James Wickett, Head of Research, Signal Sciences Mar 27 2018 7:00 pm UTC 60 mins
    Security as we have known it has completely changed. Through challenges from the outside and from within there is a wholesale conversion happening across the industry where DevOps and Security are joining forces. This talk is a hybrid of inspiration and pragmatism for dealing with the new landscape.

    Together we discover that security changes in the modern landscape to:

    * Create Security Feedback Loops
    * Embrace Adversity
    * Enable Speed
    * Much more!
  • Системы управления и мониторинга Dell EMC
    Системы управления и мониторинга Dell EMC Кирилл Сорокин Mar 28 2018 8:00 am UTC 60 mins
    Обзор систем управления и мониторинга iDRAC9 и OpenManage Enterprise, нововведения и различия с предыдущими версиями продуктов.
    Вебинар проводится при поддержке компании Intel®
  • 11ax Wi-Fi What you need to know for 2018
    11ax Wi-Fi What you need to know for 2018 Nathanial Moore, CWNE Systems Engineer, UK Aerohive Networks Mar 28 2018 10:00 am UTC 45 mins
    Are you ready for 802.11ax? This fast approaching IEEE standard addresses some of today’s biggest high density and performance challenges – increasing capacity by up to 4x; improving spectral efficiency to benefit both 2.4GHz and 5GHz bands in a variety of environments.

    Today’s 802.11ac standard already presents many fantastic capabilities for capacity and performance. So if you’re reviewing your network, which is right for you: 11ac or 11ax? And what will be the benefits of upgrading from 11ac?

    Join us for this 30 minute quick-hit, reviewing 11ax’s most important components:

    • PHY and MAC layer enhancements for better traffic management
    and efficiency
    • Downlink & uplink OFDMA; 8 x 8 MU-MIMO; Spatial re-use
    • Considerations for clients and wider network enhancements
  • 5G promises massive scale. But the bigger the pipe, the stronger the DDoS threat
    5G promises massive scale. But the bigger the pipe, the stronger the DDoS threat Michael Schachter, Senior Product Marketing Manager at Allot Mar 28 2018 2:00 pm UTC 45 mins
    Join this webinar to learn:
    •How to protect yourself against both inbound AND outbound DDoS
    •Why traditional methods of DDoS defense such as scrubbing centers just won’t fly with 5G
    •How a new, hybrid inline architecture scales to meet this challenge
  • Preparing and Protecting Your Network from an Automated Zero-Day Attack
    Preparing and Protecting Your Network from an Automated Zero-Day Attack Joe Schreiber, Technical Director, Business Development, Tufin and Dan Rheault Sr. Product Marketing Manager, Tufin Mar 28 2018 3:00 pm UTC 45 mins
    Attackers have embraced automation to launch attacks and expand their reach within your network. But ill-intentioned individuals aren’t alone in having automation in their toolkit. It’s time to fight automation with automation.

    How quickly you can respond to a zero-day attack largely depends on how proactively you secure your network. When attackers engineer malware to automatically detect vulnerabilities on your network, the way to prevent damage is to employ automation so you can react quickly and ensure its integrity.

    Join Tufin experts Dan Rheault and Joe Schreiber, also an established SOC professional, for an educational webinar that will discuss best practices to:

    •Secure the network through effective segmentation
    •Contain risk from zero-day attacks
    •Leverage automation to respond to security incidents
  • Flexible support for new protocol processing with DPDK using DDP
    Flexible support for new protocol processing with DPDK using DDP Brian Johnson, Solutions Architect, Intel Corporation Mar 28 2018 3:00 pm UTC 45 mins
    The Intel® Ethernet 700 Series was designed from the ground up to provide increased flexibility and move to a programmable pipeline allowing it to be customized to meet a wide variety of customer requirements.
    To address this, a new capability has been enabled on the Intel Ethernet 700 Series network adapters: Dynamic Device Personalization (DDP). DDP allows a DPDK application to enable identification of new protocols, for example, GTP, PPPoE, QUIC, without changing the hardware. This session will provide details on how to take advantage of this new capability and a live demo will showcase a DPDK application identifying and spreading GTP and QUIC across multiple CPU cores.

    More details about Dynamic Device Personalization can be found on the Intel Developer Zone site:
  • Cyber Security: Protecting Assets
    Cyber Security: Protecting Assets IBC365 | TVT | DPP | Juniper Networks Mar 28 2018 3:00 pm UTC 75 mins
    With viewers consuming content on an increasing array of devices and platforms and the virtualisation of workflows, the task of protecting assets has never been so complicated and costly. Add to this the fact that the media industry is a high-profile target for hackers and it becomes clear that cyber security is at the top of the agenda for all those involved in the media supply chain.

    Join this IBC365 webinar, sponsored by Juniper Networks, to hear from senior industry figures who will examine where the weaknesses lie in the production, delivery and distribution workflow and consider what can be done to address vulnerabilities and make sure that film and TV is consumed as intended by broadcasters, platforms and content owners.

    The webinar will cover:
    - Identification of supply chain vulnerabilities
    - Best practice for safe guarding assets
    - The role of people in protecting content
    - How best to anticipate a cyber breach
    - What to do if your security is compromised

    Peter Elvidge, Vice President of Technology, TVT
    Dr Mark Harrison, Managing Director, DPP
    Spencer Stephens, Production & Media Technology Expert
    Lee Fisher, Security Specialist, Juniper Networks
  • 2018 Cloud and DevOps trends – The barriers and the breakthroughs
    2018 Cloud and DevOps trends – The barriers and the breakthroughs Shashi Kiran, CMO, Quali Mar 28 2018 5:00 pm UTC 60 mins
    As part of its annual survey, Quali received inputs from over 1300 practitioners working in mid-to-large enterprises – all in different stages of their journey to Cloud and DevOps. We learnt about maturity of their own processes, their challenges and learnings, the barriers they’re still challenged to pull down and where they’ve made headway compared to the past couple of years. The survey, now entering into its fourth year provides a great way to look at the industry landscape over a 3-year and map it to the maturity of the transformation that enterprises are experiencing.

    We encourage you to join this webinar and learn what you’re peers in the industry shared. Here’re a few things you will walk away with:

    •What are the top careabouts for enterprises in their quest for agility? Where are the existing bottlenecks?
    •How is the cloud strategy shaping up and what are the top automation tools?
    •Is DevOps adopting maturing? What are the barriers? Has the culture evolved?
    •How does this compare to the past 2 years?
    •How should you prioritize your efforts for 2018?

    Register now to hold the spot.
  • Data Center INTEL – Controle e Agilidade para TI
    Data Center INTEL – Controle e Agilidade para TI Roger Garcia, Software Sales Manager, LAR Intel Data Center Management Solutions; Eduardo Lopes, MTel Tecnologia S/A Mar 29 2018 2:00 pm UTC 60 mins
    Uma rápida taxa de mudança complica todas as facetas do gerenciamento do datacenter, e os modelos de computação centrados no servidor são demasiado pesados para as cargas de trabalho altamente variáveis de hoje. É possível otimizar recursos e operações em ambientes tão dinâmicos?
    Nesta apresentação, saiba como substituir o provisionamento e o gerenciamento de aplicativos, manualmente definidos por hardware, com um modelo de recursos e uma camada de orquestração altamente automatizados, definidos pelo software, que permitem flexibilidade, simplificar eficiência de capital e TCO mais baixos. Descubra como compor pools mais ágeis de recursos do datacenter e simultaneamente gerar eficiência de TI, otimizar os requisitos de energia, aumentar a capacidade de resiliência do datacenter e fortalecer os planos de recuperação de desastres.
  • Virtualization as a Path to an Optimized, Modern Data Center
    Virtualization as a Path to an Optimized, Modern Data Center Gunnar Hellekson, director of product management, Red Hat Rex Backman, product marketing manager, Red Hat Virtualization Mar 29 2018 3:00 pm UTC 60 mins
    Virtualization will remain an integral part of the modern datacenter for the next several years. According to the Uptime Institute, up to 65% of workloads are still on-premise. While virtualized workloads may give way to the cloud and other emerging technologies, it still puts virtualization in focus as a technology that needs to be modernized.

    Join this webinar to learn about:

    - Virtualization today.
    - New architectures based on open source hypervisors, management, and automation solutions.
    - How to lead your organization to these more modern architectures.
  • Epic CA Fails: How Quickly Can You Restore Trust?
    Epic CA Fails: How Quickly Can You Restore Trust? Mike Dodson, VP WW Customer Security Strategy and Solutions, Venafi Mar 29 2018 4:00 pm UTC 60 mins
    What happens when a certificate authority compromise or error leaves you scrambling to find and replace large numbers of certificates? Many organizations put their skills to the test when Google recently decided they would no longer trust certificates issued by Symantec. With the first set of Symantec distrust deadlines just around the corner, do you know if your organization will be impacted?

    But Symantec wasn't the first panic button and it won't be the last. Most security professionals think there will other events like this in the future, but they don't have the technology or information they need to respond quickly. Join our webinar to learn how you can prepare for large-scale certificate security events.

    You'll learn why certificates are poorly understood and weakly defended in many enterprise networks. And you'll see survey results that show why a surprising number of IT security professionals are relatively unconcerned about their ability to quickly find and replace groups of certificates.

    How does your organization stack up to industry peers? Are you agile enough to find and replace all certificates that chain up to a Symantec root?

    Attend this session to learn:
    - Which types of CA events can impact your certificates
    - Why it's difficult to locate and replace impacted certificates
    - Why most organizations aren't ready to react quickly
    - Four steps you can take now to build CA agility
  • DevOps and Cloud Native
    DevOps and Cloud Native Michael Ducy, Director of Community & Evangelism, Sysdig Mar 29 2018 5:00 pm UTC 60 mins
    You just got “done” with the transformation of your organization (or parts of it) to leverage more DevOps practices, and now the next hot thing is taking over the industry: containers, Cloud Native, SRE, GitOps, Kubernetes, etc. What’s a DevOps Manager to do? Throw away the last few years and rebrand the team as Cloud Native SREs?

    Technological advancement not only provides advancement in “what” a modern technology architecture looks like, it can also provide advancement in the processes and the day to day of an organization’s technology teams. We’ve seen this before in the move from mainframe to client-server, and client-server to Cloud.

    In this presentation I’ll talk about the relationship of DevOps to Cloud Native technologies, and help make sense of all the jargon - containers, microservices, orchestration (and Kubernetes), SRE, GitOps, etc. I’ll also talk about how some processes & practices in the world of DevOps change when leveraging these technologies. Attendees will leave from this webinar with a base understanding of what a DevOps operating model looks like when leveraging modern Cloud Native technologies.
  • Mulit-cloud, multi-problems
    Mulit-cloud, multi-problems Mike Dahlgren, senior cloud solution architect, Red Hat Mar 29 2018 6:00 pm UTC 60 mins
    Simplifying complex IT operations with automation & management

    IT operations is more complex than ever before. Automation and management are critical to keep pace and deliver business results.

    Join this webinar to learn how management, automation, and innovation address your hardest IT challenges:
    > Improving processes, migrating apps for optimization, and providing a single language for DevOps practices using agentless IT automation
    > Managing multicloud environments efficiently, securely, and with compliance to various standards
    > Easily and quickly building, developing, and deploying in nearly any infrastructure—on premise, in a public cloud, or hosted
  • Key Benefits for Moving to a Cloud-Managed Network
    Key Benefits for Moving to a Cloud-Managed Network Trent Fierro: Director of Software Solutions Marketing & Kezia Gollapudi: Product Marketing Manager at Aruba, an HPE Company Mar 29 2018 6:00 pm UTC 60 mins
    Is a cloud-managed network right for you? Several businesses are moving to cloud-managed networks to simplify and automate how they set-up and maintain their networks.

    Join our webinar to discover how you can:
    - Cut unnecessary time and money spent on running your network - no servers, upgrades, or bug fixes
    - Run a reliable business-grade network without the complexity - no worries if you are short-staffed
    - Improve user experience by tapping into analytics - get more visibility and control over your network

    Attend our webinar and get a chance to experience intelligent cloud networking for yourself. In minutes, set up your evaluation kit to learn how you can easily manage and secure your network.
  • Operational Insights: How a Security Expert Defends Your Network's Blind Spots
    Operational Insights: How a Security Expert Defends Your Network's Blind Spots Sam McLane, Head of Security Engineering, Arctic Wolf Networks; Narayan Makaram, Sr. Director of Product Marketing Mar 29 2018 6:00 pm UTC 60 mins
    With an ever-changing threat landscape, the need for skilled security experts who can address your real business risks is at an all-time high. IT organizations who do not have the budget to hire security experts, are looking for help to hunt and triage advanced attacks, weed out false-positives, and address cyber threats that truly matter to their business.

    In this upcoming webinar, get key insights from Sam McLane, Head of Security Operations, at Arctic Wolf Networks (AWN), on the importance of having a Concierge Security Engineer(CSE) on your side, who can act as your trusted advisor for your IT team.

    By attending, you will:

    - Discover the role of a CSE in AWN's SOC-as-a-service offering
    - Understand how a CSE-based service is different from other managed-SIEM/SOC services
    - Explore real life examples of how a CSE tackles security issues proactively for our customers

    About our speaker:

    Sam McLane leads Security Engineering at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University. Sam holds a master of science in mathematics from Temple University and a bachelor of science in mathematics from Washington and Lee University.
  • DDoS Attack and Bot Protection: Defending your Applications
    DDoS Attack and Bot Protection: Defending your Applications Chad Lavoie, Senior Support Engineer Mar 29 2018 6:30 pm UTC 60 mins
    We read about DDoS attacks and bot threats causing companies millions in lost revenues and battered reputations almost every day. By leveraging an extremely efficient and innovative design, including extensive ACL and Stick Table tracking systems, HAProxy Enterprise Edition is able to perform the real time behavioral analysis that mitigating today’s threats demands. Rather than being caught off guard, join this webinar to see how you can use HAProxy Enterprise Edition to create an effective, high performance threat protection solution.

    In this webinar we will present how to:

    •Protect against application-based DDoS attacks such as HTTP request flooding
    •Protect against bot threats such as web scraping, brute forcing, and vulnerability scanning
    •Implement an advanced threat response policy with Antibot and Google reCAPTCHA
    •Implement cluster wide threat protection with a Stick Table Aggregator
    •Enhance bot threat protection with WAF and Fingerprint modules
    •Dynamically maintain cluster wide whitelists and blacklists
    •Monitor threat protection status
  • Remove Network Capital Constraints while Delivering Better QoE with MEC Solution
    Remove Network Capital Constraints while Delivering Better QoE with MEC Solution John Reister, VP Marketing and Product Management, Vasona Networks and Godfrey Tan, F5 Networks Apr 3 2018 4:00 pm UTC 60 mins
    Mobile operators face unprecedented mobile network performance challenges that cause poor customer experiences, user churn and flat revenue. Vasona Networks customers navigate these obstacles and pursue opportunities on the road to 5G with edge-based (MEC) solutions that offer real-time insight and control of mobile data traffic flowing through crowded cells. With Vasona, operators deliver better user experiences, make smarter use of network investments and save money. Capital constraints disappear, and operators make network investments that truly move the needle on customer QoE.

    Vasona Networks provides an edge-computing solution for mobile operators to overcome network challenges and deliver a better end-user experience. In this webinar, Vasona will discuss how it can help operators to create a new paradigm for network monitoring, measurement and refinement that drives more impactful investment decisions.
  • Protect Your Business: Top 5 Best Practices for Connected Devices
    Protect Your Business: Top 5 Best Practices for Connected Devices Sonu Shankar - Sr. Product Marketing Manager - Arctic Wolf Networks Apr 3 2018 5:00 pm UTC 45 mins
    IoT devices are increasingly connected to conventional IT infrastructures, to improve operational efficiencies and ease of remote management. IT leaders are now responsible for connecting doctors, nurses, patients, and medical devices, or enabling financial advisors on the road, to deliver services to their clients. From enabling services via remote mobile devices, to managing IP-connected cameras on-premises at the same time, running this new converged IT ecosystem, that includes Operational Technology (OT), can be a daunting task. Especially when your attack surface has now dramatically expanded.

    According to Verizon's 2017 Data Breach Investigations Report, a total of 51% of data breaches affected either financial services businesses (24%), healthcare organizations (15%), or public sector entities (12%). With the rise in data breaches in these industries, and the responsibility to manage this connected ecosystem, how do you protect your business from attacks targeting connected devices? Furthermore, how do you do this without the budget to build and staff a full-fledged Security Operations Center (SOC)?

    Join us to discover the top 5 best practices you can adopt to improve your overall security posture and recognize how you can equip your business with the security capabilities of a large enterprise, at a fraction of their costs!
  • The Routerless Branch - SD-WAN Takes Routing out of the Router
    The Routerless Branch - SD-WAN Takes Routing out of the Router Zeus Kerravala, Principal Analyst & Founder, ZK Research Apr 3 2018 5:00 pm UTC 60 mins
    The digital transformation is here, affecting business everywhere and requiring a retooling of legacy solutions. Networking needs to keep up but it relies on an architecture that has been in place for over three decades and that was not built to support the dramatic change.

    To keep pace, networks are undergoing a massive overhaul, a lot of the momentum spurred by trends like IoT and enabling technologies like SD-WAN. Included in the overhaul is rethinking branch routers by separating routing capabilities from the physical box.

    In this webinar, Zeus Kerravala of ZK Research takes a deep dive into how SD-WAN is ushering in an era of a routerless branch office.
  • In Case You Missed Parallel Wireless at MWC18
    In Case You Missed Parallel Wireless at MWC18 Jake Wright, Chris Simmonds, Zahid Ghadialy Apr 4 2018 2:00 pm UTC 45 mins
    Attend our webinar to learn all about our Open vRAN solutions and demonstrations from the event!
  • Simplified Endpoint Microsegmentation from the Cloud
    Simplified Endpoint Microsegmentation from the Cloud Tom Cross, CTO, OPAQ Networks Apr 4 2018 5:00 pm UTC 60 mins
    Many security experts warn of a rising trend of lateralization attacks against organizations of all sizes. In these attacks, east-west movement within an organization’s internal network compromises other systems, with the ultimate goal of gaining administrative control over the entire network. Organizations can prevent lateral attacks by implementing microsegmentation. However, for many organizations, segmenting the network is very complex – traditional firewalls and VLANs make it difficult and costly to manage.

    See how you can easily and flexibly implement software-defined network segmentation from the OPAQ Cloud without using firewalls or VLANs to confront the growing threat of lateralization attacks. In this webcast you’ll:

    - See the latest tools that malicious actors are using to penetrate your network.

    - Learn what leading-edge organizations are doing to gain greater visibility and control over their network assets.

    - Understand what effective strategies are being implemented to segment the network using a software-defined approach.