Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Lessons Learned using Ceph for Cloud Infrastructure
    Lessons Learned using Ceph for Cloud Infrastructure Daniel Messer, Storage Business & Philip Williams, Principal Architect, Rackspace Recorded: Jun 22 2017 67 mins
    No matter what level of modernization you are evaluating, any effort should start with a solid foundation. A standardized environment based on enterprise-ready, open-source operating system—Red Hat® Enterprise Linux®—and a hardware platform based on Intel ® is key to the modern data center.

    Learn how organizations like yours approached server consolidation projects and migrations from proprietary systems to Linux® to improve efficiency, and create a consistent foundation across current and cloud-future IT environments.
  • 10-Minutes to Cloud: How to Quickly Shift Big Data Processing
    10-Minutes to Cloud: How to Quickly Shift Big Data Processing Storage Switzerland, Avere Systems Recorded: Jun 22 2017 61 mins
    Enterprises aren't the only organizations that can benefit from big data. Medium and large businesses can too. The challenge is, can these businesses build the same big data infrastructure enterprises do? The short answer is, they can't. But the secret is, they don’t have to.

    In this webinar, join Storage Switzerland and Avere Systems as they show you how to shift large workload compute processing into the cloud in just 10 minutes. This quick onramp to unlimited cores can level the playing field and improve your ability to compete with the global giants.
  • Mega Breaches: How To Mitigate Your Risks Using Data-Centric Security
    Mega Breaches: How To Mitigate Your Risks Using Data-Centric Security Heidi Shey - Senior Analyst at Forrester and Nico Popp - SVP Engineering, Information Protection at Symantec Recorded: Jun 22 2017 57 mins
    Keeping data safe pays dividends for protecting your reputation and retaining trust. No-one wants to suffer a breach, let alone a mega breach, but how should you invest time and resources to prevent this?

    In this webinar, guest speaker Heidi Shey (Senior Analyst at Forrester) will join Nico Popp (SVP Engineering, Information Protection at Symantec) as they guide you through the evolving world of data protection and explain how a holistic approach to data security and identity puts you back in control.

    Such a data centric approach combines data discovery, protection and identity and delivers two key benefits:

    •Ensures data is only available to the right users, irrespective of location (including cloud), organization or device

    •Provides protection throughout the data lifecycle

    The webcast will include a review of best practices to help you understand how a proactive, data-centric approach makes best use of your resources, and safeguards your – and your customers’ – critical data.
  • Automating Your Corporate Mobility Management
    Automating Your Corporate Mobility Management Michele Pelino, Principal Analyst at Forrester & Pallavi Vanacharla, Head of Prod. Mktg Mobility at Cisco Jasper Recorded: Jun 22 2017 55 mins
    The increasing mobile workforce is impacting corporate mobility management needs and costs.

    Speaker Michele Pelino, Principal Analyst at Forrester, will share Forrester’s research on how enterprises are addressing this challenge.

    Joining her will be Pallavi Vanacharla, product marketing at Cisco Jasper, will share how their new platform – Control Center for Mobile Enterprise - puts the control back in the hands of enterprise.

    What you’ll learn:
    *Real examples of mobility challenges faced by enterprise IT teams
    *Forrester data on the top mobility management tools and services in use today
    *How Cisco Jasper automates mobility management

    Presented by
    Michele Pelino, Principal Analyst at Forrester & Pallavi Vanacharla, Head of Prod. Mktg Mobility at Cisco Jasper
  • LTE, SD-WAN & Network Trends
    LTE, SD-WAN & Network Trends Ian Pennell, Chief Marketing Officer, Cradlepoint Recorded: Jun 22 2017 32 mins
    Today, businesses and organizations of all sizes — and from all industries — are challenged to extend their networks to more people, places, and things than ever. It’s also clear that legacy WANs — predominately based on wired, hardware-defined, and resource-intensive infrastructures — can’t keep pace with the rapidly changing needs of today’s lean and agile connected enterprise.

    Join Cradlepoint’s Ian Pennell on June 22 for a live webinar about trends in enterprise WAN architectures. Learn what Cradlepoint’s recent State of the Network 2017 report revealed about LTE adoption, software-defined WAN, and more.
  • Clearing the Fog Around IoT Analytics
    Clearing the Fog Around IoT Analytics Jason Stamper, Data Platforms and Analytics Analyst, 451 Research Recorded: Jun 22 2017 38 mins
    In this webinar, Jason Stamper, analyst for Data Platforms and Analytics at 451 Research, will look at some of the latest trends that are being seen in IoT and specifically analytics at the edge of the network — in other words close to where the data is generated.

    He will also identify a number of data platform and analytics themes that are becoming more critical in the IoT era: security and data governance; infrastructure including edge analytics and server less computing; data processing; data integration and messaging.
  • 6 Hidden Security Risks for Industrial Environments
    6 Hidden Security Risks for Industrial Environments Rob Caldwell, ICS Manager, FireEye Recorded: Jun 22 2017 35 mins
    Industrial enterprises – like electric utilities, petroleum companies, and manufacturing organisations – invest heavily in industrial control systems (ICS) to operate industrial processes efficiently, reliably, and safely. Without technology operating the plant floor, business halts or worse.

    Join our webcast to discuss six key plant floor weaknesses that adversaries exploit to undermine plant operations. Subversive and difficult to detect, explore the implications and a step-by-step checklist for mitigating these risks firsthand with our experts.
  • Digitalisierung voranbringen - Webinar 2: Data Center Automation
    Digitalisierung voranbringen - Webinar 2: Data Center Automation Markus Knöfel, Presales Consultant, HPE Software Recorded: Jun 22 2017 39 mins
    Laut einer aktuellen Umfrage von Gartner haben 42% der CEOs mit der digitalen Transformation ihres Unternehmens begonnen *. Nach dem Thema Wachstum folgen IT-Themen auf Platz 2 der meist genannten Prioritäten. Damit ist klar, welchen Stellenwert die IT einnimmt, noch vor klassischen Themen wie Produktverbesserung oder Kundenservice. Für diese Transformation benötigen Unternehmen gut funktionierende IT-Organisationen und leistungsfähige IT-Infrastrukturen. Dafür bedarf es eines modernen IT Operations Management, das einfach, schnell und transformativ ist.

    In dieser kostenfreien Webinar-Reihe erörtern unsere Experten gemeinsam mit Ihnen, wie ein erfolgreiches IT Operations Management heute möglich ist und stellen Ihnen Lösungen von Hewlett Packard Enterprise (HPE) Software vor, mit denen Sie den Übergang gestalten können.

    Webinar 2: Data Center Automation
    Digitalisierung fordert Höchstleistung von den Rechenzentren. Dafür sind die Automatisierung und Orchestrierung das A und O. In diesem Webinar stellen wir Ihnen die Data Center Automation (DCA) Suite vor, HPEs Infrastrukturmanagement-Lösung, um Aufgaben zu automatisieren, IT-Prozesse zu orchestrieren, Compliance durchzusetzen und die Infrastruktur über virtuelle und physische Server-, Datenbank- und Middleware-Anwendungen zu optimieren.

    Dabei greifen wir u.a. folgende Themen auf: Trends, die das Infrastrukturmanagement prägen; Neuheiten wie Docker Engine Automation, Analytics und Container Delivery; Vorteile und Ausbaustufen der DCA Suite.
  • Enterprise Agile mit ALM Octane
    Enterprise Agile mit ALM Octane Andreas Widmann, Technical Consultant, HPE Software Recorded: Jun 22 2017 48 mins
    Unternehmen stehen heute vor der Herausforderung, dass Anwendungen nicht nur zuverlässig, performant und sicher sein, sondern sich auch schnell an veränderte Anforderungen des Marktes und des Business anpassen müssen. Nur so kann ein Unternehmen wettbewerbsfähig bleiben und ein stets positives Benutzerlebnis aufrecht erhalten. Für die IT heißt das: kurze Releasezyklen und ein schnelles Go-to-Market-Model.

    Um diesen Anforderungen gerecht zu werden, ist eine agile Software-Entwicklung für Unternehmen heute unumgänglich. Mit ALM Octane hat HPE gerade hierfür eine Lösung auf den Markt gebracht, die Continuous Integration, Continuous Testing, Continuous Delivery & DevOps-Szenarien unterstützt. ALM Octane integriert Projektmanagement-Funktionalitäten (SCRUM, Kanban), gängige Open Source- und wichtige Testmanagementwerkzeuge in einer einzigen Plattform. Damit steigt die Transparenz, die Durchgängigkeit wird erheblich verbessert und der Verwaltungsaufwand wird deutlich reduziert.

    Erleben Sie in diesem Webinar ALM Octane live!
    Am Beispiel eines fehlgeschlagenen Regressionstests zeigen wir Ihnen einen kompletten Prozess End-to-End. Erfahren Sie, wie man mit ALM Octane Fehler schnell eingrenzen, analysieren und beheben kann und sehen Sie, wie über Schnittstellen hinweg notwendige Informationen automatisch transportiert werden.
  • Is Hybrid AI SOC in Your Future?
    Is Hybrid AI SOC in Your Future? Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine Recorded: Jun 21 2017 31 mins
    Watch this webcast for an in-depth conversation about Hybrid AI and get clarification on the following:

    - Artificial Intelligence versus Hybrid AI
    - Hybrid AI when applied to a SOC
    - Incident response (human versus machine-driven)

    There will also be discussions around the following questions:

    - Can machines make decisions?
    - Can Hybrid AI systems operate autonomously?
    - What is missing in a SOC? How can Hybrid AI be added to a SOC?
    - Can Hybrid AI help alleviate staffing shortage?
  • Data Center Network Operations: Extensible Telemetry
    Data Center Network Operations: Extensible Telemetry Derick Winkworth Recorded: Jun 21 2017 58 mins
    Apstra Operating System (AOS) 1.2 marks a significant milestone for network operations. New operational tooling -- out-of-the-box as well as user-created in Python -- means network engineers will get more done while making fewer mistakes.

    Join us for this AOS demonstration.
  • [Webinar] Cyber ranges: Because you don't #wannacry
    [Webinar] Cyber ranges: Because you don't #wannacry Amritam Putatunda,Technical Product,Ixia, Alex Handy,Tech Journalist,THENEWSTACK,Pascal Joly,Tech Partnerships ,Quali Recorded: Jun 21 2017 58 mins
    Despite billions of dollars invested in cyber security measures, companies are still falling behind when it comes to cyber attack prevention. Case in point, The recent malware campaign “WannaCry” that was able to infect more than 300 thousand systems in short duration of time. This is a testimony to the fact that investments in proactive, rather than reactive defense strategy is acutely needed. Current cyber range solutions are often siloed efforts that takes weeks to set up and cover limited scenarios.
    Addressing these problems requires a new approach with on demand self-service environments to train incident response teams in a holistic manner across the entire organization and simulate a comprehensive set of attacks on IT infrastructure.
    In this webinar you will learn how you can use the power of Quali sandboxes and Ixia Breaking Point solution in creation of a Cyber Range training environment to
    -Rapidly provision full-stack, real-world cyber threat environments
    -Generate thousands of unique attacks mixed with a large variety of real life traffic profiles
    -Reports and grades that measures trainees abilities to neutralize attacks while maintaining traffic continuity.
  • Focusing Your Cloud Visibility: Extending Control Across the Hybrid Network
    Focusing Your Cloud Visibility: Extending Control Across the Hybrid Network Amnon Even Zohar Sr. Product Manager, Cloud Security Recorded: Jun 21 2017 45 mins
    For many security teams, the primary challenge of cloud adoption is how to gain the same level of visibility that exists for on-prem platforms.

    The Tufin Orchestration Suite has been a key solution for gaining central visibility and control across security vendors and platforms in the physical network and for reducing the complexities associated with a distributed environment.

    Join this session to learn how Tufin can provide you with the insight you need into your private and public cloud platforms. You’ll hear how you can leverage the Tufin console to manage security, connectivity, and compliance across your hybrid networks, and much more.
  • Digitalisierung voranbringen - Webinar 1: Modernes IT Operations Management
    Digitalisierung voranbringen - Webinar 1: Modernes IT Operations Management Robert Kreher, Business Development Manager, HPE Software Recorded: Jun 21 2017 47 mins
    Laut einer aktuellen Umfrage von Gartner haben 42% der CEOs mit der digitalen Transformation ihres Unternehmens begonnen *. Nach dem Thema Wachstum folgen IT-Themen auf Platz 2 der meist genannten Prioritäten. Damit ist klar, welchen Stellenwert die IT einnimmt, noch vor klassischen Themen wie Produktverbesserung oder Kundenservice. Für diese Transformation benötigen Unternehmen gut funktionierende IT-Organisationen und leistungsfähige IT-Infrastrukturen. Dafür bedarf es eines modernen IT Operations Management, das einfach, schnell und transformativ ist.

    In dieser kostenfreien Webinar-Reihe erörtern unsere Experten gemeinsam mit Ihnen, wie ein erfolgreiches IT Operations Management heute möglich ist und stellen Ihnen Lösungen von Hewlett Packard Enterprise (HPE) Software vor, mit denen Sie den Übergang gestalten können.

    Webinar 1: Modernes IT Operations Management
    Wie gestaltet man nun genau diesen Wandel hin zur digitalen Welt, ohne den laufenden IT-Betrieb zu gefährden? Das erste Webinar dieser Reihe gibt Ihnen einen Überblick, wie die Lösungen von HPE Software schnell und einfach diesen Wandel unterstützen. Sie können sich eines Portfolios bedienen, dessen Lösungen ineinander greifen und in unterschiedlichen Ausbaustufen – je nach Ihrem Bedarf – realisiert werden können.

    Eine weitere Neuheit ist die Lieferung unserer Software in Containern. Mit einem erheblich geringeren Zeitaufwand, verglichen mit klassischen und SaaS-Methoden, lässt sich die Software installieren, skalieren und aktualisieren. Leistungsstarke und vollständig integrierte Analyse- und Collaboration-Funktionen runden die Lösungen ab.
  • RobertHalf deploys Amazon AWS VPCs in 30minutes with Aviatrix
    RobertHalf deploys Amazon AWS VPCs in 30minutes with Aviatrix Aviatrix Recorded: Jun 21 2017 5 mins
    RobertHalf automates Hybrid Cloud deployment on Amazon AWS with Aviatrix Hybrid Cloud eXtend (HCX) software to reduce the time to deploy virtual private cloud (VPC) resources from 3 weeks to 30minutes. Watch the video to learn how from the solution architects of RobertHalf.
  • Cyberattacks: Why Mid-Market Companies Believe They're Safe - But Aren't
    Cyberattacks: Why Mid-Market Companies Believe They're Safe - But Aren't Sridhar Karnam, Director of Product Strategy Recorded: Jun 20 2017 54 mins
    A recent Arctic Wolf study found a prevalent cybersecurity dissonance between perception and reality, in which most companies believe that they are more cybersecure than they actually are. This is especially dangerous for mid-market companies, which face the same cyberthreats and issues but with fewer resources and a limited budget. This webinar will explain this dissonance and give tips on how to overcome it to improve your overall security posture.
  • About Arctic Wolf Networks
    About Arctic Wolf Networks Arctic Wolf Networks Recorded: Jun 20 2017 4 mins
    Arctic Wolf Networks provides a dynamic security service that combines world-class security engineering, advanced machine intelligence, and comprehensive up-to-the-minute service intel for effective, affordable cybersecurity. Watch this brief video to more about Arctic Wolf and AWN CyberSOC.
  • Modernizing Enterprise File Storage Workloads with Software-Defined Solutions
    Modernizing Enterprise File Storage Workloads with Software-Defined Solutions Irshad Raihan, Product Marketing, Red Hat Storage, fo& Yonathan Goltom, Senior Consultant, Red Hat Recorded: Jun 20 2017 46 mins
    Deploying open, software-defined scale-out storage solutions to industry standard Intel ® servers can allow you to easily manage unstructured data for physical, virtual, and cloud environments. Learn how you can benefit from added business agility and cost efficiencies by comparing traditional, monolithic storage to seamlessly scalable software-defined storage with Red Hat Gluster Storage - without sacrificing the durability, security, and performance you require from enterprise grade storage.
  • Streamlining Third Party Risk Assessments in the Cloud
    Streamlining Third Party Risk Assessments in the Cloud Jonathan Osmolski, Enterprise Records & Information Governance, Pekin Insurance & Hariom Singh, Product Management Qualys Recorded: Jun 20 2017 59 mins
    Security assessments drastically reduce your organization’s risk of suffering a data breach by identifying poor InfoSec and privacy practices among vendors, partners, contractors, and other third parties.

    For most businesses, these assessments are a slow, unscalable, manual process that strains InfoSec teams and creates a backlog of security evaluations.

    During this webcast, Jonathan Osmolski, Manager of Enterprise Records and Information Governance at Pekin Insurance, and Hariom Singh, Director of Product Management for Qualys Security Assessment Questionnaire (SAQ) will show you how you can free your organization from unreliable and labor-intensive manual processes, and optimize the accuracy of audit results.

    You will learn how Pekin Insurance:

    > Replicated its manual 76-question assessment process within SAQ’s web-based UI in just two hours
    > Simplified the design, distribution, tracking, and analysis of multiple vendor risk assessment campaigns
    > Gained improved visibility into its compliance performance metrics
    Increased the overall productivity and efficiency of its InfoSec team

    This webcast will include a live demo and Q&A session.
  • The PowerShell Risk: Understanding and Avoiding PowerShell Attacks
    The PowerShell Risk: Understanding and Avoiding PowerShell Attacks Lee Lawson, Special Operation Resercher, SecureWorks Counter Threat Unit Recorded: Jun 20 2017 62 mins
    In a recent SecureWorks engagement, 98.5% of the 3,477 commands executed by threat actors were native to the Windows operating system.

    PowerShell is a popular tool that Microsoft has been including with the Windows OS since 2009, but malicious PowerShell use is rivaling ransomware in popularity with threat actors. Security products focused on preventing endpoint threats are often not enough to differentiate legitimate from malicious PowerShell use. Join us for a discussion of why PowerShell is so risky, how SecureWorks researchers identify PowerShell threats, and how you can defend your organization.

    SecureWorks Counter Threat Unit - Special Operations Researcher, Lee Lawson, will discuss how security leaders and practitioners can leverage his experience to reduce the risk and understand how to defend against PowerShell threats in your organizations.

    You Will Learn:
    • What PowerShell is and how it is used in “living off the land” attacks
    • Why built-in tools like PowerShell are so attractive to threat actors
    • Examples of malicious PowerShell use
    • How to defend your organization against common methods to evade prevention and detection
  • Aruba's Asset Tracking Solution
    Aruba's Asset Tracking Solution Aruba, a Hewlett Packard Enterprise Company Recorded: Jun 20 2017 5 mins
    Aruba’s asset tracking solution allows organizations to track high value assets using their existing Aruba WLAN infrastructure and BLE-based Aruba Tags. This increases staff efficiency, reduces equipment costs and improves customer satisfaction.
  • Protect Your DNS from Ransomware Attacks
    Protect Your DNS from Ransomware Attacks Farsight Security CEO, Dr. Paul Vixie | Infoblox Chief DNS Architect, Cricket Liu Recorded: Jun 20 2017 68 mins
    On May 12, 2017, the WannaCry and Jaff ransomware attacks infected hundreds of thousands of computers in 150 countries. If the targets of those attacks had employed a strong DNS defense, including DNS Response Policy Zones (DNS RPZ), prior to May 12, chances are they could have protected their data.

    Learn more about WannaCry, Jaff, and other cyber threats and how you can protect your data and organization by attending our exclusive security event. Hear from RPZ creator and DNS luminary Dr. Paul Vixie, CEO of Farsight Security and Infoblox Chief DNS Architect Cricket Liu in a live videocast.
  • How to Fight Massive IoT DDoS Attacks with Multi-Layered Defense
    How to Fight Massive IoT DDoS Attacks with Multi-Layered Defense Daniel Keidar, AVP of International Pre-Sales at Allot Recorded: Jun 20 2017 48 mins
    The rapid growth of the Internet of Things (IoT) has led to a major increase in threats to network security. The proliferation of weakly secured connected devices has enabled recent DDoS attacks to become some of the largest and most destructive on record. They have significantly compromised network services, disrupted the quality of experience for millions of users, and threatened data security.
    Existing network security solutions have not proved effective enough to mitigate such large and aggressive attacks. Operators need to fight this phenomenon with a new, comprehensive, multi-layered solution. So join us to learn:
    •The impact of massive IoT-driven attacks
    •How service providers can protect their assets and their users
    •How multi-layered solutions provide networks with the strongest defense
    •The opportunities for operators to sell security as a services to customers
  • SOC in the Cloud: SANS Institute Review of AWN CyberSOC
    SOC in the Cloud: SANS Institute Review of AWN CyberSOC Sonny Sarai, SANS Review and Senior Analyst; Sridhar Karnam, AWN Director of Products Recorded: Jun 19 2017 62 mins
    No organization is safe from cyberattacks in today’s threat landscape, so many implement a security operations center (SOC) to improve their cybersecurity. In this webcast, SANS Institute reviews Arctic Wolf’s AWN CyberSOC, going through the setup, implementation, pricing, and various other aspects of the service. Learn more about security operations center and AWN CyberSOC in this webinar.
  • Monitor & Analyze the Performance of Citrix XenApp & XenDesktop
    Monitor & Analyze the Performance of Citrix XenApp & XenDesktop Valerie DiMartino, Senior Product Mktg Manager, NetScaler Citrix & Lena Yarovaya Dir. Technical Mktg, Netscaler Citixr Recorded: Jun 16 2017 46 mins
    Watch this webinar to see how NetScaler insights can provide you with complete visibility for virtual applications delivered by Citrix XenApp and XenDesktop to ensure your users have the best experience when working from anywhere. 

    Learn more:

    • See demos of visibility and analytics features of NetScaler MAS
    • Learn how to monitor and analyze application performance
    • Gain visibility into user access issues
    • Preview of advanced analytics functionality for finding large-scale data anomalies
  • Digitalisierung voranbringen - Webinar 3: Network Operations Management
    Digitalisierung voranbringen - Webinar 3: Network Operations Management Tobias Balfanz, Presales Consultant, HPE Software Jun 26 2017 12:00 pm UTC 60 mins
    Laut einer aktuellen Umfrage von Gartner haben 42% der CEOs mit der digitalen Transformation ihres Unternehmens begonnen *. Nach dem Thema Wachstum folgen IT-Themen auf Platz 2 der meist genannten Prioritäten. Damit ist klar, welchen Stellenwert die IT einnimmt, noch vor klassischen Themen wie Produktverbesserung oder Kundenservice. Für diese Transformation benötigen Unternehmen gut funktionierende IT-Organisationen und leistungsfähige IT-Infrastrukturen. Dafür bedarf es eines modernen IT Operations Management, das einfach, schnell und transformativ ist.

    In dieser kostenfreien Webinar-Reihe erörtern unsere Experten gemeinsam mit Ihnen, wie ein erfolgreiches IT Operations Management heute möglich ist und stellen Ihnen Lösungen von Hewlett Packard Enterprise (HPE) Software vor, mit denen Sie den Übergang gestalten können.

    Webinar 3: Network Operations Management
    Auch an die Sicherheit und Leistungsfähigkeit von Netzwerken stellt die Digitalisierung hohe Anforderungen. Hierbei stehen neben dem Fehler- und Verfügbarkeitsmanagement ein kontinuierlicher Blick auf die richtige Konfiguration des Netzes im Fokus sowie die Einhaltung von fremden und eigenen Compliance-Richtlinien.

    Oft sind viele unterschiedliche Werkzeuge im Einsatz, die typischerweise nicht oder nur mangelhaft integriert sind. Die reibungslose Netzwerküberwachung im laufenden Betrieb scheitert, da die Pflege der isolierten bzw. nicht integrierten Systeme zu arbeitsintensiv ist. Informieren Sie sich in diesem Webinar über unsere integrative Netzwerkmanagement-Lösung, die die heutigen Netzwerkmanagement-Anforderungen abdeckt und die Arbeitsaufwände reduziert.
  • How to Deliver Optimized WAN Segmentation
    How to Deliver Optimized WAN Segmentation Ray Wong, Sr. Solutions Engineer, EMEA Jun 27 2017 8:00 am UTC 60 mins
    Network segmentation is essential when traffic from different customers and/or business entities must be isolated from each other. Full support for segmentation includes the isolation of management, control and data plane traffic.

    This webinar discusses:
    - Why Enterprise and Service Provider networks require segmentation
    - What is SD-WAN segmentation
    - How VeloCloud segmentation is implemented and optimized
  • 3 Reasons Network Security Policy Management is a Big Deal
    3 Reasons Network Security Policy Management is a Big Deal Ron Kehoe CISSP, CISA, CISM, GCIH Senior Solutions Engineer Jun 27 2017 3:00 pm UTC 45 mins
    If you missed Data Center World conference in April 2017, then you also missed the session explaining what is Network Security Policy Management (NSPM) and why it's a big deal.
    Join this Webinar to learn how the complex nature of data centers today drives the adoption of NSPM and what are the benefits to your organization.

    Ron Kehoe has over 30 years of experience in security solutions architecture and consulting, and was a network security manager at First Republic Bank prior to joining Tufin as a senior solutions engineer.
  • Keeping up with High Speed MIgration in the Data Center
    Keeping up with High Speed MIgration in the Data Center Anthony Haupt, CommScope, Data Center Solutions Architect Jun 27 2017 3:00 pm UTC 90 mins
    The volume of data streaming into the data center has been growing exponentially for decades. Bandwidth requirements are expected to continue growing 25 percent to 35 percent per year. At the same time, lower latency requirements continue to escalate. As a result, the design of services and applications—and how they are delivered—is rapidly evolving.

    Instead of a single dedicated server, information requests coming into the data center are now fulfilled by multiple servers cooperating in parallelThe traditional three-tier network is quickly being replaced by spine-and-leaf networks. As a result, the physical infrastructure must be able to support higher link speeds and greater fiber density while enabling quick and easy migration to new more demanding applications.

    This webinar will address:

    Solutions, support & decisions
    40G or 25G lanes?
    Preterminated vs field-terminated cables
    Modulation schemes
    Duplex or Parallel transmissions
    Singlemode, multimode or wideband multimode fiber?



    Attendees with earn one BICSI Continuing Education Credit for attending.
  • Winning Strategies for Preparing MEF 2017 Award Submissions
    Winning Strategies for Preparing MEF 2017 Award Submissions Stan Hubbard, MEF17 Program Director, and Rosemary Cochran, Principal & Co-founder, Vertical Systems Group Jun 27 2017 3:00 pm UTC 60 mins
    MEF's prestigious annual Awards Program, now in its 12th year, is the world's largest, longest-running awards program. It focuses on leadership in emerging Third Network services powered by LSO (Lifecycle Service Orchestration), NFV, SDN, and CE 2.0 networking technologies. The MEF 2017 Awards program recognizes service, application, technology, and professional excellence in the vibrant global Third Network community committed to delivering innovative solutions that are optimized for the digital economy and the hyper-connected world. The most advanced services typically provide an on-demand experience with user-directed control over service capabilities and are delivered over more automated, virtualized, and interconnected networks.

    This webinar that will help you identify the award categories in which your company excels. Attend and learn how to prepare an excellent award submission. We will cover:
    -MEF award categories and important dates
    -How to use the award submissions portal
    -Tips for writing concise, compelling submissions

    The deadline for submissions is September 13, 2017. Awards finalists will be announced on October 17, 2017.

    This is an excellent opportunity to have all of your questions answered and will help you to get one step closer to being an award winner.
  • NSX Master Class: Networking from Physical to Virtual and Back Again!
    NSX Master Class: Networking from Physical to Virtual and Back Again! Neil Moore & Ron Fuller Jun 27 2017 4:00 pm UTC 60 mins
    In this session, we will bring an NSX infrastructure online in a running physical environment – a powerful example of migrating to a virtual infrastructure with no downtime. We will discuss the linking of physical devices to the edge services gateway and configuring routing protocols on network devices and in the NSX environment. We will also explain why a clear knowledge of your ecosystem, from the physical switch on up, will help you better understand how the overlay and the underlay come together. This master class picks up after the software has been installed, at the point when you need to start securing and passing packets in your environment.

    This session will include:
    - A deep dive into setting up the physical and virtual network infrastructure.
    - Demos you can follow to get NSX quickly running in your environment.
  • Breach Detection: The Fly In The Cyber Ointment
    Breach Detection: The Fly In The Cyber Ointment Jim Ambrosini, Managing Director, CohnReznick and Tony Thompson, GM Threat Detection, SS8 Jun 27 2017 5:00 pm UTC 45 mins
    Most companies list cyber security as one of their top priorities. Many have implemented various technologies and increased headcount to protect their digital assets and comply with regulations. However, despite making these investments, they continue to struggle with identifying a breach and knowing what to do or how to respond when it happens. In this Webinar, “The Fly in the Cyber Ointment – The Ability to Identify and Assess Indicators of Compromise,” cyber security risk expert Jim Ambrosini from CohnReznick will join Tony Thompson from SS8 Networks to discuss current trends in cyber security, the evolving threat landscape and present best practices on how to identify and respond to breaches.
  • How to Plan SD-WAN Migration
    How to Plan SD-WAN Migration Kangwarn Chinthammit, Director of Deployment Jun 27 2017 5:00 pm UTC 60 mins
    SD-WAN brings a new set of WAN capabilities to the enterprise from the ability to leverage any type of transport to centralized policy control to the cloud-enabled architecture. SD-WAN has become a no-brainer for greenfield deployments. However,, most enterprise roll-outs are brownfield: companies do not want to rip and replace their existing network, instead they prefer to incrementally migrate their WAN to SD-WAN architecture. Hence, successful migration to SD-WAN requires thorough planning. In this webinar, you will learn:

    - Key considerations for developing a migration plan to SD-WAN (on-premise vs hosted controller, site survey, WAN transport, network services)

    - How to implement SD-WAN routing strategy

    - How to run acceptance test and plan for site cut-over
  • The Dangers Within: 6 Hidden Signs of Cybersecurity Insider Threats
    The Dangers Within: 6 Hidden Signs of Cybersecurity Insider Threats Jon Piercey, SVP Security & Intelligence APAC, Nuix Jun 28 2017 5:00 am UTC 60 mins
    Threats from within the enterprise can pose the biggest cybersecurity risk to the organisation. Whether intentionally or accidentally, users with legitimate credentials can go about the network without triggering suspicion or alert, making their unauthorised activity difficult to detect. Insider threat activity can sometimes hide in plain sight, but what happens when people deliberately cover their tracks?

    In this webinar, you will learn:

    - Where to look for suspicious activity
    - How to set up traps that will catch malicious insiders
    - What finding paths across seemingly disparate data can reveal.

    According to a 2016 industry report, employees cause 77 percent of internal security breaches. Find out who is causing yours.

    Join Nuix’s and (ISC)² on Jun 28 (Wed) at 13:00 (Singapore time) and uncover the six hidden signs that help you detect the presence of insider threat activity.

    Presenter: Jon Piercey, SVP Security & Intelligence APAC, Nuix
    Moderator: Ir. Tejinder Singh, Senior Development Expert,T-Systems Malaysia SGA Security Engineering
  • The Evolving Threat Landscape versus Advanced Threat Protection
    The Evolving Threat Landscape versus Advanced Threat Protection Patrick Grillo, Senior Director, Security Solutions, Fortinet Jun 28 2017 9:00 am UTC 45 mins
    As the most recent outbreak of ransomware has proven once again, a debilitating attack can come from anywhere, with any sort of malware, and have a global impact. While headlines and marketing statements constantly shout “Zero Day”, even old malware can be used effectively to wreak havoc in a network if it’s not properly configured and up to date.

    The threat landscape never stops evolving and neither should an enterprise’s cyber security strategy. New products, new features and efficient source of threat intelligence are just some of the tools that an enterprise should look for from their security vendors.

    This session will look at the evolution of Advanced Threat Protection and how continuous development across the full range of technologies is crucial to maintaining security efficacy.
  • Digitalisierung voranbringen - Webinar 4: IT Monitoring, Analytics & Event Mgmt
    Digitalisierung voranbringen - Webinar 4: IT Monitoring, Analytics & Event Mgmt Klaus Holthaus, Technical Consultant, HPE Software Jun 28 2017 12:00 pm UTC 60 mins
    Laut einer aktuellen Umfrage von Gartner haben 42% der CEOs mit der digitalen Transformation ihres Unternehmens begonnen *. Nach dem Thema Wachstum folgen IT-Themen auf Platz 2 der meist genannten Prioritäten. Damit ist klar, welchen Stellenwert die IT einnimmt, noch vor klassischen Themen wie Produktverbesserung oder Kundenservice. Für diese Transformation benötigen Unternehmen gut funktionierende IT-Organisationen und leistungsfähige IT-Infrastrukturen. Dafür bedarf es eines modernen IT Operations Management, das einfach, schnell und transformativ ist.

    In dieser kostenfreien Webinar-Reihe erörtern unsere Experten gemeinsam mit Ihnen, wie ein erfolgreiches IT Operations Management heute möglich ist und stellen Ihnen Lösungen von Hewlett Packard Enterprise (HPE) Software vor, mit denen Sie den Übergang gestalten können.

    Webinar 4: IT Monitoring, Analytics & Event Management
    Um die digitale Transformation zu gestalten und gleichzeitig die Kontinuität des laufenden IT-Betriebs sicherzustellen, ist ein konsolidiertes IT-Monitoring unabdingbar, welches sowohl die gegenwärtige IT als auch neue Technologien erfasst. Nur so kann der IT-Betrieb gewährleisten, dass die Transformation auch wirklich einen Mehrwert für das Unternehmen bringt.

    Erfahren Sie in diesem Webinar, wie Sie durch den zentralen Einsatz der HPE Operations Bridge den Zustand Ihrer gesamten IT-Umgebung serviceorientiert erfassen, korrelieren und analysieren können; unabhängig davon, ob Ihre IT-Services aus physischen oder virtuellen Plattformen bereitgestellt werden, aus der Cloud oder über Container. Damit können Sie sich auf die wirklich für Ihr Business relevanten Ereignisse in Ihrer IT konzentrieren. Mit der HPE Operations Bridge erzielen Sie automatisiert die Servicequalität, die das digitalisierte Business von Ihnen erwartet.
  • Advanced Threats - Why you still need to worry about email security
    Advanced Threats - Why you still need to worry about email security Ganesh Umapathy, Product Marketing Manager SonicWall Jun 28 2017 5:00 pm UTC 45 mins
    Email-based communications are a fundamental cornerstone for effective business. That’s why email is a popular vector for sabotage across your network and a launch pad for malware – including ransomware and zero-day threats.

    This webcast discusses the current threat landscape and customer pain points, and examines how SonicWall Email Security – now integrated with Capture Advanced Threat Protection – delivers cloud-based, multi-engine sandbox protection for your email.
  • Year in Review: Financial Sector Threat Activity
    Year in Review: Financial Sector Threat Activity Candid Wueest, Threat Researcher, Symantec Security Response & Vikram Thakur, Researcher Security Response, Symantec Jun 28 2017 6:00 pm UTC 60 mins
    Financial institutions are increasingly facing attacks on multiple fronts. Cyber criminals continue to target online banking using malware to hijack customer transactions and banking sessions.

    While there has been an overall drop in infections related to these consumer threats, financial institutions are now facing a new type of attack in the form of large-scale financial heists. Attack groups such as Fin7 and Lazarus are deliberately targeting financial institutions in audacious attacks that are reaping large rewards.

    In its annual review of the financial threat landscape Symantec takes a look at the most prevalent and significant financial threats.

    In the webcast we will review:

    -The top threats facing financial institutions

    -Explore the most common techniques employed in financial attacks

    -Provide case studies of the most high-profile financial attacks of the past 12 months

    Register today
  • EIP: Construyendo el Camino a los Servicios de la Tercera Red
    EIP: Construyendo el Camino a los Servicios de la Tercera Red Emerson Moura - Distinguished Systems Engineer, Cisco & MEF CALA Marketing Co-chair Jun 29 2017 3:00 pm UTC 75 mins
    Carrier Ethernet es el combustible para la economía digital global y la base sobre la cual se construye nuevos servicios dinámicos, seguros y orquestados para el mundo hiper_conectado. Pero la falta de estandarización para interconectar proveedores y operadores de servicios Ethernet es un obstáculo para el crecimiento y la eficiencia del mercado. Actualmente, la mayoría de las interconexiones Ethernet son interconexiones de red a red (NNI) no estándar y personalizadas, lo que impide escalar el mercado. Más de una docena de proveedores de servicios y proveedores de tecnología miembros del MEF han participado en el proyecto MEF para crear Puntos de Interconexión Ethernet (Ethernet Interconnect Points o EIP) aprovechando los estándares existentes para interconexión CE. La primera fase del proyecto EIP involucró la creación de una Directriz de Implementación de Punto de Interconexión Ethernet que recomienda cómo usar las Interfaces Estándar de Red a Red (ENNIs) de forma eficaz. Esta guía inicial se enfoca en la configuración de servicios de acceso Ethernet (E-Access) de una manera simple, y las nuevas directrices avanzarán en complejidad con en el tiempo. Las directrices ayudarán a la industria a escalar rápidamente y reducir complejidad.

    Este webinar explorará dónde se dirige el mercado, las expectativas técnicas, los obstáculos operacionales que pueden surgir y la necesidad de que los operadores gestionen eficazmente la transición a medida que el mercado avanza hacia la estandarización. Este seminario apunta a aquellos proveedores de servicios que compran servicios de Ethernet mayoristas de operadorese interconectan sus redes para crear servicios CE minoristas de extremo a extremo pasando por múltiples redes. También se compartirá informaciones que pueden ser importantes para la toma de decisiones mientras desarrolla su estrategia de cómo sacar total provecho de interconexiones Ethernet estandarizadas.
  • Location Analytics: Use Cases for Improving Visualizations & Reports
    Location Analytics: Use Cases for Improving Visualizations & Reports Rick Styll, Product Management, SAS; AJ Rice, Alliance Manager, Esri Jun 29 2017 3:00 pm UTC 60 mins
    Nearly 70 percent of business data contains some level of location information. But business analysts rarely use this data within their BI and analytics workflows.

    Location analytics is more than just putting points on a map. It’s part of a much larger picture of using location to provide context in visualizations, reports and analytics. Utilizing geographic data in descriptive and predictive analytics helps companies discover new patterns, identify location-specific opportunities, and get a complete picture before making business decisions.

    In this webinar, Esri and SAS discuss the role that location analytics can play in determining practical next steps for your organization. A product demonstration will be shown as well.

    We’ll answer:
    • How does location analytics add value to BI and analytics initiatives?
    • What are the right uses for location analytics?
    • What pitfalls should organizations consider as they implement processes and technology for analyzing geographic data?
    • Are special skill sets required to use location information?
    • How can organizations best develop a strategy for using geographic data?
  • IoT Tests and Trends: Key Findings from WatchGuard's Threat Lab
    IoT Tests and Trends: Key Findings from WatchGuard's Threat Lab Marc Laliberte, Information Security Threat Analyst, and Ben Brobak, Technical Product Manager Jun 29 2017 4:00 pm UTC 60 mins
    IoT business is booming, with manufacturers connecting any and every “thing” – cars, cameras, lightbulbs, coffee makers! – to the Internet, to the delight and convenience of consumers. But as pressure grows to release new products faster and faster, we’re all left to wonder: is security really a priority? Needing an answer, WatchGuard’s Threat Lab launched an ongoing project to test some of these connected devices and determine for ourselves how secure they really are.

    Join Marc Laliberte, information security threat analyst, and Ben Brobak, technical product manager, on June 29 as they analyze the surprising results of this project and share their best tips for defense.
  • Power your Oracle Database and Business Applications Without Licensing Issues
    Power your Oracle Database and Business Applications Without Licensing Issues Alex Infanzon, Application Solution Manager, Pure Storage Dean Bolton, President at VLSS LLC Jun 29 2017 5:00 pm UTC 60 mins
    How can a better storage infrastructure accelerate time to discovery for genomics research?

    Join IDC research directors Dr. Alan Louie and Eric Burgener for an informative session as they discuss the life sciences research landscape and its key processes and requirements. They will share information about how today's data-intensive genomics workflows require high throughput and bandwidth to handle massive data sets in near real time. Brian Schwarz from Pure Storage will also share details about how a purpose-built "big data flash" scale-out NAS platform like FlashBlade can help research teams accelerate time to discovery.

    Tune into the conversation to learn:

    - Why the convergence of data storage and life sciences research go hand-in-hand
    - Technologies and best practice methodologies for genomic analysis, including containers and workflows
    - How to handle massive big data sets in real time
  • Part 2: Future of SIEM—Sniff Out Malware & Spear-Phishing w/Behavioral Analytics
    Part 2: Future of SIEM—Sniff Out Malware & Spear-Phishing w/Behavioral Analytics Orion Cassetto, Sr. Product Marketing Manager, Exabeam. Anne Saita (Moderator) Jun 29 2017 5:00 pm UTC 75 mins
    Malware and spear-phishing continue to cause the most headaches for IT security teams. Over the years, attackers have become more sophisticated and SIEM systems have failed to keep up. Key indicators of emerging threats include lateral movement, where the attacker silently attempts to access multiple servers on the network, and account management, where the attacker escalates privilege or creates new privileged accounts. Detection of advanced threats like these require real time analytics and the ability to find signals within the very noisy security environment. Join Exabeam and (ISC)² on June 29, 2017 at 1:00PM Eastern to learn how user behavior analytics automatically analyzes and scores activity for escalated risk allowing for quick attack detection.
  • Advanced Threat Protection for Messaging Gateway
    Advanced Threat Protection for Messaging Gateway Zachary Sivertson, Director Content & Malware Analysis, Symantec & Tobias Pischl, Product Manager, Email Security, Symantec Jun 29 2017 5:00 pm UTC 60 mins
    Symantec has just released new advanced threat protection capabilities for Messaging Gateway 10.6 based on integration with Symantec’s Content & Malware Analysis platform. This new advanced threat defense option for Messaging Gateway provides offloading of messages to Content & Malware Analysis for further inspection and comprehensive malware detonation.

    Join Symantec product managers from Messaging Gateway and Content & Malware Analysis to see demos of this integration in action, and learn more about how this solution addresses today’s latest advanced threats through:

    •Advanced scanning and sandboxing to detect and block malicious files and URLs
    •In-depth threat analysis and summary dashboard-level visibility
    •Threat correlation analysis across Symantec Endpoint Protection, Proxy SG and Messaging Gateway

    Don't miss this great opportunity to speak with the product experts of this combined solution and get your questions answered!
  • Success Factors in Threat Intelligence: Part 2 - Starting a Program
    Success Factors in Threat Intelligence: Part 2 - Starting a Program Allan Thomson, Chief Technical Officer Jun 29 2017 6:00 pm UTC 45 mins
    This series describes a comprehensive “business technical approach” to the justification, definition, design and execution of Threat Intelligence Programs.

    What do we mean by “business technical approach’ to Threat Intelligence?

    Much in the industry is focused solely on one technical aspect or another of threat intelligence data that indicates information about a specific malware family, a set of indicators that can be used to block malicious sites, campaign information that highlights a threat actors profile, their tactic, techniques and procedures. But much of the technically focused content do not discuss how organizations can gather or construct that information themselves, and even more so, how an organization would organize themselves to respond to such data. Much of the output of the industry is providing the fish to organizations rather than teaching the organizations how to fish themselves.

    A ‘business technical approach’ is one where we define an approach focused on the business needs, the organization personnel, organizational roles & responsibilities, team structure and those elements’ interaction with technology to address the challenge of successful threat intelligence operations. Our goal is to help organizations build effective Threat Intelligence programs.

    In Part 1 of the CSO Series we introduced the key business and technical requirements of TI programs. In Part 2 webinar we will examine some important definitions to consider in TI and how to start building the program based on the requirements identified in Part 1 of the series. We will introduce to the audience the overall vision of the TI program execution, doing gap analysis on existing security programs and identifying where the TI program can complement and enhance existing investments.
  • Digitalisierung voranbringen - Webinar 5: IT Service Management Automation
    Digitalisierung voranbringen - Webinar 5: IT Service Management Automation Robert Kreher, Business Development Manager, HPE Software Jul 3 2017 12:00 pm UTC 60 mins
    Laut einer aktuellen Umfrage von Gartner haben 42% der CEOs mit der digitalen Transformation ihres Unternehmens begonnen *. Nach dem Thema Wachstum folgen IT-Themen auf Platz 2 der meist genannten Prioritäten. Damit ist klar, welchen Stellenwert die IT einnimmt, noch vor klassischen Themen wie Produktverbesserung oder Kundenservice. Für diese Transformation benötigen Unternehmen gut funktionierende IT-Organisationen und leistungsfähige IT-Infrastrukturen. Dafür bedarf es eines modernen IT Operations Management, das einfach, schnell und transformativ ist.

    In dieser kostenfreien Webinar-Reihe erörtern unsere Experten gemeinsam mit Ihnen, wie ein erfolgreiches IT Operations Management heute möglich ist und stellen Ihnen Lösungen von Hewlett Packard Enterprise (HPE) Software vor, mit denen Sie den Übergang gestalten können.

    Webinar 5: IT Service Management Automation
    Auch vor dem Service Management macht die Digitalisierung nicht Halt. Die Interaktion zwischen dem Endanwender und dem Help Desk soll möglichst modern, interaktiv, transparent und mobil sein. Statt vieler unterschiedlicher Systeme und Kataloge wünschen sich die Anwender ein zentrales, interaktives Portal, über das man alle Anfragen einsteuern kann.

    Informieren Sie sich in diesem Webinar über die IT Service Management Automation Suite, die ein zeitgemäßes Service Lifecycle Management auf der Basis von ITIL Best Practices bietet. Ein besonderer Fokus wird auf der intuitiven Benutzerführung über das Service Portal liegen. Darüber hinaus werden wir zeigen, wie durch die intelligente Nutzung von Big Data Prozessabläufe verschlankt und beschleunigt werden können. Schließlich werden wir ein Augenmerk auf die chatbasierte Interaktion der Service Desk-Mitarbeiter mit der dahinterliegenden IT-Infrastruktur (ChatOps) richten.
  • Building a simpler, more intelligent WAN for the Hybrid Cloud era
    Building a simpler, more intelligent WAN for the Hybrid Cloud era Phil Lees, CTO of WhiteSpider Jul 4 2017 12:00 pm UTC 45 mins
    Enterprises can simplify the move to a Hybrid Cloud infrastructure with SD-WAN, building a secure, unified connectivity over any transport with simplified operations, centralised management, policy control and application visibility across the enterprise.
  • Think small with Optimised Internet
    Think small with Optimised Internet Hoo Shu Yee, Singtel Sr. Product Director and Nick Hawkins, Akamai Sr. Director Product Management Jul 5 2017 6:00 am UTC 60 mins
    Internet is a convenient, cost-efficient means to connect your branch offices and to access public cloud applications. It is also an integral part of any enterprise’s hybrid WAN architecture. However, its unreliable and unpredictable performance may hamper employee productivity.

    Join us in this webinar to learn about:
    • Some of the challenges enterprises face with Internet connectivity
    • How Internet connectivity can be optimised to improve branch offices’ connectivity and to access cloud applications

    So, think small, because a branch office could bring you closer to market domination when it is well connected to the rest of the world by reliable, business-grade Internet.
  • Digitalisierung voranbringen - Webinar 6: Hybrid Cloud Management
    Digitalisierung voranbringen - Webinar 6: Hybrid Cloud Management Markus Knöfel, Presales Consultant, HPE Software Jul 5 2017 12:00 pm UTC 60 mins
    Laut einer aktuellen Umfrage von Gartner haben 42% der CEOs mit der digitalen Transformation ihres Unternehmens begonnen *. Nach dem Thema Wachstum folgen IT-Themen auf Platz 2 der meist genannten Prioritäten. Damit ist klar, welchen Stellenwert die IT einnimmt, noch vor klassischen Themen wie Produktverbesserung oder Kundenservice. Für diese Transformation benötigen Unternehmen gut funktionierende IT-Organisationen und leistungsfähige IT-Infrastrukturen. Dafür bedarf es eines modernen IT Operations Management, das einfach, schnell und transformativ ist.

    In dieser kostenfreien Webinar-Reihe erörtern unsere Experten gemeinsam mit Ihnen, wie ein erfolgreiches IT Operations Management heute möglich ist und stellen Ihnen Lösungen von Hewlett Packard Enterprise (HPE) Software vor, mit denen Sie den Übergang gestalten können.

    Webinar 6: Hybrid Cloud Management
    Eine zentrale Rolle bei der Digitalisierung spielt natürlich das Thema Cloud. Es gibt eine Vielzahl von Management-Plattformen, die vorgeben, die damit einhergehende Komplexität zu beherrschen und die Transparenz zu erhöhen. Sie tun dies aber immer nur für die Cloud-Umgebung.

    In diesem Webinar stellen wir Ihnen die Hybrid Cloud Management-Lösung von HPE Software vor – unsere Cloud-Management-Plattform, über die traditionelle, Hybrid Cloud-, Open Source- und Cloud-native Liefermodelle in einer Vielzahl von Infrastrukturumgebungen bereitgestellt und verwaltet werden können. Wir greifen u.a. folgende Themen auf: welche Cloud für welche Anforderungen; Cloud-agnostische Service Designs; nativer Container Support; Kontrolle und Orchestrierung; Vorteile und Ausbaustufen der Lösung.
  • Transitioning Load Balancing to the Cloud
    Transitioning Load Balancing to the Cloud Ethan Banks, Co-Founder, Packet Pushers, Chiradeep Vittal, Distinguished Engineer, Citrix & Derek Yee, Sr. Product Mgr,Citrix Jul 5 2017 3:00 pm UTC 75 mins
    ADCs have largely become commoditized, and the services they provide are fairly indistinguishable from the sea of competitors on the market today. With many data center architects faced with modernizing their infrastructure, what are the considerations when transitioning applications to new automation frameworks and topologies in the cloud?
    This webinar will focus on key challenges faced by the enterprise when transitioning their load balancers to the cloud.

    What you will learn:

    •The shift to cloud native, software and service-based offerings
    •Support for new application architectures
    •Operational complexities and scale at production
    •Flexibility and support for hybrid topologies in transition