Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Symantec Cloud Workload Protection Product Demo Video Symantec Cloud Workload Protection Product Demo Video Symantec Recorded: Feb 24 2017 2 mins
    Symantec Cloud Workload Protection, our latest offering for securing enterprise data center migrations into the public cloud. This new offering adds workload security to Symantec’s security portfolio for the cloud generation.

    Cloud Workload Protection provides elastic security for AWS and Microsoft Azure workloads via cloud-native integration, enabling businesses to enjoy public cloud benefits without worrying about the security and integrity of their brand as they offer new services to their customers.

    To learn more, visit the Symantec Cloud Workload Protection product page: https://www.symantec.com/products/threat-protection/cloud-workload-protection
  • Don't Compromise your Network: How to Safely Run an Open Source Infrastructure Don't Compromise your Network: How to Safely Run an Open Source Infrastructure Mandy Sadowski and Rich Jerrido, Technical Product Marketing Managers, Red Hat Recorded: Feb 23 2017 53 mins
    The foundation of any IT deployment should be a sound infrastructure and standard lifecycle processes and procedures. At the forefront of every IT department this year is how to increase security, improve efficiency, and maintain compliance in an open source environment. With the ever-increasing influx of data, cloud and DevOps comes increased risk for cyber security attacks and data breaches. How can you continue down the path of digital transformation without compromising your network?

    Join this webinar to learn more about these increasing demands, and how Red Hat Satellite is spearheading these advancements.
  • How safe are your email-based communications? How safe are your email-based communications? Gus Maldonado Recorded: Feb 23 2017 35 mins
    Email-based communications are a fundamental cornerstone for effectively conducting business. For that reason, however, email continues to be a popular vector for business sabotage. Email is frequently used to propagate malware – including ransomware and zero-day threats - across your network.

    This webinar examines how SonicWall Email Security – now integrated with Capture Advanced Threat Protection – delivers cloud-based, multi-engine sandbox protection for your email.
    Learn how this comprehensive, flexible and scalable solution can:

    •Scan a broad range of email attachment types to detect advanced threats
    •Analyze them in a multi-engine sandbox
    •Block them prior to a security verdict
    •Rapidly deploy remediation signatures
  • Lightboard Series: Networking and Security for Virtual Desktops & Mobile Devices Lightboard Series: Networking and Security for Virtual Desktops & Mobile Devices Hadar Freehling, Staff Security Strategist, Networking & Security, VMware Recorded: Feb 23 2017 11 mins
    Series Title: Illustrating the Value of Network Virtualization
    Series Abstract: Join VMware NSX experts for a series of short webcasts focused on the technology and business drivers around network virtualization. Using a lightboard, we’ll illustrate how network virtualization with NSX can support an organization’s strategic initiatives.

    Webcast 3/3
    Title: Networking and Security for Virtual Desktops and Mobile Devices
    Abstract: Learn how to deploy intelligent networking and micro-segmentation for VDI and extend these capabilities to secure mobile apps and devices. We’ll demonstrate how VMware NSX can help you manage virtual desktop user access, and how to limit users from jumping off one server to another. You’ll also learn how to apply a few easily managed rules in your data center that can reduce your attack surface with policies that dynamically follow virtual desktops. In the second part of the session, we’ll explore how the integration of AirWatch and NSX allows you to extend security from your mobile devices and applications to their data center resources.

    In this session, we will discuss:
    •Using intelligent networking and micro-segmentation to make VDI environments more secure
    •Minimizing your attack surface with rules and policies for dynamic virtual desktops
    Extending security from mobile devices and applications to the data center
  • How to Integrate Cloud Security into SD-WAN How to Integrate Cloud Security into SD-WAN Varun Santosh, Manager, Technical Marketing at VeloCloud Networks Recorded: Feb 23 2017 27 mins
    In recent times speed has become the currency of business, and security threats have multiplied and soared in sophistication—often rendering traditional security deployments insufficient or ineffective. Cloud-delivered security provides a great opportunity for enterprises to strengthen security posture, to quickly deploy the latest defense mechanisms, while at the same time reducing latency and costs.

    Join this webinar to learn how to transition to cloud security in a complex distributed enterprise environment, address the challenges and preserve application performance.

    Topics covered include:
    - Challenges faced when introducing cloud security into a legacy network
    - Key considerations to ensure a successful migration
    - A guide to how an SD-WAN solution simplifies the transition from on-premise security to cloud security
  • Cross Talk: How Network & Security Tools Can Communicate For Better Security Cross Talk: How Network & Security Tools Can Communicate For Better Security Craig Sanderson, Sr. Dir. Prod Mktg, Infoblox; Dan York, Internet Society; Raghu Gadam, Security Analyst (ISC)2; B. Dunlap Recorded: Feb 23 2017 59 mins
    Working in silos, while never a good idea, is a reality in many organizations today. Security and network operations teams have different priorities, processes and systems. Security teams use various controls and tools to mitigate different kinds of threats which provides them with thousands of alerts on a daily basis. They often find it difficult to prioritize the threats to address first. What they may not know is that there is a whole piece of the puzzle they could be missing - core network services like DNS, DHCP and IPAM. These can provide a wealth of information and context on threats, which can help prioritize response based on actual risk and ease compliance. Join Infoblox and (ISC)2 on February 23, 2017 at 1:00PM Eastern for a roundtable discussion on how to use ecosystem integrations between network and security tools for better security and compliance.
  • Block The Risk Of Ransomware Block The Risk Of Ransomware Jonathan Korba, System Engineer, Symantec Recorded: Feb 23 2017 31 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 2 of 5: Block The Risk Of Ransomware

    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Join us to learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    • What are your options if you’re a victim of ransomware
    • Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    • How Symantec technologies work together for maximum protection

    And if that wasn't enough, watch Symantec's Endpoint Protection in action. We will share a demo with you that showcases the power of it's advanced technologies.

    Register Today

    Watch On-Demand: SEP 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126
  • IoT Risk Becomes Real IoT Risk Becomes Real Chris Rodriguez, Senior Industry Analyst Network Security + Tom Bienkowski, Directror Product Mkt, Arbor Networks Recorded: Feb 23 2017 64 mins
    Vulnerable IoT devices are plentiful and ripe for abuse by threat actors.
    But what exactly is the value of these devices to DDoS attackers?
  • HPE ITSM Automation and Containers – Accelerating Deployment and Time to Value HPE ITSM Automation and Containers – Accelerating Deployment and Time to Value Michael Pott, Scott Knox, Greg W. Morrison, HPE Recorded: Feb 23 2017 53 mins
    More IT and computing is moving to public networks such as Amazon Web Services (AWS) and Microsoft Azure. Increasingly, internal/private IT is being restructured to provide similar services. Along with this are changes in the ways applications are being built, deployed, and maintained reflected by the rapid adoption of containers and microservices. What does this mean to IT Service Management and the service desk organization?

    Join this webinar to learn w HPE Software and our ITSM Automation (ITSMA) solutions are doing to both take advantage of these trends and also help support these trends. We’ll discuss the benefits to the service desk team of faster deployments, quicker time to value, and reduced administration and maintenance. Please join us to learn more about what HPE ITSMA provides today and what’s coming soon.
  • The Forgotten Link: Identifying the Weak Point in Your Network The Forgotten Link: Identifying the Weak Point in Your Network Jim Frey, Director of Marketing Recorded: Feb 23 2017 50 mins
    There is a transition happening in our industry right before our eyes. Essentially, 1Gbps drops to the wall outlets are being replaced by 10Gbps drops to the ceiling. This is because, as 802.11ac technology advances and A/V applications like HDBaseT come onto the scene, enterprises are requiring more and more Category 6A connections to handle bandwidth demand to devices. But what happens beyond the devices? Your network, like a chain, it is only as strong as its weakest link.

    This webinar will:
    - Show you how this transition from 1Gbps to 10Gbps is creating a problem you may not know you have.
    - Explain the “Forgotten Link” and how this 10X transition is already starting to overwhelm it.
    - Introduce an engineered solution from Berk-Tek that will solve this emerging problem.
  • Lightboard Series: NSX for Multi-site Deployments and Disaster Recovery Lightboard Series: NSX for Multi-site Deployments and Disaster Recovery John Whitman, Senior NSX Systems Engineer, VMware Recorded: Feb 23 2017 16 mins
    Series Title: Illustrating the Value of Network Virtualization
    Series Abstract: Join VMware NSX experts for a series of short webcasts focused on the technology and business drivers around network virtualization. Using a lightboard, we’ll illustrate how network virtualization with NSX can support an organization’s strategic initiatives.

    Webcast 2/3
    Title: NSX for Multi-site Deployments and Disaster Recovery
    Abstract: Deploying NSX across multiple datacenters allows organizations to dynamically move and manage workloads between multiple physical locations. The benefits of this capability are immediately clear: workload mobility, resource pooling, central management, consistent security policies across vCenter domains/sites, and disaster recovery. In this session, we’ll illustrate use cases and capabilities, including L2 connectivity without the use of OTV, cross-data center security policies, and isolating networks for disaster recovery testing and validation. In the second part of the session, we’ll dive into how NSX can improve your business disaster recovery plan and strengthen your overall RTO.

    In this session, we will discuss:
    •The many benefits of deploying NSX across multiple data centers
    •Capabilities and use cases for cross-data center connectivity and security
    •Using NSX to improve your disaster recovery plans and strengthen RTO
  • How to Use Big Data to Improve Card Usage and Customer Engagement How to Use Big Data to Improve Card Usage and Customer Engagement Printec and INETCO Recorded: Feb 23 2017 62 mins
    Digital and self-service payment channels have changed the way banks and customers interact. Less direct interaction means more reliance on “Big Data” for insights that will help you identify ways to better serve your customers, run more effective card programs and capture more wallet share.

    Printec and INETCO invite you to attend a 30-45 minute live webinar, where we will showcase new technologies that will help your financial organization derive better value from customer transaction data. Learn how you can establish real-time insights into:

    - Card usage patterns
    - Profitability and cash flow
    - Application, network or third party service performance

    Can’t make the date? That’s ok. Contact Printec or INETCO if you are still interested in arranging a private discussion on how detailed transactional data can help you to predict next best product, identify customer performance problems, customize the consumer experience, competitively price card services and loans, execute targeted marketing strategies, and much more.
  • The Fundamentals of Testing Ethernet Technology. Part #2 The Fundamentals of Testing Ethernet Technology. Part #2 Diong Ming Cheng, Application Engineer, EXFO Recorded: Feb 23 2017 58 mins
    The surge in web-based, bandwidth-intensive applications has created new opportunities to deliver increasingly advanced services at higher speeds, alongside cutting-edge technologies. With its unmatched scalability and cost-effectiveness, Ethernet/IP has become the underlying technology of data communications and should be well understood by all players in the telecommunications industry.

    This 2-part webinar series addresses the fundamentals of testing Ethernet technology, as well as the tools and standards required in effectively turning up and troubleshooting next-generation Ethernet services.
    In this 2-part webinar series, we will delve deeper into the following topics:

    Webinar #2: February 23, 2017

    Birth certificates: A summary and troubleshooting basics
    +Ideal Birth Certificate testing
    +Troubleshooting
    -What is unique about 100G testing?
    -VLAN scan
    -Through Mode
    -The impact on quality of service (QoS) experience

    Get the insights you need to achieve faster Ethernet service turn-up with first-time-right results!
  • Four Ways to Simplify Database Management Four Ways to Simplify Database Management Mike Kelly, CTO SelectStar Recorded: Feb 22 2017 27 mins
    If there’s anything as important as making sure an app is running, it’s making sure the data underneath it is available as well. But the rapid changes in database technology and the quick adoption of cloud infrastructure have made that task extremely challenging for most database administrators and DevOps teams.

    In just 30 minutes, you'll learn:

    - How to monitor all database types (including SQL, NoSQL, cloud) in a single tool

    - How to get up to speed quickly on new database technologies without adding experts to your team

    - The fastest way to get an assessment of your organization’s overall database health

    - Simple tools that will drastically reduce the time you spend on database and infrastructure administration
  • Tech Talk: Application Prioritization & Compliance With Business Intent Overlays Tech Talk: Application Prioritization & Compliance With Business Intent Overlays Derek Granath and Adam Fuoss Recorded: Feb 22 2017 34 mins
    Implementing business intent overlays streamlines the process of delivering applications with the priority and QoS that business demands. Business intent overlays extend micro-segmentation from the data center across the WAN to help organizations maintain compliance requirements. Learn how to make this manageable with a Silver Peak’s SD-WAN.
  • Evolution Towards Autonomy: The Journey to Self-Operating Networks™ Evolution Towards Autonomy: The Journey to Self-Operating Networks™ Douglas Gourlay Recorded: Feb 22 2017 60 mins
    Over the past decade we have seen divergence in the architectures deployed in the hyper-scale world from those in the enterprise. We have also seen markedly different application architectures that enable more flexibility in network design. My goal in this session is to have a highly interactive discussion exploring the emerging skills gap in the networking community while also talking about methods to close that gap and enable a data center architecture that provides for scale, mobility, security, and simplicity of operations.
  • Parallel Data Mover for Lustre* organized by Intel and GRAU DATA AG Parallel Data Mover for Lustre* organized by Intel and GRAU DATA AG Adam Roe, Intel Solutions Architect for the Enterprise and HPC, Kai Hambrecht, Head of Service and Support GRAU DATA Recorded: Feb 22 2017 57 mins
    PDM for Lustre is a hardware-independent software solution which enables parallel data transfer by using the HSM API of Lustre. The purpose of the PDM for Lustre is to maximize the copy performance between Lustre and backend technologies like object stores etc. Furthermore the intention is to support HSM setups where data needs to be moved between a high performance user file system and an archive file system. PDM for Lustre can also be used to synchronize or to migrate file systems in a very generic way. In the webinar, we will show the overall functionality and the advantages of the PDM for Lustre customers.

    Highlights:

    --Hardware independent
    --Unlimited throughput
    --Parallel processing
    --Failure handling without any disruption of operation
    --Simple administration
    --Integration with Lustre Release ≥ 2.6

    GRAU DATA AG is a medium-sized software company with its headquarters in Germany. Since 2007, GRAU DATA is focused on the development of software products. The product family of GRAU DATA allows business-critical data to be archived flexibly and with high scalability. GRAU DATA is indirectly or directly represented by partner companies worldwide. Numerous top companies and public institutions use solutions from GRAU DATA.
  • Quantifying DevOps Outcomes - Digital transformation and the competitive edge Quantifying DevOps Outcomes - Digital transformation and the competitive edge George Miranda, Technical Strategy Recorded: Feb 22 2017 31 mins
    This webinar is part one of a four part series that examines how digital transformation enables you to outperform competitors.

    Digital transformation occurs when a company adopts technologies and practices that change it from one that ships its software slowly and painfully to one that ships software quickly while, at the same time, improving its quality and mitigating risk. Businesses that embrace digital transformation outperform their competitors: they capitalize on disruption rather than allowing themselves to be disrupted. They deliver their software faster, with higher efficiency and lower risk. These advances can be quantified to prove their effectiveness.

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey. The first part of our series, focuses on the overall challenges businesses face in the marketplace and how to gauge where you stand. Subsequent webinars will focus on specific measures that move transformation forward.

    Join us to:
    - Learn how industry trends shape your internal challenges
    - Explore how companies have resolved tensions between central IT organizations and development teams
    - Learn how to use industry metrics to determine where you should be focusing your efforts
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you

    Who should attend:
    - Director/VP of technology teams
    - Technology executives
    - Management seeking strategic alignment with business objectives
  • Protect Your Gaming Infrastructure from Hackers and Competitors Protect Your Gaming Infrastructure from Hackers and Competitors Shawn Andrich, Host & Founder, Gamers with Jobs Podcast and Nicole Banks, Sr. Community Manager, Imperva Incapsula Recorded: Feb 22 2017 36 mins
    Online gaming is uniquely vulnerable to costly DDoS attacks: how can you protect these platforms from cyber attacks and resulting outages? This webinar will discuss what makes the online gaming industry such a prime target for DDoS and will propose a new solution to address this growing problem.

    Benefits of attending the webinar include:


    - Learning the latest DDoS threats and what it means for your business
    - Why online gaming servers are vulnerable
    - Strategies to combat DDoS attack
  • Real World IoT – Practical Advice from the Front Lines of IoT Implementation Real World IoT – Practical Advice from the Front Lines of IoT Implementation Christian Renaud Recorded: Feb 22 2017 32 mins
    Christian Renaud, Research Director, Internet of Things, discusses the vertical and horizontal approaches to the Internet of Things, the state of IoT deployments, 2016 IoT M&A, and a preview of what to expect at the upcoming Real World IoT event, 5-6 April at the Landmark London.
  • DevOps and the Mainframe: Your Partners in Velocity, Quality, and Value DevOps and the Mainframe: Your Partners in Velocity, Quality, and Value Rob Stroud, Principal Analyst at Forrester, and Dana Boudreau, Senior Director of Product Management at CA Technologies Recorded: Feb 22 2017 58 mins
    In the application economy where traditional business is being disrupted, velocity, agility, quality and customer experience is critical for enterprises to drive differentiation to remain competitive. While many believe that DevOps is only for startups and unicorns, forward-thinking organizations are focusing on unlocking the potential of their mainframe investments to drive their Business Technology culture, leveraging DevOps practices including agile development, automated CI/CD pipelines, testing and release automation, to deliver differentiated products and services.

    Join guest speaker Rob Stroud, Principal Analyst at Forrester, and Dana Boudreau, Senior Director of Product Management at CA Technologies, for an in-depth discussion on how bringing DevOps to the mainframe can challenge traditional development methodologies, delivering code faster with greater quality in responding to escalating market demands.
  • IIoT Endpoint Security – The Model in Practice IIoT Endpoint Security – The Model in Practice Marcellus Buchheit, Co-founder, Wibu-Systems AG; Terrence Barr. Head of Solutions Engineering, Electric Imp Inc. Recorded: Feb 22 2017 61 mins
    What is your first line of defense against cyberattacks? Secure endpoints! Endpoints are everywhere in the IIoT landscape. Without proper security, Industrial Internet of Things (IIoT) systems are not trustworthy, putting organizations, their missions and the greater public at increased risk. The viability of the IIoT depends on proper implementation of security to counter the growing and ever changing threats that are emerging.

    On February 22, 2017, editors of the IISF and security experts from the Industrial Internet Consortium will discuss the endpoint protection/security model and policy in its Industrial Internet Security Framework (IISF) document and present a real-world customer use case for an approach taken to secure an industrial system.
  • Data Plane Development Kit (DPDK) 16.11 & 17.02 New Features Data Plane Development Kit (DPDK) 16.11 & 17.02 New Features Tim O’Driscoll, Product Marketing Manager for DPDK, Intel Recorded: Feb 22 2017 46 mins
    This webinar will describe the new features introduced in the two most recent DPDK releases: 16.11 which was released in November 2016, and 17.02 which is due for release in February 2017.
  • Chasing Shadows: Part 3 - How to Accelerate Service Delivery in the Age of Cloud Chasing Shadows: Part 3 - How to Accelerate Service Delivery in the Age of Cloud Jesse Barker, Red Hat Practice Lead, IIS Technology Recorded: Feb 22 2017 27 mins
    In Session I, we introduced CloudForms as an enterprise-grade cloud management platform that can give you more control over you infrastructure. In Session III, we’ll go deeper; we’ll leverage CloudForms to demonstrate the deployment of applications in VMware and RHEV, working with Red Hat Satellite to manage our content repos and system configuration standards.

    CloudForms – Gone are the days when multiple management tools juggled a complex, hybrid environment. Red Hat CloudForms unifies management and operations, and maintains a consistent user interface and functionality even as you evolve from traditional virtualization to Infrastructure-as-a-Service (IaaS). CloudForms accelerates service deliver, reduces operational costs, improves operational visibility and control, and ensures compliance and governance – no other management tools, no redundant policy implementations, and no extra staff required.
  • A View of the World's Largest & Fastest Growing Data Center Spot A View of the World's Largest & Fastest Growing Data Center Spot Kelly Morgan 451 Research and Mark Kidd Iron Mountain Feb 28 2017 6:00 pm UTC 60 mins
    A View of the World's Largest & Fastest Growing Data Center Spot and why you should be there

    The Northern Virginia market, which includes multiple locations in/around Washington DC, continues to be one of the largest and fastest growing datacenter hot spots in the world and top market for cloud providers. While much has been said about the area, please join us to discuss the latest in: what makes the market special, why so many firms want datacenter space there, how the market is evolving, and which locations to consider when thinking about a deployment in the area.

    Please join us for a webinar with Kelly Morgan, Vice President at 451 Research and Mark Kidd, Senior Vice President and General Manager for Iron Mountain Data Centers, for a discussion on the Northern Virginia market and Iron Mountain’s approach to the market.
  • Doing More With Symantec Control Compliance Suite Doing More With Symantec Control Compliance Suite Anand Visvanathan, Principal Product Manager, Symantec Feb 28 2017 6:00 pm UTC 60 mins
    In the past year, Symantec Control Compliance Suite (CCS) has added several new features that provide additional flexibility and platform coverage including:

    • IT Compliance and security assessments for custom applications and services

    • Security assessments across devices, servers and endpoints

    • Security baselines for newer technologies like Docker

    Please join us for this special webcast to learn how:

    The new features will simplify and enhance your ability to assess the compliance of your data center and get an update on the product roadmap

    Register today
  • Learn How SaaS-Managed Kubernetes Takes Containers to the Next Level Learn How SaaS-Managed Kubernetes Takes Containers to the Next Level Bich Le, Co-founder and Chief Architect, Platform9 Feb 28 2017 6:00 pm UTC 45 mins
    Container technology is hot and evolving every day by leaps and bounds. Just why are containers so attractive and how are they different from VMs? To add to the confusion, complex container environments need orchestration solutions, such as Kubernetes, to be managed effectively. There are a few different ways to deploy these solutions, each with their own drawbacks and benefits. In this BrightTALK session, we'll take a look at containers, container orchestration, and walk through a real-world application that shows why containers are leading the way.
  • Threat Intelligence Gateway: An Unconventional Weapon for An Unconventional War Threat Intelligence Gateway: An Unconventional Weapon for An Unconventional War Kinshuk Pahare, Director of Pruduct Development, LookingGlass Feb 28 2017 6:00 pm UTC 45 mins
    The cyber threat landscape is constantly evolving and conventional security products (Firewalls, IPS/IDS and web proxies) are unable to address emerging threats in a fast and efficient manner. LookingGlass’ newest threat mitigation appliance, the ScoutShield Threat Intelligence Gateway, provides a zero-touch solution to automate the threat response.

    Join our Director of Product Management, Kinshuk Pahare as he discusses the:
    1. Challenges with conventional security appliances and the need for a Threat Intelligence Gateway.
    2. Importance of having high quality threat intelligence.
    3. Must-have characteristics of a Threat Intelligence Gateway appliance.
  • The Nuix Black Report: Find Out What Hackers are Really Thinking The Nuix Black Report: Find Out What Hackers are Really Thinking Christopher Pogue, Chief Information Security Officer, Nuix Mar 1 2017 5:00 am UTC 60 mins
    The Nuix Black Report takes a unique perspective on cybersecurity. Most security industry reports compile data about incidents that have already taken place or trends in data breaches—but these are clearly the symptoms of a deeper problem. Instead, Nuix has focused on the source of the threat landscape: the attackers themselves.

    Join this webinar with report author and Nuix Chief Information Security Officer Chris Pogue to discover the true nexus between attacker methodology and defensive posture:

    • Which countermeasures will actually improve your security posture (they’re not the ones you think)?
    • What is the best spend for your security dollar and why?
    • If hackers could speak to your CEO or board of directors, what would they say?

    Join Nuix and (ISC)² on Mar 1 (Wed) at 13:00 (Singapore time) and find out what hackers are really thinking.
  • Network Security From the Cloud: the New Frontier  Network Security From the Cloud: the New Frontier  Mike Rothman, Analyst and President at Securosis and Ken Ammon, Chief Strategy & Technology Officer at OPĀQ Networks Mar 1 2017 4:00 pm UTC 60 mins
    By 2020, 68 percent of the cloud workloads will be in public cloud.The combination of cloud computing, mobility, and IoT is disrupting traditional bolt-on network security methods and requires a new approach to ensure corporate data and systems are protected, wherever they happen to be.

    The reality is that you can't possibly scale the management of infinite perimeters without breaking down longstanding barriers between network and security management. More and more organizations are no longer thinking in terms of a single, monolithic network. Instead, they are implementing application, site and user-specific networks, leveraging policies specifically designed to meet the needs of its constituent. Controls and policies are being defined within the network, using software defined networking technologies to route traffic efficiently and layer security services where necessary.

    Join Mike and Ken to see what steps organizations are taking to eliminate the complexity of today's traditional network security approach, more easily adapt to business changes, and tighten the reins on security control. 
  • Next Generation: VPN vs. Virtual Cloud Network (VCN) Next Generation: VPN vs. Virtual Cloud Network (VCN) Bryan Embrey, Product Marketing Manager, Cradlepoint Mar 1 2017 5:00 pm UTC 60 mins
    There’s no way around it: Setting up and maintaining traditional VPNs for remote access requires extensive time, energy and resources. Configuring, managing, and troubleshooting devices and applications located at the data center in headquarters and in each end device is one of the most complex and laborious aspects of network administration — especially with increased workforce mobility and IoT.

    With a next-generation Virtual Cloud Network (VCN), configuration, management, and security policies are streamlined and handled in the cloud.  This enables rapid deployment, reduces operational expenses and completely integrates with your existing infrastructure.

    At 9am PT / 12pm ET on March 1 2017, join Cradlepoint’s Bryan Embrey to explore how resilient, redundant, secure, and scalable VCNs leverage software-defined networking (SDN) and network function virtualization technologies to reduce complexity, hardware, and IT man-hours.
  • Testing at the Edges Testing at the Edges Franklin Webber, Training and Technical Content Lead Mar 1 2017 6:00 pm UTC 60 mins
    As you become a more sophisticated Chef, the complexity of the recipes you write increases. You find yourself querying data from the Chef server or requesting the state of an operating system component. You’re using complex logic that is abstracted behind helper methods. However, these advanced recipes require equally advanced tests.

    In this webinar, Franklin Webber, Training and Technical Content Lead at Chef, will show you some approaches to testing complex recipes. He’ll explain mocking and stubbing and then apply those techniques to verify recipes that use search, resource guards, and helper methods.

    Join us to learn:
    - How to test recipes that are powered by search and data bags
    - How to test resource guards
    - How to test helper methods

    Who should attend:
    Chef users with experience using ChefSpec, InSpec, and Test Kitchen
  • Continuous Delivery = Agile + DevOps: Learn more with Guest Forrester Continuous Delivery = Agile + DevOps: Learn more with Guest Forrester Forrester VP and Principal Analyst, Diego Lo Giudice and Dan Rice, Agile Advisor, CA Technologies Mar 2 2017 4:00 pm UTC 60 mins
    The Global Agile Software Application Development Online Survey from Forrester Research, Inc. shows that a third of firms have been practicing agile for more than five years, and 54% have successfully scaled their Agile practices to more than half their teams.*

    People who practice agile methods often talk about "pulling quality forward." This and other agile tenets (delivering early and often, reducing batch size, inspecting and adapting, creating a collaborative culture and focusing on customer value) are designed to help organizations get valuable, high-quality features out the door, fast. But they can't happen just in engineering: agile succeeds as a mindset that's systemic throughout your organization.

    Join CA Technologies and guest speaker Diego Lo Giudice, Forrester VP and Principal Analyst in Application Development + Delivery to find out how YOU can help make your business an agile business by implementing agile both upstream (through your business portfolio) AND downstream (through testing and operations).

    If you're ready for a strategic, collaborative approach to delivering value to customers, then you won’t want to miss this webinar.


    *Forrester Research, Inc. “The 2015 State Of Agile Development: Learn From Agile Expert Firms,” August 2015
  • Unlock Public Cloud Benefits While Maintaining Security Unlock Public Cloud Benefits While Maintaining Security Sudha lyer, Principal Product Marketing, Symantec and Dan Frey, Senior Manager Product Marketing, Symantec Mar 2 2017 6:00 pm UTC 60 mins
    The public cloud offers agility and cost savings for organizations seeking that competitive edge, but will your critical workloads and applications remain secure?

    The "shared responsibility" model of security means that businesses are still on the hook for securing everything running on the IaaS providers infrastructure.

    Learn how the new Symantec Cloud Workload Protection automates security for your AWS and Azure deployments, how to defend your workloads against exploits and advanced threats so you can enjoy public cloud benefits without worrrying about security.

    Join our webcast to learn how easy it can be to:

    * Automatically discover, view, and control all of your for public cloud IaaS instances
    * Intregrate security directly into your DevOps continuous delivery workflows
    * Deploy security that scales seamlessly with your dynamic public cloud workloads
    * Mitigate risk associated with public cloud adoption

    Register Today
  • How Not to Get Fired as a CISO How Not to Get Fired as a CISO Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy Mar 2 2017 6:00 pm UTC 60 mins
    Seasoned CISOs know that failure to plan past a two-year window is dangerous— to both their company and their job security. But it is all too common for many security strategies to only look two years out.

    That’s why Imperva’s own CISO is going to devote this next Cybersecurity Webinar to exploring the phenomenon of the Two-Year Trap, its impact, and how to avoid it.

    Join this webinar featuring Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy for a lively interactive session that will discuss:

    *What is the Two-Year Trap and how to avoid it
    *How to manage the long-term vs. short-term security view
    *What do about trendy security attacks

    Join us to learn how CISOs can extend their life expectancy with a long-term view.
  • Everything You Wanted To Know about Storage But Were Too Proud To Ask: iSCSI Pod Everything You Wanted To Know about Storage But Were Too Proud To Ask: iSCSI Pod J Metz, Cisco, Loy Evans, Cisco, Rob Davis, Mellanox, Alex McDonald, NetApp Mar 2 2017 6:00 pm UTC 75 mins
    One of the most used technologies in Data Centers today is the storage protocol iSCSI. With the increasing speeds for Ethernet, the technology is more and more appealing because of its relative low cost to implement. However, like any other Storage Technology, there is more here than meets the eye.

    In this webcast, we will be focusing entirely on iSCSI. We’ll start by covering the basic elements that will make your life easier if you are considering using iSCSI in your architecture. In particular we will be talking about:

    •iSCSI Definition
    •iSCSI offload
    •Host-based iSCSI
    •TCP offload

    Like nearly everything else in storage, there is more here than just a protocol. If you are interested in making the most of your iSCSI solution, this webcast is for you.
  • CTO PoV: Enterprise Networks CTO PoV: Enterprise Networks Khalid Raza, CTO & Co-Founder, Viptela Mar 2 2017 6:00 pm UTC 45 mins
    Rapidly changing enterprise application requirements, the cloud, and mobile computing are placing stress on traditional wide area networks (WANs). Enterprises are being challenged to rethink network architectures to meet present and future business requirements.

    Khalid Raza, CTO and Co-Founder at Viptela, will discuss why current WAN infrastructures are not designed to support new enterprise traffic patterns, and how emerging approaches can help organizations adapt to these changes.

    In this webinar, we will cover:

    - Key applications molding enterprise network requirements
    - Impact on current WAN architectures & shift in present and future business needs
    - How enterprise network teams and service providers can adapt the traditional WAN to support new traffic patterns
  • How to Extend SD-WAN to AWS How to Extend SD-WAN to AWS Parag Thakore, Director of Product Management Mar 2 2017 6:00 pm UTC 45 mins
    Enterprises are trending towards deploying inexpensive Internet broadband links to enable bandwidth-intensive applications, but public transport links are “best-effort”, insecure and susceptible to damaging attacks. A cloud-delivered SD-WAN delivers ubiquitous security and enterprise-grade application performance independent of the transport medium, enabling a cost-effective solution for organizations increasingly moving data center workloads to IaaS, such as Amazon Web Services (AWS).

    In this seminar, you learn ways to reduce operational complexity and optimize application performance to cloud data centers, including:

    - The challenges inherent in access to IaaS workloads such as AWS and Azure
    - Seamlessly including IaaS workloads in your SD-WAN architecture with only a few clicks
    - How to secure and optimize IaaS access in your SD-WAN
    - A live demonstration of cloud-delivered SD-WAN capabilities
  • Information Overload - Making Sense of Threat Intelligence Sources Information Overload - Making Sense of Threat Intelligence Sources John Carnes, Anthem; Mat Gangwer, CTO, Rook Security; Erik Von Geldern, FXCM; Brandon Dunlap (Moderator) Mar 2 2017 6:00 pm UTC 75 mins
    There's an overwhelming amount of information that comes from the connected world. Information sources are endless, but their credibility can be questionable. Cyber security teams can often relate with an overload of threat data from a variety of sources. Building an effective threat intelligence capability requires drilling down through all of information to find the data that is most relevant to you. So where do you start? To avoid information overload, an organization needs to be selective about the sources that they need to stay ahead of the threats and exploits that can compromise them. Join (ISC)2 and our sponsor Recorded Future for a From the Trenches webcast on March 2, 2017 at 1:00 PM ET for a discussion on threat intelligence sources, what's available out there, and how to separate the signal from the noise so you can spend less time on data collection and more time on analysis.
  • Operational Excellence: The Key to Safeguarding Your IT Infrastructure Operational Excellence: The Key to Safeguarding Your IT Infrastructure Dan Thompson Senior Research Analyst 451 Research and Kelly Sullivan, VP Global Data Center Operations at CenturyLink Mar 2 2017 7:00 pm UTC 60 mins
    Data center uptime is more critical than ever as more and more business processes are digitized. Having a sound foundation starts with having a solid and reliable data center in which to deploy your IT infrastructure. The data shows that how a data center is run and managed is the single biggest contributor to uptime.

    Join 451 Research Senior Analyst, Dan Thompson, and Kelly Sullivan, VP Global Data Center Operations at CenturyLink for a dialog on how operational excellence is put into practice and has become a core of the organizational culture at CenturyLink.

    Hear real-world experience and insight derived from managing a global fleet of 57 data centers and how the Uptime Institute Management and Operations Stamp of Approval program helped them raise their game through a regiment of continual improvement.
  • How to Migrate from Traditional WAN to SD-WAN How to Migrate from Traditional WAN to SD-WAN Ray Wong, Sr. Solutions Engineer for EMEA, VeloCloud Networks Mar 7 2017 9:00 am UTC 45 mins
    Once your enterprise makes the decision to implement SD-WAN, the question arises: how to migrate the network infrastructure with minimal disruption to business operations. Having the right feature set is important, yes, but it is just as critical to come up with the right strategy of connecting the SD-WAN to the existing network.

    Join this webinar to learn

    Challenges enterprises face during SD-WAN migration
    Key considerations for a successful SD-WAN deployment
    Step-by-step guide to transition from a traditional WAN to SD-WAN

    Ray Wong, Sr. Solutions Engineer for EMEA at VeloCloud, uses real-life customer use cases to discuss the optimal steps to a successful SD-WAN deployment in Europe, Africa, and the Middle East.
  • F5 Herculon Security Overview  F5 Herculon Security Overview  Renuka Nadkarni, Director of Product Management- Application Protection, Joe Peck, Director of Product Management- Access F5 Mar 7 2017 4:00 pm UTC 60 mins
    The new Herculon product family combines the strength of F5’s proven security offerings with dedicated, purpose-built hardware and a simplified, security-focused user experience, allowing security operations teams to quickly and easily deploy solutions that protect against evolving application and network vulnerabilities and attacks. The initial entries in the Herculon portfolio being introduced today are Herculon SSL Orchestrator and Herculon DDoS Hybrid Defender

    The F5 Herculon SSL Orchestrator improves insight into the blindspots and gaps created by the growing use of encryption for applications and their data. The F5 Herculon DDoS Hybrid Defender delivers a multilayered DDoS defense across network, session and application layers.

    In this session, we will discuss how to engage every customer to discuss how they currently address SSL visibility and DDoS challenges.
  • Why Application Performance Management Needs Better Database Monitoring Why Application Performance Management Needs Better Database Monitoring Mike Kelly, SelectStar CTO & Milan Hanson, Forrester Senior Analyst Mar 7 2017 6:00 pm UTC 60 mins
    There's a lot of emphasis going into tracking the customer's transaction performance through all of the factors that might slow it down. Today there is lots of emphasis on looking into the source code, looking at APIs, looking into the network, looking into the servers, VMs, and containers on-prem or in the cloud. But let's not forget an essential component that's not getting a lot of attention: databases. Customer obsession and performance management depend as much today as ever -- maybe more -- on databases. And they're not getting any simpler! Complex distributed databases like Hadoop, Cassandra, and NoSQL require monitoring and management that's very different and much more complex -- monitoring that integrates into the APM systems and analytics required to achieve customer obsession.

    In this webinar, join guest speaker, Forrester Senior Analyst Milan Hanson, who will discuss the importance of customer experience, customer obsession and the technological and cultural shift this creates. Following Milan, SelectStar General Manager Mike Kelly will highlight key trends driving database monitoring and management, including how it relates to application performance.
  • Analyze Costs of GCP and Hybrid Cloud Using CloudPhysics Analyze Costs of GCP and Hybrid Cloud Using CloudPhysics Chris Grossmeier, Director of Product Management Mar 7 2017 6:00 pm UTC 45 mins
    Clear the fog around Google Cloud Platform (GCP) hybrid cloud costing. See how to save costs in a hybrid cloud or GCP cloud migration as CloudPhysics rightsizes, and then calculates costs for your running infrastructure. Segment workloads based on real performance and configurations—then map into Google options for greatest savings. Evaluate hosting scenarios: on-premises vs. hybrid cloud vs. dedicated cloud hosting. We’ll address asset utilization, rightsizing, and licensing for migration. Be the company hero with rich operational and cloud costing analysis.
  • Is it Time to Replace Your MPLS? How a global SD-WAN fits (and trims) the bill Is it Time to Replace Your MPLS? How a global SD-WAN fits (and trims) the bill Jim Davis, Senior Analyst of Service Providers at 451 Research; Dave Nuti, VP of Business Development at Aryaka Mar 7 2017 6:00 pm UTC 60 mins
    The biggest challenge facing global enterprises today is the ability to deliver fast and reliable performance of mission-critical applications to worldwide users, especially when they work in cloud and SaaS environments. The move to cloud has exposed some of the limitations to MPLS networking services. Is it time to replace (or augment) MPLS with SD-WAN?

    Join Jim Davis, Senior Analyst of 451 Research, and Dave Nuti, Vice President of Business Development at Aryaka, as they present their latest findings on the best practices for delivering fast and reliable application performance using a global SD-WAN. Attend this special webinar to learn:

    •The current challenges with data and application delivery faced by global enterprises, including striking a balance between performance, cost, and deployment flexibility.
    •Why legacy networks, such as MPLS and the public Internet, do not work for application delivery in today’s global environment
    •The best practices to improve global application performance using an SD-WAN as a service
  • How to scout the dark web and why How to scout the dark web and why Aurélie Perez, Senior Security Consultant at Orange Cyberdefense Mar 8 2017 1:00 pm UTC 60 mins
    Are cybercriminals using the dark web to buy and sell your customer and employee data, intellectual property and malware? Highly specialist expertise, big data tools and Artificial Intelligence are essential to detect and mitigate the threats to your enterprise.

    Learn about the techniques used to:
    • Conduct undercover surveillance on the dark web to discover mentions of your industry, brand, and data
    • Find data from a security breach at your enterprise
    • Stop stolen user account credentials from being used to breach trusted systems
    • Track emerging exploit kits and vulnerabilities

    Mainstream search engines are unable to penetrate and index these hidden parts of the Internet. Access to sites is often restricted to cybercriminals who are recommended by a current member. Meanwhile, the cost of cybercrime is forecast to hit $6 trillion annually by 2021 according to Cybersecurity Ventures. It’s an issue that can’t be ignored.
  • Meet the key to your IT future – Pulse Access Suite Meet the key to your IT future – Pulse Access Suite John Oh & Scott Erickson Mar 8 2017 4:00 pm UTC 45 mins
    For many years, organizations only cared about remote access – connecting remote users through VPNs to data centers. In today’s very different world, policy-based secure access is essential, including cloud applications, mobility, and even IoT devices. Join us to learn how the new Pulse Access Suite readies you for whatever access challenge is next with easy to deploy, use and scale Secure Access.
  • Is Hybrid IT the new grail? Is Hybrid IT the new grail? Adam Levine, Chief Commercial Officer, Data4; Stephen Worn, DatacenterDynamics Mar 8 2017 5:00 pm UTC 60 mins
    How do you make the right decisions as to how and where to host and manage your IT assets? Cloud added not just a whole new set of choices to the decision, it has changed the way that IT is consumed and paid for, and how IT delivery can be aligned with business needs.

    To make hybrid IT work effectively requires a level of computing capacity, connectivity, efficiency and resilience that most enterprise data centers simply cannot reach without prohibitive investment.

    Join us on 8 March and let DATA4, explain how they have used these increasingly common IT pain points to shape their philosophy and their offering.
  • Quantifying DevOps Outcomes - Managing Risk Quantifying DevOps Outcomes - Managing Risk George Miranda, Technical Strategy Mar 8 2017 6:00 pm UTC 30 mins
    This webinar is part two of a four part series that focuses on the steps you should take to bring about digital transformation in your organization. In this webinar, we talk about ways to manage risk.

    Traditionally, determining whether an application and its supporting infrastructure meet an organization’s information security standards is tacked on as an afterthought, at the end of the development and testing cycle. In contrast, high-performing organizations that have undergone digital transformation treat these requirements as fundamental to a successful software deployment and shift security and compliance testing far to the left. Industry metrics demonstrate that embedding compliance requirements into the deployment pipeline improves your ability to ship your software faster.

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey.

    Join us to:
    - Explore the role of automated compliance solutions
    - Learn which industry metrics demonstrate your successful efforts to mitigate risk
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you

    Who should attend:
    - Director/VP of technology teams (Engineering/IT/DevOps/etc)
    - Technology executives (CIO/CTO)
    - Management seeking strategic alignment w/ business objectives