Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • The Blurring of Boundaries in a Software-Defined Data Center
    The Blurring of Boundaries in a Software-Defined Data Center JR Rivers, Co-Founder & CTO, Cumulus Networks Live 60 mins
    The software-defined data center has been a heavily touted concept over the past few years, and heralded by some as the next step in the evolution of virtualization and cloud computing. Having a data center that is governed by software, rather than dictated by hardware, can lead to more fully automated and intelligent operations. Having infrastructure elements such as networking, storage and security conceived of as a services is, indeed, an attractive concept to many.

    In this webinar we will be joined by JR Rivers, Co-Founder and CTO of Cumulus Networks, to talk about how he (and Cumulus) define the concept of a software-defined data center. He will present how the definition of a software-defined data center has evolved since its inception, and how tools like VXLAN, EVPN, Ansible and more can help organizations further their journey to a “software-defined” state and simplify network operations.
  • Top 10 Secrets to a Successful Virtualization Upgrade
    Top 10 Secrets to a Successful Virtualization Upgrade Dan Richardson, Systems Engineer, and Bo Busillo, Senior Technical Account Manager Recorded: Aug 17 2017 43 mins
    Upgrading your IT operations -- even with the industry's leading virtualization platform -- is an unpredictable process. During this webcast, our technical experts will share common do's and don'ts for an easier virtualization upgrade execution for your DevOps and IT teams.
  • GDPR and What It Means for Security Teams
    GDPR and What It Means for Security Teams Cheryl Tang, Director Data Security Products, Imperva Recorded: Aug 17 2017 37 mins
    The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.

    Join us to learn:

    - What is GDPR
    - Deep dive into relevant data security articles of the GDPR
    - Review how different technology can address some of the GDPR data security requirements
  • The Foundation for Data Center Modernization and Open Source Operations
    The Foundation for Data Center Modernization and Open Source Operations Dan Courcy, Red Hat Enterprise Linux, Andre Pitanga, Service Delivery Manager, Red Hat Recorded: Aug 17 2017 41 mins
    No matter what level of modernization you are evaluating, any effort should start with a solid foundation.

    A standardized environment based on an enterprise-ready, open source operating system like Red Hat® Enterprise Linux®, and a hardware platform based on Intel, is key to the modern data center.

    Learn how organizations like yours approached server consolidation projects and migrations from proprietary systems to Linux, to improve efficiency and create a consistent foundation for current and cloud-future IT environments.
  • An interview with Chris Pope
    An interview with Chris Pope Kepner-Tregoe Recorded: Aug 17 2017 11 mins
    10 in Tech’s Kirstie Magowan and Shane Carlson chatted with Chris Pope of Service Now at Knowledge17. There were 15,000 attendees at Knowledge17 and Chris talked about how ServiceNow is sticking to its roots of understanding how people work and what they want and need to do.
  • Detecting a Healthcare Breach with the NIST Cybersecurity Framework
    Detecting a Healthcare Breach with the NIST Cybersecurity Framework Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Recorded: Aug 17 2017 55 mins
    Part 4 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    Put on your detective hats with the DETECT function of the NIST CSF. Too often healthcare organizations are breached without ever knowing it.

    In this webinar, we’ll look at how the NIST CSF helps healthcare organizations set up technologies and policies to make sure they know, in a timely manner, when they’ve been breached, how they were breached and, most importantly, what they can do to mitigate this risk in the future.

    We will take a deeper dive into the core components of the DETECT function, including the categories of anomaly/event detection, continuous monitoring and effective detection processes.

    It can be difficult to learn that your organization has been breached, but that knowledge is crucial to improving overall cybersecurity operations.

    Register Today

    To view upcoming NIST Cybersecurity Framework for Healthcare Webinar Series Part 5-7 https://resource.elq.symantec.com/LP=4235
  • SDN/NFV Interoperability – Challenges & Opportunities
    SDN/NFV Interoperability – Challenges & Opportunities Dimetis - Bruce Katzel, VP of Sales for North America; Glenn Booth, VP of Marketing Recorded: Aug 17 2017 50 mins
    SDN/NFV Interoperability testing presents many challenges and opportunities. In this webinar, we will explore many interoperability testing organizations, test plans and results and how standardization can move faster. We’ll explore the dreaded ‘hybrid phase’, where CSPs are in the middle of transition from fully physical networks to physical + virtualized networks, and what can be done to minimize complexity and service disruption.
  • Keeping up with High Speed MIgration in the Data Center
    Keeping up with High Speed MIgration in the Data Center Anthony Haupt, CommScope, Data Center Solutions Architect Recorded: Aug 17 2017 58 mins
    The volume of data streaming into the data center has been growing exponentially for decades. Bandwidth requirements are expected to continue growing 25 percent to 35 percent per year. At the same time, lower latency requirements continue to escalate. As a result, the design of services and applications—and how they are delivered—is rapidly evolving.

    Instead of a single dedicated server, information requests coming into the data center are now fulfilled by multiple servers cooperating in parallelThe traditional three-tier network is quickly being replaced by spine-and-leaf networks. As a result, the physical infrastructure must be able to support higher link speeds and greater fiber density while enabling quick and easy migration to new more demanding applications.

    This webinar will address:

    Solutions, support & decisions
    40G or 25G lanes?
    Preterminated vs field-terminated cables
    Modulation schemes
    Duplex or Parallel transmissions
    Singlemode, multimode or wideband multimode fiber?



    Attendees with earn one BICSI Continuing Education Credit for attending.
  • Software-Defining More than Just the WAN
    Software-Defining More than Just the WAN Robert McBride, Director of Enterprise and Telco Solutions Recorded: Aug 17 2017 29 mins
    Software-defining the WAN is just one component to simplifying and cost reducing the enterprise branch. But why limit your transformation to just the WAN? Are you aware of the additional appliance and service consolidation that you can achieve when you look beyond just WAN connectivity? Have you considered the implications of security when it comes to direct Internet access (DIA), and the complexity that it can add?

    Join us for this live webinar as we discuss how a software-defined branch (SD-Branch) is the logical step in your WAN/branch transformation.

    In this webinar, you will come to understand:

    •Implications of security due to SD-WAN-enabled direct Internet access
    •Operational and financial benefits of virtualizing the full branch
    •How SD-WAN is only one part of your next-generation branch and WAN architecture
  • [Panel] Software-Defined in the Digital Transformation Era
    [Panel] Software-Defined in the Digital Transformation Era Arturo Suarez, Canonical; Idjiwa Adjido, Extrahop; Johna Till Johnson, Nemeretes; Haidee McMahon, Intel; Bob Crooks Recorded: Aug 17 2017 60 mins
    The ICT sector is moving us inexorably towards a software-enabled digital world, but many still fail to understand the power of this trend, how it is going to impact/benefit the ICT Industries and infrastructures delivering them.

    Among topics discussed will be:
    - Present and future impact of Software Defined technologies on IT (challenges and opportunities)
    - How Software-Defined is enabling the digital transformation
    - Best practices and recommendation on adopting software-defined technologies with the future in mind.

    This Webinar is aimed at IT professionals and CIOs/CDOs/CTOs seeking to understand more about how software-defined impacts the present and future of enterprises.
  • BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018?
    BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018? Josh Downs, BrightTALK; Stuart McKenzie, Mandiant; Sian John, Symantec; Nigel Tozer, Commvault & Tim Hickman, White & Case Recorded: Aug 17 2017 63 mins
    9 months until the GDPR deadline - are you completely up-to-speed?

    Our panel of data protection experts will be discussing the compliance considerations that you need to be assessing for May 2018 along with suggesting next steps from a cyber and general security standpoint.

    We'll also be asking YOU at what stage you're at in terms of your preparations via a series of interactive benchmarks as we go through the session to get a sense of where the security community is at in terms of preparations.

    -------------

    GDPR and its May 2018 deadline are now fully the minds of the vast majority of security professionals and with massive fines on the horizon for non-compliance, now is a better time than ever to get to grips with the legislation and ensure that your organisation is secure and compliant.

    It’s vital that your business has carried out the relevant preparations for compliance by then to make sure you don’t get whacked with a huge fine of up to £15m or 4% of your organisation’s global annual turnover.

    Not only are there potentially huge financial repercussions, but leaving your business open to attack and your customers at risk can cause serious reputational damage.
  • Why Visibility is Key to GDPR
    Why Visibility is Key to GDPR Adrian Rowley, EMEA Technical Director at Gigamon Recorded: Aug 17 2017 40 mins
    The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.

    Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.

    In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:

    - Eliminate monitoring blind spots
    - Vastly improve the accuracy and precision of data risk detection
    - Help organisations meet the GDPR challenge

    About the Presenter

    Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
  • Not Your Grandmothers Network: What SDN Really Means
    Not Your Grandmothers Network: What SDN Really Means Eric Hanselman, Chief Analyst, 451 Research Recorded: Aug 16 2017 46 mins
    We’ve been working through the impacts of software-defined networking for a number of years. The technologies that have reached the market today have matured considerably from the early implementations and there are tremendous opportunities that SDN has created. What were once model T’s are now a lot faster and a bit more furious.

    Those changes have also opened some gaps in understanding and management that can create operational issues and security concerns. SD-WAN’s are seeing a lot of deployment and the orchestration possibilities of virtual networks in software-defined infrastructures (SDI) are powerful.

    This session will dig into the implications of all of this new performance and look at ways to ensure that your network doesn’t wind up in the ditch. There’s a lot of good work to be done, but it’s important to understand how to master all of that power.
  • 6 Key Tech Disruptions and Our Point of View
    6 Key Tech Disruptions and Our Point of View Chris Hsu Recorded: Aug 16 2017 63 mins
    HPE Software EVP & GM Chris Hsu hosts: 6 Key Tech Disruptions and Our Point of View

    As part of the planned Software spin-off and merger with Micro Focus, HPE’s Software organization is undergoing a major transformation to shape the combined company as uniquely positioned to help customers on challenges across a hybridized environment.

    And hybrid is much more than a buzzword. In today’s reality, not only do businesses have to deal with the rapidly changing technologies and multiple deployment models, but they also have to deal with the pressure of reducing their run costs and to constantly innovate.

    During this transformation, we have interviewed thousands of customers, conducting deep market research, allowing us to gain unprecedented market insights. Join this webcast and learn about the new waves of tech disruptors, and how, our combined, software pure-play company is going to shape the industry.

    “When you prepare for a global merger of this scale, it gives each company an unprecedented opportunity to look at all of their processes and take steps to optimize. We have had the luxury of stepping back and asking how do we transform our IT platform to support our strategy for tomorrow? Few of us ever get this opportunity.”
  • Who Stole My Software-Defined Network?
    Who Stole My Software-Defined Network? Chuck Black, Author, Senior SDN Instructor, Training & Development Recorded: Aug 16 2017 64 mins
    Software-defined networking has previously had a relatively narrow definition, but in the past few years, SDN has expanded and morphed towards including multiple different technologies. Protocols such as NETCONF, BGP, PCEP, and even the CLI are being used in "SDN" solutions. Even automation and orchestration are being presented as a form of SDN. Where has SDN been, where is it now, and where it is going? These are questions that this presentation will answer.

    Chuck Black is author of the book "SDN: A Comprehensive Approach", and has been active in creating networking products for over 35 years, acquiring many patents and scars in the process. He is currently engaged in teaching vendors and customers alike about software-defined networking.
  • IT Solutions from Cradle to Grave - An interview with William Choppa
    IT Solutions from Cradle to Grave - An interview with William Choppa IT Chronicles Media Recorded: Aug 16 2017 10 mins
    Bill Choppa talks to Carlos Casanova and Shane Carlson about Cradle to Grave IT Solutions
  • Software-Defined Everything at the Elastic Edge
    Software-Defined Everything at the Elastic Edge Tyler Peterson and Matt Thueson, NetCloud Product Specialists at Cradlepoint Recorded: Aug 16 2017 43 mins
    From SD-WAN at branches and quick-serve restaurants to SD-Perimeter (SD-P) for the Internet of Things and remote employees, networks today need constant connectivity, mobility, cloud services and software-defined everything. The Elastic Edge of the network requires a secure, next-generation WAN that expands, contracts, and evolves at a moment’s notice.

    Join Tyler Peterson and Matt Thueson of Cradlepoint for a live webinar on Aug. 16, 2017, to discuss use cases and success stories for SD-WAN, SD-P, and always-available LTE connectivity.

    Attendees will learn about:

    + The characteristics of the Elastic Edge
    + Simpler, more efficient networking at the branch level
    + Virtual Cloud Networks and dark cloud security for IoT
    + Real-word SD-WAN and SD-P success stories
  • Considerations in Data Center Transformation
    Considerations in Data Center Transformation Tom Parker, Solutions Product Manager, Lenovo and Robert Campbell, Senior Global Technical Alliance Manager, VMWare Recorded: Aug 16 2017 43 mins
    VMware's Software Defined Data Center is about data center transformation. Join Lenovo and VMware for a discussion about hybrid cloud, storage, and other things to consider in your data center transformation. Consider a hyperconverged design based on VMware VSAN, or work with traditional storage. Find the right path for your enterprise, so your team can focus less on keeping the lights on and more on data governance and enterprise business unit needs.

    In this webinar, Lenovo and VMware will discuss validated and tested designs working with the most recent VMware software releases and Lenovo’s ThinkSystem servers and infrastructure based on Intel® Xeon® Scalable processors. Join us to see how Lenovo and VMware enable you to transform your IT by building a high performing, serviceable, and secure future-designed data center.
  • Software-Defined Agile Infrastructures: How the Future of SDN is Evolving
    Software-Defined Agile Infrastructures: How the Future of SDN is Evolving Todd Krautkremer, Cradlepoint, Bill Nelson, Lenovo & Chad Hintz, Cisco Recorded: Aug 16 2017 63 mins
    According to Aryaka's 2017 State of the WAN report, 50% of WAN traffic is now in the cloud. The cloud era of networking has officially arrived, and engineers better get comfortable with the software. It's here to stay.

    SD-WANs are now more business-critical than ever. Given the rise and momentum of BYOD and more and more connected IoT devices storing data in the cloud, WAN traffic is growing more than 200% YoY. Companies can't afford not to adopt these technologies and risk falling behind the curve without a mobile infrastructure.

    Join Todd Krautkremer, SVP of Strategy & Corporate Development, Cradlepoint, William Nelson, Principal Networking and SDE Architect at Lenovo, and Chad Hintz, Principal Systems Engineer, Cisco for a true technical deep dive and look at advanced SDN. Tune into this dynamic panel discussion for insight into key trends in software-defined networking, what it means for the cloud and IoT, and what the evolution of secure, agile infrastructures will look like in a software-defined world.
  • The Automation Journey Starts with Firewall Administration
    The Automation Journey Starts with Firewall Administration Erez Tadmor, Senior Product Manager & Karen Crowley, Sr. Product Marketing Manager, Tufin Recorded: Aug 16 2017 39 mins
    As a valued Tufin customer we invite you to learn how to begin the journey towards automation. We will discuss the challenges of automation and how you can take the first step towards automating firewall administration tasks.

    In this webinar, you will learn how to gain immediate productivity benefits from the first phase of firewall change automation, such as;

    •Discover and decommission unused and forgotten rules with a streamlined, automated process
    •Understand the implications of server decommission and automate the process
    •Realize the benefits of automating changes to object groups

    Register now to save time and resources, reduce your workload, and quickly tighten your security posture with practical firewall automation.
  • Incident Response from the Inside Out
    Incident Response from the Inside Out Sam McLane, Head of Security Engineering, Arctic Wolf Networks Recorded: Aug 15 2017 2 mins
    In this video, we take a deeper dive into the incident response. Discover what a containment strategy is, how evidence is gathered, and is that evidence always the truth.
  • [Talk] op 10 Barriers to DevOps - and how to overcome them
    [Talk] op 10 Barriers to DevOps - and how to overcome them Shashi Kiran, CMO, Quali Recorded: Aug 15 2017 52 mins
    his presentation will share key insights from a survey Quali conducted of 2045 professionals to gauge the state of DevOps and Cloud adoption. It reviews the top 10 barriers to DevOps adoption as well as best practices that can help overcome these barriers. This is an informative session for DevOps and Cloud architects, application owners, technologists as well as IT infrastructure professionals that are responsible for planning and deployment of DevOps tools and processes.
  • Secure Your Business: How to Improve Threat Detection & Response
    Secure Your Business: How to Improve Threat Detection & Response Sridhar Karnam, Director, Product Marketing at Arctic Wolf Networks Recorded: Aug 15 2017 39 mins
    Are cyberthreats keeping you up at night? You’re not the only one. According to recent research, 67% of companies are worried about security issues such as malware, phishing, and data theft. 

    So how do you improve your company’s security? How should you prioritize? How can you integrate all the tools? How many security staff will you need? How do you integrate a SOC and a NOC? 

    Managed Detection and Response (MDR) provides the answer to all these questions. With a focus on quick detection and response to threats, the service combines the right tools, people and processes to help you quickly implement the best security within your budget. 

    Ready for a good night’s rest? Join this webinar to discover how MDR can help!
  • Integrated Security in Operations - An interview with Dennis Drogseth
    Integrated Security in Operations - An interview with Dennis Drogseth IT Chronicles Media Recorded: Aug 15 2017 9 mins
    Kirstie Magowan and Carlos Casanova talk to Dennis Drogseth about Integrated Security in Operations
  • Challenges in Building Connected Communities
    Challenges in Building Connected Communities Kate Garman, Jascha Franklin-Hodge, Peter Marx, Limor Schafman Aug 21 2017 3:00 pm UTC 75 mins
    Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more.

    This webcast will discuss such questions as:
    > What issues are city officials prioritizing for resolution through smart community applications?
    > How are communities planning for and deploying small cell infrastructure?
    > Which departments are involved in communications infrastructure?
    > How can suppliers navigate the multiple departments involved in decision making?
    > What business models are cities negotiating with their technology product partners?
    > What are some of the lessons learned from cities that you can translate into your own business offering?

    Speakers:
    Jascha Franklin-Hodge, CIO, Boston, MA
    Kate Garman,Smart City Coordinator, Seattle, WA
    Peter Marx, currently in the position of VP, GE Digital and former CTO, City of Los Angeles
  • Solving the last encryption problem. Never exposing keys in memory!
    Solving the last encryption problem. Never exposing keys in memory! Steve Pate – HyTrust Chief Architect Aug 22 2017 3:00 pm UTC 60 mins
    It wasn’t long ago that encryption projects were thwart with problems. The performance was terrible. Key management was a nightmare. Encryption was only implemented as a “must have” for compliance or national security. Around 10 years ago, performance started to be addressed with the introduction of AES acceleration in modern Intel processors. A new range of key management solutions started to appear to simplify encryption projects. Coupled with a “move to the cloud” the demand for encryption is now at an all-time high. But there is still one problem left to be solved. To perform encryption, even with hardware acceleration that AES-NI provides, encryption keys need to be memory resident. As such, the keys are vulnerable to attack.

    With the introduction of Intel QuickAssist and Key Protection Technology and, in conjunction with HyTrust DataControl, this webinar will introduce you to some new and exciting technology where encryption keys are never exposed in memory and high-performance encryption is performed by the QuickAssist hardware. We’ll also be exploring the use of SGX in conjunction with QuickAssist to build secure, distributed HSMs.
  • Driving Change in IT Ops through Automation
    Driving Change in IT Ops through Automation Justin Nemmers, General Manager, Ansible by Red Hat Aug 22 2017 4:00 pm UTC 60 mins
    Given the sheer pace of innovation and ever-increasing competition in today’s marketplace, organizations are leaning on the CIO more than ever before to lead a lean, agile enterprise. For IT teams, this has translated into delivering faster, at greater scale, and more efficiently.

    These same demands have also catalyzed a demand for new applications that are delivered both more nimbly and more quickly. This places further stress on the IT Operations team, as they are now tasked with providing a scalable, on-demand infrastructure that can service both developers and the business.

    As these expectations converge, IT leaders can no longer focus solely on a management strategy – they must also consider, “What is our automation strategy?” Red Hat and Intel are bring together senior IT executives from across industries for this webinar: Driving Change in IT Ops through Automation. Join us for a brief presentation that will explore how automation can help transform IT operations for the next generation of IT management, followed by a panel of senior IT executives as they discuss the challenges and best practices related to these topics and more.
  • How to Choose Your Next Database Audit Solution
    How to Choose Your Next Database Audit Solution Terry Ray, Chief Technology Officer at Imperva Aug 22 2017 4:00 pm UTC 60 mins
    Data is the lifeblood of today's business. As the volume of generated data continues to grow, so does the number of data breaches. It's more critical than ever for organizations to adopt database audit and protection solutions. But not all solutions are created equal.

    What are the key capabilities that IT and security teams should evaluate? Join Terry Ray as he discusses key considerations for selecting a database audit and protection solution.

    About the Presenter:

    Terry Ray is the Chief Technology Officer for Imperva, Inc., the leading provider of data security solutions. Terry works directly with Imperva’s largest customers to educate on industry best practices, challenges and regulations. He also, operates as an executive sponsor to strategic customers who benefit from a bridge between both company’s executive teams. During his 12 years at Imperva, he has deployed hundreds of data security solutions to meet the requirements of customers and regulators from every industry. Terry is a frequent speaker for RSA, ISSA, OWASP, ISACA, Gartner, IANS and other professional security and audit organizations in the Americas and abroad.
  • Virtual Network Insight: Installation, Configuration & Microsegmentation
    Virtual Network Insight: Installation, Configuration & Microsegmentation Karl Hauck (Sr. Systems Engineer) and Brian Wilson (Staff Systems Engineer) Aug 22 2017 6:00 pm UTC 90 mins
    Looking to solve the puzzling visibility gap across the virtual and physical network? Trying to find the elusive answer to ensuring health and availability while also enhancing security and compliance? Need to deliver faster time to value?

    See how you can quickly and easily design and deploy micro-segmentation across the network with an intuitive and easy-to-use UI with natural language search. Optimize network performance and availability with visibility and analytics across virtual and physical networks. And get troubleshooting and operational views to quickly and confidently manage and scale VMware NSX deployments. This session will provide you an overview of vRealize Network Insight (vRNI) product and capabilities.
  • Watch the Cloud: Monitoring Your Migration
    Watch the Cloud: Monitoring Your Migration Mike Langdon, Product Manager Aug 22 2017 6:00 pm UTC 30 mins
    Migrating your infrastructure from on-premises to the cloud requires extensive monitoring to ensure your IT operations don't suffer along the way. For many organizations, garnering this insight can be difficult -- if not impossible. Join Blue Medora's Mike Langdon to learn key best practices to monitor your infrastructure during migration, helping you simplify the process and ensure optimal performance from migration to decommissioning.
  • Learn how the NIST Cybersecurity Framework Benefits State and Local Governments
    Learn how the NIST Cybersecurity Framework Benefits State and Local Governments Renault Ross, Chief Cybersecurity Business Strategist North America, Symantec Aug 22 2017 6:00 pm UTC 60 mins
    The NIST Cybersecurity Framework (CSF) provides an excellent guide for state and local governments looking to improve their overall cybersecurity posture.

    Join our webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross, where he reveals how to apply the CSF to state and local government.

    Learn to:

    •Identify where sensitive data is and who is accessing it.

    •Protect that data with universal policies to ensure stability of networks and infrastructure.

    •Detect cyber threats quickly and reduce the chance of breaches.

    •Respond to threats with automated actions.

    •Recover after a threat to produce reports to prove compliance.

    Register Today
  • Moving towards XaaS: Could the Public versus Private Cloud debate be over?
    Moving towards XaaS: Could the Public versus Private Cloud debate be over? Rory Duncan, Research Director at 451 Research; Dan Havens, SVP, WorldWide Sales at Ormuco Aug 23 2017 1:00 pm UTC 60 mins
    The cloud promises to enable organisations to be more flexible, agile and responsive to the needs of their business and the demands of customer and partners. As physical infrastructure has become invisible to end-users, the role of service providers and channel partners has changed. Faced with public and private options, many firms are taking a XaaS approach, embracing the best of both private and public worlds - implementing hybrid architectures to deliver on-demand access to compute resources, capacity, and services, while also providing greater levels of control, security, and visibility of data and applications. In this webinar, Rory Duncan, Research Director with 451 Research will outline the opportunities for Service Providers and channel partners delivering cloud services, examining topics such as support, managed services, data protection and data sovereignty for facilitating cloud consumption.
  • Upgrade Your Website Performance and Security: Migrate from Akamai to Incapsula
    Upgrade Your Website Performance and Security: Migrate from Akamai to Incapsula Dvir Shapira, Director of Product Management & Robert Hamilton, Director of Product Marketing, Imperva Incapsula Aug 24 2017 4:00 pm UTC 45 mins
    If your Akamai cloud-based platform is no longer meeting your company’s need for security and application delivery, consider a switch to Imperva Incapsula.

    The Incapsula cloud service helps you deliver applications securely and efficiently. With a single interface that integrates content delivery, website security, DDoS protection, and load balancing, you can accelerate the delivery of your web content and protect your site from external threats.

    Here's just some of what you'll learn during this webinar:
    •The differences in functionality between the two platforms
    •Operational advantages and cost savings from a switch to Incapsula
    •How to plan and execute a successful migration from Akamai to Incapsula

    And just for attending this live webinar, you’ll get a free migration guide to help you transition easily from Akamai to Incapsula.

    With PCI compliance, a robust engine with customizable security rule setting, 24/7 support, and significant cost savings, why wouldn’t you consider a switch to Incapsula? Find out if the Incapsula cloud security platform is right for you.
  • Modeling and Pricing Cloud Migration Scenarios
    Modeling and Pricing Cloud Migration Scenarios Chris Grossmeier, Senior Director of Product, CloudPhysics Aug 24 2017 5:00 pm UTC 45 mins
    Learn how to appropriately model your future state environment for both instance and cluster-based cloud hosting. Learn how outliers and dependencies make major impacts on capacity and costing your future environment. Look at groupings, clusters, and dependencies to ensure all workloads move together to avoid ingress/egress charges for large IO resources.
  • Shoring up Your Defenses by Leveraging Analytics and Machine Learning
    Shoring up Your Defenses by Leveraging Analytics and Machine Learning Mark McGovern, VP, Product Mgmt., CA; John Carnes, Infosecurity Senior Adviser, Anthem; Erik Von Geldern, FXCM Aug 24 2017 5:00 pm UTC 75 mins
    Attackers are getting quicker and more sophisticated. Today's enterprise defenders aren’t able to withstand the pace and complexities of the threats they face. Automated tools and intelligence are being deployed to breach your IT infrastructure and access your priceless data by targeting privileged accounts. In playing defense, security teams must become proactive, not reactive and use data and analytics in a meaningful way, being more effective and agile in detecting attackers and quickly thwarting them. Join CA Technologies and (ISC)2 on August 24, 2017 at 1:00PM Eastern for a discussion on emergence of machine learning and security analytics as tools that organizations can leverage to defend their data and some practical ways it can be used to protect key assets such as privileged accounts.
  • Success Factors in Threat Intelligence: Part 4 - Connecting the Dots
    Success Factors in Threat Intelligence: Part 4 - Connecting the Dots Allan Thomson, Chief Technical Officer Aug 24 2017 6:00 pm UTC 45 mins
    This series describes a comprehensive “business technical approach” to the justification, definition, design and execution of Threat Intelligence Programs.

    What do we mean by “business technical approach’ to Threat Intelligence?

    Much in the industry is focused solely on one technical aspect or another of threat intelligence data that indicates information about a specific malware family, a set of indicators that can be used to block malicious sites, campaign information that highlights a threat actors profile, their tactic, techniques and procedures. But much of the technically focused content do not discuss how organizations can gather or construct that information themselves, and even more so, how an organization would organize themselves to respond to such data. Much of the output of the industry is providing the fish to organizations rather than teaching the organizations how to fish themselves.

    A ‘business technical approach’ is one where we define an approach focused on the business needs, the organization personnel, organizational roles & responsibilities, team structure and those elements’ interaction with technology to address the challenge of successful threat intelligence operations. Our goal is to help organizations build effective Threat Intelligence programs.

    In this final part of the CSO Series, we will describe how successful TI Programs can fully deliver on reducing risk in organizations. What does success look like for an effective TI Program when it is fully integrated into organizations security framework.
  • VMware vRealize Operations: Installation, Sizing & Day 1 in the Cloud
    VMware vRealize Operations: Installation, Sizing & Day 1 in the Cloud Mike Eisenberg Aug 24 2017 6:00 pm UTC 90 mins
    During this session a VMware Cloud Specialist Engineer will show you how to install and configure vRealize Operations (vROps) to quickly make it functional within your environment. We will begin with a brief review of the vRealize Operations Architecture and its different server configuration options.

    This session will also cover:
    -Sizing considerations and guidelines for pre-installation planning
    -Installation wizard walk through including setup options and their effect on the environment
    -Connection options of vROps to a vCenter(s) and the process of discovering and collecting data
    -Steps to verify the system is collecting data once installation is complete

    To wrap things up we will review the user environment and how to start using vROps to proactively manage your environment.
  • IoT is Wildly Insecure – Who is watching over your wall?
    IoT is Wildly Insecure – Who is watching over your wall? Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Aug 24 2017 6:00 pm UTC 45 mins
    In today’s interconnected world of IoT devices, security is the #1 challenge. Between self-driving cars, Nest thermostats, and talking refrigerators, the Internet of Things has grown at a staggering rate. It’s estimated that there will be an 50B IoT devices in use by 2020, most of which will have exploitable vulnerabilities.

    Manufacturing, healthcare, and information sectors have all embraced IoT devices because of their increased functionality, but at what cost to network hygiene? As your organization begins to incorporate more connected devices, how do you protect your network?

    Attend this webinar to learn about:
    1)  Top 5 IoT Security Challenges
    2)  Disconnect between Operations and Information Technology
    3)  Cyber security best practices that includes IoT security

    You are the shield that guards your realm. Don’t let IoT penetrate your wall.
  • Six foresights for the SDN – ensuring security, connectivity, and compliance
    Six foresights for the SDN – ensuring security, connectivity, and compliance Amnon Even Zohar Director of Cloud Product Management, Tufin & Dan Rheault, Sr. Product Marketing Manager, Tufin Aug 29 2017 3:00 pm UTC 45 mins
    Despite the rampant adoption of cloud computing, some companies are hesitant to move entirely to the public cloud. Instead, they rely on the higher degree of control of the SDN in the private cloud, or utilize a hybrid approach. While the private cloud offers more control and manageability, ensuring that applications are deployed successfully, securely, and within the parameters of compliance can pose challenges without proper visibility and the foresight for auditability.

    Organizations that are using a SDN need to employ best practices at the start to ensure that they are successful in the future.

    Please join members of Tufin cloud team for an informal product-agnostic discussion on how network security policy management (NSPM) solutions can ingrain best practices in deploying and managing applications in the SDN, ensure connectivity, and enforce security. Topics for discussion include how to:
    •Build a zero-trust policy in the private cloud
    •Ensure compliance across all access changes
    •Design and deploy network segmentation efficiently
    •Deploy business applications with access continuity
    •Ingrain preparedness for audits
  • Acceleration with the Universal Data Plane - FD.io
    Acceleration with the Universal Data Plane - FD.io Ed Warnicke, FD.io Technical Steering Committee chair, Cisco & John DiGiglio, FD.io Marketing Committee, Intel Aug 29 2017 4:00 pm UTC 60 mins
    The Fast Data Project, FD.io, is relentlessly focused on data IO speed and efficiency for more flexible and scalable networks and storage. As the universal data plane, FD.io is helping enable the developer community achieve the highest performance, throughput, and resource efficiency in cloud networking, container networking, NFVI, bare metal networking, and SmartNic acceleration. Recently FD.io extended its lead as the fastest most scalable software data plane on earth by demonstrating terabit throughput levels with multi-million fib table entries on standard high-volume server platforms utilizing the new Intel® Xeon® Scalable Processor. Hear from host Ed Warnicke (Technical Steering Committee chair and Distinguished Engineer at Cisco) on the benefits of FD.io, including key functionality offered in the latest release (17.07), providing key features to enable commercial-ready solutions for software-defined infrastructures. Also hear from host John DiGiglio (Packet Processing SW Product Manager at Intel) on how recent architectural improvements in Intel’s newest platform have doubled performance without modification to the FD.io software.
  • Modern Data Center Virtualization for Securing Tomorrow's Cloud Applications
    Modern Data Center Virtualization for Securing Tomorrow's Cloud Applications Jon Benedict, technical product marketing manager, Red Hat Virtualization Aug 29 2017 4:00 pm UTC 105 mins
    Even with the advent of cloud and containers, virtualization will continue to be key to the efficient data center. But is your virtualization technology able to handle today’s demands for hybrid, modern applications?

    Red Hat® Virtualization provides the performance, security, and scale required for virtualized workloads that pave the way for streamlined operations, increased productivity, and ultimately more modern applications. Learn about approaches for consolidating, upgrading, or migrating virtualization resources and unifying and automating management of heterogeneous environments.

    The OpenStack® Word Mark and OpenStack Logo are either registered trademarks / service marks or trademarks / service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation or the OpenStack community.
  • Dive Deep into NVMe over Fibre Channel (FC-NVMe)
    Dive Deep into NVMe over Fibre Channel (FC-NVMe) Curt Beckmann, Brocade, Craig Carlson, Cavium, J Metz, Cisco Aug 29 2017 5:00 pm UTC 60 mins
    As FC-NVMe (NVMe over Fibre Channel) is preparing for it’s official launch, there have been numerous questions about how the technology works, how it gets implemented, and what makes it special when compared to traditional, SCSI-based Fibre Channel.

    When we did our first webinar on FC-NVMe [link], we got lots of questions about more details, more technical aspects, and more thorough explanations. So here we are!

    This presentation is going to be a more thorough analysis of the bits and bytes of FC-NVMe, where you will learn:

    •What are the key differences and similarities between NVMe and SCSI Fibre Channel structures
    •What are the main architectural differences between NVMe and SCSI deployments
    •Impact on Queue Depth
    •How to cross-connect legacy and future flash arrays with FC-NVMe

    Please join us on August 29th for this advanced, deep dive on FC-NVMe.
  • Getting Started with IT Automation and Self Service Provisioning
    Getting Started with IT Automation and Self Service Provisioning Ryan Kelly, Staff Systems Engineer, Cloud Management BU, VMware Aug 29 2017 6:00 pm UTC 90 mins
    We all know how important automation is for the delivery of IT services. And a self-service provisioning, the key feature of the cloud, comes hand in hand with automation. But many customers, even those who already have vRealize Automation in their environment, don’t know where to start or how to move forward in the most effective way. If you are one of them, this webcast is for you.

    Through practical demonstrations, whiteboards, and technical tutorial, we will show you how to quickly become the automation guru in your team!

    In this technical, hands-on webinar we will cover the following topics:
    -Overview of vRealize Automation setup and configuration
    -Identifying and catering to your end users
    -Blueprint design (Machine Lifecycle Whiteboard session)
    -Overview of vRealize Automation extensibility
    -Tying it all together
  • The Profound Effect Wireless will Have on Your Network Infrastructure
    The Profound Effect Wireless will Have on Your Network Infrastructure Jim Frey, Director of Marketing Aug 30 2017 3:00 pm UTC 30 mins
    Explosive growth in the number of wireless devices being used, combined with advancing wireless technology, will eventually lead to big changes to your network infrastructure. This 30-minute webinar will review the evolution of network technology and the associated bandwidth requirements of each new generation. It will also discuss how next generation WAPs (only a few years away) will affect your horizontal network infrastructure, and eventually, your fiber backbone too. The webinar will close with some recommended network infrastructure solutions you should consider for your next WiFi project.

    You should attend this webinar if you want to:
    - Minimize the total cost of ownership (TCO) for your next WiFi project
    - Learn how wireless technology is advancing
    - Be prepared for the next generation of wireless will be here in just a few years
  • Comprehensive Protection and Visibility into Advanced Email Attacks
    Comprehensive Protection and Visibility into Advanced Email Attacks Nirav Shah, Product Mktg Mgr for Email Security.Cloud, Symantec & Naveen Palavalli, Director Product Mktg., Symantec Aug 30 2017 5:00 pm UTC 60 mins
    The latest version of the Symantec Cloud Email Security solution provides the strongest protection against Business Email Compromise with new, automated impersonation controls.

    In addition, this release offers the deepest visibility into targeted & advanced attacks with advanced email security analytics that now includes insights into both clean and malicious emails with 60+ data points on each email.

    Join this webcast to learn more about these new capabilities in and see them in action! Find out how Symantec Cloud Email Security can help you:

    • Defend your business from Business Email Compromise, spear phishing, spoofing attacks, and other scams

    • Accelerate response to targeted and advanced email attacks with more visibility than ever into email threats

    • Quickly correlate and respond to threats by exporting advanced email security analytics to your Security Operations Center
  • Have Your Cake and Eat It Too With R, Python + SAS®
    Have Your Cake and Eat It Too With R, Python + SAS® Wendy McHenry, SAS; Rachel Hawley, SAS; Jesse Luebbert, SAS Aug 30 2017 6:00 pm UTC 60 mins
    R and Python are used by many data scientists, often bringing together teams with varied backgrounds and experiences to solve complex problems in new ways. But R and Python often lack the scalability, governance and support needed for enterprise analytics deployment. In this webinar, you'll see a demo on how SAS integrates with R and Python to increase productivity, value, maturity, and scalability of your data science efforts. Key takeaways:

    • How to use R and Python with SAS while meeting statistical analysis requirements within your organization and with external regulatory agencies.
    • How SAS offers the scalability, governance and support organizations require for production and operational analytics.
    • When and how SAS is used with R and Python.
  • Getting Sign-off for Your SD-WAN Business Case
    Getting Sign-off for Your SD-WAN Business Case Tim Sullivan, CEO, Coevolve & Sasha Emmerling, Sr. Director of Marketing, VeloCloud Aug 31 2017 1:00 am UTC 60 mins
    Coevolve and VeloCloud had a great response to our Webinar: “Building an SD-WAN Business Case – Part 1”. Now it is time to expand on that information about building a compelling business case to adopt SD-WAN and share a next level of experience.

    In“Part 2 – Getting sign off for your SD-WAN Business Case” Tim Sullivan, CEO of Coevolve and Sasha Nunke, Sr. Director of Marketing, VeloCloud will discuss details on the following:

    - The SD-WAN business case headlines required for C-level approval
    - What commercial due diligence is required and how do you evaluate it?
    - What are the most persuasive operational benefits of SD-WAN?
    - What TCO and rate of return metrics typically achieved by other enterprise SD-WAN achieving?