Network infrastructure professionals understand that a reliable and secure infrastructure is crucial to enabling business execution. Join the network infrastructure community to interact with thousands of IT professionals. Browse hundreds of on-demand and live webinars and videos to learn about the latest trends in network computing, SDN, WAN optimization and more.
Valerie DiMartino Senior Product Marketing Manager, Sony Kogin Principle Product Marketing, Managed Service ProviderRecorded: Nov 15 201852 mins
Azure or adopting Office 365, it’s time to look at SD-WAN to securely connect branch users and deliver and optimized experience that’s eases cloud and SaaS migration. This webinar will explain the advantages that Citrix SD-WAN brings to your Microsoft deployment including tools such as Microsoft Azure Virtual WAN and Office 365 performance.
In this session, you will learn how Citrix SD-WAN helps:
• Securely connect branches to the cloud, SaaS, and the Internet
• Optimize Office 365 connectivity and performance
• Simplify and automate large-scale branch connectivity with Azure Virtual WAN
Gaurav Pant Chief Insights Officer, Incisiv, and Ricardo Belmar, Senior Director, Global Enterprise Marketing, InfovistaRecorded: Nov 15 201856 mins
As the lines between online and in-store retailing become increasingly blurred, your stores’ digital transformation needs to enable new in-store experiences that increase conversion rates, while empowering your associates to raise customer satisfaction with the help of new technology. Yet 74% of retailers tell us their store network is the #1 barrier to an effective customer journey from these new technologies.
Retailers tell us their top five applications that deliver on the promise of great customer experience and associate enablement are: point of sale (POS), inventory management, guest Wi-Fi, workforce management, and real-time data analytics. How do you enable your network to power your store transformation and deliver a consistent, high performance in-store experience?
Join Gaurav Pant, Chief Insights Officer, Incisiv, and Ricardo Belmar, Senior Director, Global Enterprise Marketing, Infovista, as they discuss the 5 key imperatives that can help retailers deliver the digital in-store experiences that work.
- Why digital is the front door to your store
- Reveal the 5 Requirements for successful digital in-store experiences
Learn why Ipanema SD-WAN, Application Intelligence for the WAN Edge, is the only solution that meets all of these requirements and how it helped the world’s largest QSR brand protect its digital revenues while enabling the digital transformation of its restaurants.
Guy Rosefelt, Director of PM at NSFOCUS and Adrian Sanabria, VP of Strategy and Product Marketing at NopSecRecorded: Nov 15 201859 mins
Recent evidence shows that a surprisingly high portion of vulnerabilities incorporated into malware or exploit kits are ranked low or medium severity. Counter to commonly-accepted practices, focusing only on high-severity vulnerabilities and setting a ‘cut-off’ point for lower scored issues, is not a safe or effective strategy. More importantly, proof-of-concept (POC) code for lower priority vulnerabilities is appearing more quickly after 0-day announcement leading to leading to widespread attacks equally as quickly. NSFOCUS and Nopsec will delve into this recent trend, discuss some of these lower level vulnerabilities being quickly exploited, and provide some thoughts how to better protect against these in the future.
John Gudmundson, A10 NetworksRecorded: Nov 15 201847 mins
With the evolving nature of application deployment, it is critical that these services be dynamically allocable, fully portable, scale on-demand and procured by a simplified license.
You will see a live demonstration of FlexPool™, a software subscription for capacity pooling. This will allow you the flexibility to allocate and distribute secure application services whenever and wherever you need them.
Join A10 Networks and learn how to:
•Achieve on-demand provisioning of app services in seconds
•Maximize ROI with license portability and pay-as-you-grow
•Use modern DevOps tools to simplify license management
Sree Subramaniam, Chintan UdeshiRecorded: Nov 15 201850 mins
Your enterprise network relies on a vast array of security devices and solutions, each generating their own incidents. More often than not, the data they produce can’t be easily shared.
According to a 2017 ESG report, keeping up with the enormous volume of security alerts and a lack of integration are the biggest network security challenges enterprises face.*
The consequences? Solution silos, lack of context and prioritization, high false positives and costly delays in responding to active and impending threats.
Learn How to Automate and Orchestrate Your Security Response
Join Infoblox and ServiceNow for a live discussion on how organizations are taking network security to the next level by using DNS and IP address management data to enable diverse security tools to work in unison to contain threats faster.
Attend this webinar and explore how security ecosystem integration can help your network and security teams to:
-Gain visibility into new devices and infected hosts in a single place
-Respond faster to DNS threats
-Eliminate silos between network and security tools
-Improve ROI of existing network and security investments
Discover how to take your security to the next level. Reserve your spot now.
*ESG, “Security Operations Challenges, Priorities and Strategies in 2017.”
Christopher Liljenstolpe, Chief Technical Officer, Solutions at TigeraRecorded: Nov 15 201845 mins
Kubernetes is widely used to re-architect traditional applications. Many organizations first set up Kubernetes within their on-prem environment and then later expand to the public cloud. This hybrid environment often creates security and compliance challenges with workloads. Join this webinar to learn how to leverage universal security policy definition that works across a hybrid environment.
Cherie Martin, Sr. Solutions Marketing Manager - ArubaRecorded: Nov 15 201848 mins
The industry is buzzing about the soon-to-be released 802.11ax Wi-Fi standard that will greatly increase wireless speed and optimize client battery life. Are you ready to take your network to the next level? Join us as Aruba’s Cherie Martin, Sr. Solutions Marketing Manager, shares the top three things you need to consider in deciding which technology to choose to give your business, employees, and guests, simple, business-class networking without sacrifice
Peter Mackenzie, Malware Escalations Manager, SophosRecorded: Nov 15 201847 mins
Join Peter Mackenzie as he discusses the rise of targeted ransomware and why attacks like SamSam, Dharma and BitPaymer are making headlines. Watch a live demo of a ransomware payload being unleashed and the steps you need to protect your organization from similar attacks.
Scott Olson, Sr. Sales Engineer; Stephen DeSanto, Solutions EngineerRecorded: Nov 15 201844 mins
Splunk is an excellent platform for analyzing machine data and orchestrating responses. ExtraHop extracts wire data events and metrics from network communications, and can send this information to Splunk for added accuracy and context.
This webinar explains why ExtraHop and Splunk make such a great fit, and how you can use the ExtraHop App for Splunk to stream wire data such as details for DNS, database, storage, and more.
Sarah Terry, Senior Product Manager, LogicMonitorRecorded: Nov 15 201843 mins
How do you maintain visibility into the performance of containerized applications as containers come and go? The layering of dynamic, ephemeral resources onto service-oriented architectures presents a challenge for optimization and complicates the understanding of true aggregate performance.
Are you and/or your hybrid and IT Operations teams tired of being woken up in the middle of the night for non-critical alerts? We’ll show you how to use hybrid monitoring to more effectively track the performance of dynamic services and more quickly identify impacted services for a given alert to optimize service availability and performance.
Join this webinar and learn how to:
-Gain complete visibility into the performance and availability of services in hybrid IT infrastructure
-Ensure that alerts reflect overall service impact for distributed and clustered resources
-Leverage dashboards and performance insights in order to reduce time spent troubleshooting
Eric Hanselman of 451 Research & Steve Madden of EquinixRecorded: Nov 15 201861 mins
Digital transformation is accelerating for every company in every industry, everywhere around the world. As a part of this necessary transition, people, software and machines are creating and consuming data faster and in more distributed locations than ever before. According to the second annual Global Interconnection Index (the “GXI”), a market study published by Equinix that analyzes traffic exchange globally, Interconnection, or direct and private traffic exchange between key business partners, is becoming the defacto method for companies to operate in today’s digital world. 451 Research Chief Analyst Eric Hanselman and Equinix’s Steve Madden will discuss how major macro, technology and regulatory trends are converging to form an unprecedented era of complexity and risk and forcing the integration of physical and digital worlds requiring Interconnection.
IBC365 | Huawei | Rights Stuff | O2 | AmpereRecorded: Nov 15 201863 mins
The boundaries between broadcasters, pay TV platforms, OTT operators and telecoms providers are blurring.
Competitors are becoming partners as content owners recognise the role of telcos to deliver their services to a bigger audience and drive new revenues, while telecom operators are creating compelling consumer experiences built around video.
Convergence is now all about putting the consumer at the centre of a connected media and entertainment experience where the distinction between live broadcast and on-demand services disappears.
It's an exciting time for every player in the content and connectivity business, and in this ground-breaking webinar we'll map out the future of convergence and hear:
- Why high-quality video services are vital for telecom operators wanting to engage consumers and grow their revenues through "experience monetisation"
- When is the right time for operators to license their own content or offer their own VOD platform
- How becoming a super-aggregator of OTT services and TV channels can create a compelling offer without costing a cent in content rights
- Why content providers, broadcasters and SVOD platform owners should partner with telcos to reach new audiences in new markets
Richard Griffiths, Vice President Consultant Office, Huawei Technologies
Wendy Bernfeld, Managing Director, Rights Stuff
David Owens, 5G Ecosystem Liaison Technology Strategy, O2 (Telefonica UK)
Tony Maroulis, Research Manager, Ampere Analysis
Andy Shoemaker, founder of DDoS testing company NimbusDDOSRecorded: Nov 15 201859 mins
Are you relying on manual DDoS mitigation methods? How can waiting minutes to mitigate a DDoS attack impact your business? Watch as Andy Shoemaker, founder of DDoS testing company NimbusDDOS, gives you a look behind the curtains of a live DDoS attack. Then see first-hand how Imperva Incapsula automatically blocks the threat without impacting the user experience.
In this webinar you will:
• Learn why automatic mitigation is crucial to keeping your business up and running
• Understand the power and importance of the Incapsula 10-second DDoS SLA
• Participate in a live Q&A with DDoS experts
John Maddison, SVP of Products and SolutionsRecorded: Nov 15 201844 mins
In this webinar on demand, John Maddison discusses how Fortinet Enterprise Firewalls deliver a unique fabric-based architecture and why Fortinet was named a Leader in the 2018 Gartner Magic Quadrant for Enterprise Network Firewalls.
Christian Giebner, Presales Engineer, Tufin & Christian Giebner, Presales Engineer, TufinRecorded: Nov 15 201833 mins
ist Ihre Netzwerktopologie flacher als die Schleswig-Holsteinische-Gebirgslandschaft?
Wir können Sie dabei unterstützen Ihr Netzwerk in effektive Sicherheitszonen aufzuteilen und haben eine Lösung, welche die Einschränkungen der Kommunikation zwischen den Zonen, Hersteller- und Plattformunabhängig, sicherstellt.
Besuchen Sie das Webinar am 15. November um 9:00 Uhr, vom Presales Engineer Christian Giebner, erfahren Sie die Methoden und Vorteile einer praktikablen Netzwerksegmentierung und lernen Sie:
•Warum eine einheitliche Segmentierungsrichtlinie essentiell für die Sicherheitsrichtlinienverwaltung ist
•Wie Sie Sicherheitszonen definieren und die Interzonenkommunikation gestalten
•Wie Sie effektiv Ihre Segmentierungsrichtlinie pflegen und durchsetzen
Ian Farquhar, Distinguished Engineer, Security, Gigamon; Moderator: SC Leung, Member, Asia-Pacific Advisory CouncilRecorded: Nov 15 201861 mins
Inline security tools operate by actively preventing threats in your network, but deploying and optimizing these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade. The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges.
Join Gigamon and (ISC)² to examine how inline bypass can overcome physical deployment obstacles, maximize network availability, increase the scale of inspection and reduce the impact to network performance.
Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf NetworksRecorded: Nov 14 201843 mins
A security information and event management (SIEM) platform has been touted as the cornerstone of cybersecurity. But, can such a stand-alone platform address your IT security challenges and compliance reporting needs? With the growing complexity of SIEM solutions and a shortage of people with cybersecurity skills to manage them, many organizations are looking for alternatives to building their own in-house SIEM and staffing a security operations center (SOC).
In this webinar, security expert, Narayan Makaram, Sr. Director of Product Marketing at Arctic Wolf Networks, will examine the following:
- Business drivers for a SIEM
- What is/is-not included in a SIEM
- SIEM deployment options
- Outsourcing considerations – MSSP vs MDR
Oracle database administrators looking to get more performance against larger data volumes can utilize the Oracle feature called “Database Smart Flash Cache” to accelerate Oracle without. This webcast will detail how to take full advantage of this very useful but sometimes overlooked feature to demonstrate how admins with high query rate databases with large tables and huge volumes can get immediate Oracle performance acceleration using Smart Flash Cache along with the Vexata Scalable Flash Array. In this webcast, you will learn how to:
•Architect Oracle Infrastructure that maintains existing primary storage using the Vexata VX-100 as the Smart Flash Cache Tier
•Boost Oracle Database performance by 6X or more without the need to replace existing host servers or primary storage array.
•Demonstrate these dramatic performance gains in your own Oracle environment along with technical documentation and resources to deploy Smart Flash Cache with no risk.
Venky Nagapudi, VP of Product Management
Cameron Jones, Product Manager, Blue MedoraRecorded: Nov 14 201845 mins
Do you love Azure Monitor? Have you considered setting up an Action Group for when the office coffee maker is at 10% capacity? Do you wish you could ask the Azure Advisor anything? New infrastructure and multi-cloud integrations for Azure Monitor have made it possible to use it in dozens of new ways. Join us and get insight into how BindPlane enables:
- Datacenter monitoring with Azure Monitor and Log Analytics
- Data from multiple clouds in Log Analytics
- Monitoring Azure workloads like MSSQL and Oracle
- Query Analysis in Log Analytics
John Kim, Mellanox; Saqib Jang, Chelsio; Fred Zhang, IntelRecorded: Nov 14 201844 mins
Scale-out storage is increasingly popular for cloud, high-performance computing, machine learning, and certain enterprise applications. It offers the ability to grow both capacity and performance at the same time and to distribute I/O workloads across multiple machines.
But unlike traditional local or scale-up storage, scale-out storage imposes different and more intense workloads on the network. Clients often access multiple storage servers simultaneously; data typically replicates or migrates from one storage node to another; and metadata or management servers must stay in sync with each other as well as communicating with clients. Due to these demands, traditional network architectures and speeds may not work well for scale-out storage, especially when it’s based on flash. Join this webinar to learn:
•Scale-out storage solutions and what workloads they can address
•How your network may need to evolve to support scale-out storage
•Network considerations to ensure performance for demanding workloads
•Key considerations for all flash
Amandeep Nagra, Sr. Product Marketing Manager, Workspace services, CitrixRecorded: Nov 14 201857 mins
Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.
With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.
Some of Citrix Workspace key advantages include:
• Higher user productivity and a better experience
• Stronger security which extends to the cloud
• joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario
Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
Amar Singh; Steve VickersRecorded: Nov 14 201849 mins
Are you open minded to saving money and ensuring that your business is better protected from cyber criminals at the same time? Join Amar Singh and Steve Vickers as they discuss a simple checklist for charities and small businesses. A non-technical discussion, we layout step by step guidance on what you can do:
- To save money on your current IT and security investments
- To ensure your third party is delivering the right level of security and service
- Increase your operational efficiency and lower total cost of operations.
Steve Mulhearn, Director Enhanced Technology FortinetNov 19 201810:00 amUTC45 mins
In the rapidly changing threat landscape one of the top concerns for most organisations is the introduction of IOT.
While some organisations have attempted to prevent the connection of these devices due to their lack or non existence of any security, many organisations and Enterprises have now reached the reality that they are here to stay.
With this in mind what risk does this pose to your organisation and how to reduce this risk to an acceptable level? We will walk through some of the options available and how they may help Enterprise manage the changing landscape.
Timothy Fong, Security Product Expert at Cloudflare | John Esterline, Solutions Engineer at CloudflareNov 19 20182:00 pmUTC45 mins
As the web application security landscape evolves, companies are facing increased pressures to strengthen their security posture. Recently, the world’s largest distributed denial of service (DDoS) recorded attacked GitHub at 1.35 Tbps. While the big attacks get all the headlines, at Cloudflare we have learned about other forms of attacks that can unexpectedly bring your site down.
Join this webinar to learn about:
- How small DDoS attacks can still bring your site down
- A little known way attackers can bypass traditional DDoS protections
- Why TCP services may make you vulnerable to a DDoS attack
- Pros and cons of multiple solutions: BGP, MPLS, and building your own
- How to augment Cloudflare’s unmetered DDoS solution with Spectrum, Rate Limiting, and Argo Tunnel
Yoni Geva, Product ManagerNov 19 20183:00 pmUTC60 mins
Are you still implementing firewall changes manually? Are you still trying to keep track of all the changes and their ramifications with spreadsheets?
Network security policy automation gives you quick, accurate change management across even the most complex hybrid networks, avoiding security holes, compliance issues and costly outages. With automation, you don’t have to choose between agility and security. You can have both.
In this webinar, Yoni Geva, Product Manager at AlgoSec, explains how security policies can be updated automatically and accurately.
Join our webinar to learn how to take advantage of:
•Automated security policy automation with zero touch
•Security policy management that keeps up with business requirements
•Automatic identification of risk
•Enhanced compliance with quick audit reports on demand
Jacquie Touma, Chaitra Vedullapalli, Terri StephanNov 20 20188:00 pmUTC60 mins
We live in a truly amazing time. Technology is changing almost every aspect of our lives at breathtaking speed. Advances in medicine, education, communication, and productivity have increased life expectancy around the globe and lifted hundreds of millions of people out of poverty.
The ability to connect to people and information instantly is so commonplace that many take it for granted and now, we’ve arrived at the beginning of an era of even more profound transformation, all centered on the cloud. We’re excited to bring more opportunities through cloud computing to address issues in healthcare, the environment, cybersecurity, and underserved communities. And we’ve seen the incredible good that can come from the cloud, but with it also come challenges. For women in technology, there are increased challenges in a cloud-based world.
Women in Cloud initiative is designed to empower female tech entrepreneurs by providing Access, Acceleration, and Actions so women entrepreneurs can take Actions every day to achieve their business goals!
In this webinar, we will share experiences and tips for female tech entrepreneurs in building their cloud B2B with enterprise companies in a simple and predictable way. This is going to be a panel discussion with great conversation with female tech entrepreneurs in driving customer traction.
Also, learn how you can participate in the next cohort of women in cloud accelerator to build your business with enterprise brands!
Peter Thornycroft, Distinguished engineer in Aruba CTO groupNov 21 201810:00 amUTC61 mins
As more mobile and IoT devices, and bandwidth hungry apps, are increasingly straining Wi-Fi networks, it’s difficult to predict how your network responds.
The new IEEE 802.11ax standard is designed to enhance throughput by 4X in dense environments and provide a more predictable experience.
Join us for a deep dive session on technical ingredients of 802.11ax technology where we cover features such as OFDMA, MU-MIMO and Target Weight Time (TWT).
Suzanne Dickson Sr. Dir. Product Marketing, Mobility Citrix; Amandeep Nagra Sr. Product Marketing Manager, CitrixNov 21 201811:00 amUTC53 mins
Windows 10 and the proliferation of BYO devices introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embrace unified endpoint management (UEM) to solve the challenges of managing PC, IoT and mobile devices with a centralized solution to manage and secure endpoints.
Register for this webinar to hear from Suzanne Dickson, Sr. Director, Product Marketing and Citrix Workspace Product Marketing Expert, Amandeep Nagra on how to manage and secure your endpoints.
This session will address how UEM helps solve challenges of traditional client management in the context of the new digital workspace. Learn more about:
• UEM and how it fits into a Digital Workspace
• Managing endpoints through Citrix UEM
• The future of Citrix UEM
Prasad Raviraj Solutions Marketing SR Manager, SecurityNov 21 20182:00 pmUTC14 mins
Price, agility, scale, global footprint, and availability of emerging technologies (such as AI, Serverless, IOT, etc) within the cloud platforms have contributed to the rapid adoption of multicloud by businesses across the globe. However, helping business adopt these technologies and deployment models while keeping the network safe from attack is a major challenge for even the most seasoned of security professionals. In this session we will explore how a three-pronged approach using Juniper Networks Unified Cybersecurity Platform can help businesses get multicloud security right.
Keith Langridge & Darren Overall from BT, and Stephen Smith & Mark Jopling from Riverbed Technology Inc.Nov 21 20183:30 pmUTC60 mins
CEOs are adopting a digital first approach to match customer needs, but how are they measuring success?
Digital technology changes how we do almost everything, and this pace of change continues to accelerate. When it’s built into the core of your business strategy it can help your company thrive - make you quicker, lighter and more responsive.
But there’s a twist. A recent survey suggests that important digital services and applications are failing and letting 80% of you down.
The stark reality is, that in a lot of cases the promise of digital is not living up to expectations and in many cases it’s becoming even harder to operate in an increasingly cloud-oriented world.
Join us on a webinar on 21 November to discover how to measure if your business really has become more agile and responsive. We’ll talk about how to get full end-to-end performance visibility and control of your global applications and network infrastructure. With actionable data you can quickly tweak and improve performance and service levels and show the impact of the digital services you’ve deployed.
You’ll be in a better position to respond to the changing needs of your business, establish whether your digital technologies are delivering what you need them to and tune them to deliver a successful outcome.
-Keith Langridge, VP, network services, BT
-Darren Overall, Head of Connect Intelligence, BT
-Stephen Smith, VP of business development, Global Digital Service Providers, Riverbed Technology Inc.
-Mark Jopling, SVP EMEA Sales, Riverbed Technology Inc.
Jonathan Lewis, VP of Product MarketingNov 21 20185:00 pmUTC30 mins
Advancements in DNS (Domain Name Systems), including the ability to communicate via APIs and the power to couple real-time telemetry with automation capabilities, give this often overlooked but foundational component of the application delivery stack a critical role in a DevOps-driven world.
Leading-edge enterprises have stopped viewing DNS as just a "phone book" and are now leveraging next-generation DNS to better manage their infrastructure, improve application performance and lower costs.
In this webinar we'll focus on 3 case study examples of next-generation DNS in action:
- How a gaming company integrated and automated multiple CDNs to cut content delivery costs in half
- How an ad delivery platform delivers impressions 70% faster using a multi-cloud strategy managed by DNS
- How a security SaaS organization used DNS to improve performance and reduce help desk calls
Remy Guercio, Product Marketing, CloudflareNov 22 20181:00 amUTC23 mins
As part of this, we'll briefly cover:
- How to perform custom routing
- Creating custom authorization
- Building an API Gateway
Anand Guruprasad, Solutions Engineer, Cloudflare | Nithyanand Mehta, Director of Technical Services, CatchpointNov 22 20186:00 amUTC45 mins
At Cloudflare, we not only protect 12 million domains against DDoS attacks with our global network but also accelerate their performance. Our 150+ data centers all over the world puts us in a key position to serve content from the edge to the end users, blazingly fast.
Join this webinar to learn about:
• How performance affects your revenue
• What is the right metric to measure and how
• Challenges in achieving an optimal performance on your web assets
• How to improve your website’s performance and user-experience
• Learn from industry experts on best practices for improving web performance
Remy Guercio, Product Marketing, CloudflareNov 22 201810:00 amUTC23 mins
As part of this, we'll briefly cover:
- How to perform custom routing
- Creating custom authorization
- Building an API Gateway
Richard Leadbetter, Security Technical Specialist, EMEANov 22 201810:30 amUTC60 mins
With the arrival of digital workplaces comes added security threats.
Your business will need integrated and automated security controls to help protect your data from malware and unauthorized users. Including wireless intrusion detection and prevention, your network can be safeguarded from wireless threats, rogue access points and clients.
Join our webinar, ‘Getting the Right Network Security for Your Business’ to learn how Aruba, a trusted brand that provides next generation network solutions, helps keep your business applications and data safe.
You'll also learn about:
• The network security landscape
• Aruba SMB solutions and their security benefits
• Available additional resources
Steve Brumer- Partner at 151 Advisors and Steve Wimsatt - Senior Director, Alliances and Business Development Ruckus NetworkNov 26 20185:00 pmUTC60 mins
Problems faced by IoT and smart city opportunities are knowing how all the moving pieces work together to obtain a real ROI! Join Steve Brumer, Partner at 151 Advisors and Steve Wimsatt, Senior Director, Alliances and Business Development Ruckus Networks, a unit of ARRIS for a 45-minute open discussion on IoT in Smart Cities, the real-world applications and uses cases across the globe and how to make money!
Topics will include:
- Real World Applications & Uses Cases
-Where is the money in supplying products and services and the commercialization aspects of them!
- What is the true meaning of ROI in the Smart Cities and Smart Buildings space?
Key takeaways will focus on where should you focus your time, energy and efforts within this space and how to drive revenue.
Remy Guercio, Product Marketing, CloudflareNov 27 201810:00 amUTC22 mins
As part of this, we'll briefly cover:
- How to cleanly create custom routes
- Easy header modification
- As a bonus, how to port existing edge side includes
Johna Till Johnson, CEO & Founder, Nemertes ResearchNov 27 20184:00 pmUTC60 mins
Enterprise Architecture is dead. Long live Enterprise Architecture!
In the face of DevOps and Agile development methodologies, many enterprises have backed off entirely from the concept of an enterprise architecture. That's a mistake. Enterprise Architecture is needed more urgently than ever before--but not the old, silo-ed, inflexible architecture.
Next-generation Enterprise Architecture needs to be fast, flexible, and as adaptive as next-generation development methodologies. It needs to encompass the radical changes in infrastructure, from virtualization to cloud- and mobile-first.
And it's absolutely essential for enterprises who want to align their technology investments with their fast-moving business goals.
This webinar reviews the fundamentals of enterprise architecture and provides a blueprint for a next-generation EA that encompasses DevOps, cloud, mobility, virtualization, microservices, and more!
Mory Lin, DIrector, Embedded System Product, SupermicroNov 27 20184:00 pmUTC60 mins
Accelerate and transform computing convergence at the edge using software-defined networking (SDN) hardware and infrastructure solutions from Supermicro and Intel. Universal customer premises equipment (uCPE) is an emerging category of network functions virtualization (NVF)-based edge computing and service provisioning systems. This new generation of systems provides network platform suppliers, systems integrators and software vendors the ability to quickly deliver managed services using software-driven and virtual network functions (VNFs). Intel® Select Solutions are verified hardware and software stacks that are optimized for specific software workloads and are designed to be easy to deploy. Join us on this webinar to learn how Supermicro’s verified Intel® Select Solutions for uCPE are enabling customers in their deployments.
Jeremy Snyder, Bill Prout, Tim Sandage, Derek HansonNov 27 20186:30 pmUTC60 mins
Join this live panel discussion with experts at AWS re:Invent 2018 for a deep dive into next-gen endpoint protection and cloud-managed network security.
Tune into this interactive Q&A session with world renowned IT leaders while they discuss the following:
- The latest network security demands, threats, and protections
- What a successful cloud-managed network looks like
- How to embrace IT initiatives with confidence while keeping your cloud network secure and compliant
This live panel will be streamed directly from AWS re:Invent in Las Vegas! Join us for live Q&A from the comfort of your desk.
Jeremy Snyder, VP Sales & Business Development, DivvyCloud
Bill Prout, Lead Security Architect, Public Cloud, Sophos
Tim Sandage, Sr. Security Partner Strategist, AWS
Derek Hanson, Sr. Director of Solutions Architecture & Standards, Yubico
Eric Wright (Turbonomic), Leonid Igolnik (SignalFx), Simon Jones (PubNub), Arabella Hallawell (NETSCOUT)Nov 27 20189:00 pmUTC60 mins
Join this live panel discussion with experts at AWS re:Invent 2018 for a closer look at multi-cloud management.
Tune into this interactive Q&A session with world renowned Cloud, DevOps and IT leaders while they discuss the following:
- What a successful multi-cloud strategy looks like and how to get started
- How serverless architectures and DevOps are evolving multi-cloud management
- How serverless impacts or intersects with microservice architectures and the future of solutions development
This live panel will be streamed directly from AWS re:Invent in Las Vegas! Join us for live Q&A from the comfort of your desk.
Eric Wright, Technology Evangelist, Turbonomic (Moderator)
Simon Jones, VP Marketing, PubNub
Leonid Igolnik, Executive VP Engineering, SignalFX
Arabella Hallawell, VP Corporate Strategy, NETSCOUT
Gerri Hinkel, Sr. Marketing Manager for Primary EducationNov 28 20182:00 pmUTC61 mins
With so many users and devices on the network at any given time, universities and colleges struggle to keep up with the demand for always-on connectivity. What can you do to optimize your network infrastructure to tackle these challenges?
Join our networking experts for a webinar that will discuss how Aruba solutions:
* Provide always-on connectivity with features including RF optimization and controller hitless failover
* Secure the network and identify risk with IoT devices pre-authentication and user and entity behaviour analytics (UEBA)
* Provide deeper and predictive network insights
* Address campus wired pain points with a unified wired AND wireless solution
Michael Dickman, VP of Global PLM Campus Networking
Peter Lane, Aruba WLAN PLM
Danny Jump, Aruba ClearPass PLM
Dan Comfort, Aruba Cloud PLM
David Monahan, Senior Analyst, EMA and John Matthews, CIO, ExtraHopNov 28 20185:00 pmUTC60 mins
The shortage of skilled security professionals won’t end anytime soon, but you can improve your incident response (IR) capabilities now by taking advantage of your network traffic for early detection and more investigation. In this webinar, EMA Managing research Director David Monahan will join ExtraHop CIO John Matthews to explain how you can make your staff more productive by automatically prioritizing your most critical assets, providing context to alerts, and putting full transaction details at the fingertips of analysts during investigations.
In this webinar, you’ll learn how to:
- Use your network as a force multiplier for SecOps
- Equip junior security staff to do more by providing them with greater context and analysis
- Reduce your attack surface and prioritize response on your most critical assets