Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Securing All of Your Data on All of Your Clouds
    Securing All of Your Data on All of Your Clouds Ronen Shpirer, Security Solutions Architect, Fortinet Recorded: Oct 18 2017 43 mins
    Your data is created, processed and consumed everywhere in your data center, and in an multi-dimensional hybrid cloud environment.

    Securing and protecting this data seamlessly across these environments in a coherent way is crucial to the effectiveness of your security posture.

    This session will provide a mix of information and live demonstrations on seamlessly securing all of your data on all of your clouds.
  • The Emerging Impact of NVMe-oF and Storage Class Memory
    The Emerging Impact of NVMe-oF and Storage Class Memory Jeff Kato, Senior Analyst & Consultant, Taneja Group Recorded: Oct 17 2017 61 mins
    Join us for a fast-paced and informative 60-minute roundtable as we discuss the latest—and potentially most game-changing—technology disruptors to traditional storage architectures since flash: NVMe over fabric and Storage Class Memory.

    It was just five years ago that Flash technology transformed the traditional storage market forever. Modern flash-first arrays are now the new normal for traditional storage. Will a new shared storage access protocol called NVM express over Fabric (NVMe-oF) combined with the advent of storage class memory (SCM) be equally disruptive to traditional storage over the next five years as NAND flash technology was in the past?

    Vendors are now announcing new products and future architectures to enable them to support these new technologies. With the help of a lively panel of experts from HPE, Pivot3, and Mellanox, we will unpack this topic and explore how their innovative approaches to leveraging Storage Class Memory and NVMe-oF can radically improve storage products and solutions.
  • 2018 Forecast: Clouds Keep Rolling In
    2018 Forecast: Clouds Keep Rolling In Howard Marks, Deep Storage & Bernie Behn, Avere Systems Recorded: Oct 17 2017 57 mins
    Howard Marks looks ahead at the storage trends rolling into IT Operations in the new year.

    Today’s data center is a much more dynamic environment than ever before leaving IT organizations struggling to compete, and or integrate, with public cloud services with tools and hardware designed for the much more static datacenter of yesteryear. In this webinar long time industry observer Howard Marks will examine five of the trends that IT operators should pay attention to in the coming year.

    Our discussion will focus on the promise, tools and challenges involved in moving to hybrid architectures that bridge private data centers and cloud resources to shift workloads, support data-intensive compute operations, manage unstructured data growth, build affordable archives, and prepare for disaster recovery. These technologies will consider macro-level trends as well as solving operational challenges that come with the growth of cloud.

    Infrastructure architects, systems engineers, storage engineers, data strategists, HPC specialists and other enterprise IT professionals will learn:
    - Current environment and challenges in building hybrid infrastructures that support traditional and object storage
    - Five not-to-be-ignored trends ripe for adoption in 2018
    - How compute and storage can mix in the new cloud-enabled world
  • Manage your Secure Access with one view via Pulse One
    Manage your Secure Access with one view via Pulse One Jim Hebler, Partner Velocity Director & Greg Bassett, Senior Director - Solutions Architecture Recorded: Oct 17 2017 32 mins
    How much visibility do you have via Secure Access end-points – from the Data Center, to the Cloud, to Devices and Applications hitting your network?

    Join Pulse Secure for a compelling Webinar Centered on Pulse One – its’ leading edge Monitoring-Visibility Solution. Configured correctly, Pulse One also enhances compliance alliance, segmentation and pro-active management and consolidation for Secure Access at the front-edge of your network.
  • ExtraHop 7.0: Know the Shape of Your Enterprise
    ExtraHop 7.0: Know the Shape of Your Enterprise Isaac Roybal, Director of Product Marketing and Paul Sanford, Sr. Director of Product Management for ExtraHop Recorded: Oct 17 2017 60 mins
    Many teams throughout the enterprise—security, network, IT operations—lack the insights needed to make confident, data-driven decisions. People cannot access the data they need quickly, resulting in waste, slow response times, and expensive incidents.

    With the announcement of version 7.0, ExtraHop provides real-time and empirical data all teams can benefit from through complete visibility, faster incident resolution, and stronger security.

    In this webinar, we will cover the new ways we are helping our customers reveal the shape and context of their digital enterprise by demonstrating:
    • Live activity maps that allow for unprecedented visual environment exploration
    • Automated anomaly workflows—including new security anomalies
    • Scheduled reports that share real-time views of the information that matters most to each user
  • Cloud-Delivered SD-WAN and Security: Best Practices for Branch Transformation
    Cloud-Delivered SD-WAN and Security: Best Practices for Branch Transformation Dhawal Sharma, Director of Product Management, Zscaler, Inc., Rachna Srivastava, Sr. Director of Product Marketing, VeloCloud Recorded: Oct 17 2017 59 mins
    Cloud technology is the key enabler to new business opportunities, improved efficiency, and a sustainable competitive edge. IT requires new ways to rapidly deliver business applications and services in the cloud reliably and securely. This can be achieved by adopting a new approach that allows for agility and security in the cloud-era.

    Attend this webinar to learn about a holistic transformation strategy that brings cloud security and SD-WAN from Zscaler and VeloCloud together for secure, efficient, and cost-effective access to cloud applications and services, over the Internet and beyond.
  • SNIA's New 100-Year Archive Survey: Ten Years Later
    SNIA's New 100-Year Archive Survey: Ten Years Later Thomas Rivera, SNIA-DPCO Co-Chair; Sam Fineberg, SNIA LTR TWG Co-chair; Bob Rogers, CTO, Application Matrix Recorded: Oct 17 2017 60 mins
    Ten years ago, the SNIA 100-Year Archive Task Force developed a survey with the goal to determine the requirements for long-term digital information retention in the data center - requirements needed to frame the definition of best practices and solutions to the retention and preservation problems unique to large,scalable data centers.

    Now in 2017, SNIA presents a new survey developed to assess the following details:

    1. Who needs to retain long term information
    2. What information needs to be retained and for how long
    3. If organizations are able to meet their retention needs
    4. How long term information is stored, secured and preserved

    Join us as we see where we were and where we need to be in the preservation and retention of data.
  • How to Use the NIST CSF to Recover from a Healthcare Breach
    How to Use the NIST CSF to Recover from a Healthcare Breach Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Recorded: Oct 17 2017 60 mins
    Part 6 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    The final piece to the puzzle is the RECOVER function, which is arguably the most important area of the NIST CSF. How quickly can you return to business and clinical operations after a cyberattack occured?

    This webinar will focus on the measures required for a timely recovery and return to normal operations to reduce the impact from a cybersecurity event, with a focus on:

    • Recovery Planning: Processes and procedures are executed and maintained to ensure timely restoration of systems or assets.

    • Improvements: Planning and processes are improved by incorporating lessons learned.

    • Communications: Restoration activities are coordinated with internal and external parties.

    Register Today

    To view upcoming NIST Cybersecurity Framework for Healthcare Series Part 7 https://resource.elq.symantec.com/LP=4235
  • Adventures in TI: What is your IP Reputation?
    Adventures in TI: What is your IP Reputation? Guy Rosefelt, Director of PM, APAC Threat Intelligence & Web Security Recorded: Oct 17 2017 48 mins
    Abstract: Can you afford not knowing how bad your provider's IP reputation is? How likely are IP addresses adjacent to you of being infected with malware or participating in botnets?

    NSFOCUS has been tracking the reputation of IP addresses globally by ASN for over a year and recently released the August 2017 Global IP Reputation report. Some interesting patterns have emerged worldwide as the number of IP addresses added to reputation lists continues to increase due to Mirai, WannaCry and other malware infecting the Internet of Things.

    NSFOCUS SecLab is tracking IP reputation across 9 categories, including SPAM, DDoS, botnets, and web attackers. This talk will present global IP reputation trends and rank the countries with the worst IP reputation…and it may not be China.
  • Simplifying your Secure Access solution with the latest software release
    Simplifying your Secure Access solution with the latest software release Prashant Batra, Ganesh Nakhawa, and Scott Erickson Recorded: Oct 17 2017 44 mins
    Learn how Pulse Secure’s latest Secure Access solutions are protecting the latest information architecture transformation and investment.

    Our latest Secure Access software release includes stronger portfolio integration, expanded ecosystem interoperability, and revamped admin UX.

    Along with these highlights, we will show you the tech in action with live demos of Pulse Cloud Secure and Profiler. We are excited about securing your digital footprint with this exciting release. Don't miss out!
  • Take your Incident Response plan to a whole new level!
    Take your Incident Response plan to a whole new level! Gary Southwell, General Manager, CSPi & John Black, Cisco Recorded: Oct 17 2017 44 mins
    In this webinar, join Cisco and CSPi as they discuss how automated breach notification takes Cisco’s incident response services to a whole new level. With FirePOWER and nVoy the incident response process can start immediately after a breach is verified and therefore be completed faster, in some cases the full impact of a breach can be determined in minutes.

    This can be extremely powerful for companies which rely on managed services providers for their cyber breach incident response strategy. With FirePOWER and nVoy Cisco’s IR professional services team will proactively monitor the solution for you and will receive email notifications when a potential incident is occurring against your organizations critical assets to trigger IR activity as per services contract.

    Shortening the breach identification and investigation phase provides several benefits:
    - Meet stringent data privacy compliance regulations, like GDPR
    - Focus efforts on effective forensic analysis and remediation
    - Limit breach exposure and the expenses related to handling breaches

    Up your incident response game!
  • ExtraHop 7.0: Know the Shape of Your Enterprise
    ExtraHop 7.0: Know the Shape of Your Enterprise Isaac Roybal, Director of Product Marketing Recorded: Oct 17 2017 53 mins
    Many teams throughout the enterprise—security, network, IT operations—lack the insights needed to make confident, data-driven decisions. People cannot access the data they need quickly, resulting in waste, slow response times, and expensive incidents.

    With the announcement of version 7.0, ExtraHop provides real-time and empirical data all teams can benefit from through complete visibility, faster incident resolution, and stronger security.

    In this webinar, we will cover the new ways we are helping our customers reveal the shape and context of their digital enterprise by demonstrating:
    • Live activity maps that allow for unprecedented visual environment exploration
    • Scheduled reports that share real-time views of the information that matters most to each user
  • ExtraHop 7.0: Know the Shape of Your Enterprise - APAC
    ExtraHop 7.0: Know the Shape of Your Enterprise - APAC Isaac Roybal, Director of Product Marketing and Daniel Chu, Director of Systems Engineering Recorded: Oct 17 2017 55 mins
    Many teams throughout the enterprise—security, network, IT operations—lack the insights needed to make confident, data-driven decisions. People cannot access the data they need quickly, resulting in waste, slow response times, and expensive incidents.

    With the announcement of version 7.0, ExtraHop provides real-time and empirical data all teams can benefit from through complete visibility, faster incident resolution, and stronger security.

    In this webinar, we will cover the new ways we are helping our customers reveal the shape and context of their digital enterprise by demonstrating:
    • Live activity maps that allow for unprecedented visual environment exploration
    • Automated anomaly workflows—including new security anomalies
    • Scheduled reports that share real-time views of the information that matters most to each user
  • What is Modern Service Management? with John Clark
    What is Modern Service Management? with John Clark IT Chronicles Media Recorded: Oct 16 2017 11 mins
    Modern Service Management is not another framework, or set of books or IP. It is designed to enable ITSM professionals to focus on business outcomes.
  • Rethink Load Balancing: 7 Considerations Before Your Next Refresh
    Rethink Load Balancing: 7 Considerations Before Your Next Refresh Ashish Shah Recorded: Oct 13 2017 44 mins
    Applications in your data center, and your IT operations, demand agile, cost-effective load balancing solutions. Traditional ADC (application delivery controller) vendors such as F5 Networks or Citrix NetScaler have done little to address the needs of modern applications and cloud-native use cases. Instead, they force you down the path of expensive and inflexible hardware refreshes without addressing the fundamental challenges of elasticity, automation, hybrid-cloud use, and cost.

    Learn how Avi Networks delivers flexible application services beyond load balancing, including:

    • Application analytics and visibility
    • Predictive autoscaling
    • Automation in private data centers or the public cloud.
  • Culture, Containers and Accelerating DevOps: A Virtual Discussion
    Culture, Containers and Accelerating DevOps: A Virtual Discussion Gene Kim, DevOps Enthusiast & Brian Gracely, Red Hat Recorded: Oct 12 2017 55 mins
    A how-to guide to container and DevOps deployment can help you with the necessary architecture to move faster and be more agile. Red Hat and Intel can help you put DevOps, containers, and application platforms to work for your business.

    Enjoy this unique conversation with DevOps enthusiast, Gene Kim, author of The Phoenix Project and The DevOps Handbook, and Brian Gracely, Red Hat director of Product Strategy. Learn from Gene Kim's 18+ years of experience studying high-performing IT organizations.

    Join us for a discussion on culture, containers, and accelerating DevOps. Topics will include:
    - The trends.
    - The journey
    - The challenges.
    - The path to success
  • Unlock the Value of Hybrid and Multi-Cloud Environments
    Unlock the Value of Hybrid and Multi-Cloud Environments Ashish Shah Recorded: Oct 12 2017 33 mins
    Hybrid cloud is becoming an increasingly common deployment model, where companies utilize both internal cloud environments, as well as public cloud environments (Amazon AWS, Microsoft Azure, Google Cloud, etc). There are many advantages to such an approach, including flexibility, data privacy, and cost.

    Avi Networks helps hybrid cloud deployments with cloudbursting via multicloud support and application AutoScale. Avi Vantage has native support for multiple cloud environments from the same controller cluster, allowing for a true single pane of glass view into your load balancing environment, regardless where it lives.

    Join Avi Networks in this webinar to learn about:

    • Cloudbursting
    • Multicloud support
    • Application autoscale
  • Transforming the Retail Experience with SD-WAN
    Transforming the Retail Experience with SD-WAN Zeus Kerravala, Principal Analyst & Founder Recorded: Oct 12 2017 46 mins
    Digital trends are transforming nearly every industry and retail is amongst the top industries to be impacted.

    The retail store front will remain the hub for omni-channel interactions with customers. Business leaders in retail need to prepare for a wide range of technologies such as in-store WiFi, digital signage, tablets, self-checkouts and others in addition to maintaining a 100% transaction uptime.

    All of these advanced technologies are highly dependent on the network, particularly the wide area network (WAN) for success. However, legacy WANs were never designed to support omni-channel interactions, which means evolving the WAN to a software defined WAN (SD-WAN) must be a top initiative for business and IT leaders in the retail industry.

    Join Zeus Kerravala, Principal Analyst and Founder of ZK Research as he discusses the changes in the retail industry, why legacy networks are challenged and provides practical advice on how to migrate to SD-WAN.
  • A NIST Guide on How Identity Management is Reshaping Cyber Security
    A NIST Guide on How Identity Management is Reshaping Cyber Security Bill Newhouse, Deputy Director, NICE; Naresh Persaud, Sr. Dir. Security; Prod Mktg, CA; Spencer Wilcox; Brandon Dunlap Recorded: Oct 12 2017 60 mins
    Did you know that 80% of data breaches implicate lost, stolen and weak credentials, as well as excessive access as culprits? NIST’s National Cybersecurity Center of Excellence (NCCoE) is helping companies better understand how to apply standards-based, commercially available technologies to improve their cybersecurity posture. The NCCoE’s security control mappings, reference designs, and lab implementations can be used as roadmaps or checklists for organizations looking to bolster their cybersecurity programs. Join CA and (ISC)2 on October 12, 2017 at 1:00PM Eastern for our ThinkTank where our expert panel will take an in depth look at how Identity Management is shaping the recommendations and requirements for the next generation of cyber security controls.
  • DevOps Automation - The real business value - Steve Brodie
    DevOps Automation - The real business value - Steve Brodie IT Chronicles Media Recorded: Oct 12 2017 12 mins
    Steve Brodie talks about how to create a simple, repeatable way to collect and view information from any DevOps tool along the pipeline in the context of a single release, and deliver metrics that provide real business value.
  • Centro de Datos. Agilidad y Control de TI
    Centro de Datos. Agilidad y Control de TI Roger Garcia Villajuana Gerente de Ventas SW Intel LAR Recorded: Oct 12 2017 60 mins
    Una rápida evolución de la tecnología complica cada aspecto de la gestión del centro de datos y los modelos de cómputo basados en el servidor son demasiado complejos para las cargas de trabajo altamente variables de hoy en día.

    ¿Es posible optimizar recursos y operaciones en entornos dinámicos?

    En esta presentación, aprenda cómo reemplazar el aprovisionamiento y la gestión de aplicaciones manuales y definidas por hardware con un modelo de recursos y una capa de orquestación altamente automatizados y definidos por software que permiten flexibilidad, hacer más eficiente el uso de capital en un esquema bajo demanda y un menor TCO. Descubra cómo agrupar de manera más ágil los recursos de centro de datos, y a la vez, aumentar la eficiencia de TI, optimizar los requerimientos de energía, aumentar la flexibilidad del centro de datos y fortalecer los planes de recuperación de desastres.

    ¿Infraestructura en hospedaje?

    Obtenga información en tiempo real de consumos de energía, temperatura, flujos de aire así como la salud de los componentes de sus servidores para cumplir con los SLA de su organización.
  • Case Study: Transform Threat Investigation With a Stretched Security Team
    Case Study: Transform Threat Investigation With a Stretched Security Team Arabella Hallawell, Sr. Director Advanced Threat Product Marketing + Deb Briggs, CSO, NETSCOUT Recorded: Oct 12 2017 43 mins
    Chief Information Security Officer Reveals How With Arbor Spectrum.

    Attackers continuously have new tools, tactics and practices in their weapons arsenal. Human defenders must shift their strategies to more proactively uncover meaningful threats, and find ways that dramatically accelerate threat investigation.

    Join us to hear:
    - NETSCOUT’s Chief Security Officer discuss how the Arbor Spectrum threat analytics platform was used to help her team take detection and investigation to a new level.
    - In depth examples of how security teams can begin or enhance their detection and investigation of attack campaigns.
  • How To Map Applications & Infrastructure for GDPR, Change control and Risk
    How To Map Applications & Infrastructure for GDPR, Change control and Risk David Cuthbertson Recorded: Oct 12 2017 46 mins
    David Cuthbertson will show you methods and techniques to help achieve a baseline map of your IT systems, supporting not just GDPR issues but also change control, operational management and risk assessment.
  • Hybrid IT in Australia: How to Simplify & Manage Multiple Cloud Environments
    Hybrid IT in Australia: How to Simplify & Manage Multiple Cloud Environments Kelly Morgan, Research VP, Services at 451 Research; Nathan Vandenberg, GM, Data Centre at Dimension Data Recorded: Oct 12 2017 50 mins
    How can your enterprise better manage multiple cloud and non-cloud IT environments to accelerate your digital business? Are you among the 50% of enterprises challenged by the complexity of managing applications and data across hybrid environments?

    Find out what workloads are still on physical IT, where they’re moving to, and why enterprises use migration services to help.

    Join Kelly Morgan, Research Vice President, Services from 451 Research and Nathan Vandenberg, General Manager, Data Centre from Dimension Data on Thursday 12 October 2017, 11:00am – 11:45am, to understand the most common challenges faced when managing multiple IT environments in Australia and how to overcome them.

    We will guide you through the hybrid IT maze and provide you with actionable steps to simplify the complexity of managing multiple enterprise cloud and non-cloud IT environments.

    Join us as we explore the findings from the Hybrid IT report, a 451 Research report commissioned by Dimension Data.
  • Combating Advance Threats
    Combating Advance Threats Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec Recorded: Oct 11 2017 4 mins
    Protect remote users and Mobile devices from the rapidly evolving threat landscape
  • Visibility & Actionable Intelligence for a Migration to GCP
    Visibility & Actionable Intelligence for a Migration to GCP Chris Grossmeier, Director of Product Management Oct 18 2017 4:00 pm UTC 45 mins
    Learn how to determine your anticipated costs and benefits to make an informed decision on how to securely and cost-effectively migrate your workloads to the Google Cloud Platform without disrupting your operations.
  • SOC Talk: Automation and Visibility for Faster, More Accurate Response
    SOC Talk: Automation and Visibility for Faster, More Accurate Response Simon Gibson, CISO / Security Architect, Jack Hamm, Principal Information Security Engineer, Graham Melville, Sr. Director Oct 18 2017 4:00 pm UTC 45 mins
    Join Jack Hamm and Simon Gibson from the Gigamon SecOps as they demonstrate how to use automation and visibility to take the boredom out of repetitive tasks. One of the featured use case will be how to automate tasks to find and block Kaspersky in government organizations.
     
    Security practitioners use a variety of tools and information sources to spot potential threats, evaluate each event and then act to mitigate. They are challenged by little interoperability between security tools, plus the cost of these tools across the network and cloud can be prohibitive.
     
    During this lively webinar, hosted by Security Solutions leader, Graham Melville, you will see how Gigamon and the Phantom security automation and orchestration platform can help you reduce mean time to resolution. The team will show how you can provide wider visibility and automate the tasks your security staff repeats on a frequent basis. 

     
    Simon and Jack will demonstrate:

    •How to generate indicators of compromise to trigger Phantom to execute customized playbooks with specific actions.
    •How to automate tasks to find and block the use of Kaspersky in government organizations.
    •How to streamline dozens of sources to gain insight into security events.
    •How to gain visibility to the necessary traffic from all segments of your networks without buying more security tools.
    •How you can reduce the load and turn on more features on your security tools such as Next Gen Firewalls.
  • Parallel Networks Provide Stronger Security at the Elastic Edge
    Parallel Networks Provide Stronger Security at the Elastic Edge Ken Hosac, VP of Business Development, Cradlepoint Oct 18 2017 4:00 pm UTC 60 mins
    Enterprises are seeking ways to reduce the scope and complexity of securing their Network’s Edge. Data breaches can cost companies millions of dollars in reduced revenue, shareholder value, fines, and diminished brand loyalty.

    IT managers concerned about their connected-network systems have turned to Parallel Networking to create application-specific networks to protect cardholder data while enabling customer engagement and improving operations.

    Parallel Networking enables organizations with hundreds or thousands of distributed locations to enhance security and PCI Compliance at the Network’s Edge.

    Join Cradlepoint for a webinar to learn about the benefits of Parallel Networking, real customer success examples, and best practices for greater security at the Elastic EdgeSM. 
  • Today's Predictions for Tomorrow's Connected World
    Today's Predictions for Tomorrow's Connected World Kevin Haley, Director of Product Management for Symantec Security Technology and Response Oct 18 2017 5:00 pm UTC 30 mins
    In the new world of IoT, smart cities, smart cars and home, our personal devices are more connected than ever before.

    Learn about predicting the future by looking at the past with insights on how to improve the world of IoT that is coming into our homes.

    Register Today
  • Secure and Always-On Connectivity Changes the Game
    Secure and Always-On Connectivity Changes the Game Hosted by Gerri Hinkel, Sr. Marketing Manager for Primary Education Oct 18 2017 6:00 pm UTC 60 mins
    With so many users and devices on the network at any given time, universities and colleges struggle to keep up with the demand for always-on connectivity. What can you do to optimize your network infrastructure to tackle these challenges?

    Join our networking experts for a webinar that will discuss how Aruba solutions:

    * Provide always-on connectivity with features including RF optimization and controller hitless failover
    * Secure the network and identify risk with with IoT devices pre-authentication and user and entity behavior analytics (UEBA)
    * Provide deeper and predictive network insights
    * Address campus wired pain points with a unified wired AND wireless solution

    Speakers
    Michael Dickman, VP of Global PLM Campus Networking
    Peter Lane, Aruba WLAN PLM
    Danny Jump, Aruba ClearPass PLM
    Dan Comfort, Aruba Cloud PLM
  • Are Your Third Party Vendors Exposing Your Organization to Cyber Threats?
    Are Your Third Party Vendors Exposing Your Organization to Cyber Threats? Eric Olson, LookingGlass Vice President of Intelligence Operations and Nick Hayes, Forrester Senior Analyst – Security & Risk Oct 18 2017 6:00 pm UTC 90 mins
    By now, the majority of us have likely been inundated with stories about third party data breaches and how one vendor’s vulnerability can cost your organization millions. But how do you know if you’re doing enough to stop third party risk?

    As we enter 2018, new U.S. and European cyber regulations are going into effect, and organizations can no longer check the box when it comes to their vendors’ cybersecurity. You are not only liable for knowing where you are most at-risk, but now you must also understand how that risk affects your organization and identify a solution for mitigating that risk.

    This webinar features guest speaker Nick Hayes, Senior Analyst at Forrester and LookingGlass VP of Intelligence Operations Eric Olson. They will delve into the third party risk landscape: our current state of affairs, and where the industry is moving, as well as how you can take a different approach to third party risk prevention, including:
    • How to see where your vendors are already compromised
    • The importance of actionable intelligence for real-time mitigation
    • Why a continuous monitoring solution is the future of third party risk
  • How to Design SQL Server Infrastructures for Optimal Performance
    How to Design SQL Server Infrastructures for Optimal Performance Matt Henderson, Director of Microsoft Technology Oct 19 2017 5:00 pm UTC 45 mins
    Successful analytics and transactional systems start with proper architectural principles and considerations. This webinar will be a detailed walkthrough of all the software and hardware infrastructure below the database server. It will explain how each layer affects database workloads as well as give tools and metrics for determining optimal architectural configurations.

    From this webinar you will learn:

    • How to design SQL server infrastructures for optimal performance
    • How the software and hardware infrastructure affect database performance
    • Tools and metrics to determine appropriate hardware allocations. For example, how many CPU cores, data volumes, tempdb files or GBs of memory are needed for your workload.
    • Tools and metrics to find current bottlenecks, inside and outside of the database server
    • Tools and best practices for monitoring all layers

    Presented by Matt Henderson, who has over two decades of experience in designing high-performance database platforms and over five years working with the latest all-flash storage technologies. He currently is the Director of Microsoft Technologies at Vexata where he helps customers optimize and scale their mission-critical databases.
  • Learn how Proxy Plays a Critical Role in Protecting Your Enterprise
    Learn how Proxy Plays a Critical Role in Protecting Your Enterprise Timothy Chiu - Senior Director of Product Marketing, Symantec Oct 19 2017 5:00 pm UTC 30 mins
    Solving the most sophisticated security challenges requires an advanced approach that is built upon a proxy-based architecture. This approach allows you to leverage best of breed security technologies to provide a safe and confident cloud and network experience.

    Symantec secure web gateway solutions deliver strong proxy-based security in the form factor your organization needs: on-premises appliance, virtual appliance, in the cloud, or in a unified hybrid combination of these solutions.

    The solution’s unique proxy architecture allows it to effectively monitor, control, and secure traffic to ensure a safe web and cloud experience.

    In this webinar learn:
    • Why Proxy architecture is more important than ever as a critical security component of your network
    • How a web proxy can serve as a platform for advanced threat detection and data protection
    • Why pre-filtering your sandbox with proxy architecture is a smart move for both your SOC and your bottom line.

    Register Today
  • How to Make Network Analytics Useful for the Whole Business
    How to Make Network Analytics Useful for the Whole Business Kentik Co-founder & CEO Avi Freedman and Forrester Analyst Andre Kindness Oct 19 2017 5:30 pm UTC 60 mins
    In the new enterprise network reality, boundaries have blurred: the internet is central and out of your control. A modern approach to network analytics is now more important than ever. The good news is that it’s possible to get vastly better insights from network traffic data than ever before, due to the power of cloud and big data systems. The key is to link that network traffic data and show the benefit to the broader business. In this webinar guest speaker Forrester analyst Andre Kindness and Kentik Co-founder and CEO Avi Freedman will help you understand:

    - The changes in enterprise networks that make modern network analytics a must-have
    - Why it’s so important to combine network data with business context
    - Examples of business intelligence driven by network data in IT organizations today
    - How you can gain the business advantage that modern network analytics offers
  • How Browser Security Indicators Can Protect You from Phishing
    How Browser Security Indicators Can Protect You from Phishing Chris Bailey, VP Strategy & Business Development, and Kirk Hall, Director of Policy & Compliance Oct 19 2017 6:00 pm UTC 60 mins
    The move to requiring encryption on all websites is picking up speed, with browsers starting to show UI warnings for unencrypted websites. Roughly 60% of internet page loads already "https", and the number of sites switching to encryption grows every month. This trend is helped by the availability of anonymous, free Domain Validated (DV) SSL certificates from several Certification Authorities (CAs), which include no identity information about the website owner.

    While increased encryption is good for connection security and combating “man-in-the-middle” (MITM) attacks, many phishing and malware fraudsters are using DV certificates to imitate login pages for top sites such as PayPal.com, banking sites, etc. and steal user information. Unfortunately, these fake DV login pages receive a favorable green padlock “Secure” security indicator in the Chrome UI, causing some users to believe Chrome is vouching for the phishing website as safe or trustworthy.

    Join Entrust Datacard's Chris Bailey and Kirk Hall as they discuss:
    • The difference between DV, OV, and EV
    • The issues with current browser UIs to do with certificate information
    • A proposed new UI security indicator to help users and enhance security
  • Transitioning Load Balancing to the Cloud
    Transitioning Load Balancing to the Cloud Ethan Banks, Co-Founder, Packet Pushers, Chiradeep Vittal, Distinguished Engineer, Citrix & Derek Yee, Sr. Product Mgr,Citrix Oct 19 2017 6:00 pm UTC 75 mins
    ADCs have largely become commoditized, and the services they provide are fairly indistinguishable from the sea of competitors on the market today. With many data center architects faced with modernizing their infrastructure, what are the considerations when transitioning applications to new automation frameworks and topologies in the cloud?

    This webinar will focus on key challenges faced by the enterprise when transitioning their load balancers to the cloud.

    What you will learn:

    •The shift to cloud native, software and service-based offerings
    •Support for new application architectures
    •Operational complexities and scale at production
    •Flexibility and support for hybrid topologies in transition
  • What AI and the Cloud Revolution Mean for Business Communications
    What AI and the Cloud Revolution Mean for Business Communications Curtis Peterson, SVP of Operations at RingCentral Oct 19 2017 7:00 pm UTC 60 mins
    Are you concerned about the advancement of AI and cloud technology and how they will impact your business communications? Or perhaps you’re looking for ways to get your business communications AI ready? If you answered yes to either of these, then save your spot at this webinar now.
     
    The hype surrounding AI and its imminent take-over of the business world is creating a sense of panic. But whereas AI, just like cloud technology, is sure to become a driving force as we look to the future of business communications, there is no need to jump in at the deep end and throw all your resources at it just yet.
     
    Join us for this webinar in which we’ll explain the current state of play for AI (spoiler alert: humans are not going anywhere for a while) and cloud technology and impart some useful ways you can prepare your business communications.

    Chris Peterson, SVP of Operations at RingCentral, will talk you through:
     
    - Key trends in cloud communications
    - The importance of cloud communications
    - Team collaboration
    - Open platforms
    - AI hype vs. reality
    - How your business can create value with AI
  • Simplifying Data Integration for the Cloud
    Simplifying Data Integration for the Cloud Jill Reber, CEO, JayJay Zheng, Technical Director & Eric Greenfeder, Chief Architect, Primitive Logic Oct 19 2017 9:00 pm UTC 60 mins
    The rapid adoption of enterprise cloud-based solutions brings data integration as one of the greatest challenges. The challenge grows on increasingly numerous SaaS applications with lack of suitable connectors that fit your business needs. Join this webinar led by Primitive Logic team to see how data integration can be simplified for your cloud. This talk introduces the generic declarative zero-coding approach using Informatica Cloud Rest Connector as an example and illustrates its practical features, as well as best practices and hidden gems.

    Moderator: Jill Reber, CEO, Primitive Logic
    Panelists: JayJay Zheng, Technical Director & Eric Greenfeder, Chief Architect, Primitive Logic
  • Enable Security and Grow Your Business with the Industry’s leading connect UTM
    Enable Security and Grow Your Business with the Industry’s leading connect UTM Peter Newton, Sr. Director of Product Marketing, Fortinet Oct 24 2017 6:00 am UTC 45 mins
    Join this webinar to understand the benefits of a unified view of your infrastructure and comprehensive security that keeps up with changing network requirements and technologies like cloud services and smart devices.
  • The Security Paradigm: "From the Cloud, To the Cloud, In the Cloud"
    The Security Paradigm: "From the Cloud, To the Cloud, In the Cloud" David Grout, Director, Southern Europe Systems Engineering, FireEye Oct 24 2017 2:00 pm UTC 45 mins
    Cloud adoption is a reality today, every company is moving applications and businesses in the cloud to get more flexibility, agility and to potentially reduce their costs.

    Security operations need to enable this transformation and help the business to activate capabilities in the cloud infrastructure. Risks exist and cannot be ignored if companies want to provide a sustainable and secure environment for themselves and their customers.

    During this webinar, we will describe the main risks associated with cloud adoption and cover how to mitigate those risks.  
  • Top 2017 Cyberattacks & How to Avoid Them in 2018
    Top 2017 Cyberattacks & How to Avoid Them in 2018 Christofer Sears, Sr. Solutions Engineer, CISM, Tufin & Dan Rheault, Sr. Product Marketing Manager, Tufin Oct 24 2017 3:00 pm UTC 45 mins
    2017 has been another year of endless headlines featuring words like "breached," "hacked," and "cyberattack" – many of which were avoidable. Enforcing security policy across the legacy physical network is already challenging, and the addition of virtualized networks including the SDN and public cloud introduce new risks to organizations.

    Join this webinar to learn how to avoid the headlines by making security policy continuously enforceable. Having served in network security roles at Wells Fargo, General Dynamics, St. Jude Medical, and the Army National Guard, Tufin's Senior Solutions Engineer, Christofer Sears, CISM, will share his insight garnered throughout 10 years of experience.

    Key topics include how to:

    • Develop and deploy an enforceable security policy
    • Mitigate the inherent risk of DevOps’ CI/CD agility
    • Contain malware outbreaks like WannaCry
    • Effectively design implementation
    • Create time for proactive security projects
  • Addressing The Security Challenges of the Cloud Generation
    Addressing The Security Challenges of the Cloud Generation Gerry Grealish, Head of Product Marketing, Network and Cloud Security Products Oct 24 2017 4:00 pm UTC 45 mins
    Welcome to the Cloud Generation, where employees demand flexibility and access wherever they are, but can expose your most sensitive data to risk.

    Distributed environments—like mobile and distributed workforces—introduce new attack surfaces that must be protected and increased use of SaaS Cloud Apps are driving the need for new compliance and security controls. The result? Security and IT teams are being forced to rethink network designs to better answer questions like:

    - How do we effectively govern access to data, apps and systems?

    - How can we combat advanced threats targeting our business through the web, cloud and e-mail?

    - How should we secure information that is moving between our network, endpoints and the cloud?

    Join Gerry as he discusses the key Cloud Generation security challenges facing Symantec’s enterprise customers and learn how Symantec’s Cloud-delivered security solutions can be used to protect users, devices and corporate data, wherever it resides.
  • Can Your Network Survive the Miercom Torture Test?
    Can Your Network Survive the Miercom Torture Test? Robert Smithers, CEO at Miercom and Derek Granath, VP Product Marketing at Silver Peak Oct 24 2017 5:00 pm UTC 60 mins
    Join leading independent product assessment group, Miercom and technical experts from Silver Peak as they discuss the performance expectations of today’s networks and how the right SD-WAN solution can improve application availability across the WAN using any type of transport. They will disclose how Silver Peak’s SD-WAN solution, Unity EdgeConnect fared in their aggressive stress test environment and provide a live demo on its performance capabilities.
  • Propel the Future of Retail with SD-WAN
    Propel the Future of Retail with SD-WAN Rachna Srivistava, Sr. Director Product Marketing Oct 24 2017 5:00 pm UTC 60 mins
    Delivering an exceptional user experience to a retail customer is more than just having the right product on-hand. An omni-channel environment will become commonplace and retail organizations must deliver or be replaced by competitors who will. Having the right network to support growth and expansion, while keeping costs under check, is critical.

    In the second session of our Retail Revolution webinar series, VeloCloud will dive deeper with a take on how Cloud-Delivered SD-WAN can help retailers ensure security at each touch point with segmentation and PCI compliance, enhancing the customer engagement anytime, anywhere, and using real-world examples of how customers have used SD-WAN to improve their retail organizations.

    Key takeaways include:

    - Best practices on delivering an exceptional retail customer experience with Cloud-Delivered SD-WAN.
    - Guidance on how to stay secure with a range of features from VeloCloud, along with PCI
    - Optimizing your retail environment to ensure bottlenecks are removed and performance is optimized
    - Simplifying the PCI audit process with the VeloCloud PCI Certified Solution
  • Why Native Security Features in AWS and Office365 aren't Enough
    Why Native Security Features in AWS and Office365 aren't Enough Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager Oct 24 2017 9:00 pm UTC 60 mins
    Most businesses are rapidly moving to the cloud to be fast and nimble, reduce their cost structure, and reach more customers anywhere, anytime. These new architectures have powerful new capabilities—but also expose businesses to a new universe of risk.

    When dealing with outsourced infrastructure like AWS, or a SaaS solution like Office365, it is easy for IT managers to assume that security is out of their hands, for better or worse. But, this assumption may not always be true. Businesses must develop an active cloud security strategy as they pursue their migrations, and become a proactive security partner with their cloud providers—or they will find themselves vulnerable to attack.

    In this upcoming webinar, hear from security experts at Arctic Wolf Network (AWN), on:

    - The top cybersecurity risks and best practices for securing cloud deployments
    - How AWN security monitoring compliments the native security features in AWS and Office365
    - The role of AWN cloud security in integrating observations from cloud and on-premise systems

    To see how AWN CyberSOC™ can secure your cloud, register now.

    About our speakers:

    Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with in-depthexpertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.

    Louis Evans is a new member of the Arctic Wolf team. He’s passionate about cybersecurity, defeating the next generation of threats, and Alan Turing.
  • Rev Up Your Cloud Integrations with Big Data Technology
    Rev Up Your Cloud Integrations with Big Data Technology Eric Greenfeder, Chief Architect, Primitive Logic Oct 24 2017 9:00 pm UTC 60 mins
    This presentation details how to leverage technologies such as Hadoop, MapReduce, Pig and Sqoop to massively scale cloud integrations to services such as Salesforce.com. Attendees will learn how to overcome API limitations, throughput latency and infrastructure scaling challenges to significantly increase integration performance.
  • Intel's Data Center Game Changer
    Intel's Data Center Game Changer Noel John BDM & Eric Xie, Sr. Application Engineer, Intel Data Center Management Solutions Oct 25 2017 6:00 am UTC 60 mins
    A rapid rate of change complicates every facet of datacenter management, and server-centric compute models are too cumbersome for today’s highly variable workloads. Is it possible to optimize resources and operations in such dynamic environments? In this presentation, learn how to replace manual, hardware-defined application provisioning and management with a highly automated, software-defined resource model and orchestration layer that enables flexibility, simplified on-demand capital efficiency, and lower TCO. Find out how to compose more agile pools of datacenter resources, and simultaneously drive up IT efficiency, optimize energy requirements, increase datacenter resilience, and strengthen disaster recovery plans.
  • Next Generation Security in a Native Cloud World: are you ready?
    Next Generation Security in a Native Cloud World: are you ready? Klaus Gheri, VP & GM Network Security Oct 25 2017 12:00 pm UTC 60 mins
    The Cloud Generation

    The cloud is upon us and with accelerating adoption, it’s impacting the way the world does business. As the cloud has changed the world, products are evolving to meet the challenges. Security solutions like Next Generation Firewalls, Web Application Firewalls and Secure Email Gateways must evolve for this new frontier.

    Join Klaus Gheri, VP Network Security, to discuss how to ensure your organisation can prepare for the cloud generation. During this webinar, he will discuss:

    1. Knowing your security responsibility when it comes to public cloud
    2. How cloud service utilization can cause pressure on your current network architecture and how to alleviate it
    3. How cloud native does not come naturally with many of today’s security products and how to adapt to this new generation
  • Simplify Threat Response Through Integration & Automation
    Simplify Threat Response Through Integration & Automation Anthony Leigh, Systems Engineer, FireEye Oct 25 2017 1:00 pm UTC 45 mins
    FireEye Security Orchestrator helps you improve response times, reduce risk exposure, and maintain process consistency across your security program. It unifies disparate technologies and incident handling processes into a single console that codifies experiences from the frontlines to deliver real-time guided responses.

    In this technical session we hear from an orchestration expert on best practices to simplify and automate security tools and processes. We will look at real-life examples of providing teams with greater control of incident response process for improved efficiency, thus saving time & resources and increasing efficiency and performance. We will also look at orchestration services with incident response playbooks, plug-in development, automation and workflow deployment.