Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • How Snapper Further Protects Data in Amazon S3 Using CWP for Storage
    How Snapper Further Protects Data in Amazon S3 Using CWP for Storage Sameer Vasanthapuram, Kevin Stultz and Paul Hortop Recorded: Sep 21 2018 43 mins
    Snapper, a New Zealand-based company, needed a security solution to protect their customer data in Amazon Simple Storage Service (Amazon S3) from advanced threats and malware. In our upcoming webinar, learn why the flexibility and scalability of Symantec Cloud Workload Protection for Storage (CWP for Storage) made it the right solution for Snapper.

    In this webinar, you’ll learn:

    - How CWP for Storage protects against the latest threats and malware

    - Ways CWP for Storage delivers scalable security that integrates with DevOps workflows

    Register Today
  • Learn How to Close the Gap in Your DNS security
    Learn How to Close the Gap in Your DNS security Troy Hager Recorded: Sep 21 2018 48 mins
    There’s Something Missing from Your Defensive Lineup
    Cybersecurity is a team sport. No one player can win the game solo. Unfortunately, existing “players” often leave gaps in your defenses. One of the most serious of these is DNS. It's used by more than 90% of malware to communicate with C&C servers, steal data, or hold it hostage through ransomware—malicious activities that go undetected by traditional technology players.

    Learn How to Close the Gap in Your DNS security
    Infoblox ActiveTrust® Cloud turns DNS from a security gap into your MVP of defense. The live demo from product management will focus on production use of actionable threat intelligence within your DNS security policies and configuration and demonstrate performing threat research and hunting using Dossier to optimize your security team and boost ROI and productivity.

    This webinar will highlight how to:

    -Automatically detect and block DNS-based data exfiltration and malware proliferation
    -Leverage actionable threat intelligence within your DNS security policies
    -Perform daily SOC and threat intelligence research and threat hunting, on DNS and other threats in your environment using Dossier
  • Real World IoT Podcast | Ep. 20 | ft Globalstar | Satellite & IoT in Oil & Gas
    Real World IoT Podcast | Ep. 20 | ft Globalstar | Satellite & IoT in Oil & Gas 151 Advisors | Marty Jefferson | Ken Briodagh Recorded: Sep 21 2018 50 mins
    On this week’s episode of the Real World IoT Podcast, host Ken Briodagh discusses why satellite connectivity is crucial to the productivity of the Oil & Gas Industry with Data Services Manager at Globalstar, Marty Jefferson.
  • An Introduction to Catchpoint Performance Monitoring
    An Introduction to Catchpoint Performance Monitoring Craig Lowell, Manager of Global Customer Programs, Catchpoint Recorded: Sep 21 2018 17 mins
    This presentation introduces the nuts and bolts of synthetic, real user, and on-premise monitoring, and explore the visibility into your end users' experience that each of these Catchpoint solutions provide to help detect and fix service delivery issues faster.
  • [PORTUGUESE WEBINAR] A entrega de aplicações acaba de se tornar mais eficiente
    [PORTUGUESE WEBINAR] A entrega de aplicações acaba de se tornar mais eficiente Ricardo de Melo, System Engineer Brazil, A10 Networks Recorded: Sep 21 2018 44 mins
    Adotar uma estratégia híbrida e em várias nuvens para a entrega de suas aplicações tambiém pode levar a perda da percepção de rendimento de suas aplicações. Compartiremos e demostraremos as últimas funções de análises centralizadas nas aplicações com o Harmony Controller 4.1. Nosso mais novo controlador ajuda as organizações a obter informação útil sobre o rendimento das aplicações, a experiência do usuário final e os problemas de segurança, além de permitir uma resolução de problemas de forma muito mais rápida e fácil.

    O Harmony Controller de múltiplas nuvens nos entrega inteligência conectada através de uma série de serviços de aplicações seguras da A10: ADC / balanceamento de carga, inspeção SSL, Gi-Firewall e Carrier Grade NAT.

    Ao se conectar a este webinar, você aprenderá como:
    * Simplificar e agilizar suas operações de TI
    * Assegurar a disponibilidade da aplicação
    * Separar facilmente os dados contextuais e rapidamente identificar as áreas problemáticas
    * Acessar aplicações centralizadas, redes e análises de segurança a partir de um único painel
    * Habilitar a análise de auto-serviço para vários proprietários de aplicações
  • Staying Ahead of the Curve: Microservice & MDM Strategies for Agile Architecture
    Staying Ahead of the Curve: Microservice & MDM Strategies for Agile Architecture Primitive Logic President Kevin Moos, Chief Architect Eric Greenfeder, Technical Director Steve Ernst Recorded: Sep 20 2018 40 mins
    In the race towards digital transformation, fueled by growing competitive pressures, enterprises need an architecture that responds quickly to escalating customer expectations — while also maintaining security and reliability.

    Join Primitive Logic to discover why your EA roadmap must begin with your business priorities … and how microservice architectures and master data management (MDM) strategies can help you achieve your objectives.

    You’ll learn:
    - How to build a secure EA roadmap grounded in your business priorities
    - How microservices let you move quickly in keeping up with customer expectations
    - How MDM helps you deliver the insights businesses need to make data-driven decisions
  • Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond
    Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond Dinah Davis, VP Research & Development - Arctic Wolf Networks Recorded: Sep 20 2018 38 mins
    Last year was all about large Ransomware hacks like WannaCry, Petya/NotPetya, and CRYPSHED to name a few. These various strains of Ransomware can bypass your perimeter controls and infect your critical systems, bringing your business to a grinding halt.

    However, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. So, what are your options?

    In this webinar Dinah Davis, VP of Research & Development, at Arctic Wolf Networks, will share her key insights on a ransomware cyber kill chain from delivery, infection to command and control activity, and walk you through the following:

    - What happens when a ransomware is exploded in a computer, with a demo
    - How do you detect and respond to a ransomware attack?
    - What is coming next in the world of ransomware?

    To discover how to fortify your network with 24/7 monitoring with managed detection and response, register for our upcoming webinar.
  • IT Ops SIG Talk Ep. 10: Building a Hybrid IT Blueprint
    IT Ops SIG Talk Ep. 10: Building a Hybrid IT Blueprint Bobby Allen Recorded: Sep 20 2018 29 mins
    Building a Hybrid IT Blueprint – Discover the right mix of public vs. private providers and services for your application portfolio

    Many decision makers will say they need more information. The reality is that most leaders are actually drowning in information. What they really need is to move from information to clarity to insight. Attend our talk on building a hybrid it blueprint to see how CloudGenera can quickly take large amounts of data about your applications and provide data-driven analysis on best execution venue. We believe these sorts of insights should happen in minutes not months.

    Attendees will learn the following:

    •Elements that must be part of Total cost of ownership (TCO) analysis
    •How to analyze public vs. private execution venues
    •How to quickly revisit decisions when inputs or market factors change
  • Optimize Your Application Delivery, Gain Visibility and Cut Cloud Costs
    Optimize Your Application Delivery, Gain Visibility and Cut Cloud Costs Greg Schulz, Microsoft MVP, VMware vExpert, and founder of Server StorageIO & Kamal Anand, Vice President, Cloud A10 Networks Recorded: Sep 20 2018 58 mins
    Businesses today are migrating their application workloads to hybrid infrastructures, spanning from on-premises to public clouds. They expect to get better ease of use, rapid deployment, elastic scaling, automation, and increased operational efficiency. They don’t expect hidden costs or a loss of control—but that is exactly what many organizations experience.

    Learn to manage cost, complexity, and control of your application workloads in this interactive fireside chat. Greg Schulz, MVP, StorageIO, and Kamal Anand, Vice President of Cloud, A10 Networks, will be looking at the trends, tools, and best practices you can apply right now to make your cloud-based application delivery a success.

    In this 30-minute webinar, you will learn to:
    * Boost your productivity and application performance
    * Avoid getting locked into a single public cloud platform
    * Gain visibility and deep insights into your applications
    * Eliminate unexpected monthly expenses
    * Steps you can take today, during, or right after the fireside chat
  • A Zero Trust Approach to Decoupling Intent from Implementation
    A Zero Trust Approach to Decoupling Intent from Implementation Chase Cunningham, Principal Analyst, Risk & Security, Forrester and Matt Dean, Vice President, Product Strategy, FireMon Recorded: Sep 20 2018 60 mins
    Adopting a Zero Trust model means taking the first steps to redesigning your network in order to strengthen data security, detection, and response.

    In such an ecosystem, it can no longer be about just writing security rules. Instead, enterprises must adopt a method of security intent and separate that desired goal of security from the specific implementation.

    This hierarchy allows you to set a single global policy that’s applied to any network resource with all its defining attributes – regardless of mutations in the network.

    At the same time, you can reduce the number of access requests that need to be managed manually and automatically ensure real-time compliance. And even more, business intent can be fully in line with security policy controlled at speed and scale.

    At most hybrid enterprises right now, these aren't realities -- but they can be, and that's where network security is headed.

    Join our guest, Forrester's Chase Cunningham, with FireMon's Vice President, Product Strategy at FireMon, Matt Dean for a look at the future of network security, which will ultimately enable each business team to fully own their security policies.
  • OpenDemo: Network Automation with Ansible
    OpenDemo: Network Automation with Ansible Eric McLeroy, Senior Solution Architect, Red Hat Recorded: Sep 20 2018 56 mins
    Ansible's simple automation framework means that previously isolated network administrators can finally speak the same language of automation as the rest of the IT organization, extending the capabilities of Ansible to include native support for both legacy and open network infrastructure devices. Network devices and systems can now be included in an organization's overall automation strategy for a holistic approach to application workload management.
    The original airdate of this demo was Sept. 18.
  • DDoS Attack and Bot Protection: Defending your Applications
    DDoS Attack and Bot Protection: Defending your Applications Chad Lavoie, Senior Support Engineer Recorded: Sep 20 2018 52 mins
    We read about DDoS attacks and bot threats causing companies millions in lost revenues and battered reputations almost every day. By leveraging an extremely efficient and innovative design, including extensive ACL and Stick Table tracking systems, HAProxy Enterprise Edition is able to perform the real time behavioral analysis that mitigating today’s threats demands. Rather than being caught off guard, join this webinar to see how you can use HAProxy Enterprise Edition to create an effective, high performance threat protection solution.

    In this webinar we will present how to:

    •Protect against application-based DDoS attacks such as HTTP request flooding
    •Protect against bot threats such as web scraping, brute forcing, and vulnerability scanning
    •Implement an advanced threat response policy with Antibot and Google reCAPTCHA
    •Implement cluster wide threat protection with a Stick Table Aggregator
    •Enhance bot threat protection with WAF and Fingerprint modules
    •Dynamically maintain cluster wide whitelists and blacklists
    •Monitor threat protection status
  • Part 3 of 3: Secrets of Mature DLP Programs -  Getting from "How" to "Wow"!
    Part 3 of 3: Secrets of Mature DLP Programs - Getting from "How" to "Wow"! Carmine Clementelli, Tim Merriam, Daphne Zhao from Symantec Recorded: Sep 20 2018 49 mins
    In the third and final session of the three-part webcast series:

    Part 3: Data, Data Everywhere - Increasing DLP Value as Everyone Goes Cloud

    As hybrid cloud infrastructures become the new normal, DLP programs must adapt and expand to ensure that data – where ever it’s located – stays protected. New challenges include uncovering shadow data in unauthorized apps, eliminating multiple islands of DLP overhead, and maintaining performance across on-prem hardware and the cloud.

    Join Symantec on September 20 and Learn how to:

    -Reuse existing DLP policies and workflows for cloud apps

    -Incorporate authentication and encryption with Symantec ICE & VIP

    -Discover sensitive data within cloud apps with Symantec CloudSOC

    Register Today

    About the three-part DLP webcast series:
    The need for data protection continues to increase as organiztions mature, acquire new organizations, adopt cloud applications and infrastructure. The need to maintain visibility protection and control over the data is extremely difficult. This is especially true with increasing and more strict compliance laws such as the new California data protection law, GDPR. While each DLP initiative launches with high expectations, many remain immature after years. Root causes can be understood - technology, people, and processes – and addressed so DLP can effectively protect data in the hybrid cloud world.

    This 3-part series features pragmatic insights and lessons learned from mature DLP programs on making their teams effective and getting buy in from their organizations.

    On-Demand:
    Part 1: First Things First - Understanding "Normal" Through Smart Incident Response and UEBA (View Now: http://bit.ly/0809DLPWebinar)

    Part 2: Talking it Out - Cross-Functional Communication Key to Mature DLP Programs (View Now: http://bit.ly/0830DLPwebcast)
  • How to Build an EA Roadmap for the Future
    How to Build an EA Roadmap for the Future Jeanne Morain, iSpeak Cloud, Bala Kalavala, Wyndham Hotels & Resorts, Anthony Nguyen, HP Recorded: Sep 20 2018 62 mins
    Tune into this live panel discussion and start building your enterprise architecture roadmap for 2020 and beyond.

    Topics in this panel discussion will include:

    - How to drive business value through technology
    - Enterprise architecture from a UX perspective
    - Cloud transformation and automation, including Robotic Process Automation
    - Services and API strategy
    - How technologies like Blockchain are changing the enterprise

    And much more!

    Moderator: Jeanne Morain, Digital Strategist, Author & Speaker, iSpeak Cloud
    Panelists: Bala Kalavala, Director of Enterprise Architecture, Wyndham Hotels & Resorts and Anthony Nguyen, UX/Enterprise Architect at HP
  • IT Ops SIG Talk Ep. 9:  Work with OpsBridge API’s
    IT Ops SIG Talk Ep. 9: Work with OpsBridge API’s Amr Fahmy Recorded: Sep 20 2018 29 mins
    Work with OpsBridge API’s

    In this session, Amr will give a small introduction of OpsBridge and then will start with a basic introduction about OpsBridge API. Next, he will give a simple example on how we can call the OpsBridge API’s and start creating custom Attributes in the events. Finally, Amr will do some modifications on Events Custom Scripts.

    What you can expect to take away from this session:

    •Basic information on how API’s works and the difference between them
    •How to integrate third party applications with OpsBridge using API
    •Basic Bash Scripts or Python Script depending on the Operation system we will use
  • IT Ops SIG Talk Series - OpsBridge API’s & Hybrid IT Blueprint for App Portfolio
    IT Ops SIG Talk Series - OpsBridge API’s & Hybrid IT Blueprint for App Portfolio Amr Fahmy, Bobby Allen Recorded: Sep 20 2018 55 mins
    SIG Talk: IT Operations - Operations Bridge API’s and Hybrid IT Blueprint for Application Portfolio (Complete Edition)

    Join us for the next IT Operations SIG Talk to hear from Vivit member experts about working with OpsBridge API's and building a Hybrid IT Blueprint for your application portfolio. These two presentations will give in depth insight and takeaways.

    Speaker: Amr Fahmy
    Work with OpsBridge API’s: In this session, Amr will give a small introduction of OpsBridge and then will start with a basic introduction about OpsBridge API. Next, he will give a simple example on how we can call the OpsBridge API’s and start creating custom Attributes in the events. Finally, Amr will do some modifications on Events Custom Scripts.

    What you can expect to take away from this session:

    •Basic information on how API’s works and the difference between them
    •How to integrate third party applications with OpsBridge using API
    •Basic Bash Scripts or Python Script depending on the Operation system we will use

    Speaker: Bobby Allen
    Building a Hybrid IT Blueprint – Discover the right mix of public vs. private providers and services for your application portfolio: Many decision makers will say they need more information. The reality is that most leaders are actually drowning in information. What they really need is to move from information to clarity to insight. Attend our talk on building a hybrid it blueprint to see how CloudGenera can quickly take large amounts of data about your applications and provide data-driven analysis on best execution venue. We believe these sorts of insights should happen in minutes not months.

    Attendees will learn the following:

    •Elements that must be part of Total cost of ownership (TCO) analysis
    •How to analyze public vs. private execution venues
    •How to quickly revisit decisions when inputs or market factors change
  • Technical Education Series: Further Securing the SaaS Model
    Technical Education Series: Further Securing the SaaS Model Hari Nanda, Sr. Systems Engineer, Symantec Recorded: Sep 20 2018 59 mins
    In this webinar you will learn how to utilize and configure Symantec’s CoudSOC service to protect access to an Office 365 SaaS environment.
  • [SPANISH] Cómo proteger y consolidar su negocio cibernético de los ataques DDoS?
    [SPANISH] Cómo proteger y consolidar su negocio cibernético de los ataques DDoS? Bruno Carvalho, Arquitecto de soluciones, EMEA Recorded: Sep 20 2018 56 mins
    Dado que los ataques dirigidos a las aplicaciones web son cada vez más frecuentes, es más importante que nunca que las organizaciones comprendan cómo protegerse contra los atacantes que apuntan a todos los niveles de la infraestructura. Los malintencionados están utilizando tecnologías, herramientas y conocimiento para explorar dónde eres más susceptible al ataque. Aunque eres susceptible de atacar, no tienes que ser vulnerable.
    Si usted es como la mayoría de las organizaciones, ya tiene una solución DDoS implementada, pero eso podría no ser lo suficientemente bueno. Cada vez más, los expertos recomiendan alejarse de los puntos únicos de falla, duplícalos o a veces triplicar, las soluciones de mitigación DDoS.
    Al adoptar una estrategia de mitigación DDoS híbrida (capacidad local y nube), las organizaciones tienen la mejor ruta hacia la resiliencia y eficiencia operativa en el evento de un ataque DDoS.

    Consideraciones adicionales
    • ¿Cómo estás definiendo la mitigación?
    • Si está utilizando una compañía de mitigación DDoS, ¿cuál es el mejor momento de mitigar?
    • ¿Tiene solución de nube como opción de failover?
    • ¿Estás haciendo todo lo que puedes para proteger a tu organización contra el próximo ataque?
    • NSFOCUS Holistic Hybrid Security
    • NSFOCUS Threat Intelligence

    Reserve su asiento hoy mismo para comprender cómo proteger y consolidar su negocio cibernético frente a los ataques DDoS
  • Securing Your Digital Transformation: Considerations for Enterprise Architecture
    Securing Your Digital Transformation: Considerations for Enterprise Architecture Todd Jobson, Co-founder & CTO, TechThought.org Recorded: Sep 20 2018 63 mins
    This webinar will outline how successful Digital Transformation requires an evolution of traditional Enterprise Architecture and Security practices.

    This will include a brief history of today's rapid paradigm shifts, drivers, benefits and challenges.

    Key considerations among several related areas:
    - FOSS, mobile
    - Cloud architecture & deployment models
    - Agile DevOps vs. traditional governance
    - Traditional app architecture vs. CloudNative Microservices & FaaS/Serverless
    - The rapidly changing data landscape (OLTP/OLAP -- BigData & Streaming Analytics)

    Todd Jobson will explore the impact in several of these areas related to successful Digital Transformation, Enterprise Cloud Architecture, as well as considerations related to security. While not intended to be a comprehensive nor prescriptive webinar, it will include several strategic recommendations along with inter-related tactical considerations that most enterprises will encounter along the complex path of Digital Transformation.

    About the Speaker:
    Todd Jobson is the CTO & Co-Founder of TechThought.org and has 25 years of experience as both a strategic & tactical thought leader across some of the most demanding business & technically complex mission critical environments. His background has included SW Engineer/Manager developing Nuclear Reactor Control & RealTime access control systems for NYPA, directing application architecture & global Integration (as far as Moscow, Russia) as Chief Technologist for SAI, leading a decade of Enterprise (Fortune 50) client architecture & delivery engagements for Sun Microsystems Professional Services, to conducting Enterprise-wide Digital Transformation Workshops/ Assessments & Future State Cloud Architecture enablement for dozens of Oracle's largest customers.
  • The great escape: Migrating to a modern virtualized environment
    The great escape: Migrating to a modern virtualized environment Bill Helgeson, senior principal domain architect, Red Hat; Matt Nolan, senior cloud architect, Red Hat Recorded: Sep 20 2018 39 mins
    As organizations face pressure to reduce operational costs and become more agile, it's critical that IT support a diverse environment, where traditional applications can coexist with dynamic and cloud-native applications. However, transitioning from legacy, proprietary infrastructure to a managed cloud infrastructure that consists of both traditional and modern components can be daunting.
    In this webinar, we'll discuss an approach to radically simplify the process of migrating workloads from legacy platforms. Specifically, we’ll cover:
    > Methods for building a robust, flexible computing infrastructure to lower total cost of ownership (TCO), improve provisioning time, deliver services faster, and streamline processes.
    > Best practices for organizing workloads into manageable groups and automating migration in a policy-driven manner using Red Hat® Virtualization, Red Hat CloudForms® , and Red Hat Ansible® Automation.
    > How several customers have successfully solved this problem, reduced transition costs, and increased control of their environment.
  • What is a Secure Enterprise Architecture Roadmap?
    What is a Secure Enterprise Architecture Roadmap? Juanita Koilpillai, Bob Flores, Mark Rasch, Ulf Mattsson, David Morris Recorded: Sep 20 2018 69 mins
    This session will cover the following topics:

    * What is a Secure Enterprise Architecture roadmap (SEA)?
    * Are there different Roadmaps for different industries?
    * How does compliance fit in with a SEA?
    * Does blockchain, GDPR, Cloud, and IoT conflict with compliance regulations complicating your SEA?
    * How will quantum computing impact SEA roadmap?
  • Architectures for deploying SD-WAN and Security
    Architectures for deploying SD-WAN and Security Ronen Shpirer, Security Solutions Architect, Fortinet Recorded: Sep 20 2018 3 mins
    DUE TO BRIGHTTALK TECHNICAL PROBLEM EARLIER TODAY, WE WERE NOT ABLE TO SHOW THE PRESENTATION THAT GOES WITH THIS WEBINAR AND HAD THEREFORE HAD TO CANCEL IT.

    MANY APOLOGIES FOR THIS PROBLEM TOTALLY OUTSIDE OF OUR CONTROL. WE WILL RESCHEDULE AS SOON AS THE BRIGHTTALK ISSUE IS SOLVED.

    THANKS FOR YOUR UNDERSTANDING


    Security plays a major role in SD-WAN deployments due to the direct internet connectivity inherent to SD-WAN. Any SD-WAN solution and architecture must be considered at both the networking/WAN level AND the security level.

    This session will focus on the alternative architectures for deploying SD-WAN and security in view of Gartner’s suggested architectures and NSS Labs SD-WAN test report – the 1st independent SD-WAN group test report.
  • Your Data: Safe, Accessible, and Optimized - All the Time
    Your Data: Safe, Accessible, and Optimized - All the Time Jaap Van Kleef, EMEA Technical Manager Recorded: Sep 20 2018 56 mins
    Growing data volume, rising cost of downtime and data loss, cyber attacks, limited storage capacity, business continuity, and inadequate backup and recovery performance are among the myriad of challenges that IT teams face today.

    Join this webcast with Jaap Van Kleef, EMEA Technical Manager at StorageCraft and learn about best practices for data protection and disaster recovery.
  • (Replay) IT Convergence: A Perspective on CI & HCI
    (Replay) IT Convergence: A Perspective on CI & HCI Howard Marks, Chief Scientist, DeepStorage.Net; Vaughn Stewart, VP of Technology, Pure Storage Recorded: Sep 20 2018 20 mins
    Join us for an informative look at the Converged Infrastructure and Hyper-Converged marketspace. Vaughn Stewart, VP of Technology from Pure Storage, will moderate this session and also share perspective on why you don’t need to compromise.

    Third party analyst and Chief Scientist, Howard Marks of DeepStorage.Net, will also provide his eye-opening findings on the true costs of each of these solution stacks so you can make a more informed decision on what is best for your organization.
  • Pilotez vos programmes de transformation
    Pilotez vos programmes de transformation Jean-Bernard Adda, CA Technologies et Richard Bouchereau, ISPA Consutling Sep 25 2018 8:00 am UTC 55 mins
    Votre entreprise innove en améliorant ses services, en intégrant de nouvelles technologies et de nouveaux usages portés par la digitalisation.
    Dans cette dynamique, votre entreprise se transforme sans cesse et doit s’adapter aux nouvelles attentes métiers et à l’optimisation des programmes de transformation.

    •Organisation, règles, visibilité, prise de décisions, quelle gouvernance adopter pour ces programmes de transformation ?
    •Entre méthodologie classique et Agile, quelles facilités l'outillage peut-il apporter afin de négocier adroitement le virage de la digitalisation ?

    Découvrez lors de ce webinar animé par les experts de CA Technologies et d’ISPA Consulting, comment répondre à ces 2 défis en 45 minutes le jeudi 31 mai à 11h.
  • Neuer OneXafe: nächste Generation für konvergierten Speicher und Datensicherung
    Neuer OneXafe: nächste Generation für konvergierten Speicher und Datensicherung Ivonne Ehle, DACH Sales Engineer - SCME, Certified Trainer Sep 25 2018 9:00 am UTC 60 mins
    Das Wachstum virtualisierter Anwendungen, immer kleinere Backup-Fenster und ein explosionsartiges Datenwachstum haben die Anforderungen an die Datensicherheit und die Speicherinfrastruktur enorm belastet. Backup- und sekundäre Speicherinfrastrukturen kommen oft von mehreren Anbietern, was die Kosten erheblich steigert, betriebliche Ineffizienzen erhöht und zu Datensilos führt, wodurch die zentrale Verwaltung immer komplexer wird.

    Registrieren Sie sich für unseren Webcast und erfahren Sie, wie Sie mit der neuen konvergenten Datenplattform StorageCraft OneXafe Ihre Daten in heterogenen Umgebungen besser schützen und verwalten
  • VDI / Client virtualisatie / Moonshot Update
    VDI / Client virtualisatie / Moonshot Update Johan Benning, Solutions Architect, HPE Sep 25 2018 9:00 am UTC 60 mins
    Op het gebied van Client Virtualisatie gebeurt er nog steeds veel. In deze presentatie krijgt u de laatste update vanuit een data center / hardware-perspectief.
  • Be More Avocado
    Be More Avocado Yogi Chandiramani Sep 25 2018 9:00 am UTC 60 mins
    Most security gateways are like a coconut, once you're through the hard shell, you have access to everything.
    Zscaler is different. We give you security all the way through the stacks for known and unknown threats, on all devices.
    Like an Avocado
  • HPE ProLiant voor Microsoft Azure Stack
    HPE ProLiant voor Microsoft Azure Stack Martin van Seventer, Solutions Architect, HPE Sep 25 2018 10:30 am UTC 60 mins
    In deze sessie hoort u wat HPE ProLiant voor Microsoft Azure Stack (hét hybride cloudplatform waarmee u Azure-services kunt leveren vanuit uw datacenter die als geïntegreerd systeem wordt geleverd) voor u kan betekenen. Wat is Azure Stack, wat kun je ermee en wat is de rol van HPE hierin? U hoort in deze technisch-georiënteerde sessie alles te weten over HPE Microsoft voor Azure Stack.
  • Infosight – Artificial Intelligence in het datacenter
    Infosight – Artificial Intelligence in het datacenter Jeroen Venema, Solutions Architect, HPE Sep 25 2018 12:00 pm UTC 60 mins
    Hoe krijg je met AI inzicht in je datacenter en kun je problemen oplossen voordat ze storingen veroorzaken met als doel het “Autonomous Datacenter?
  • Synergy versus c-Class versus DL
    Synergy versus c-Class versus DL Remco Pomp, Solution Architect, HPE Sep 25 2018 1:30 pm UTC 60 mins
    Wat zijn de kosten per workload? Hoe verhoudt zicht Hybride It zich ten opzichten cloud-only voor wat betreft de kosten? Hoe is verhouding TCO en Capex? Met welke aanpak hou je de kosten zo laag mogelijk? Kies je voor veel cores met weinig MHz of weinig cores met veel MHz? En wat doet dit met softwarelicentiekosten?
  • Infrastructure as Code & Changing Organizational Design: 2019 & Beyond
    Infrastructure as Code & Changing Organizational Design: 2019 & Beyond Mark Thiele, Erik Ottem, Jeanne Morain and Karthik Krishnaswamy Sep 25 2018 5:00 pm UTC 45 mins
    This webinar is part of BrightTALK's I&O Tech Talk Series.

    Data center hardware and configuration are on the outs as technologies such as Infrastructure as Code (IaC) take shape. The world of manual processes and provisioning is disappearing before our eyes, and it's changing the way organizations are designed and modernized.

    Tune into this roundtable panel discussion led by Mark Thiele, Chief Strategy Officer, Apcera as they discuss the phenomenon of Infrastructure as Code and other emerging technologies, and how they are disrupting IT infrastructure and the traditional data center.

    Moderator: Mark Thiele, Chief Strategy Officer, Apcera
    Panelists: Erik Ottem, Director of Product Marketing, Western Digital and Jeanne Morain, Digital Strategist, Author & Speaker, iSpeak Cloud, Karthik Krishnaswamy, Sr Product Marketing Manager, NGINX
  • Ruggedized Routers Maximize Connectivity & Readiness for First Responders
    Ruggedized Routers Maximize Connectivity & Readiness for First Responders Dale Rolfson, Battalion Chief, Indianapolis FD, and Kevin Gona, Chief of Logistics, Indianapolis EMS Sep 25 2018 6:00 pm UTC 60 mins
    The modern first responder relies on always-on mobile networks to keep their mission-critical applications and devices up and running. These teams need technology to just work — anytime, anywhere — so they can focus on doing their jobs and trust that the technology will function.

    Indianapolis Fire Department (IFD) and Emergency Medical Service (IEMS) agencies are both increasing communication and response times by leveraging Cradlepoint’s solutions with:

    •Constant network connectivity and redundancy for in-vehicle devices,
    such as Mobile Data Terminals (MDTs)

    •NetCloud Manager to troubleshoot issues

    •Rugged and reliable wireless router solutions

    Soon, both agencies will take advantage of the U.S. government created First Responder Network Authority’s nationwide public safety broadband network. Other carriers have announced or are planning their own mobile public safety network using a dedicated cellular “core.” These networks provide a common ability to prioritize first responder communications and can preempt all other cellular traffic to deliver needed performance.

    In this webinar attendees will learn:

    •The different ways agencies are implementing Cradlepoint solutions

    •How agencies are gaining faster response times with always-on
    connectivity

    •Details on why agencies are leveraging wireless solutions

    Join Dale Rolfson, Battalion Chief, Indianapolis Fire Department, and Kevin Gona, Chief of Logistics, Indianapolis EMS for a live webinar to explore how Cradlepoint’s easy-to-use and best in class solutions are helping first responders to act and communicate faster.
  • Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For
    Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Sep 25 2018 6:00 pm UTC 45 mins
    With the major cyber-attacks headlining the news, many of these cyber threats fall into five different attack vectors. Whether it's user credentials, personally identifiable information (PII), payment card information, health care information, intellectual property, or another form of data, nothing is safe from these bad actors. So, how do you protect you and your business from these debilitating attacks?

    In our upcoming webinar, we arm you with the essential components needed to defend your business against the top five attack vectors we see in a Cyber Security Operations Center (SOC).

    After attending you will:

    - Recognize what are the top 5 attack vectors and the counter-measures you can take
    - Understand the importance of detection and response in the kill-chain for each attack vector
    - Discover how Arctic Wolf Networks (AWN) CyberSOC works to provide the essential components to protect against each of them

    Register now to understand the different ways an attacker may cause harm to you and your business and how to defend yourself moving forward.
  • API Gateways: Why You Should Use Them in Microservices Development
    API Gateways: Why You Should Use Them in Microservices Development Charles Pretzer, Technical Architect, NGINX Sep 25 2018 6:00 pm UTC 60 mins
    The use of an API gateway and the move to microservices are two of the most important trends in application development. But are they similar, or different; complementary, or contradictory? In this webinar we discuss the advantages of an API gateway, the advantages of microservices development, and how and when they can work together.

    Join this webinar to learn:
    - More about the advantages of an API gateway
    - More about the advantages of microservices
    - Whether an API gateway approach works with different microservices network architectures, including service mesh
    - How to reduce rework if your application needs to move from one network architecture to another
  • [Live Panel] Tech Stack Secrets from Top IT Teams
    [Live Panel] Tech Stack Secrets from Top IT Teams Dave R Taylor, CMO, Impartner, Lief Koepsel, Fortinet, Armin Moaddel, Marketo, Margaret Back, McAfee & Kevin Sequeira, Splunk Sep 25 2018 8:00 pm UTC 60 mins
    How do you support your business units?

    How do you decide to make or buy?

    How do you decide whether to use functionality from an existing vendor or bring in a totally new technology provider?

    These are the questions top IT teams are and should be asking. In this webinar you’ll hear from top IT leaders – and one business unit buyer – from today’s most progressive tech companies for insights on how they’ve navigated these questions for their organizations and helped them construct a world-class tech stack that outpaces the competition.

    Join Dave R Taylor, Chief Marketing Officer at Impartner for this live streamed panel during Dreamforce 2018 in San Francisco.

    Panelists:
    Lief Koepsel, Senior Director, Channel - North America, Fortinet
    Armin Moaddel, Senior Partner Operations Manager, Marketo
    Margaret Back, Business Process Architect, McAfee
    Kevin Sequeira, Senior Director, Sales Technologies, Splunk
  • [Live Interview] Ask the Expert: How to be the IT Champion of a PRM Installation
    [Live Interview] Ask the Expert: How to be the IT Champion of a PRM Installation Gary Sabin, Senior Director, Product & UX and Dan Lang, Senior Salesforce Developer, Impartner Sep 25 2018 9:15 pm UTC 30 mins
    Sales tech stack: ✓ Martech stack: ✓  This year’s hot tech stack is for the channel -- which typically represents 75% or more of a company’s revenue. 2018’s breakthrough technology is PRM – Partner Relationship Management. This foundational system of record sits at the core of a chantech stack and everyone from Splunk, to Zendesk to Xerox have made PRM this year’s must have technology. IT leadership is uniquely positioned to ensure the quick, on-budget implementation success.

    Join this intense “Ask the Expert” session with one of Impartner Channel Innovation Labs top installation experts to learn best practices on how to streamline deployment of this highly-visible, revenue-generating solution.
  • 4 Practical Ways Cloud Simplifies Managing Apps, Devices, and Data
    4 Practical Ways Cloud Simplifies Managing Apps, Devices, and Data Vishal Ganeriwala Sr. Director, Workspace Marketing, Citrix Sep 26 2018 9:00 am UTC 35 mins
    Traditionally, apps, desktops, devices and data are all managed through different systems, which is complex and time-consuming. Unifying management as cloud services with a single control plane improves the delivery and management of the apps and data employees need. Citrix delivers a complete, secure digital workspace.

    Join this webinar to learn more about how managing apps, desktops, devices and data with Citrix Workspace is:

    • Fast: Deploy apps and desktops, or complete secure digital workspaces in hours, not weeks.
    • Simple: Implement a fully-integrated portfolio via a single-management plane to simplify administration.
    • Adaptable: Choose to deploy on any cloud or virtual infrastructure — or a hybrid of both.
    • Secure: Keep all proprietary information for your apps, desktops and data under your control.
  • Data... de levensader van uw organisatie.
    Data... de levensader van uw organisatie. Alex den Hartog, Senior Sales Consultant, Commvault Sep 26 2018 9:00 am UTC 60 mins
    Data... het is de levensader van uw organisatie. Maar hoe houdt u de groei van data in de hand? Hoe zorgt u voor compliance, security en privacy als u steeds meer databronnen gebruikt? Hoe haalt u het meeste uit uw oplossingen zonder eraan vast te zitten? En welke datamanagement strategie past bij u, ondersteunend aan de bedrijfsdoelstellingen en tegen het gewenste kostenniveau? Geïntegreerd datamanagement heeft de toekomst! Luister naar de visie van Commvault en laat u inspireren
  • Scality Software Defined Storage – Any Time, Any Scale on Any Cloud
    Scality Software Defined Storage – Any Time, Any Scale on Any Cloud TBC Sep 26 2018 10:30 am UTC 60 mins
    Come and see how Scality RING’s proven limitless scale-out storage performance can significantly drive down your total cost of ownership whilst improving durability and availability of your data. See also how Scality’s new ZENKO platform enables you to manage your data in native mode across multiple cloud providers giving freedom and control to people who create value with data.
  • Memory based computing voor databases en andere moderne (research-)applicaties
    Memory based computing voor databases en andere moderne (research-)applicaties Sander de Jong, Solution Architect, HPE Sep 26 2018 12:00 pm UTC 60 mins
    Nieuwe technolnologieën zoals HPE Proliant Persistent memory kunnen de systeemperformance drastisch verbeteren. Er wordt vaak gedacht dat deze nieuwe technologie alleen geschikt is voor grote enterprise omgevingen, databases of specialistische applicaties. In deze sessie gaan we dieper in op HPE Persistent memory oplossingen voor allerlei soorten omgevingen. Ondek de mogelijkheden van onbeperkte hoeveelheden geheugen, waarbij informatie ook nog eens persistant kan zijn (d.w.z. dat de info bij stroomuitval bewaard blijft). En wat betekent memory based computing voor o.a. de verwerkingssnelheid en kosten?
  • Greenlake - Hybrid IT as a Service
    Greenlake - Hybrid IT as a Service Ronald Klaasse van HPE Sep 26 2018 1:30 pm UTC 60 mins
    IT-teams staan onder een steeds hogere druk om oplossingen snel, maar tegen lage kosten en risico’s te leveren. De verschuiving naar Hybride IT in een consumptiemodel en ‘everything-as-a-service’ versnelt weliswaar de business, maar zorgt ook voor minder controle bij de IT-afdeling. Daarom hebben bedrijven ook on-premises flexibele infrastructuuromgevingen nodig, met cloudachtige mogelijkheden voor workloads. HPE GreenLake biedt klanten de keuzes waar workloads geplaatst worden en hoe ze flexibel in een pay-per-use & service-led model afgenomen kunnen worden. In deze sessie vertelt Ronald Klaasse u welke mogelijkheden er zijn en wat de voordelen daarvan zijn.
  • Enabling Digital Transformation - What to Expect at IP EXPO Europe 2018
    Enabling Digital Transformation - What to Expect at IP EXPO Europe 2018 Simon Bitton, Sean McAvan Sep 26 2018 2:00 pm UTC 60 mins
    With just a few weeks to the must-attend IT event of the year for CIOs, IT Managers and Directors, Security specialists, Technical experts, we've gathered some of the elite speakers who will be taking the stage to debate the hottest solutions, trends and the biggest opportunities and challenges for businesses to successfully embrace digital change.

    Topics to be covered include:

    - Cyber Security
    - DevOPs
    - AI Analytics
    - Blockchain
    - Internet of Things

    What will they be talking about at ExCeL London, on the 3-4 of October 2018, what do they want to hear about, what are they looking forward to?

    Presenters
    Simon Bitton, Director of Marketing, Europe, Park Place Technologies
    Sean McAvan, Managing Director, Navisite Europe
  • IT Security’s Offering to Cloud: Enable DevOps with Automated Security
    IT Security’s Offering to Cloud: Enable DevOps with Automated Security Colby Dyess, Director Cloud Marketing & Dan Rheault, Sr. Product Marketing Manager, Tufin Sep 26 2018 3:00 pm UTC 60 mins
    DevOps teams often operate outside the purview of IT security, but security is still necessary in the cloud. IT security can ensure that DevOps teams retain their agility and maintain strong security using automation. By integrating security through automation, the security watchdog now becomes the trusted advisor, helping DevOps enable the business.

    Join this webinar on September 26 to hear Tufin experts Colby Dyess and Dan Rheault discuss how information security operations teams integrate security into a dynamic delivery process. We will cover how to:
    •Find commonalities between information security and cloud teams
    •Gain visibility into cloud security
    •Assess risk within the cloud by leveraging a policy-driven approach
    •Enforce security in CI/CD without impeding application delivery
    Register now to learn how automation enables organizations to align cloud and DevOps with security policies.
  • Turbocharge Data Pipelines with VelocityAI
    Turbocharge Data Pipelines with VelocityAI Jason Blum, CTO at GPL Technologies and Shailesh Manjrekar, Sr. Director, Product and Solutions Management at Vexata Sep 26 2018 5:00 pm UTC 60 mins
    Data is doubling every two years, driven by human and machine-generated data, such as the Internet of Things (IoT). The analysis of patData is doubling every two years, driven by human and machine-generated data, such as the Internet of Things (IoT). The analysis of patterns and structure in this data and its transformation into actionable insights is driven by Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) workloads.

    IDC predicts that in the next three years over half the businesses will use AI, ML, and DL workloads. This has given rise to the NVIDIA DGX-1 GPU-based supercomputer to accelerate these workloads. Vexata supports the DGX-1 and delivers ultra-low latency, massive ingest bandwidth, and heavy mixed random and sequential read/write I/O operations. Using direct attached storage (DAS) or all-flash arrays (AFAs) limits the usefulness of the DGX-1 by restraining performance and requiring complex data provisioning, mobility, and growth. Vexata addresses these issues with VelocityAI, which combines the NVIDIA DGX-1 and the Vexata VX-100FS Scalable NVMe File Array.

    Learn about VelocityAI and how we built it to overcome these machine learning challenges. This webinar is targeted to those that want to leverage GPU for data analytics. Our expert will cover:

    - Dealing with large training and inferencing data-sets by leveraging NVMe media
    - Using the VelocityAI to eliminate movement between data pipeline stages
    - Dealing with data security, protection, and efficiency concerns

    Learn how you can leverage VelocityAI to deliver transformative performance with breakthrough economics at scale for your AI, ML, and DL applications.
  • Elevate Your Network Security with NSX SD-WAN and Palo Alto Networks
    Elevate Your Network Security with NSX SD-WAN and Palo Alto Networks Brian Tokuyoshi, Sr. Product Marketing Manager, Palo Alto Networks & Nitin Kumar, Product Line Manager, VeloCloud Sep 26 2018 5:00 pm UTC 60 mins
    With an ever-increasing amount of enterprise traffic driven by Public Cloud SaaS applications, security has never been more complex. Direct access of applications over the internet, while inexpensive, does not provide Enterprise-grade performance and simultaneously leaves the network susceptible to attacks. Furthermore, the traditional approach to branch connectivity involves a convoluted backhaul of traffic to a centralized firewall located in the corporate HQ or Data Center before accessing the internet.

    Why does it need to be this complicated? The short answer… it doesn’t.

    Join this webinar for an overview — and a deep dive — of an integrated approach to wide area networking that combines best-of-breed security and SD-WAN solutions. Experts from Palo Alto Networks and VeloCloud, now part of VMware, will discuss next generation Enterprise WAN and outline an approach that makes it simple to assure the performance and security of applications, dramatically simplify deployments with various options, and cut costs.
  • (Replay) How End-to-End Copy Automation for SAP Systems Can Save Budget
    (Replay) How End-to-End Copy Automation for SAP Systems Can Save Budget Samer Kamal, SAP Solutions Manager, Pure Storage Sep 26 2018 11:00 pm UTC 45 mins
    Companies are facing increasingly complex IT landscapes, and testing needs to occur quickly and with consistency. Resource-intensive tasks, such as SAP system copy, clone, and refresh, can be complex and time-consuming – some customers report spending 3-5 days for one system copy. In this webinar, learn about a copy automation tool for SAP applications that incorporates more than 75% of all pre, copy and post functionality – and automates it. Whether for traditional SAP or SAP HANA, Pure Storage’s Copy Automation Tool (CAT) for SAP applications drives digital transformation with huge gains in productivity and cost savings, and is included with every Pure Storage FlashArray. In this webinar, you will learn:

    - How some companies have saved up to 80 percent of time and budget when performing SAP landscape copy, clone, and refresh tasks, freeing up time to focus on increasing innovation

    - How to simplify SAP copy functionality and gain flexibility through additional integration or customization, to speed SAP migrations, upgrades, and testing

    - How to reduce risks by automating the refresh process, and reduce complexity through the use of this embedded tool
  • 第2のエンドポイント:スマホが狙われている!モバイル脅威に纏わるリアリティと対策
    第2のエンドポイント:スマホが狙われている!モバイル脅威に纏わるリアリティと対策 髙岡 隆佳, エバンジェリスト, Symantec Japan Sep 27 2018 6:00 am UTC 60 mins
    平素より格別のご高配を賜り厚く御礼申し上げます。

    企業のクラウドシフトが進むにつれて、社員にスマートフォンやスマートデバイスが払い出され業務で活用する企業も増えつつあります。スマホは利便性が高く、クラウド連携し業務の効率化が可能である一方、脆弱性を悪用した端末のハック、マイクを利用した盗聴、偽のWifiスポット経由での情報搾取など、様々な脅威に曝されています。

    業務でスマホを安全に活用するために欠かせない、Mobile Threat Defense(MTD)という技術がMDMを補うものとして注目されています。本ウェビナーでは脅威の実例を交えながらMTDを実現するソリューションについて解説いたします。

    本ウェビナーについてご質問がございましたら以下までご連絡ください。