Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Take the WAN superhighway to the cloud with SD-WAN
    Take the WAN superhighway to the cloud with SD-WAN
    Valerie DiMartino Senior Product Marketing Manager, Sony Kogin Principle Product Marketing, Managed Service Provider Recorded: Nov 15 2018 52 mins
    Azure or adopting Office 365, it’s time to look at SD-WAN to securely connect branch users and deliver and optimized experience that’s eases cloud and SaaS migration. This webinar will explain the advantages that Citrix SD-WAN brings to your Microsoft deployment including tools such as Microsoft Azure Virtual WAN and Office 365 performance.

    In this session, you will learn how Citrix SD-WAN helps:

    • Securely connect branches to the cloud, SaaS, and the Internet
    • Optimize Office 365 connectivity and performance
    • Simplify and automate large-scale branch connectivity with Azure Virtual WAN
  • Top 5 requirements for digital in-store experiences that work
    Top 5 requirements for digital in-store experiences that work
    Gaurav Pant Chief Insights Officer, Incisiv, and Ricardo Belmar, Senior Director, Global Enterprise Marketing, Infovista Recorded: Nov 15 2018 56 mins
    As the lines between online and in-store retailing become increasingly blurred, your stores’ digital transformation needs to enable new in-store experiences that increase conversion rates, while empowering your associates to raise customer satisfaction with the help of new technology. Yet 74% of retailers tell us their store network is the #1 barrier to an effective customer journey from these new technologies.

    Retailers tell us their top five applications that deliver on the promise of great customer experience and associate enablement are: point of sale (POS), inventory management, guest Wi-Fi, workforce management, and real-time data analytics. How do you enable your network to power your store transformation and deliver a consistent, high performance in-store experience?
    Join Gaurav Pant, Chief Insights Officer, Incisiv, and Ricardo Belmar, Senior Director, Global Enterprise Marketing, Infovista, as they discuss the 5 key imperatives that can help retailers deliver the digital in-store experiences that work.

    - Why digital is the front door to your store
    - Reveal the 5 Requirements for successful digital in-store experiences

    Learn why Ipanema SD-WAN, Application Intelligence for the WAN Edge, is the only solution that meets all of these requirements and how it helped the world’s largest QSR brand protect its digital revenues while enabling the digital transformation of its restaurants.
  • Low to High: Risk Adverse May Not Make the Most Risk Sense
    Low to High: Risk Adverse May Not Make the Most Risk Sense
    Guy Rosefelt, Director of PM at NSFOCUS and Adrian Sanabria, VP of Strategy and Product Marketing at NopSec Recorded: Nov 15 2018 59 mins
    Recent evidence shows that a surprisingly high portion of vulnerabilities incorporated into malware or exploit kits are ranked low or medium severity. Counter to commonly-accepted practices, focusing only on high-severity vulnerabilities and setting a ‘cut-off’ point for lower scored issues, is not a safe or effective strategy. More importantly, proof-of-concept (POC) code for lower priority vulnerabilities is appearing more quickly after 0-day announcement leading to leading to widespread attacks equally as quickly. NSFOCUS and Nopsec will delve into this recent trend, discuss some of these lower level vulnerabilities being quickly exploited, and provide some thoughts how to better protect against these in the future.
  • Flexibly Allocate and Distribute Secure Application Services
    Flexibly Allocate and Distribute Secure Application Services
    John Gudmundson, A10 Networks Recorded: Nov 15 2018 47 mins
    With the evolving nature of application deployment, it is critical that these services be dynamically allocable, fully portable, scale on-demand and procured by a simplified license.

    You will see a live demonstration of FlexPool™, a software subscription for capacity pooling. This will allow you the flexibility to allocate and distribute secure application services whenever and wherever you need them.

    Join A10 Networks and learn how to:
    •Achieve on-demand provisioning of app services in seconds
    •Maximize ROI with license portability and pay-as-you-grow
    •Use modern DevOps tools to simplify license management
  • Accelerate Remediation by Bridging various Islands of Security
    Accelerate Remediation by Bridging various Islands of Security
    Sree Subramaniam, Chintan Udeshi Recorded: Nov 15 2018 50 mins
    Your enterprise network relies on a vast array of security devices and solutions, each generating their own incidents. More often than not, the data they produce can’t be easily shared.

    According to a 2017 ESG report, keeping up with the enormous volume of security alerts and a lack of integration are the biggest network security challenges enterprises face.*

    The consequences? Solution silos, lack of context and prioritization, high false positives and costly delays in responding to active and impending threats.

    Learn How to Automate and Orchestrate Your Security Response
    Join Infoblox and ServiceNow for a live discussion on how organizations are taking network security to the next level by using DNS and IP address management data to enable diverse security tools to work in unison to contain threats faster.

    Attend this webinar and explore how security ecosystem integration can help your network and security teams to:

    -Gain visibility into new devices and infected hosts in a single place
    -Respond faster to DNS threats
    -Eliminate silos between network and security tools
    -Improve ROI of existing network and security investments

    Discover how to take your security to the next level. Reserve your spot now.

    *ESG, “Security Operations Challenges, Priorities and Strategies in 2017.”
  • Kubernetes: Securing Hybrid and Multi-Cloud Environments
    Kubernetes: Securing Hybrid and Multi-Cloud Environments
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Nov 15 2018 45 mins
    Kubernetes is widely used to re-architect traditional applications. Many organizations first set up Kubernetes within their on-prem environment and then later expand to the public cloud. This hybrid environment often creates security and compliance challenges with workloads. Join this webinar to learn how to leverage universal security policy definition that works across a hybrid environment.
  • 802.11ax or 802.11ac: Which is Right for Your Business?
    802.11ax or 802.11ac: Which is Right for Your Business?
    Cherie Martin, Sr. Solutions Marketing Manager - Aruba Recorded: Nov 15 2018 48 mins
    The industry is buzzing about the soon-to-be released 802.11ax Wi-Fi standard that will greatly increase wireless speed and optimize client battery life. Are you ready to take your network to the next level? Join us as Aruba’s Cherie Martin, Sr. Solutions Marketing Manager, shares the top three things you need to consider in deciding which technology to choose to give your business, employees, and guests, simple, business-class networking without sacrifice
  • An Inside Look at Targeted Ransomware Attacks
    An Inside Look at Targeted Ransomware Attacks
    Peter Mackenzie, Malware Escalations Manager, Sophos Recorded: Nov 15 2018 47 mins
    Join Peter Mackenzie as he discusses the rise of targeted ransomware and why attacks like SamSam, Dharma and BitPaymer are making headlines. Watch a live demo of a ransomware payload being unleashed and the steps you need to protect your organization from similar attacks.
  • How to Get More Out of Your Splunk Deployment with ExtraHop
    How to Get More Out of Your Splunk Deployment with ExtraHop
    Scott Olson, Sr. Sales Engineer; Stephen DeSanto, Solutions Engineer Recorded: Nov 15 2018 44 mins
    Splunk is an excellent platform for analyzing machine data and orchestrating responses. ExtraHop extracts wire data events and metrics from network communications, and can send this information to Splunk for added accuracy and context.

    This webinar explains why ExtraHop and Splunk make such a great fit, and how you can use the ExtraHop App for Splunk to stream wire data such as details for DNS, database, storage, and more.
  • The Future of Hybrid: Optimize Performance and Reduce Alert Noise for DevOps
    The Future of Hybrid: Optimize Performance and Reduce Alert Noise for DevOps
    Sarah Terry, Senior Product Manager, LogicMonitor Recorded: Nov 15 2018 43 mins
    How do you maintain visibility into the performance of containerized applications as containers come and go? The layering of dynamic, ephemeral resources onto service-oriented architectures presents a challenge for optimization and complicates the understanding of true aggregate performance.

    Are you and/or your hybrid and IT Operations teams tired of being woken up in the middle of the night for non-critical alerts? We’ll show you how to use hybrid monitoring to more effectively track the performance of dynamic services and more quickly identify impacted services for a given alert to optimize service availability and performance.

    Join this webinar and learn how to:

    -Gain complete visibility into the performance and availability of services in hybrid IT infrastructure
    -Ensure that alerts reflect overall service impact for distributed and clustered resources
    -Leverage dashboards and performance insights in order to reduce time spent troubleshooting
  • Get Digital Ready Or Get Left Behind
    Get Digital Ready Or Get Left Behind
    Eric Hanselman of 451 Research & Steve Madden of Equinix Recorded: Nov 15 2018 61 mins
    Digital transformation is accelerating for every company in every industry, everywhere around the world. As a part of this necessary transition, people, software and machines are creating and consuming data faster and in more distributed locations than ever before. According to the second annual Global Interconnection Index (the “GXI”), a market study published by Equinix that analyzes traffic exchange globally, Interconnection, or direct and private traffic exchange between key business partners, is becoming the defacto method for companies to operate in today’s digital world. 451 Research Chief Analyst Eric Hanselman and Equinix’s Steve Madden will discuss how major macro, technology and regulatory trends are converging to form an unprecedented era of complexity and risk and forcing the integration of physical and digital worlds requiring Interconnection.
  • Content convergence: Why telcos need content and content providers need telcos
    Content convergence: Why telcos need content and content providers need telcos
    IBC365 | Huawei | Rights Stuff | O2 | Ampere Recorded: Nov 15 2018 63 mins
    The boundaries between broadcasters, pay TV platforms, OTT operators and telecoms providers are blurring.

    Competitors are becoming partners as content owners recognise the role of telcos to deliver their services to a bigger audience and drive new revenues, while telecom operators are creating compelling consumer experiences built around video.

    Convergence is now all about putting the consumer at the centre of a connected media and entertainment experience where the distinction between live broadcast and on-demand services disappears.

    It's an exciting time for every player in the content and connectivity business, and in this ground-breaking webinar we'll map out the future of convergence and hear:
    - Why high-quality video services are vital for telecom operators wanting to engage consumers and grow their revenues through "experience monetisation"
    - When is the right time for operators to license their own content or offer their own VOD platform
    - How becoming a super-aggregator of OTT services and TV channels can create a compelling offer without costing a cent in content rights
    - Why content providers, broadcasters and SVOD platform owners should partner with telcos to reach new audiences in new markets

    Speakers:
    Richard Griffiths, Vice President Consultant Office, Huawei Technologies
    Wendy Bernfeld, Managing Director, Rights Stuff
    David Owens, 5G Ecosystem Liaison Technology Strategy, O2 (Telefonica UK)
    Tony Maroulis, Research Manager, Ampere Analysis
  • Live DDoS Attack: How to Mitigate the Threat and Avoid Downtime
    Live DDoS Attack: How to Mitigate the Threat and Avoid Downtime
    Andy Shoemaker, founder of DDoS testing company NimbusDDOS Recorded: Nov 15 2018 59 mins
    Are you relying on manual DDoS mitigation methods? How can waiting minutes to mitigate a DDoS attack impact your business? Watch as Andy Shoemaker, founder of DDoS testing company NimbusDDOS, gives you a look behind the curtains of a live DDoS attack. Then see first-hand how Imperva Incapsula automatically blocks the threat without impacting the user experience.

    In this webinar you will:
    • Learn why automatic mitigation is crucial to keeping your business up and running
    • Understand the power and importance of the Incapsula 10-second DDoS SLA
    • Participate in a live Q&A with DDoS experts
  • How Fortinet Enterprise Firewalls deliver a unique fabric-based architecture
    How Fortinet Enterprise Firewalls deliver a unique fabric-based architecture
    John Maddison, SVP of Products and Solutions Recorded: Nov 15 2018 44 mins
    In this webinar on demand, John Maddison discusses how Fortinet Enterprise Firewalls deliver a unique fabric-based architecture and why Fortinet was named a Leader in the 2018 Gartner Magic Quadrant for Enterprise Network Firewalls.
  • Webinar: Netzwerksegmentierung – Methoden und Vorteile
    Webinar: Netzwerksegmentierung – Methoden und Vorteile
    Christian Giebner, Presales Engineer, Tufin & Christian Giebner, Presales Engineer, Tufin Recorded: Nov 15 2018 33 mins
    ist Ihre Netzwerktopologie flacher als die Schleswig-Holsteinische-Gebirgslandschaft?

    Wir können Sie dabei unterstützen Ihr Netzwerk in effektive Sicherheitszonen aufzuteilen und haben eine Lösung, welche die Einschränkungen der Kommunikation zwischen den Zonen, Hersteller- und Plattformunabhängig, sicherstellt.

    Besuchen Sie das Webinar am 15. November um 9:00 Uhr, vom Presales Engineer Christian Giebner, erfahren Sie die Methoden und Vorteile einer praktikablen Netzwerksegmentierung und lernen Sie:
    •Warum eine einheitliche Segmentierungsrichtlinie essentiell für die Sicherheitsrichtlinienverwaltung ist
    •Wie Sie Sicherheitszonen definieren und die Interzonenkommunikation gestalten
    •Wie Sie effektiv Ihre Segmentierungsrichtlinie pflegen und durchsetzen

    Registrieren Sie sich jetzt!
  • Achieve Your Security Goals with Inline Prevention Tools
    Achieve Your Security Goals with Inline Prevention Tools
    Ian Farquhar, Distinguished Engineer, Security, Gigamon; Moderator: SC Leung, Member, Asia-Pacific Advisory Council Recorded: Nov 15 2018 61 mins
    Inline security tools operate by actively preventing threats in your network, but deploying and optimizing these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade. The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges.

    Join Gigamon and (ISC)² to examine how inline bypass can overcome physical deployment obstacles, maximize network availability, increase the scale of inspection and reduce the impact to network performance.
  • To SIEM, Not to SIEM? Find Out Your Options
    To SIEM, Not to SIEM? Find Out Your Options
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Nov 14 2018 43 mins
    A security information and event management (SIEM) platform has been touted as the cornerstone of cybersecurity. But, can such a stand-alone platform address your IT security challenges and compliance reporting needs? With the growing complexity of SIEM solutions and a shortage of people with cybersecurity skills to manage them, many organizations are looking for alternatives to building their own in-house SIEM and staffing a security operations center (SOC).

    In this webinar, security expert, Narayan Makaram, Sr. Director of Product Marketing at Arctic Wolf Networks, will examine the following:

    - Business drivers for a SIEM
    - What is/is-not included in a SIEM
    - SIEM deployment options
    - Outsourcing considerations – MSSP vs MDR

    Save your seat now to learn more!
  • A Pragmatic Look at Security Platforms - Immediate Impact and Future Promise
    A Pragmatic Look at Security Platforms - Immediate Impact and Future Promise
    Ryan Stolte CTO, Bay Dynamics, Jon Oltsik Sr.Principal Analyst, ESG and Patrick Gardner SVP, Email Security & ATP, Symantec Recorded: Nov 14 2018 60 mins
    There has been a lot of industry buzz about cybersecurity platforms over the past year but much of the discussion is long on hyperbole and short on detail.

    What exactly is a cybersecurity platform?
    Are organizations really looking to purchase and deploy these platforms?
    How can they impact the daily lives of security practitioners?

    Join Bay Dynamics, ESG, and Symantec and get educated on:

    - New research about the growing transition to cybersecurity platforms

    - The benefits of cybersecurity platforms

    - How cybersecurity platforms will continue to evolve in the future.

    Register Today
  • Accelerate Oracle Performance with Vexata and Database Smart Flash Cache
    Accelerate Oracle Performance with Vexata and Database Smart Flash Cache
    Venky Nagapudi Recorded: Nov 14 2018 40 mins
    Oracle database administrators looking to get more performance against larger data volumes can utilize the Oracle feature called “Database Smart Flash Cache” to accelerate Oracle without. This webcast will detail how to take full advantage of this very useful but sometimes overlooked feature to demonstrate how admins with high query rate databases with large tables and huge volumes can get immediate Oracle performance acceleration using Smart Flash Cache along with the Vexata Scalable Flash Array. In this webcast, you will learn how to:

    •Architect Oracle Infrastructure that maintains existing primary storage using the Vexata VX-100 as the Smart Flash Cache Tier
    •Boost Oracle Database performance by 6X or more without the need to replace existing host servers or primary storage array.
    •Demonstrate these dramatic performance gains in your own Oracle environment along with technical documentation and resources to deploy Smart Flash Cache with no risk.


    Presenter:
    Venky Nagapudi, VP of Product Management
  • 4 ways to use Azure Monitor beyond Azure resources
    4 ways to use Azure Monitor beyond Azure resources
    Cameron Jones, Product Manager, Blue Medora Recorded: Nov 14 2018 45 mins
    Do you love Azure Monitor? Have you considered setting up an Action Group for when the office coffee maker is at 10% capacity? Do you wish you could ask the Azure Advisor anything? New infrastructure and multi-cloud integrations for Azure Monitor have made it possible to use it in dozens of new ways. Join us and get insight into how BindPlane enables:
    - Datacenter monitoring with Azure Monitor and Log Analytics
    - Data from multiple clouds in Log Analytics
    - Monitoring Azure workloads like MSSQL and Oracle
    - Query Analysis in Log Analytics
  • Networking Requirements for Scale-Out Storage
    Networking Requirements for Scale-Out Storage
    John Kim, Mellanox; Saqib Jang, Chelsio; Fred Zhang, Intel Recorded: Nov 14 2018 44 mins
    Scale-out storage is increasingly popular for cloud, high-performance computing, machine learning, and certain enterprise applications. It offers the ability to grow both capacity and performance at the same time and to distribute I/O workloads across multiple machines.

    But unlike traditional local or scale-up storage, scale-out storage imposes different and more intense workloads on the network. Clients often access multiple storage servers simultaneously; data typically replicates or migrates from one storage node to another; and metadata or management servers must stay in sync with each other as well as communicating with clients. Due to these demands, traditional network architectures and speeds may not work well for scale-out storage, especially when it’s based on flash. Join this webinar to learn:

    •Scale-out storage solutions and what workloads they can address
    •How your network may need to evolve to support scale-out storage
    •Network considerations to ensure performance for demanding workloads
    •Key considerations for all flash
  • Technical Education Series: Securing the Cloud Approach
    Technical Education Series: Securing the Cloud Approach
    Mohammad Kaouk, World Wide Solutions Architect Recorded: Nov 14 2018 88 mins
    In this webinar you will learn how to utilize Symantec’s Web Security Service in order to secure your day to day interactions with the Internet
  • Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Amandeep Nagra, Sr. Product Marketing Manager, Workspace services, Citrix Recorded: Nov 14 2018 57 mins
    Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.

    With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.

    Some of Citrix Workspace key advantages include:
    • Higher user productivity and a better experience
    • Stronger security which extends to the cloud
    • joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario

    Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
  • Saving Money and Stopping Cyber Attacks - 3 Simple Steps for the Small Business
    Saving Money and Stopping Cyber Attacks - 3 Simple Steps for the Small Business
    Amar Singh; Steve Vickers Recorded: Nov 14 2018 49 mins
    Are you open minded to saving money and ensuring that your business is better protected from cyber criminals at the same time? Join Amar Singh and Steve Vickers as they discuss a simple checklist for charities and small businesses. A non-technical discussion, we layout step by step guidance on what you can do:

    - To save money on your current IT and security investments
    - To ensure your third party is delivering the right level of security and service
    - Increase your operational efficiency and lower total cost of operations.
  • Visibility and Risk in the IOT World with NAC 3.0
    Visibility and Risk in the IOT World with NAC 3.0
    Steve Mulhearn, Director Enhanced Technology Fortinet Nov 19 2018 10:00 am UTC 45 mins
    In the rapidly changing threat landscape one of the top concerns for most organisations is the introduction of IOT.

    While some organisations have attempted to prevent the connection of these devices due to their lack or non existence of any security, many organisations and Enterprises have now reached the reality that they are here to stay.

    With this in mind what risk does this pose to your organisation and how to reduce this risk to an acceptable level? We will walk through some of the options available and how they may help Enterprise manage the changing landscape.
  • How To Take Your DDoS Protection To The Next Level
    How To Take Your DDoS Protection To The Next Level
    Timothy Fong, Security Product Expert at Cloudflare | John Esterline, Solutions Engineer at Cloudflare Nov 19 2018 2:00 pm UTC 45 mins
    As the web application security landscape evolves, companies are facing increased pressures to strengthen their security posture. Recently, the world’s largest distributed denial of service (DDoS) recorded attacked GitHub at 1.35 Tbps. While the big attacks get all the headlines, at Cloudflare we have learned about other forms of attacks that can unexpectedly bring your site down.

    Join this webinar to learn about:

    - How small DDoS attacks can still bring your site down
    - A little known way attackers can bypass traditional DDoS protections
    - Why TCP services may make you vulnerable to a DDoS attack
    - Pros and cons of multiple solutions: BGP, MPLS, and building your own
    - How to augment Cloudflare’s unmetered DDoS solution with Spectrum, Rate Limiting, and Argo Tunnel
  • Have it All: Achieving Agility and Security with Automation
    Have it All: Achieving Agility and Security with Automation
    Yoni Geva, Product Manager Nov 19 2018 3:00 pm UTC 60 mins
    Are you still implementing firewall changes manually? Are you still trying to keep track of all the changes and their ramifications with spreadsheets?
    Network security policy automation gives you quick, accurate change management across even the most complex hybrid networks, avoiding security holes, compliance issues and costly outages. With automation, you don’t have to choose between agility and security. You can have both.
    In this webinar, Yoni Geva, Product Manager at AlgoSec, explains how security policies can be updated automatically and accurately.
    Join our webinar to learn how to take advantage of:
    •Automated security policy automation with zero touch
    •Security policy management that keeps up with business requirements
    •Automatic identification of risk
    •Enhanced compliance with quick audit reports on demand
  • Women In Cloud: The Shared Experience of Female Tech Entrepreneurship
    Women In Cloud: The Shared Experience of Female Tech Entrepreneurship
    Jacquie Touma, Chaitra Vedullapalli, Terri Stephan Nov 20 2018 8:00 pm UTC 60 mins
    We live in a truly amazing time. Technology is changing almost every aspect of our lives at breathtaking speed. Advances in medicine, education, communication, and productivity have increased life expectancy around the globe and lifted hundreds of millions of people out of poverty.

    The ability to connect to people and information instantly is so commonplace that many take it for granted and now, we’ve arrived at the beginning of an era of even more profound transformation, all centered on the cloud. We’re excited to bring more opportunities through cloud computing to address issues in healthcare, the environment, cybersecurity, and underserved communities. And we’ve seen the incredible good that can come from the cloud, but with it also come challenges. For women in technology, there are increased challenges in a cloud-based world.

    Women in Cloud initiative is designed to empower female tech entrepreneurs by providing Access, Acceleration, and Actions so women entrepreneurs can take Actions every day to achieve their business goals!

    In this webinar, we will share experiences and tips for female tech entrepreneurs in building their cloud B2B with enterprise companies in a simple and predictable way. This is going to be a panel discussion with great conversation with female tech entrepreneurs in driving customer traction.

    Also, learn how you can participate in the next cohort of women in cloud accelerator to build your business with enterprise brands!
  • Can 802.11ax help with density issues today?
    Can 802.11ax help with density issues today?
    Peter Thornycroft, Distinguished engineer in Aruba CTO group Nov 21 2018 10:00 am UTC 61 mins
    As more mobile and IoT devices, and bandwidth hungry apps, are increasingly straining Wi-Fi networks, it’s difficult to predict how your network responds.
    The new IEEE 802.11ax standard is designed to enhance throughput by 4X in dense environments and provide a more predictable experience.
    Join us for a deep dive session on technical ingredients of 802.11ax technology where we cover features such as OFDMA, MU-MIMO and Target Weight Time (TWT).
  • Migrate PC & Mobility with Unified Endpoint Management
    Migrate PC & Mobility with Unified Endpoint Management
    Suzanne Dickson Sr. Dir. Product Marketing, Mobility Citrix; Amandeep Nagra Sr. Product Marketing Manager, Citrix Nov 21 2018 11:00 am UTC 53 mins
    Windows 10 and the proliferation of BYO devices introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embrace unified endpoint management (UEM) to solve the challenges of managing PC, IoT and mobile devices with a centralized solution to manage and secure endpoints.

    Register for this webinar to hear from Suzanne Dickson, Sr. Director, Product Marketing and Citrix Workspace Product Marketing Expert, Amandeep Nagra on how to manage and secure your endpoints.

    This session will address how UEM helps solve challenges of traditional client management in the context of the new digital workspace. Learn more about:

    • UEM and how it fits into a Digital Workspace
    • Managing endpoints through Citrix UEM
    • The future of Citrix UEM
  • Dynamic, Adaptive Multicloud Security
    Dynamic, Adaptive Multicloud Security
    Prasad Raviraj Solutions Marketing SR Manager, Security Nov 21 2018 2:00 pm UTC 14 mins
    Price, agility, scale, global footprint, and availability of emerging technologies (such as AI, Serverless, IOT, etc) within the cloud platforms have contributed to the rapid adoption of multicloud by businesses across the globe. However, helping business adopt these technologies and deployment models while keeping the network safe from attack is a major challenge for even the most seasoned of security professionals. In this session we will explore how a three-pronged approach using Juniper Networks Unified Cybersecurity Platform can help businesses get multicloud security right.
  • Transforming to a digital network – How are you measuring success?
    Transforming to a digital network – How are you measuring success?
    Keith Langridge & Darren Overall from BT, and Stephen Smith & Mark Jopling from Riverbed Technology Inc. Nov 21 2018 3:30 pm UTC 60 mins
    CEOs are adopting a digital first approach to match customer needs, but how are they measuring success?

    Digital technology changes how we do almost everything, and this pace of change continues to accelerate. When it’s built into the core of your business strategy it can help your company thrive - make you quicker, lighter and more responsive.

    But there’s a twist. A recent survey suggests that important digital services and applications are failing and letting 80% of you down.

    The stark reality is, that in a lot of cases the promise of digital is not living up to expectations and in many cases it’s becoming even harder to operate in an increasingly cloud-oriented world.

    Join us on a webinar on 21 November to discover how to measure if your business really has become more agile and responsive. We’ll talk about how to get full end-to-end performance visibility and control of your global applications and network infrastructure. With actionable data you can quickly tweak and improve performance and service levels and show the impact of the digital services you’ve deployed.

    You’ll be in a better position to respond to the changing needs of your business, establish whether your digital technologies are delivering what you need them to and tune them to deliver a successful outcome.

    Presenters:
    -Keith Langridge, VP, network services, BT
    -Darren Overall, Head of Connect Intelligence, BT
    -Stephen Smith, VP of business development, Global Digital Service Providers, Riverbed Technology Inc.
    -Mark Jopling, SVP EMEA Sales, Riverbed Technology Inc.
  • DNS for a DevOps Future
    DNS for a DevOps Future
    Jonathan Lewis, VP of Product Marketing Nov 21 2018 5:00 pm UTC 30 mins
    Advancements in DNS (Domain Name Systems), including the ability to communicate via APIs and the power to couple real-time telemetry with automation capabilities, give this often overlooked but foundational component of the application delivery stack a critical role in a DevOps-driven world.

    Leading-edge enterprises have stopped viewing DNS as just a "phone book" and are now leveraging next-generation DNS to better manage their infrastructure, improve application performance and lower costs.

    In this webinar we'll focus on 3 case study examples of next-generation DNS in action:

    - How a gaming company integrated and automated multiple CDNs to cut content delivery costs in half
    - How an ad delivery platform delivers impressions 70% faster using a multi-cloud strategy managed by DNS
    - How a security SaaS organization used DNS to improve performance and reduce help desk calls
  • Stop Configuring Varnish and Start Coding (APAC)
    Stop Configuring Varnish and Start Coding (APAC)
    Remy Guercio, Product Marketing, Cloudflare Nov 22 2018 1:00 am UTC 23 mins
    In this webinar, we'll discuss how to swap out wrestling Varnish Configuration Language (VCL) with writing modern JavaScript. Using JavaScript will not only make it easier to configure traditional caching behavior but also open up new possibilities for moving additional functionality away from the origin.

    As part of this, we'll briefly cover:
    - How to perform custom routing
    - Creating custom authorization
    - Building an API Gateway
  • Web Performance Matters: Challenges, Solutions, Best Practices
    Web Performance Matters: Challenges, Solutions, Best Practices
    Anand Guruprasad, Solutions Engineer, Cloudflare | Nithyanand Mehta, Director of Technical Services, Catchpoint Nov 22 2018 6:00 am UTC 45 mins
    At Cloudflare, we not only protect 12 million domains against DDoS attacks with our global network but also accelerate their performance. Our 150+ data centers all over the world puts us in a key position to serve content from the edge to the end users, blazingly fast.

    Join this webinar to learn about:

    • How performance affects your revenue
    • What is the right metric to measure and how
    • Challenges in achieving an optimal performance on your web assets
    • How to improve your website’s performance and user-experience
    • Learn from industry experts on best practices for improving web performance
  • Stop Configuring Varnish and Start Coding (EMEA)
    Stop Configuring Varnish and Start Coding (EMEA)
    Remy Guercio, Product Marketing, Cloudflare Nov 22 2018 10:00 am UTC 23 mins
    In this webinar, we'll discuss how to swap out wrestling Varnish Configuration Language (VCL) with writing modern JavaScript. Using JavaScript will not only make it easier to configure traditional caching behavior but also open up new possibilities for moving additional functionality away from the origin.

    As part of this, we'll briefly cover:
    - How to perform custom routing
    - Creating custom authorization
    - Building an API Gateway
  • Getting the Right Network Security for Your Business
    Getting the Right Network Security for Your Business
    Richard Leadbetter, Security Technical Specialist, EMEA Nov 22 2018 10:30 am UTC 60 mins
    With the arrival of digital workplaces comes added security threats.

    Your business will need integrated and automated security controls to help protect your data from malware and unauthorized users. Including wireless intrusion detection and prevention, your network can be safeguarded from wireless threats, rogue access points and clients.

    Join our webinar, ‘Getting the Right Network Security for Your Business’ to learn how Aruba, a trusted brand that provides next generation network solutions, helps keep your business applications and data safe.

    You'll also learn about:

    • The network security landscape
    • Aruba SMB solutions and their security benefits
    • Available additional resources
  • Smart Cities: Real IoT Use Cases
    Smart Cities: Real IoT Use Cases
    Steve Brumer- Partner at 151 Advisors and Steve Wimsatt - Senior Director, Alliances and Business Development Ruckus Network Nov 26 2018 5:00 pm UTC 60 mins
    Problems faced by IoT and smart city opportunities are knowing how all the moving pieces work together to obtain a real ROI! Join Steve Brumer, Partner at 151 Advisors and Steve Wimsatt, Senior Director, Alliances and Business Development Ruckus Networks, a unit of ARRIS for a 45-minute open discussion on IoT in Smart Cities, the real-world applications and uses cases across the globe and how to make money!

    Topics will include:
    - Real World Applications & Uses Cases
    -Where is the money in supplying products and services and the commercialization aspects of them!
    - What is the true meaning of ROI in the Smart Cities and Smart Buildings space?

    Key takeaways will focus on where should you focus your time, energy and efforts within this space and how to drive revenue.
  • Don't Let Legacy CDNs Hold You Back (EMEA)
    Don't Let Legacy CDNs Hold You Back (EMEA)
    Remy Guercio, Product Marketing, Cloudflare Nov 27 2018 10:00 am UTC 22 mins
    In this webinar we'll discuss how moving away from legacy CDNs with bulky XML based configuration files and specifications can improve both development velocity and application performance. We'll be using Cloudflare Workers written with modern JavaScript to reduce large and difficult to decipher configuration files into small, clean and easy to modify files.

    As part of this, we'll briefly cover:
    - How to cleanly create custom routes
    - Easy header modification
    - As a bonus, how to port existing edge side includes
  • Crafting a Next-Generation Enterprise Architecture
    Crafting a Next-Generation Enterprise Architecture
    Johna Till Johnson, CEO & Founder, Nemertes Research Nov 27 2018 4:00 pm UTC 60 mins
    Enterprise Architecture is dead. Long live Enterprise Architecture!

    In the face of DevOps and Agile development methodologies, many enterprises have backed off entirely from the concept of an enterprise architecture. That's a mistake. Enterprise Architecture is needed more urgently than ever before--but not the old, silo-ed, inflexible architecture.

    Next-generation Enterprise Architecture needs to be fast, flexible, and as adaptive as next-generation development methodologies. It needs to encompass the radical changes in infrastructure, from virtualization to cloud- and mobile-first.

    And it's absolutely essential for enterprises who want to align their technology investments with their fast-moving business goals.

    This webinar reviews the fundamentals of enterprise architecture and provides a blueprint for a next-generation EA that encompasses DevOps, cloud, mobility, virtualization, microservices, and more!
  • Enabling Edge to Cloud Computing with Supermicro’s uCPE Intel Select Solution
    Enabling Edge to Cloud Computing with Supermicro’s uCPE Intel Select Solution
    Mory Lin, DIrector, Embedded System Product, Supermicro Nov 27 2018 4:00 pm UTC 60 mins
    Accelerate and transform computing convergence at the edge using software-defined networking (SDN) hardware and infrastructure solutions from Supermicro and Intel. Universal customer premises equipment (uCPE) is an emerging category of network functions virtualization (NVF)-based edge computing and service provisioning systems. This new generation of systems provides network platform suppliers, systems integrators and software vendors the ability to quickly deliver managed services using software-driven and virtual network functions (VNFs). Intel® Select Solutions are verified hardware and software stacks that are optimized for specific software workloads and are designed to be easy to deploy. Join us on this webinar to learn how Supermicro’s verified Intel® Select Solutions for uCPE are enabling customers in their deployments.
  • Securing Your Cloud Networks
    Securing Your Cloud Networks
    Jeremy Snyder, Bill Prout, Tim Sandage, Derek Hanson Nov 27 2018 6:30 pm UTC 60 mins
    Join this live panel discussion with experts at AWS re:Invent 2018 for a deep dive into next-gen endpoint protection and cloud-managed network security.

    Tune into this interactive Q&A session with world renowned IT leaders while they discuss the following:

    - The latest network security demands, threats, and protections
    - What a successful cloud-managed network looks like
    - How to embrace IT initiatives with confidence while keeping your cloud network secure and compliant

    This live panel will be streamed directly from AWS re:Invent in Las Vegas! Join us for live Q&A from the comfort of your desk.

    Moderator:
    Jeremy Snyder, VP Sales & Business Development, DivvyCloud

    Panelists:
    Bill Prout, Lead Security Architect, Public Cloud, Sophos
    Tim Sandage, Sr. Security Partner Strategist, AWS
    Derek Hanson, Sr. Director of Solutions Architecture & Standards, Yubico
  • Multi-Cloud in the Age of Serverless and DevOps
    Multi-Cloud in the Age of Serverless and DevOps
    Eric Wright (Turbonomic), Leonid Igolnik (SignalFx), Simon Jones (PubNub), Arabella Hallawell (NETSCOUT) Nov 27 2018 9:00 pm UTC 60 mins
    Join this live panel discussion with experts at AWS re:Invent 2018 for a closer look at multi-cloud management.

    Tune into this interactive Q&A session with world renowned Cloud, DevOps and IT leaders while they discuss the following:

    - What a successful multi-cloud strategy looks like and how to get started
    - How serverless architectures and DevOps are evolving multi-cloud management
    - How serverless impacts or intersects with microservice architectures and the future of solutions development

    This live panel will be streamed directly from AWS re:Invent in Las Vegas! Join us for live Q&A from the comfort of your desk.

    Panelists:
    Eric Wright, Technology Evangelist, Turbonomic (Moderator)
    Simon Jones, VP Marketing, PubNub
    Leonid Igolnik, Executive VP Engineering, SignalFX
    Arabella Hallawell, VP Corporate Strategy, NETSCOUT
  • Secure and Always-On Connectivity Changes the Game
    Secure and Always-On Connectivity Changes the Game
    Gerri Hinkel, Sr. Marketing Manager for Primary Education Nov 28 2018 2:00 pm UTC 61 mins
    With so many users and devices on the network at any given time, universities and colleges struggle to keep up with the demand for always-on connectivity. What can you do to optimize your network infrastructure to tackle these challenges?

    Join our networking experts for a webinar that will discuss how Aruba solutions:

    * Provide always-on connectivity with features including RF optimization and controller hitless failover
    * Secure the network and identify risk with IoT devices pre-authentication and user and entity behaviour analytics (UEBA)
    * Provide deeper and predictive network insights
    * Address campus wired pain points with a unified wired AND wireless solution

    Speakers
    Michael Dickman, VP of Global PLM Campus Networking
    Peter Lane, Aruba WLAN PLM
    Danny Jump, Aruba ClearPass PLM
    Dan Comfort, Aruba Cloud PLM
  • 3 Ways to Use Your Network as a Force Multiplier for Incident Response
    3 Ways to Use Your Network as a Force Multiplier for Incident Response
    David Monahan, Senior Analyst, EMA and John Matthews, CIO, ExtraHop Nov 28 2018 5:00 pm UTC 60 mins
    The shortage of skilled security professionals won’t end anytime soon, but you can improve your incident response (IR) capabilities now by taking advantage of your network traffic for early detection and more investigation. In this webinar, EMA Managing research Director David Monahan will join ExtraHop CIO John Matthews to explain how you can make your staff more productive by automatically prioritizing your most critical assets, providing context to alerts, and putting full transaction details at the fingertips of analysts during investigations.

    In this webinar, you’ll learn how to:
    - Use your network as a force multiplier for SecOps
    - Equip junior security staff to do more by providing them with greater context and analysis
    - Reduce your attack surface and prioritize response on your most critical assets