Network infrastructure professionals understand that a reliable and secure infrastructure is crucial to enabling business execution. Join the network infrastructure community to interact with thousands of IT professionals. Browse hundreds of on-demand and live webinars and videos to learn about the latest trends in network computing, SDN, WAN optimization and more.
Praveen Vengalam, Co-Founder and VP of Engineering, demonstrates Anuta Networks ATOM. He begins with a system overview and demonstration of microservices and scale before proceeding to a discussion of functional flows, including network automation, closed-loop automation, telemetry, analytics, and DevOps flow.
John McNiece,Sr. Product Manager, Symantec and Arnav Ghosh, Product Manager, SymantecRecorded: Jan 23 201937 mins
The Cloud Generation brings a host of new challenges --- vulnerability to increasingly malicious attacks; inability to gain a unified view across multiple cloud and on-premises environments; disparate security policies and tools; and massive traffic to monitor, analyze, and protect.
Join us for a live webinar where we will take a closer look at some of the greatest security challenges companies are facing as they move to the cloud. We will discuss what companies are experiencing and the solutions they are adopting to bolster their response.
In this session, you will:
•. Hear real-world security scenarios as witnessed by a former SOC analyst
•. Learn why the cloud has been particularly challenging to secure
•. Find out how Symantec Managed Security Services (MSS) can help to strengthen and improve your cloud strategy through Managed Cloud Defense
Mansour Karam, Mike WoodRecorded: Jan 23 201961 mins
The world of Data Centers is evolving. Enterprises today need flexibility, agility and scalability. Intent-Based Data Center Automation enables Enterprise IT teams to plan, design, and build Intent-Based Data Centers that are enabling business transformation initiatives, such as digital transformation, agile applications, IoT implementations, cloud adoption, and client demands.
Join Apstra in this live webinar on Wednesday, January 23rd at 10:00 a.m. PT / 1:00 p.m. ET to hear about real-world examples of why and how actual businesses are deploying Intent-Based Data Center Automation. You'll also gain a better understanding of how these businesses are using Intent-Based Data Center Automation to increase application reliability, simplify deployments, and reduce costs.
Join Michael Wood, CMO and VP of Product of Apstra, and Mansour Karam, CEO and Founder of Apstra, to learn:
- How five Enterprises implemented Intent-Based Data Center Automation
- The top real-world problems and challenges Enterprises are solving today
- Specific benefits Enterprises can achieve through the use of Intent-Based Data Center Automation
- How key technologies, such as Intent-Based Networking, factor into live deployments
Rob Anderson, Head of Product Marketing & Greg Shields, Datacenter Specialist, NetFoundryRecorded: Jan 23 201930 mins
2019 will be the year of application explosion and extension of the datacenter’s edge as we know it. This massively distributed application environment is being fueled by digital transformation projects in hybrid networking, multi-cloud and IIoT.
Do you have an architecture in place to support and future-proof your network in this new application-centric world?
Join this webinar to learn how to develop a strategy that is agile, reliable and secure and by design.
Industry experts will discuss:
- How this new edge-to-cloud landscape will change your network’s architecture
- Game-changing technology advances including Microsoft Azure & AWS Outpost
- How traditional networks must evolve to support the modern digital enterprise
- Why you need to pay attention to a Zero Trust security approach
- Real-world examples of network typologies for the cloud era
If you are involved in the digital transformation of your datacenter’s edge, this is a must-see educational webinar.
Rob Daniels, GM, security portfolio strategy & propositions, & David Simpkins, GM, managed services & public cloudRecorded: Jan 23 201929 mins
You’re under immense pressure for digital transformation. Moving to the cloud presents new possibilities: but the security of your data and apps is critical. It’s not all plain sailing because the cloud requires a fundamentally different approach to security. If you dig your heels in, you’ll find that Shadow IT increases and people will circumvent you. It’s also increasingly difficult to keep an eye on your entire network, so you’ll need to continually reassess where you’re most exposed.
In this webinar, live from the studio, you’ll discover how to:
- Create a security strategy that works as an enabler to support your cloud migration, not a separate work stream or standalone function
- Take steps to protect your new cloud infrastructure as well as your legacy network
- Avoid certain pitfalls when it comes to cloud migration that could open up new vulnerabilities and threats
Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, CitrixRecorded: Jan 23 201945 mins
Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.
Learn how Citrix networking solutions for hybrid cloud can deliver:
•Contextual and secure access to applications
•Website and application protection from internal and external threats
•Application and network visibility and intelligent analytics
•Flexibility and performance
Евгений Папантониу, специалист по Windows Server, Microsoft и Никита Степанов, системный инженер Dell EMCRecorded: Jan 23 201961 mins
Более 15,000 серверных кластеров используют Storage Spaces Direct (S2D) для реализации гиперконвергентной архитектуры (HCI) на основе Windows Server 2016/2019 и пре-валидированного аппаратного обеспечения. Посетите это вебинар, чтобы узнать, почему компании во всем мире используют Storage Spaces Direct, и каким образом Dell EMC совместно с Microsoft может вам помочь ускорить трансформацию ИТ на основе готовых решений Dell EMC S2D Ready Nodes. Этот вебинар также охватит новости о Windows Admin Center и новом функционале хранилищ данных в Windows Server 2019.
Rick Kutcipal and John ChenRecorded: Jan 22 201925 mins
Many enterprises choose Serial Attached SCSI (SAS) for storage in the data center, and for very good reasons. The price/performance point exceeds all other solutions in the market, and the ability to scale with SAS to potentially thousands of drives is simply unmatched. These benefits of SAS are all realized while maintaining high reliability, ease of storage management and the ability to address power management needs in the data center.
In this webinar, leading storage industry experts from Broadcom and a third-party market analyst from TRENDFOCUS will cover:
- A look at today’s market adoption of SAS
- Price / performance and why SAS is a cost-effective choice
- How SAS’s ability to scale brings wide data center deployment
- SAS storage management features including built-in SCSI enclosure services and SMP Priorities
- The SAS Roadmap and what the future holds
At the conclusion of the webinar, you understand why, from large to small data centers, SAS is the better storage protocol solution.
Speakers: Rick Kutcipal, Product Planner, Data Center Solution Group, Broadcom; Board Member, SCSI Trade Association and John Chen, Vice President, TRENDFOCUS
David Hines, Vice President of Architecture and Engineering - TierPointRecorded: Jan 22 201947 mins
As reported in Forbes last year, 73% of companies are planning to move to a fully software-defined data center within two years.
A software-defined data center is based on a virtualized environment of compute, storage, networking and security in conjunction with policy-based management and automation. The evolution from a traditional data center architecture to one that is software-defined can take months if not years but can yield immense benefits for the business.
Join us for a discussion on the progress toward the fully software-defined data center, including benefits of infrastructure as code and overcoming challenges associated with traditional workflows.
Chandu Guntakala, CEO and Co-Founder, introduces Anuta Networks at Networking Field Day 18. He introduces the company, discusses the business challenges they address, and highlights the motivations for creating the ATOM product. He then discusses the ATOM software platform approach and its application for multi-vendor closed-loop automation. He finishes with three customer case studies: Managed SD-WAN automation, a global cloud exchange provider, and MPLS L2/L3 VPN automation.
Laurence Pitt, Global Security Strategy Director at Juniper Networks Lee FisherRecorded: Jan 22 20193 mins
Laurence Pitt, Security Strategy Director at Juniper Networks explains why a key challenge for many security organizations, is the time required to simply maintain a baseline of security. Becoming overwhelmed in activity can prevent security teams from improving existing processes, which creates an ideal environment for cyber criminals who are typically on the offense and have studied the security model's vulnerabilities. Laurence makes the case that organisations need to use their internal data to establish baselines in behaviour, as this information will not be available to attackers.
Bob Laliberte, Senior Analyst, ESG and Sam Kumarsamy, Senior Product Marketing Manager, GigamonRecorded: Jan 22 201954 mins
Enable IT Collaboration with a Common Distributed Data Services Layer.
The IT environment is rapidly changing, becoming more distributed and complex as organizations transform themselves to provide better digital experiences. Because these improved experiences will be more dependent on the network, it’s imperative for organizations to properly plan and prepare now to eliminate security blind spots. The bottom line is that companies need complete visibility into their physical, virtual and cloud infrastructure to detect and contain data breaches and mitigate risk.
To accomplish this, successful organizations resist the legacy mentality that relies on more people and more tools at every location. Instead, they are turning to a new architectural approach that disaggregates the speed of the network from the speed of the tools inspecting traffic on that network. This innovative approach allows enterprises to absorb change in network speed and technology without compromising security.
ESG believes the foundational step in this approach is to ensure comprehensive infrastructure visibility across data centers and distributed edge and cloud environments. To do this, organizations must have a common distributed data services layer that can collect, process and distribute the right information to the right tools at the right time.
Join us to learn how a consolidated network architecture that includes security delivers better visibility, reduces complexity and increases tool efficiency.
Donna Johnson, Vice President of Product and Solution Marketing, CradlepointRecorded: Jan 22 201941 mins
With the arrival of Gigabit-Class LTE network solutions for enterprises and public safety agencies, the era of wireless WAN is here — and enterprise networking will never be the same. Utilizing Elastic Wideband technology, Cradlepoint’s new cloud-managed routers featuring built-in Gigabit-Class LTE modems provide the speeds, reliability, and flexibility necessary to drastically improve existing use cases, and to enable new ones that have never been possible in branch or vehicle settings.
With game-changing Gigabit-Class LTE, which leverages technologies that are foundational pieces of 5G, wireless now meets or exceeds other broadband networks, but with the added value of mobility, immediate deployment, and standardized billing on a single nationwide carrier.
Join Donna Johnson, vice president of product and solution marketing at Cradlepoint, for a live webinar to explore how the world’s first Gigabit-Class LTE solutions for enterprise networking can revolutionize wireless WAN and put organizations on the Pathway to 5G.
James Locus, Product Marketing at Cisco MerakiRecorded: Jan 22 201927 mins
Join us for a tour of this new class of switches that brings cloud-based visibility and control over the entire edge network. From seeing combined views of thousands of ports to using diagnostic tools that improve daily operations, learn how cloud-managed networks simplify IT.
Simon Tompson, Product Marketing LeadRecorded: Jan 22 201925 mins
Increasing digital consumption by your customers and modern-day technology provides your business with unlimited opportunities! The challenges of digitalization vary, but each digital infrastructure requires one thing above all: a strong network foundation. Join us for a webinar to learn more about cloud-managed IT and accelerate your digital journey!
Дмитрий Лицов, Старший системный инженерRecorded: Jan 22 201934 mins
Поскольку критически важные бизнес-данные становятся все более распределенными - от ядра до границы сети и облаков, поскольку появляются новые регулирующие правила (GDPR) и новые угрозы для бизнес-операций (например, кибератаки), защита данных приобретает важное значение и становится приоритной в процессе трансформации ИТ. Приходите узнать, как портфель защиты данных Dell EMC может помочь вам эффективно трансформировать стратегии защиты данных с помощью комплексного подхода к защите данных - независимо от того, где ваши данные находятся, на локальной площадке или в нескольких облаках, и как вы их используете. Также узнайте, что нового в этом году появилось в плане безопасности и защиты данных в Data Domain, Integrated Data Protection Appliance (IDPA) и в программной обеспечении Data Protection Suite (DPS), что позволяет еще больше упростить, автоматизировать и модернизировать текущую среду защиты данных, предоставляя трансформирующую инфраструктуру защиты данных для удовлетворения будущих потребностей.
In this Mode Cast from the Core, JoAnne McDougald speaks with Kelly Ahuda about Versa’s vision for network infrastructure, the key big problems facing network infrastructure, and how Versa and Mode together are working to solve them. Kelly is CEO of Versa Networks and a Cisco alumnus.
Sushil Nalawade, Tata CommunicationsRecorded: Jan 18 2019
In this Mode Cast from the Core, JoAnne McDougald speaks with Sushil Nalawade about Tata Communications’ view of the future of network infrastructure, particularly regarding security. Sushil Nalawade is director of solutions engineering at Tata, a company responsible for a significant portion of the entire internet’s infrastructure today.
In this Mode Cast from the Core, JoAnne McDougald speaks with Steve Garson about Mode’s SD-Core and what it has to offer SD-WAN architectures. Steve is based in Denver and consults with firms on building SD-WAN systems.
Michael Human, Vice Presidio Global Services, PresidioRecorded: Jan 18 201944 mins
Presidio helps global organizations address various procurement, logistics and service issues by providing innovative, practical solutions, efficiency, control, risk mitigation, and visibility, all supported via our global team and expertise. We have a dedicated team of global commerce and logistics professionals available to assist with any unforeseen roadblocks or challenges.
Kiran Sirupa, Praveen VengalamRecorded: Jan 18 201925 mins
Anuta Networks announced the general availability of ATOM, a powerful Assurance, Telemetry, and Orchestration platform for Multi-Vendor Networks. In this webinar, Praveen Vengalam and Kiran Sirupa will walk through the key elements of ATOM.
1. How are the new trends such as 5G, IOT, and Multi-Cloud going to impact Network operations?
2. What are Anuta networks approaches to solving complex multi-vendor network orchestration and assurance challenges?
3. Anuta ATOM product overview and customer use-cases
Lee Doyle, Principal Analyst at Doyle Research & Rosa Lear, Director of Marketing at VeloCloud, now part of VMwareRecorded: Jan 17 201933 mins
The increased deployment of cloud applications, storage, hosted voice, video, mobile applications, and the emergence of IoT has challenged IT and business managers to provide high-quality WAN services to the branch. Software-defined WAN (SD-WAN) offers compelling advantages for distributed organizations with critical branch operations, including the benefits of business agility, optimized application performance, and increased bandwidth efficiencies.
This webinar discusses the emerging role of SD-WAN as the key element for branch and remote user connectivity, including:
-Cloud-based intelligence and management
Elisa Lippincott, Director of Product MarketingRecorded: Jan 17 201938 mins
When it comes to cloud security, consistency is everything – your cloud controls should mimic your on-premise implementations, so you have complete consistency of security policy enforcement across environments.
Cloud security breaches have not been the result of brilliant criminal masterminds. Rather, they have been the result of self-inflicted errors that are often caused by faulty migration and deployment practices – particularly when the right security personnel are excluded from the process.
Attend this webinar to learn how to:
•Avoid misconfiguring your own security controls
•Ensure consistency in your cloud security implementation
•Optimize your vulnerability management
Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?
Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.
You’ll learn how to:
• Simplify your systems and ongoing management with a cloud-based approach
• Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
• Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
Johna Till Johnson, CEO & Founder, Nemertes ResearchJan 24 20194:00 pmUTC60 mins
Everybody knows IoT is the wave of the future. But what are successful organizations doing differently when it comes to their IoT initiatives? Are they saving more? Generating new revenue and lines of business? Or increasing operational efficiency and other metrics?
This webinar unveils the secrets of top-performing companies when it comes to IoT initiatives. You'll learn how they plan for, design, secure, and operate their IoT initiatives--and how they track the benefits.
Paul Congdon, PhD, CTO of Tallac NetworksJan 24 20194:00 pmUTC60 mins
Modern data centers are tasked with delivering intelligent multi-media responses to real-time human interactions. Massive amounts of data are being churned and sifted by highly parallel applications, such as Online Data Intensive Services (OLDI) and Artificial Intelligence (AI), which historically required specialized High-Performance Computing (HPC) infrastructure.
New advancements in high-speed distributed solid-state storage, coupled with remote direct memory access (RDMA) and new networking technologies to better manage congestion, are allowing these parallel environments to run atop more generalized next generation Cloud infrastructure. Generalized cloud infrastructure is also being deployed in the telecommunication operator’s central office.
The key to advancing cloud infrastructure to the next level is the elimination of loss in the network; not just packet loss, but throughput loss and latency loss.
There simply should be no loss in the data center network. Congestion is the primary source of loss and in the network, congestion leads to dramatic performance degradation. This presentation summaries work from the IEEE 802 Network Enhancements for the Next Decade Industry Connections Activity (Nendica).
The Nendica report describes the need for new technologies to combat loss in the data center network and introduces promising potential solutions.
Are you tired of troubleshooting with TCPdump? The Avi Vantage Platform is here to help. Learn how you can abandon your decades-old CPU-intensive logging tools – and gain intuitive, real-time analytics, faster time-to-resolution, modern SSL encryption, and (most importantly) happy IT teams focused on delivering applications.
Register for this Avi webinar to #ByeByeTCPdump forever and learn:
- Why TCPdump should be your tool of last resort
- How headers compressed with HTTP/2, SSL leveraging PFS, and distributed systems have rendered certain tools useless
- How automation and visibility can help you troubleshoot more quickly
- How you can replace TCPdump with intelligent logs and analytics
Eric Carter, Michael DucyJan 24 20196:00 pmUTC45 mins
Kubernetes is now 3.5 years old, the technology has matured, and adoption of containerized applications orchestrated by Kubernetes has scaled beyond tiger teams.
Enterprises are more comfortable with Kubernetes, and by default, more comfortable with containers.
We predict that is only the beginning: Enterprises will migrate mission-critical, stateful applications to Kubernetes in droves in 2019. As a result, security and operational visibility needs are growing. Solutions that support enterprise-level capabilities, processes, and support become the requirement.
Join an expert panel to:
-hear observations and insights from KubeCon
-learn about key usage data and trends
-understand how Kubernetes and other open source and commercial technologies are evolving in the enterprise
Christopher Liljenstolpe, Chief Technical Officer, Solutions at TigeraJan 24 20196:00 pmUTC60 mins
Learn how to support, what Gartner has termed, a continuous adaptive risk and trust assessment (CARTA) when building a CaaS platform using Kubernetes. Network security enables microsegmentation and is a core component of a zero trust security model. It allows you to protect your workloads against threats without relying on assumptions about the network, infrastructure, and workloads.
Bhardi Govindarajan, Principal Application Engineer., Expedia; Aaron Miller, Senior Solutions Engineer, KongJan 24 20196:00 pmUTC57 mins
In this presentation Bhadri Govindarajan, Principal Application Engineer at Expedia, and Aaron Miller, Senior Solutions Engineer at Kong, go over some of the serverless use cases currently in production and in planning at Expedia.
This presentation explores real-life use cases that bridge the gap between serverless excitement and serverless reality.
Serverless could become the dominant application development model, lowering operations burden, increasing feature release velocity, and allowing developers to focus on delivering business value rather than worrying about deployment concerns and traffic planning. If fully adopted, serverless could have a massive impact in the infrastructure and the business models of the travel and retail industries as there will no longer be a need to forecast, plan, and provision for spikey workloads or unpredictable compute capacity.
This presentation also includes an overview of Kong’s implementation at Expedia.
Matthew Thurston, Chief Architect - Arctic Wolf NetworksJan 24 20197:00 pmUTC48 mins
Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?
In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.
We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.
After attending, you will be able to:
- Recognize how AI and Machine Learning are typically used in Cybersecurity, and what are the gaps
- Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
- Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks
About our guest speaker:
Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
Brian Eichman, Director of Cloud Ecosystems & Product Development, CoreSiteJan 24 20199:00 pmUTC20 mins
The increasing need for agility and faster innovation has many organizations implementing cloud-first strategies. Spreading core business services and data across a hybrid cloud environment multiplies complexity.
Watch this webinar to learn about how the CoreSite Open Cloud Exchange® can simplify your hybrid IT strategy with a single connection to multiple cloud providers.
Святослав Сухов, Руководитель департамента UDSJan 25 20198:00 amUTC60 mins
Неструктурированные данные стимулируют цифровую трансформацию, и эта задача стоит сегодня практически перед любой компанией. Организации, которые правильно используют свои файлы, объекты и потоковые данные, могут получить огромное конкурентное преимущество. На этой сессии мы опишем стратегию работы с данными с использованием решений Isilon и ECS, которые могут повысить ценность вашего «капитала данных» и обеспечить вашей организации мощное конкурентное преимущество.
Eric Mittelhammer & Tori WieldtJan 29 201910:00 amUTC38 mins
The code’s been written. It’s been reviewed. It’s been tested. The build has passed and it’s finally time to deploy, but will this thing actually work in production? Every team aspires to accelerate their development cycle, but increasing velocity while maintaining quality is hard.
Patrick Grillo, Senior Director, Security Solutions, FortinetJan 29 201910:00 amUTC45 mins
For the past several months social media and the Internet in general has been overloaded with all sorts of dire predictions about the future of the threat landscape. However, if all of these were taken at face value then organizations might as well either close up shop or go back to print advertising and taking orders by paper purchase orders.
While these predictions can give us an insight of what “could” happen in the future they shouldn’t be allowed to become distractions from the tasks at hand - ensuring that
1) cyber security best practices are being implemented and being followed throughout the organization
2) the right technology is deployed where needed throughout the network and
3) preventive and predictive technologies are deployed in equal measure.
This session will look back on some of 2018’s threat landscape predictions and how close (or far) from the mark they landed. Some of the predictions for 2019 will also be examined to see if any trends have developed year-on-year. Any predictions made during the session will follow the Winston Churchill rule: "I always avoid prophesying beforehand because it is much better to prophesy after the event has already taken place".
Arun S, Aruba TAC TeamJan 29 201910:00 amUTC60 mins
Clustering is a new feature introduced in AOS 8.0 that enables seamless roaming of clients between APs, hitless client failover and load balancing of users across Mobility Controllers in the cluster. This solution provides the configuration required to create a cluster of Mobility Controllers that are managed by the same Mobility Master.
Join this webinar to learn about:
· Cluster load balancing (AP and client)
· AP termination in cluster
· AP move
· Cluster troubleshooting
Craig Hurst Director of Software Strategy, Visual Cloud Division, Data Center Group, IntelJan 29 20194:00 pmUTC60 mins
What is the Visual Cloud and how are cloud based workloads evolving. In this course we will explore Intel’s approach to supporting the Visual Cloud via an open source collection of frameworks and libraries that support four core building blocks that build the five key visual cloud workloads.
Jacob Smith Co-founder and CMO at PacketJan 29 20195:00 pmUTC45 mins
Data Centers have been around for decades but ease of access and data center management (for individual companies) has never been easy. Yet 80% of the world is still on-premise.
With the rise of software-defined data centers (SDDC), Data Centers as a Service providers such as Packet have made it easy for companies to leverage the resources that a Data Center has to offer (vs. the public cloud) without the headache.
Learn how the evolution of SDDC is changing the infrastructure market and how you can make your company's infrastructure strategy your competitive advantage.
Brian Washburn, Network Transformation & Cloud Services, Ovum & Hoo Shu Yee Senior Director, IP & International Data, SingtelJan 29 20196:00 pmUTC60 mins
Cloud and application-first strategies are changing the way IT administrators think about the network as they become a critical enabler in digital transformation (DX).
Is your network smart enough to solve issues before they occur? Is it secure, yet transparent and flexible enough for you to have total control?
Join Singtel and Ovum in this webinar as we address today’s network complexity conundrum with Singtel Liquid Infrastructure™, an intelligent, software-driven platform that delivers powerful capabilities such as deep visibility and orchestration, giving you actionable intelligence and unprecedented network control.
Daniel Kennedy, Research Director, Information Security, 451 Research; Brandon Dunlap (moderator)Jan 29 20196:00 pmUTC60 mins
Security budgets continue to tick upward, but underneath the hood, increasingly hybrid architectures in enterprise IT are driving shifts in where that money is applied. GDPR has driven compliance to the forefront of security project decision making, while other pain points including user behavior and lack of qualified personnel drive specific security product deployments. Security resistance to cloud continues to decrease, while the endpoint security space remains both relevant and increasingly crowded. Join Daniel Kennedy, Research Director for 451 Research on January 29, 2019 at 1:00PM Eastern as he walks through highlights of 451's 2018 surveys and interviews of information security professionals.
Rich Lane, Senior Analyst, Forrester & Will Cappelli, CTO of EMEA, MoogsoftJan 29 20196:00 pmUTC45 mins
You’re invited to join our complimentary webcast, AIOps The Next Five Years, featuring Forrester analyst Rich Lane and Moogsoft CTO Will Cappelli.
AIOps is becoming imperative to the management of today’s complex IT systems and their ability to support changing business conditions. In this webinar, the speakers will discuss the role that AIOps can and will play in the enterprise of the future, how the scope of AIOps platforms will expand, and what new functionality may be deployed.
By attending this webcast, you will learn:
- How AIOps will enable and support the digitalization of key business processes
- What new AI technologies and algorithms are likely to have the most impact on the continuing evolution of AIOps
- Why the relationship of AIOps to both monitoring and service management is likely to change by 2023
This webcast will include a Q&A with our guest speakers.
Greg Strickland, COO at Periscope DataJan 29 20197:00 pmUTC60 mins
Ever wondered how Periscope Data actually uses Periscope? In this webinar, you'll get a behind the scenes look at the dashboard our executive team uses to report on all our top level KPIs. Combining data from all business units here at Periscope Data, it provides us a concise view of our single source of truth - the one dashboard to rule them all.
Attend this webinar to hear directly from Greg Strickland, COO at Periscope Data, to learn how he:
- Templatizes his dashboard requests to our Data team for quicker work
- Uses data from all departments to inform the entire company
- Partners with Data on larger strategic projects
- And learn his #1 most important tip for visualizing data across teams
Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.
With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.
Some of Citrix Workspace key advantages include:
• Higher user productivity and a better experience
• Stronger security which extends to the cloud
• joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario
Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
Benny Czarny, Guy Dagan, Ariel Zeitlin, Diana KelleyJan 30 20191:00 pmUTC60 mins
"In the age of breaches, enterprises are looking to understand the security and compliance risks associated with data stored in, and accesible from, cloud applications so they can better prepare should the unthinkable happen. With data and workloads moving to the cloud, securing the enterprise is more critical than ever.
Join cloud, security and compliance experts as they discuss:
- How to proactively analyze security risk from the business perspective
- What you need to know about your data, and how to ensure it is compliant when in the cloud
- How to automate security policy changes
- Top challenges for CISOs and CIOs
- Achieving security and compliance across multiple clouds
- Steps to take today"
Benny Czarny, CEO and Founder, OPSWAT
Guy Dagan, Cofounder and Partner, Consienta
Ariel Zeitlin, CTO and co-founder, Guardicore
Diana Kelley, Cybersecurity Field CTO, Microsoft