Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • The Goldilocks Problem of AI in Security: How to Find the “Just Right” Use Cases
    The Goldilocks Problem of AI in Security: How to Find the “Just Right” Use Cases Gary Golomb, Co-founder and Chief Research Officer, Awake Security Recorded: Jan 17 2018 45 mins
    Like many technologies, artificial intelligence (AI) and machine learning (ML) are "just right" for some types of problems, but are often over-sold for others they are just not well-suited for. This webinar will dive into the characteristics of problems that AI/ML can greatly help enterprise security teams solve, but also contrast those against use cases where AI/ML is a much higher risk for those same resource-strapped teams. In those situations, the technology can actually worsen the skills deficit in the organization, rather than making it better.

    Attending this webinar will give you a framework for evaluating AI/ML technologies, including:

    - When can AI/ML indeed replace people, and when is it better suited to assist people?
    - What types of threats is it best suited for?
    - How does AI/ML fit in with other methodologies like security analytics, for threat detection?
    - How can AI/ML help with security investigations and incident response?
    - How can organizations evaluate vendor claims and ask them the right questions?
  • Through the LookingGlass – What We Learned from Major 2017 Cybersecurity Events
    Through the LookingGlass – What We Learned from Major 2017 Cybersecurity Events Eric Olson, VP of Intelligence Operations, and James Carnall, VP of Customer Support Recorded: Jan 17 2018 61 mins
    2017 was filled with cybersecurity meltdowns. From WannaCry to BadRabbit, the cybersecurity landscape has only become more volatile. With cyber threats on the rise, is your organization’s security posture ready for 2018?

    Join LookingGlass’ Vice President of Customer Support, James Carnall and Vice President of Intelligence Operations, Eric Olson as they take a closer look at 2017’s major cyber-related incidents and provide tips and recommendations on how your organization can prepare for 2018. Webinar attendees will learn:

    · Major cybersecurity trends from the past year
    · Cybersecurity tactics that worked – and didn’t work – in 2017
    · How to take a proactive cybersecurity approach to fending off cyber threats
  • Hybrid-AI: Boost Cybersecurity with Human Augmented Machine Learning
    Hybrid-AI: Boost Cybersecurity with Human Augmented Machine Learning Matthew Thurston, Chief Architect - Arctic Wolf Networks Recorded: Jan 17 2018 48 mins
    Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?

    In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.

    We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.

    After attending, you will be able to:

    - Recognize how AI and Machine Learning are typically used in Cyber Security, and what are the gaps
    - Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
    - Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks

    About our guest speaker:

    Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
  • How To Simplify Your Datacenter Environment in a Multi Cloud World
    How To Simplify Your Datacenter Environment in a Multi Cloud World Vinu Thomas, Raphael Meyerowitz, Mike Berthiaume Recorded: Jan 17 2018 55 mins
    Presidio is radically simplifying customers datacenter environments with Nutanix. Come hear from Vinu Thomas, Presidio CTO, Raphael Meyerowitz, AVP of Datacenter Solutions, and Mike Berthiaume with Nutanix on how we are making it easier to manage, upgrade and deploy multi-cloud solutions.
  • Verizon Threat Research Advisory Center - Monthly Intel Briefing
    Verizon Threat Research Advisory Center - Monthly Intel Briefing John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Jan 17 2018 90 mins
    Join us—the Verizon Threat Research Advisory Center —for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape. Threats like MeltDown, Spectre and other hot topics will be shared by experts across Verizon and our partners.

    Each month, we will have a specific theme to help promote awareness and best practices.
  • Security Management in the Cloud
    Security Management in the Cloud Presenter: Greg Singh, Technical Director-APAC, Skybox Security | Moderator: Clayton Jones, Managing Director, APAC, (ISC)2 Recorded: Jan 17 2018 60 mins
    As organizations migrate workloads to cloud computing, they benefit from flexibility and agility, but network security operations grow increasingly difficult.

    Gaining visibility into cloud environments, extending existing security operations and workflows, ensuring compliance, and managing shared responsibility create new challenges for security professionals. Add to this the complexity of hybrid and multi-cloud environments — and the loss of control within those environments — and it’s no wonder security leaders are scratching their heads over how to best secure their organization’s journey to the cloud.

    This session will look at approaches to addressing the many challenges around cloud security management and best practices for translating on-prem security controls and processes into hybrid and multi-cloud environments.

    Join Skybox Security and (ISC)² on Jan 17, 2018 (Wed) at 14:00 Singapore time to learn more about security management in the cloud.
  • The [SMART] & Modern Highly-Efficient Data Center
    The [SMART] & Modern Highly-Efficient Data Center Stewart Dale, Sr. Application Engineer, Intel Data Center Management Solutions, and Dr. Rene Meyer, AMAX Recorded: Jan 16 2018 53 mins
    AMAX's [SMART]DC Data Center Manager is the premier out-of-band DCIM solution for the modern heterogeneous data centers, to optimize efficiency and manageability while reducing operational costs and resource underutilization.

    This webinar will cover:

    •The Next Generation of Data Centers: High Efficiency Meets Scalability
    •Streamline Heterogeneous Data Center Management with [SMART]DC
    •Incorporate GPU platforms Seamlessly as Your Data Center Upgrades
    •Achieve up to 30% in Power Savings for Your Infrastructure
    •Minimize Operational Disruptions and Protect Hardware Investment
    •How You Can Start Today
  • Forecasting 2018: An insider’s look to the future of IoT — a webinar
    Forecasting 2018: An insider’s look to the future of IoT — a webinar Aeris Communications Recorded: Jan 16 2018 64 mins
    With IoT still experiencing growing pains, predicting its future can be guesswork at best. Join us for this January 16 webinar where IoT subject matter experts peer into the crystal ball and expand on some of their IoT visions for the near future.

    Moderated by Christina Richards, VP, Global Marketing, Aeris, this webinar will present viewpoints, discuss upcoming IoT directions, innovations, and challenges, and enable audience participation via a Q&A session. All is possible at this future-leaning webinar. Here are a few tidbits.

    “SIM providers are going away. It’s just a matter of when.”
    —Drew Johnson, VP Engineering & Operations, Aeris

    “Automotive transformation via the IoT will become mainstream.”
    —Michelle Avary, VP, Automotive Strategy, Aeris

    “With more than a billion people in India alone, many below the poverty line, IoT will lead the charge for securing basic needs, such as clean water, healthcare, and education.”
    —Dr. Rishi Mohan Bhatnagar, President, Aeris India

    “Security will have to up its game as IoT delivers huge volumes of data.”
    —Syed “Z” Hosain, Chief Technology Officer, Aeris

    My prediction: This will be the only IoT futuristic view you will need to attend this year!

    Sign up now for this futuristic view into the future of IoT.
  • From 10% to 100% Cloud in 3 Years: How (ISC)² is Doing it & Putting Security 1st
    From 10% to 100% Cloud in 3 Years: How (ISC)² is Doing it & Putting Security 1st Wesley Simpson, MSM, COO, (ISC)² Recorded: Jan 16 2018 49 mins
    (ISC)² COO Wesley Simpson, shares the association’s experience as (ISC)² transitions to a 100% cloud-based services model. This interactive discussion explores how (ISC)² decided to go all in with cloud, why the cloud was the best option, how the team ensured its cloud strategy mapped to operational needs, and how security is front and center throughout the entire process. Learn how we are doing it and share your cloud migration experiences. This discussion is for anyone thinking about moving to the cloud, already making the transition or even those who completed a cloud migration but still looking for best practices to apply.
  • Protecting your blind spots w/ Radware’s Alteon & Intel® QuickAssist Technology
    Protecting your blind spots w/ Radware’s Alteon & Intel® QuickAssist Technology Boaz Avigad, Director of Technical Marketing Recorded: Jan 16 2018 37 mins
    With the ever growing cyber threats organizations are facing and the rising adoption of traffic encryption - providing efficient and cost-effective protection is becoming a daunting task. Join us to learn about how you can better protect your organization’s assets throughout trending datacenter evolution.

    In this webinar we will learn about:

    i. Why SSL visibility is important
    ii. What new challenges are we facing in SSL
    iii. The importance of performance
    iv. SSL in the age of virtualization
    v. The impact of the evolving datacenter landscape on SSL requirements
  • Help Wanted! – Addressing the Cybersecurity Skills Shortage
    Help Wanted! – Addressing the Cybersecurity Skills Shortage Gary Beach, Brandon Dunlap, Donald W. Freese, David Shearer, Deidre Diamond Recorded: Jan 15 2018 66 mins
    Panel Moderator: Gary Beach – Author: The U.S. Technology Skills Gap

    Panelist: Brandon Dunlap – Speaker, (ISC)²
    Panelist: Donald W. Freese – Deputy Assistant Director, F.B.I.
    Panelist: David Shearer, CISSP – CEO, (ISC)²
    Panelist: Deidre Diamond – Founder and CEO, CyberSN and #brainbabe
  • Agile Cloud Security
    Agile Cloud Security Paul Oakes, CISSP, ISSAP, CCSP, CSM, CSPO, AWS PSA, Senior Enterprise Security Architect, TD Bank Recorded: Jan 15 2018 61 mins
    How does an established data center-centric organization with high trust and security needs move to the public cloud? How does a waterfall-model-oriented organization make such a move in a timely fashion so as to not be left behind by its competition? What does governance look like for such an organization's use of the public cloud? What can these organizations avoid doing wrong?

    These questions are answered by using the fundamentals of Agile methodologies: prioritization by highest value and risk; technical excellence; and continuous delivery of valuable products as seen through the lense of security principles. Those principles include least privilege, separation of duties, data protection, and visibility to examine and provide solutions for the trust, security and governance needs of cloud-new adopting organizations.
  • Cybersecurity Careers: It’s Not Just Hacking
    Cybersecurity Careers: It’s Not Just Hacking Deidre Diamond Founder and CEO CyberSN and brainbabe.org Recorded: Jan 15 2018 63 mins
    With more than 500,000 unfilled cybersecurity jobs, an industry made up of 10 percent women and a trend of 56 percent of women leaving tech inside 10 years, we have a big problem. The stereotype of a hoodie-clad man at a terminal in a dark room -- a myth our schools perpetuate -- is harmful. Those in cybersecurity can change this right now! Come discuss how to sell all the diverse cybersecurity jobs to women, so they will want to join us.
  • An Automated AppSec Pipeline with Docker and Serverless
    An Automated AppSec Pipeline with Docker and Serverless Matt Tesauro, Senior Technical Project Coordinator, OWASP, Aaron Weaver, Application Security Manager Recorded: Jan 15 2018 43 mins
    In application security, the size of the security team is always the most scarce resource. The best way to optimize the security team is automation. This presentation will provide an overview of key application security automation principles and practices creating an Application Security Pipeline augmented with automation.

    With the rise of docker and serverless patterns, there is a whole new suite of tools available to the pipeline builder. We show you how to get started automating application security tooling and reporting using these new patterns.
  • Application visibility and control in the cloud
    Application visibility and control in the cloud George McGregor, Senior Director, Product Marketing, Citrix & Kenneth Ross, Director of Product Management, Citrix Recorded: Jan 12 2018 57 mins
    Are you concerned about loss of control and visibility as you move applications and workloads to the cloud?
     
    NetScaler Management and Analytics (NetScaler MAS) provides application level visibility, management and automation of your application delivery environment across multiple clouds. NetScaler MAS is available as a Citrix cloud service or can be deployed as software in your data center.
     
    Join this webinar and learn how to:
     
    • Harness and use data about users, apps, and traffic from any NetScaler or HAproxy
    • Automate and manage your entire application delivery infrastructure from one console
    • Deploy and map applications to infrastructure using stylebooks so that you can easily manage your app’s lifecycle
    • Ensure policies are consistently applied by automating provisioning, configuration and SSL certificate management across your environment
    • And more!
  • 3 Steps to a Single Source of Truth
    3 Steps to a Single Source of Truth Craig Lee, Chief Systems Architect, Blue Medora Recorded: Jan 12 2018 24 mins
    Machine learning advancements by VMware, new heterogeneous data integration technologies and an innovative hybrid cloud management platform have put predictive analytics in reach for nearly every VMware customer. Hear from Blue Medora Chief Solution Architect, Craig Lee, discuss the tools you’ll need to help you accelerate time to remediate critical components of your IT Stack through root cause analysis.
  • GDPR Compliance: Maintaining Security in the Cloud
    GDPR Compliance: Maintaining Security in the Cloud Clive Finlay, Director, Technical Account Management,Symantec and Peter Gooch, Partner within Deloitte Cyber Security Service Recorded: Jan 11 2018 62 mins
    Security is a gating factor to cloud adoption that continues to hinder a businesses’ ability to maintain control and visibility across cloud applications. With increased compliance regulations such as PCI, HIPAA, and GDPR, is it truly possible to maintain compliance in the cloud?

    Symantec is offering an opportunity to hear first-hand the challenges businesses face when adopting the cloud and adhering to compliance regulations.

    Join us to learn how to enable safe cloud adoption while maintaining compliance.

    Key Takeaways:

    • How to address security and compliance challenges when migrating to the cloud

    • How to support GDPR compliance in the cloud

    • Leverage a single data protection solution for email, storage, network, endpoints, and cloud

    Register Today
  • Detecting Attackers Within Your Networks Using Autonomous Deception
    Detecting Attackers Within Your Networks Using Autonomous Deception John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies and Rick Moy, CMO, Acalvio Technologies Recorded: Jan 11 2018 60 mins
    This session will discuss the ongoing problem of identifying attackers who have successfully evaded prevention technologies such as firewalls, IPS and antivirus. It will focus on deception technology and its practical approaches to quickly detecting attackers already inside your network. Special attention will be given to working with SIEMs to validate alerts, as well as incident response and forensic procedures.
  • Human vs Machine: Is Hybrid AI SOC in Your Security's Future?
    Human vs Machine: Is Hybrid AI SOC in Your Security's Future? Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine Recorded: Jan 11 2018 31 mins
    Watch this webcast for an in-depth conversation about Hybrid AI and get clarification on the following:

    - Artificial Intelligence versus Hybrid AI
    - Hybrid AI when applied to a SOC
    - Incident response (human versus machine-driven)

    There will also be discussions around the following questions:

    - Can machines make decisions?
    - Can Hybrid AI systems operate autonomously?
    - What is missing in a SOC? How can Hybrid AI be added to a SOC?
    - Can Hybrid AI help alleviate staffing shortage?
  • Testautomatisierung in der Cloud: Simpel – Smart – Skalierbar
    Testautomatisierung in der Cloud: Simpel – Smart – Skalierbar Udo Blank, Presales Consultant Recorded: Jan 11 2018 63 mins
    Die Verlagerung von Testumgebungen in die Cloud bedeutet neue Chancen für Softwarequalitätssicherung und Entwicklungsabteilungen. Durch die deutlich verkürzten Bereitstellungszeiten können Softwaretests in kürzerer Zeit und damit termintreuer, aber dennoch mit höherer Testabdeckung durchgeführt werden. Die Nutzung der Cloud-Technologie für die Testautomatisierung stellt nicht nur eine Alternative zu Hosting und Virtualisierung dar, vielmehr bringt sie einen Quantensprung in Sachen Qualität und Zuverlässigkeit der ausgelieferten Anwendungen mit sich. Tests, die bisher selten durchgeführt wurden, weil sie zu aufwändig oder zu teuer in der Umsetzung waren, können in der Cloud nun mit deutlich weniger Aufwand und Kosten realisiert werden.

    Mit StormRunner Functional (SRF) hat Micro Focus genau hierfür eine innovative Lösung auf den Markt gebracht, mit der funktionale Tests für Web-, mobile sowie SAP-Anwendungen einfach aus der Cloud heraus durchgeführt werden können. Die Vorteile auf einen Blick:

    - EINE cloudbasierte Plattform für das manuelle, explorative und automatisierte Testen.
    - Unterstützt agile Verfahren und Continuous Integration-/Testing-Initiativen.
    - Sehr einfache und übersichtliche Bedienung – auch für Business- und Fachabteilungen.
    - Keine Installation notwendig, SRF wird rein über den Browser aufgerufen.
    - "Out-of-the-Box"-Bereitstellung von Testumgebungen unter Berücksichtigung der verschiedensten Kombinationen hinsichtlich Betriebssysteme, Browsertypen sowie deren Versionen.
    - Nuzung von vorhandenen Skripten (UFT, UFT Pro (LeanFT), Selenium).
    - Möglichkeit zur Erstellung und Verwaltung von automatisierten Testfällen direkt in der Cloud.
    - Integration in agile Projekte über gängige CI/CD-Engines.

    Erfahren Sie im Live Webinar am 11. Januar 2018 anhand von ausgewählten Use Cases und einer spannenden Live Demo alles über StormRunner Functional.
    Seien Sie dabei und nutzen Sie die Gelegenheit, Ihre Fragen an unseren Experten zu stellen.
  • SD-WAN in Retail: Powering Security and Segmentation for Digital Transformation
    SD-WAN in Retail: Powering Security and Segmentation for Digital Transformation Parag Thakore, VP of Product Management; Fan Gu, Product Manager Recorded: Jan 10 2018 35 mins
    In the last ten years, the profile of network traffic has completely changed from the ten years before that. The internet of things (IoT), the variance and number of connected devices, video, images, voice, credit card data and payments processing, wifi, and much more has changed the requirements of what networks must support today.

    Retail, specifically, must support various types of network traffic and each must be treated differently, such as separating PCI traffic from guest wifi from voice. This is where segmentation plays a strategic role.

    This webinar will cover the following topics:
    - What is segmentation as it relates to SD-WAN.
    - Why segmentation matters in Retail, illustrated with use cases.
    - A live demonstration segmentation with SD-WAN.
  • TechTalk: Effective Micro-Segmentation for the Multi-Cloud
    TechTalk: Effective Micro-Segmentation for the Multi-Cloud John Parker, VP Products, ShieldX Networks Recorded: Jan 10 2018 30 mins
    According to MarketsandMarkets, “more than 75% of businesses are planning to implement multi-cloud architectures within the next 2 years (2018–2019).” And with the rise of multi-cloud architectures, plans and budgets to employ micro-segmentation are on the rise too, to help protect against the lateral movement of an attack, its access to high-value assets, and its subsequent exfiltration of sensitive data.

    But while ESG' research reports that already “68% of enterprise organizations use some type of software-based micro-segmentation technology” today, its implementation still presents challenges and fails to protect against today’s most pervasive assaults.

    Specifically, today’s micro-segmentation solutions offer only simple, ACL-based control, failing to secure all layers of the protocol stack in a way that is also cost-effective and practical to operationalize, especially in newer and elastic, multi-cloud environments.

    ShieldX Networks, a 2017 Gartner Cool Vendor in Cloud Security, will present a brief and instructional overview on the new criteria for effective micro-segmentation, including why micro-segmentation and security controls must work through Layer 7 to protect against advanced attacks, and how to evaluate a solution behind the hype to determine if the micro-segmentation product you plan to deploy will deliver the security you’ve been promised.

    Overview

    •Micro-segmentation state-of-the-union: What is it and how most IT organizations deploy it today

    •Security challenges: What basic micro-segmentation does, and the compromises it misses

    •Blueprint for effective micro-segmentation: Preventing the ‘confused deputy’ and its use in the spread of lateral attacks

    •Best practice takeaways

    •Q&A
  • 국내외 보안관제솔루션 시장과 Best Practice
    국내외 보안관제솔루션 시장과 Best Practice 황원섭, 차장 Security Presales, Micro Focus Korea Recorded: Jan 10 2018 60 mins
    빠르게 진화하는 사이버 위협에 대해 보다 신속·효율적인 보호와 대응을 위해서는 IT 인프라 전반에서 가시성을 확보하고, 보안 사고를 탐지·조사·대응할 수 있어야 합니다. 현재 국내외 다양한 통합로그 분석 및 보안관제 솔루션이 존재하며, 이를 보통 가트너에서 정의한 SIEM(Security Information and Event Management)이라는 명칭으로 불리우고 있습니다. 본 웨비나를 통해서 국내/외 대형 보안관제센터에서 사용 중인 솔루션의 특징 및 고려사항 등을 파악한 후, 향후 관련 솔루션 도입을 검토하신다면 많은 시행착오를 줄일 수 있을 것으로 생각됩니다.
  • Insights from City of Sparks' IT Decision Maker—Steve Davidek
    Insights from City of Sparks' IT Decision Maker—Steve Davidek Steve Davidek, IT Manager, City of Sparks; Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Jan 10 2018 3 mins
    In this brief, video clip hear insights from the City of Sparks (NV) IT Manager, Steve Davidek, on the security challenges faced by most governments and business organizations. Learn how Arctic Wolf's industry-leading security operations center (SOC)-as-a-service–the AWN CyberSOC–helped the City of Sparks vastly improve its threat detection and response.
  • Quality & Testing SIG Talk: Proven Practices
    Quality & Testing SIG Talk: Proven Practices Teri Sarallo Recorded: Jan 9 2018 61 mins
    We are excited to be hosting another Vivit SIG Talk [#VivitSIGTalk] event focused on Proven Practices around Quality & Testing for you. The live event is being held on 9 Jan 2018 at 12 PM ET, and a full session replay, along with individual session replays and slides presented will all be available.

    For this Vivit SIG Talk session, we will be featuring speakers from the United States, England and Australia. If you have been in the Quality & Testing space for any period of time, you will recognize each of these individuals as experts. We are fortunate enough to have them as speakers, so they can share their thoughts, and provide our members with some thought provoking and actionable content.
  • Case Study Webinar: Moving Network Operations into the Future
    Case Study Webinar: Moving Network Operations into the Future Ralf Buchroth, Team Lead in IT Infrastructure and Provider Management at RWE & Karen Crowley,Sr. Product Marketing Manager Jan 18 2018 4:00 pm UTC 60 mins
    Join us on January 18th, 2018 for a lively discussion with Ralf Buchroth, Team Lead in IT Infrastructure and Provider Management at RWE, the second largest utility provider in Germany.

    We will discuss RWE’s challenges and success in moving their network operations into the future without compromising security and compliance, including:
    • consolidating security and orchestrating connectivity across a hybrid network, including legacy firewalls and routers, next generation firewalls, and the AWS cloud platform
    • incorporating a cloud-first strategy and a heavy investment in DevOps to identify and address security violations in AWS, and allow application developers to spin up new applications without knowing IPs, protocols and ports
    • reclaiming visibility of their firewall configurations and moving from error-prone manual changes to automating the process
    • vastly improving workflows to improve audit preparation from a previously non-auditable change process

    Register now to gain amazing insight into how they have found success. We will wrap up with a live Q&A, so have your questions ready!
  • Security and the Changing Value of our Data
    Security and the Changing Value of our Data Laurence Pitt, Global Security Strategy Director at Juniper Networks Jan 18 2018 5:00 pm UTC 45 mins
    We’ve spent years just seeing data as ‘there’; whether it’s a spreadsheet, email or information on a website/social media – data just exists. However, with recent, and massive, growth in stored data its value throughout its lifetime has now changed.

    Because of this changing value, data must be secured and protected – kept away from people who might pose a threat to its integrity and value. In this world of instantly available information a news leak informed by real data is something that can quickly reduce the value of a product, or even damage the revenue and reputation of your business.

    Endpoint-based technologies can help to prevent an attack, but this is a defensive posture - we need to move and become more proactive. Understanding the data you have makes it easier to know what is ‘normal’, in turn this makes it easier to recognize unusual behavior of devices and data which might indicate a threat has breached the network. The faster you are able to see this, the faster you can react – ensuring maximum time possible to mitigate the potential damage.
  • Playing Through the Pain: Strategies for Working in the Real World
    Playing Through the Pain: Strategies for Working in the Real World Richard Thieme, Author and Professional Speaker Jan 18 2018 5:00 pm UTC 60 mins
    After 25 years of speaking and writing about the impacts of technologies on “the human in the machine,” Richard Thieme documented the traumatic consequences for security and intelligence professionals of swimming in dark and turbulent waters that challenged our abilities, our ethos, and sometimes our very identity. Who we thought we were came up against what we had to do and the friction threw off sparks.

    This webinar goes beyond those stories to explore in particular how what dominant cultures call “minorities” manage their unique challenges. Thieme has uncharacteristically lived as “a minority” in five different ways and the dynamics and resultant strategies he had learned port seamlessly to the experience of others. There’s more to it than “playing through the pain” - there’s real gold in discovering our capacities for the resilience, power, and self-transcendence intrinsic to the human condition.

    Beginning with the “real facts” of the matter, Thieme draws on his experience to suggest ways to make this game a long distance run, not a sprint, and not lose our selves along the way.
  • The Future of Authentication in a Hyper Connected World
    The Future of Authentication in a Hyper Connected World Angel Grant, Dir, Identity, Fraud & Risk Mgmt., RSA; Clare Nelson; John Carnes, Anthem; Brandon Dunlap (moderator) Jan 18 2018 5:00 pm UTC 75 mins
    With the ever increasing number of devices and applications that individuals use and access on a daily basis, the authentication of individuals has become paramount for organizations. It needs to be done faster, seamlessly and have less impact on the user. What can organizations do to meet this challenge? Are behavioral analytics an answer? What role does identity assurance play? What about multi-factor authentication? Biometrics? Join RSA and (ISC)2 on January 18, 2018 at 1:00PM Eastern for a discussion on where ID/Access management and authentication is going and how these future advancements can impact your organization.
  • Secrets Revealed: Effective Protection Against Ransomware
    Secrets Revealed: Effective Protection Against Ransomware Naveen Palavalli, Director, Product & GTM Strategy, Symantec and Jonathan Korba, System Engineer, Symantec Jan 18 2018 6:00 pm UTC 60 mins
    Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.

    This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.

    Join us to discover how you can:

    · Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention

    · Gain enhanced visibility into suspicious activity across your endpoint estate

    · Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc

    In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.

    Register Today
  • Machine Learning and Microsegmentation
    Machine Learning and Microsegmentation John O'Neil, Edgewise Chief Data Scientist Jan 18 2018 7:00 pm UTC 45 mins
    “Make the trust zones smaller” is the rallying cry behind microsegmentation projects. Break up the network into smaller pieces and put firewalls in between those pieces to ensure attackers can’t get from one part of the network to the next. But making microsegmentation projects work relies on a great deal of knowledge of the network and attack pathways. And it’s an incredibly heavy lift–configuring and deploying a microsegmentation solution takes an immense amount of time and resources. Machine learning can significantly reduce the hurdles by learning the network’s intended state and defining the attack pathways that need to be secured, automating the microsegmentation process.

    Edgewise’s Chief Data Scientist John O’Neil will deep-dive into the role of machine learning in microsegmentation and demonstrate how a machine learning driven solution could reduce the time and energy needed to deploy microsegmentation from months to hours.
  • DDoS Attack: How Attackers Circumvent CDNs to Attack Origin Systems
    DDoS Attack: How Attackers Circumvent CDNs to Attack Origin Systems Andy Shoemaker, Founder, NimbusDDOS & Kim Lambert, Sr. Product Marketing Manager, Imperva Incapsula Jan 18 2018 9:00 pm UTC 60 mins
    Do you feel safe from DDoS attacks because you use a content delivery network (CDN)? Join Andy Shoemaker, founder of DDoS testing company NimbusDDOS, to uncover the limitations of this strategy. In this webinar he’ll perform a live DDoS attack to show how attackers bypass CDN defenses to directly target an organization’s critical resources.

    In this webinar you will:
    · Learn about the benefits and pitfalls of using CDNs as a DDoS protection strategy
    · Watch a live DDoS attack from the attacker's perspective
    · Participate in a live Q&A with DDoS experts
  • Data Protector zum Wochenstart: Neuigkeiten zu DP und Backup Navigator
    Data Protector zum Wochenstart: Neuigkeiten zu DP und Backup Navigator Marc Fisseler, Presales Consultant Data Protection, Micro Focus Jan 22 2018 8:00 am UTC 90 mins
    In den Webinaren "Data Protector zum Wochenstart" wird Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vorstellen. Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb. Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.

    In diesem Webinar wird sich alles um die Neuerungen des Data Protector Version 10.0 drehen. Die neue Konfigurationsoberfläche des Data Protector und ein komplett überholter Scheduler
    gestalten die tägliche Arbeit neu. Darüberhinaus werden wir auf weitere neue Features eingehen. Neben einem theoretischen Überblick schließt sich ein praktischer Teil anhand von Demos an.
  • Hunting the Hunters or Can you cover your cyber tracks to avoid being caught?
    Hunting the Hunters or Can you cover your cyber tracks to avoid being caught? Patrick Grillo, Senior Director, Security Solutions, Fortinet Jan 23 2018 10:00 am UTC 45 mins
    While some hackers crave the attention of a high profile attack or data breach, others prefer to work in shadows either trying to hide their tracks or are indifferent all together.

    Regardless, accurately understanding where an attack comes from is very helpful in defending against future attacks. More importantly, when companies and key organizations work together it is possible to tie together a multitude of individual footprints into a single, conclusive trail back to the originator.

    This session will focus on the importance of attribution and includes a case study of how a major cyber criminal was taken down, from the lowest foot soldier to the kingpin himself.
  • Docker Monitoring: Best Practices for Optimal Efficiency
    Docker Monitoring: Best Practices for Optimal Efficiency Eric Carter, Product Marketing Manager, Sysdig Jan 23 2018 2:00 pm UTC 60 mins
    Pushing Docker-based applications into production radically changes the way you monitor & troubleshoot your environment.

    Join Sysdig for a review of the challenges of this new infrastructure and get live examples of monitoring and troubleshooting containers and orchestration systems like Kubernetes for optimal efficiency.

    During this webinar you’ll learn:

    - How should you monitor services built on top of containers?
    - What metrics become more relevant in Docker-based environments?
    - How do you construct alerts most effectively?
    - How do you troubleshoot containers that are rapidly coming and going?

    The webinar will focus on demonstrating open source tools, like Prometheus, and commercial tools, such as Sysdig Monitor, that help you solve these new challenges. You’ll walk away with ideas that you can immediately put to work in any scale environment.
  • Hong Kong & Singapore: Standing Out in the APAC MTDC Market (US Audience)
    Hong Kong & Singapore: Standing Out in the APAC MTDC Market (US Audience) Kelly Morgan, VP, Services & Dan Thompson, Senior Analyst, MTDC Jan 23 2018 4:00 pm UTC 60 mins
    The multi-tenant datacenter market in Asia is expected to grow at a 15% CAGR from 2015-2020, and is the fastest-growing region after Latin America. Hong Kong and Singapore continue to be key markets in that region for growth, despite Singapore having a slower year in 2017, when considering new datacenter builds. In this webinar, we will discuss our most recent findings on the major players and trends in these top markets. We will also preview our research plans for 2018, including the new Asian markets we expect to cover.
  • Breaking Down Cloud Security: Discover What it Means to You
    Breaking Down Cloud Security: Discover What it Means to You Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine Jan 23 2018 5:00 pm UTC 45 mins
    Cloud Security has recently filled everyone's network security forecast. Everyone is talking about it, but are they talking about the same thing? Today's webinar puts a framework around a term that has become ever-present in today's conversations even though its definition has not.

    Join us as we discuss:

    - How cloud security differs from a public cloud, a private cloud or a hybrid cloud
    - How cloud technologies impact a company's security options
    - How do you defend against attacks of third-party providers of IT services
    - How to develop policies and procedures to test and evaluate servers over which you have no physical control

    To better understand what cloud security means to you, register now.
  • 3M & Staples Present: Improving comfort and performance in the workplace
    3M & Staples Present: Improving comfort and performance in the workplace Tom Albin PhD & Cristina Ainslie, LEED AP BD+C Field Sales Director, Furniture, Staples Business Advantage Jan 23 2018 7:00 pm UTC 45 mins
    Gain valuable insight from our expert speakers.

    Webinar topics include:
    • Ergonomics 101
    How it impacts workplace productivity
    • Sitting vs. Standing
    The benefits and costs
    • Employee Retention
    Why comfort makes employees happy

    Tom Albin PhD is a licensed professional engineer (PE) and a certified professional ergonomist (CPE). He holds a PhD from the Technical University of Delft in the Netherlands. He is a Fellow of the Human Factors and Ergonomics Society. Tom divides his professional life between the Office Ergonomics Research Committee (www.oerc.org), where he is the Executive Director, and his consulting practice, High Plains Engineering Services. He has extensive experience as a researcher, corporate ergonomist, and product developer. In addition, he has been active in the US and International Standards community. He is accredited as a US expert to several International Standards Organization working groups and is Vice-Convenor of the ISO committee revising the standards for input devices and workstation layout/postures.

    Cristina Ainslie brings a wealth of knowledge to her role as Field Sales Director, Furniture as she has been in the industry for over 30 years. Her tenure in the industry ranges from working as Regional Manager for Teknion and as a Principle for a LEED consulting firm. She is passionate about bringing value to your project by putting together a team that is best in class and will ensure your project is planned, design and executed to your specific needs. She was instrumental in helping her teams create furniture programs for Yahoo, Netflix, Cisco Systems, Polo/Ralph Lauren and YouTube. Her experience in sustainability helped her act as an owner’s rep to assist her clients in obtaining LEED Certification for their projects. She assembled project teams that included architects, contractors, MEP and furniture vendors.
  • Minimize Cyber Exposure in a World of Cloud, Containers and Other Modern Assets
    Minimize Cyber Exposure in a World of Cloud, Containers and Other Modern Assets Robert Healey, Senior Director Marketing, APAC, Tenable Network Security Jan 24 2018 6:00 am UTC 60 mins
    As organizations embrace cloud infrastructure, DevOps methodologies, PAAS, IoT and mobile workforce, there are new risks coming from a broader attack surface. Vulnerability management designed for traditional assets is not enough. To improve security, you need to rethink how you do things. For example, containers have become the de facto standard in cloud architectures today, which means that security needs to move into developers’ build processes while complementing existing solutions.

    Attend this webinar to discover:
    •Where vulnerability management for today’s assets needs to start
    •What the new faces of attacks and remediation look like
    •Why prioritization should not be based on scan results
    •Why reports using Excel are no longer the answer
    •How DevOps can be part of the solution to incorporate security

    Join Tenable and (ISC)² on Jan 24, 2018 (Wed) at 14:00 (Singapore time) to learn how to minimize cyber exposure in a world of cloud, containers and other modern assets.
  • Advancing Our Leadership in Automation with Tufin R17-3
    Advancing Our Leadership in Automation with Tufin R17-3 Amnon Even-Zohar,Senior Product Manager, Tufin & Dan Rheault, Sr. Product Marketing Manager, Tufin Jan 24 2018 4:00 pm UTC 45 mins
    Please join Tufin as we brief our customers on the release of Tufin Orchestration Suite™ R17-3, Advancing Our Leadership in Automation: Pioneering the Automation Journey to the SDN and More. We’ll cover the different facets of automation features in the release including automation and provisioning for VMware NSX, support for Check Point Identity Awareness Blade, and end-to-end group modification automation.

    Other items covered include:

    Policy optimization for Cisco Firepower
    Enhancements to topology to further support “what-if” analysis
    Policy Browser search enhancements
    Changes to cloud license enforcement
  • MEF 3.0 - What You Need to Know
    MEF 3.0 - What You Need to Know Stan Hubbard - Dir. Communications & Research, MEF; Dan Pitt - SVP, MEF; Bob Mandeville - President, Iometrix Jan 24 2018 5:00 pm UTC 75 mins
    In Nov. 2017, MEF released our MEF 3.0 transformational global services framework for defining, delivering, and certifying agile, assured, and orchestrated services across a global ecosystem of automated networks. Dozens of service and technology firms have publicly embraced MEF 3.0 and currently are involved in MEF 3.0 development work.

    MEF 3.0 services provide an on-demand, cloud-centric experience with unprecedented user- and application-directed control over network resources and service capabilities.

    Over the next several months, MEF will host a series of webinars covering the key pillars of MEF 3.0:

    • Standardized, Orchestrated Services
    • Open LSO APIs
    • Agile Service & Technology Certification
    • Community Collaboration

    Our first webinar will provide an overview of MEF 3.0, including:

    • Explanation of the MEF 3.0 framework
    • Comparing MEF 3.0 to CE 2.0
    • Latest developments on inter-provider and intra-provider LSO APIs
    • An exciting new approach to MEF certifications
    • Expanded community collaboration
  • Container Runtime Security with Sysdig Falco
    Container Runtime Security with Sysdig Falco Michael Ducy, Director of Community and Evangelism, Sysdig Jan 24 2018 6:00 pm UTC 60 mins
    While there have been many improvements around securing containers, there is still a large gap in monitoring the behavior of containers in production and taking action on any abnormal behavior. That’s why we created Sysdig Falco, the open source behavioral activity monitor for containerized environments.

    Sysdig Falco can detect and alert on anomalous behavior at the application, file, system, and network level. In this webinar attendees get a deep dive into Falco and learn:

    -How does behavioral security differ from existing security solutions like image scanning?

    -How does Falco work?

    -What can it detect?

    -How to build and customize rules.

    -How to extend with alerting options.

    Who should attend?

    If you're managing containers in production, or just beginning our container exploration, you'll want to attend to understand the security paradigms of containers and how to secure them.
  • IT Service Management mit DevOps-Turbo – Neue Maßstäbe in puncto Nutzererfahrung
    IT Service Management mit DevOps-Turbo – Neue Maßstäbe in puncto Nutzererfahrung Robert Kreher, Micro Focus, und Dr. Kai-Uwe Winter, Materna Jan 25 2018 10:00 am UTC 60 mins
    Digitalisierung, Cloud oder DevOps machen auch vor dem Service Management nicht Halt. Die Interaktion zwischen Endanwender und Help Desk soll modern, interaktiv, transparent und mobil sein. Die Anwender wünschen sich ein zentrales, interaktives Portal für alle Anfragen. Transformative Trends wiederum verlangen nach Service Management-Lösungen, die mit ihrer Geschwindigkeit mithalten können. Routinetätigkeiten sollen sukzessive automatisiert werden können und zugleich kosteneffizient sein.

    Eine innovative Lösung hierfür ist Service Management Automation-X (SMA-X) von Micro Focus. Sie bietet integrierte virtuelle Agenten mit Chatbots, Social-Collaboration-Funktionen, ein Smart-Ticketing-System und intelligente E-Mail-Programme. All dies sorgt beim Anwender für ein optimiertes Nutzererlebnis. Als erste vollständig containerbasierte und mandantenfähige Plattform für das Service Management bietet SMA-X die größte Bandbreite an Deployment-Optionen. Auch strengste Service Level Agreements können damit kosteneffizient erfüllt werden. Sie verfügen über die Datenhoheit und können so Sicherheit und Speicherort der Daten garantieren sowie Datenschutz- und Compliance-Richtlinien einhalten.

    Diese Vorteile von Service Management Automation-X lernen Sie im Webinar kennen:
    • Containerbasierte Bereitstellung vom Rechenzentrum bis zur Public Cloud
    • Läuft in der Public Cloud mit voller Performance- und Kostenflexibilität
    • Code- und versionslose Benutzerführung
    • Schlanke und moderne Benutzerführung durch den Einsatz von Big Data Analytics und Automatisierung
    • Mandantenfähigkeit durch Containertechnologie
    • Zusätzliche Enterprise-Anwendungen
    • Verbesserte Smart Ticketing Analytics durch optische Zeichenerkennung und maschinenbasierte Lernsysteme
    • Hosting in Deutschland im zertifizierten Rechenzentrum der Materna in Dortmund

    Nutzen Sie die Gelegenheit, Ihre Fragen an die Experten zu stellen. Die Teilnahme am Webinar ist für Sie kostenfrei. Wir freuen uns auf Ihre Anmeldung.
  • Remote Production: Game changer for sports broadcasting
    Remote Production: Game changer for sports broadcasting IBC365 | Tata Communications | VISTA Worldlink Jan 25 2018 1:00 pm UTC 60 mins
    Join IBC365 and Tata Communications on Thursday 25 January at 1pm GMT to explore how remote production is changing the way sports broadcasters operate.

    Remote production gives broadcasters the ability to produce live broadcasts at a distance from the actual event, by sending raw camera feeds, audio and equipment control over a telecom infrastructure to a central studio facility.

    It helps to generate high volume of sports content economically, thereby improving productivity and efficiency for sports broadcasters.

    Today, for any live event, about 30-40 people travel to each location with kit and other equipment to produce the broadcast feed at the venue. This is not only expensive but also logistically a nightmare.

    By producing feeds remotely at a central location only a handful of camera crew would have to travel while the technical director, commentator and other key crew members can finalise production at a central location.

    In this webinar we explore how broadcasters and production companies can overcome any technical and operational challenges to embrace the benefits of remote production.

    Speakers:
    Jeremy Dujardin, CTO, Media Services, Tata Communications
    Dhaval Ponda, Global Sales Head, Media Services, Tata Communications
    Josh Liemer, VP Creative Services, VISTA Worldlink
  • 20 Docker Security Tools Compared
    20 Docker Security Tools Compared Jorge Salamero Sanz and Knox Anderson Jan 25 2018 6:00 pm UTC 60 mins
    There are quite a few Docker security tools in the ecosystem; how do they compare?

    Everyone starts with image vulnerability scanning, but that's just the beginning and usually stops where your CI/CD pipeline ends. That’s why we created this extensive list of 20 container and Docker specific security tools that can help keep containers secure in production. https://sysdig.com/blog/20-docker-security-tools/

    We got lots of feedback and questions from many of you, so we decided to pick some of the most popular open source tools and commercial products, look at them in detail, and show them to you live in a webinar.

    Join Knox and Jorge from the Sysdig Team, for a 1 hour session to run through:

    How to secure Docker containers and what are the best practices
    Why you need to both static and dynamic (run-time) scanning for your images
    What other container security measures and policies are necessary in production
    Demo: Comparing and implementing docker security basics with the most popular container security tools
  • Putting the Power of Proxy to Work
    Putting the Power of Proxy to Work Gerry Grealish, Head of Product Marketing, Network and Cloud Security Products, Symantec Jan 25 2018 6:00 pm UTC 30 mins
    Data, devices, applications are no longer confined to the traditional perimeter. They now co-exist on-premises and in the cloud, and enterprises are scrambling to secure this new operating environment. Not surprisingly, Symantec’s 2017 Internet Security Threat Report (ISTR) identified that the number of sophisticated attacks targeting enterprises across the network and the cloud is on the rise.


    Join us for our webinar “Putting the Power of Proxy to Work” to learn how:

    - Enterprises use Secure Web Gateway’s unique proxy capabilities to improve threat prevention and data security as they move to the cloud

    - Cloud-delivered security services can protect your remote employees, enabling a secure and compliant “direct-to-net” network architecture when adopting cloud apps like Office 365

    - A defense-in-depth approach to combatting malware provides high levels of detection with extremely low false positives, easing the operational burden on your security organization

    Register Today
  • How the Counter Threat Unit™ Sets Secureworks Consulting Services Apart
    How the Counter Threat Unit™ Sets Secureworks Consulting Services Apart Panel of Secureworks Information Security Strategic and Technical Consultants Jan 25 2018 7:00 pm UTC 60 mins
    As the scope for security skill and expertise demanded of organizations extends, CISOs are increasingly turning to security consulting partners for strategic guidance and technical and advisory expertise.

    There are a broad range of organizations in today’s market offering security consultancy services based on best practices and standard frameworks. Partnering with one of these firms can provide your organization with the technical expertise to improve network visibility and gain a clearer understanding of your vulnerabilities, provide the strategic and practical guidance that helps you prioritize and build out programs that enable business objectives, as well as advise on how to effectively engage with the C-suite.

    What truly sets Secureworks’ information security consulting services apart is how we utilize our Counter Threat Unit™ and knowledge garnered from thousands of client engagements to ensure you are being consulted on the latest industry trends and threats. This way, the outcome is based on real-world scenarios that matter to your organization.

    Join consultants across our technical and strategic practices as they share lessons learned from their most challenging engagements and the value that real-time threat intelligence has brought to those engagements.

    Key topics discussed include:

    • Examples of real-world engagements where the CTU™ and Consulting Practice improved the outcomes for clients
    • Tools consultants use to ensure that your outcome is based on real-world scenarios and threats that matter to your organization
    • Lessons learned from our most strategic and complex engagements
  • SAP-Basis im Wandel: Wie kann man hybride SAP-Landschaften automatisiert managen
    SAP-Basis im Wandel: Wie kann man hybride SAP-Landschaften automatisiert managen Sandra Apflauer, Micro Focus, und Helge Sanden, IT-Onlinemagazin Jan 30 2018 9:00 am UTC 45 mins
    IT-Onlinemagazin Expert-Talk

    SAP-Basis im Wandel: Wie kann man hybride SAP-Landschaften automatisiert managen?
    30.01.2018 um 10:00 Uhr - Micro Focus & IT-Onlinemagazin

    IT-Abteilungen und SAP-Basisadministratoren sind aktuell nicht zu beneiden: Sie stehen im Spannungsfeld hohen Kostendrucks, steigender Heterogenität der IT-Landschaften, dem SAP-Generationswechsel und ganz neuer Anforderungen durch Innovationsthemen.

    Welche Antwortmöglichkeiten es für diese Herausforderungen gibt, werden wir in diesem Expert-Talk diskutieren. Wir werden beleuchten, wie man Routineaufgaben in der SAP Basis automatisieren, wie man Self-Services für die Anwender einrichten und wie man die zukünftigen, hybriden Multi-Cloud SAP-Landschaften sinnvoll Ende-zu-Ende orchestrieren und über den gesamten Lebenszyklus hinweg managen kann.

    Unser Anliegen ist es, Ihnen Ideen für Veränderungen im SAP Basis Betrieb aufzuzeigen, die Ihnen gleichzeitig Raum für Innovationen schaffen können. Wenn Sie im Vorfeld Fragen haben, senden Sie diese bitte gerne an: redaktion@it-onlinemagazin.de.

    Ihre Gesprächspartner:
    Sandra Apflauer, Pre-Sales Team Lead Innovation Strategies, Micro Focus
    Helge Sanden, Chefredakteur, IT-Onlinemagazin
  • Key Considerations for Choosing a Fiber Termination Method
    Key Considerations for Choosing a Fiber Termination Method Betsy Conroy & Brian Duval, Siemon Company Jan 30 2018 4:00 pm UTC 90 mins
    There are many considerations when it comes to choosing your fiber termination method – from the number of connections and the application being supported, to performance and overall required time to go live. While pre-terminated fiber solutions offer significant benefits in terms of factor-terminated performance and ease of deployment, they do require proper planning and predetermining of lengths, as well as longer lead times. Choosing a field termination method like fusion splicing or mechanical splice connectors comes with its own set of additional considerations, including cost, required skill set and labor efficiency. This webinar will examine the various types of fiber termination methods available today, providing pros and cons of each method and basic considerations to help you choose the fiber termination that’s right for your specific fiber deployment, including key questions to ask and termination time comparisons and analysis.

    This webinar is approved for one BICSI CEC.
  • Easy To Build: All Programmable Carrier Grade VNF Platform
    Easy To Build: All Programmable Carrier Grade VNF Platform David Levi, CEO at Ethernity Networks & Ken Dennen, Sr. Director of Business Development for the U.S Jan 30 2018 5:00 pm UTC 45 mins
    For communication server providers (CSPs), Carrier Ethernet (CE) underpins the vast majority of modern services delivered to enterprise and residential customers. As CSPs seek to expand their service offerings from their networking infrastructure base, they need to leverage their CE access networks to seamlessly connect users to Multi-Access Edge Computing (MEC) applications. The strength of CE service orchestration and service level agreements (SLAs) provides a dynamic, trusted foundation for new revenue generating services. Ethernity Networks’ ACE-NIC 40G Server Adapter integrates field-proven CE services and programmable NFVI acceleration, all optimized to work with Intel servers and DPDK.