Network infrastructure professionals understand that a reliable and secure infrastructure is crucial to enabling business execution. Join the network infrastructure community to interact with thousands of IT professionals. Browse hundreds of on-demand and live webinars and videos to learn about the latest trends in network computing, SDN, WAN optimization and more.
Abraham Snell, Senior Solutions Architect, Red HatRecorded: Sep 28 202042 mins
Whatever your role in IT, you know managing technology is tough, yet it pales in comparison to managing organization-wide relationships.
In this breakout session, a senior IT analyst of Southern Company, a leading energy company, will share how they're using Red Hat Ansible Tower to reduce OS patching labor hours by approximately 90% and at the same time positively impacting longstanding social divides. He'll discuss:
How, with automation, they forged a path that started the renewal of a large portion of the company’s IT culture.
How these cultural changes are leading to greater synergies, efficiencies, improved relationships, and better quality of life
Sultan Aziz Senior Director, Product Supply Strategy Management Johnson & JohnsonRecorded: Sep 28 202043 mins
This keynote address will highlight IIC member Johnson & Johnson's journey to supply chain excellence. Sultan Aziz Senior Director, Product Supply Strategy Management at Johnson & Johnson will share the company's extensive experience in supply chain associated with pharma, over-the counter medications, and consumer goods and will share their best practices and guidance. Discover how IoT adoption, under the umbrella of the Digital Operating Model, is a critical component & enabler for the overall Supply Chain Innovation Engine.
* Start with customer and business needs & opportunities to DEFINE “What to innovate for” and direct & guide the innovation work to address business needs.
* Gain EXTERNAL INSIGHTS – discover and explore the broad & global innovation “Eco-System” for potential value creation opportunities, that fit the “defined needs”. SCOUT & SCREEN value creation opportunities and prioritize for further evaluation.
* EVALUATE the prioritized solutions, demonstrate & validate in a “Proof of Concept”
* TEST and proof feasibility of the solutions in the “Real World”, and gain understanding of the requirements for enabling factors.
* DEPLOY & SCALE the proven solutions as integrated & sustainable supply chain capabilities.
Amelia Powell, Arshdeep Sawhney, Jamie ItalianoRecorded: Sep 28 202074 mins
Verizon Response Solutions are ready when you are.
We’re committed to help keep first responders ready. Response ready. Because every second counts when you answer the call. Local, state and federal public safety agencies can stay prepared, connected and aware with our emergency response–ready solutions.
We understand public safety needs and work continually to meet them by supporting you with the reliable, secure coverage you deserve. We’re helping build innovative emergency response solutions that could someday run fast and reliably on our 5G Ultra Wideband. With our 5G Ultra Wideband, first responders could potentially help protect and save lives in entirely new ways–and be response ready.
Syed Ahmed, Founder & CEO @SAVORTEX®Recorded: Sep 28 202022 mins
SAVORTEX® is a multi-award winning British IoT hand-hygiene technology company that has over 400 projects deployed internationally to multinational companies such as Gatwick Airport, The Shard, Euro Garages, Wates and RBS to name a few. Covid-19 has brought hand-hygiene to the forefront of global business, a sector forecast to grow from $2.7bn to $36.6bn by 2026. With 1 in 5 people not washing hands and considering that 80 percent of all infections are transmitted by touch, it’s costing employers $225.8 billion annually. During this webinar presentation, Syed Ahmed, Founder and CEO, will highlight the launch of the first Smart hand sanitiser which has the ability to report users who do not sanitise their hands as a hygiene risk and deny access if required, to make buildings safer.
Cali Pitchel Schmidt, Porter Novelli, Vice President Strategic PlanningRecorded: Sep 25 202031 mins
Cali Pitchel Schmidt, Porter Novelli, Vice President Strategic Planning
The internet has fundamentally changed the relationship between brands and consumers. The consumer has access to more information than ever before, and this shift in power has broad implications for the way in which brands talk to the market, especially in times of crisis or reputation risk. There are two non-negotiable rules for incident response—tell the truth and take responsibility. Being prepared (and proactive) is key to successfully navigating an always-on communications culture—in good times and in bad. In this session, we’ll cover how to operationalize the truth across your business before a crisis; the right time to think about reputation management; and how to communicate to your customers and the broader market in the case of an incident.
Ebudo Osime, BlackBerry, Threat Intelligence AnalystRecorded: Sep 25 202055 mins
Part three will examine how a Zero Trust security strategy built on AI-based security technologies could better prepare you to face the modern threat landscape. We will walk through some current, pervasive threats to gain a better understanding of why and how the unique features of AI-driven technologies are better suited to prevent, detect, and respond to them.
John McClurg, CISO, BlackBerry (formerly Cylance)Recorded: Sep 25 202055 mins
In Part two, we’ll discuss strategies for securing remote workers using Zero Trust. As millions of us have grown accustomed to and continue working from home, the delineation between work and home has become increasingly porous. Devices – no matter the environment in which they are situated – must be secure without any performance trade-offs. We will explore how emerging solutions like continuous authentication and unified endpoint security that leverage AI, machine learning, and automation could play a critical role in deploying a robust Zero Trust security framework to secure all devices – anytime, anywhere.
Rich Thompson, VP of Sales Engineering, BlackBerry (formerly Cylance)Recorded: Sep 25 202056 mins
In this first part, we’ll explore the important preliminary questions about whether Zero Trust should be a priority for your organization and provides guidance on defining trusted users and devices, and how to integrate identity and network. It will address how to build a business case for Zero Trust, addressing business drivers such as cloud environments and business continuity needs.
As Companies evolve and navigate through this situation we start to see some distinct phases and thinking emerging for IT. Responds, Reflect and Rethink. In this session VMware will explain how Workspace One can help through IT provide employees with what they need through these phases and what the main things they need to consider now but going forward too.
Pam Cyr - SVP Business and Corporate Development, Tufin and Henry Pea Sales Engineering Director, APAC - TufinRecorded: Sep 25 202063 mins
Watch this panel discussion led by industry leaders, Dr. Juergen Tusch, Head of Telecommunications at Innogy Westenergie GmbH, Reuven Harrison CTO at Tufin, and John Jacobs, VP Global Solutions Architecture at Fortinet.
This expert panel will discuss how the German utility services company, Innogy Westenergie GmbH, protects and simplifies network operations while maintaining mission-critical infrastructure via automation and zero trust architecture.
Panelists will discuss lessons learned on:
• How to enable secure infrastructure changes, and in parallel, reduce Germany’s global energy footprint
• Simplifying network operation via automation to enhance productivity, speed, and accuracy
• Best practices of how to s
Modern websites today interact with third parties to provide enriching features like marketing automation, personalization, analytics, social media, login and payments to name a few. This setup although necessary, creates a broad attack surface for your website and its users.
In this live security briefing, you will learn about:
- Different approaches to defending from client-side script attacks
- Current state of script protection and its gaps
- How these attacks are carried out via a live demo
- How to request and use data from a complimentary page integrity report from Akamai
MEDHOST, Pacific Dental Services and AdventHealthRecorded: Sep 24 202092 mins
According to the Department of Health and Human Services, healthcare data breaches increased by 196% from 2018 to 2019 and are expected to see a double digit increase in 2020. Given its valuable data, connected devices and the need for constant data access to ensure continuity of care, Healthcare organizations have been and will likely always be a prime target for cyberattacks. While awareness around these issues has drastically improved, the threat is still as real as it has ever been
Please join us for a conversation on September 15 as we bring healthcare leaders from MEDHOST , Pacific Dental Services and AdventHealth together to discuss the new realities and challenges facing healthcare IT teams today.
During our dialogue, our panel of industry leaders will dissect cybersecurity topics relevant to today's ever changing environment including securing IOT devices, cloud adoption, Zero Trust, regional site visibility and the effects of COVID-19, work from home and skill shortage within security teams.
Murali Palanisamy, Chief Solutions OfficerRecorded: Sep 24 202043 mins
NetOps and SecOps teams everywhere are striving to perfect an approach to service delivery, that is, both rapid and effective. Automation brings value to organizations by delivering applications faster, simplifying routine tasks, reducing costs and improving business agility. NetOps and SecOps automation also helps tighten industry standards and ensures continued compliance.
The results of automation are compelling for businesses of all sizes, and by taking a careful step-by-step approach, it is easy to apply these solutions to your network, ultimately promoting a more agile data center.
Watch our webinar to learn more about -
- What are NetOps and SecOps automation
- Why automation matters?
- The evolution toward NetOps and SecOps automation
- The step-by-step approach one should take to implement automation
Matt Rotkis, Dell Technologies & Matt Johnson, Davenport GroupRecorded: Sep 24 202041 mins
Digital transformation and cloud computing are not new concepts. Recent global events have put further emphasis on the need to scale applications and IT services in a distributed and automated fashion. As more customers, partners and employees work remotely, there is increased traffic to your applications for flexible remote workforce enablement and this highlights a realization of existing IT limitations.
Organizations have become more a-tune that an all cloud or a cloud first strategy isn’t working like they thought it would. Organizations are repatriating at a record pace and struggling to determine the best strategy to balance the requirements of the business with IT resources.
Join Dell Technologies and Davenport Group as we embark on a journey into the cloud operating model. Learn how to build an organizational strategy that supports better business, customer and employee outcomes.
•What is cloud vs a cloud operating model; is there a difference?
•The “laws” of the cloud
Vaughn Stewart, VP of Technology Alliances- Pure Storage | Jeremiah Stuppy, Solutions Director, Data Center- ePlus TechnologyRecorded: Sep 24 202049 mins
Many enterprises are seeking to optimize scalability, operational simplicity and their hybrid cloud architecture through adopting VMware Cloud Foundation (VCF). VCF provides the next generation of VMware on-prem and focuses on reinventing operations and life-cycle management, enabling hybrid cloud, and streamlined deployment of containers and virtual machines to tenants.
Join ePlus and Vaughn Stewart, VP of Technology Alliances, Pure Storage, to learn how enterprises are modernizing their VMware environments with VCF on FlashStack and gaining advantages like….
- Enable flexibility and infrastructure consolidation supporting VCF workload domains
- Ability to deploy VCF on Fibre Channel, iSCSI or NVMe-oF
- Gain the agility to scale the infrastructure on demand without data re-balancing
- Gain 99.9999+% availability, advanced business continuance and backup by running VMware on Pure Storage
- Reduce the cost of VCF infrastructure
- Gain up to 10X operational & management simplicity over the direct attached storage
ePlus and Pure Storage have a unique and powerful solution for modernizing your VMware environment with VMware Cloud Foundation on FlashStack; from automated deployment on existing fabrics to optimized operations, scaling and data protection.
-Jeremiah Stuppy, Solutions Director, Data Center- ePlus Technology
-Vaughn Stewart, VP of Technology Alliances- Pure Storage
Scott Raynovich and Atif KhanRecorded: Sep 24 202053 mins
Multi-cloud is one of the most significant trends influencing enterprises in the recent years. Fueled by the application migrations from on-premise data centers to one or multiple public cloud and SaaS offerings, multi-cloud has quickly gained ground and has proven to be one of the most disruptive forces behind the Enterprise IT.
Join us for an interactive discussion with Scott Raynovich, Founder and Chief Technology Analyst of Futuriom and Atif Khan, Co-Founder and CTO of Alkira. You will hear the insights from the recently published Futuriom “The Future of Multi-Cloud Networking” report and learn how Alkira is reinventing networking for the cloud era by allowing enterprises to have networks that are consumed as-a-service, built for the cloud and behave like the cloud.
Sam McLane, CTO, Arctic Wolf; Charles Johnson and Mark Holdsworth, AccudataRecorded: Sep 24 202030 mins
Managed Detection and Response (MDR) providers offer a wide range of services. Some may be right for your business, but some may not. How do you choose the right MDR provider?
Accudata’s Solution Architect team provides design and architecture services for many different solutions, from data center migrations to deploying contact centers. One solution we’ve seen across the board that’s been attractive to our customers is MDR. A few weeks ago, we reviewed what is compelling in this space. In this webinar, we’ll showcase one of our favorites, Arctic Wolf.
Join Accudata’s Cybersecurity Practice Manager Charles Johnson and Managed Services Practice Manager Mark Holdsworth as they sit down and talk with Arctic Wolf CTO Sam McLane on Thursday, September 24, at noon. They’ll discuss Arctic Wolf, how they’re different, what they do well, and what they’re working on next.
Jaspreet Bhatia, Product Manager at VeloCloud, now part of VMwareRecorded: Sep 24 202049 mins
The increasing adoption of cloud services makes traditional backhauling—along with its centralized security stack—obsolete. Organizations today rely heavily on cloud-delivered applications to effectively serve their employees and customers across locations beyond their enterprise infrastructure. However, the quality of experience and application performance for the end user primarily depend on the quality of the network connecting users to applications deployed on- or off-cloud.
Further, with so many options for security, mid-mile, analytics, compute, IaaS, and network exchanges, SD-WAN needs to be intelligent to selectively steer traffic to these clouds based on each business use case.
This webinar describes the comprehensive set of capabilities and common features that VMware SD-WAN™ by VeloCloud® offers to drive your multicloud strategy. Learn how VMware SD-WAN delivers optimal performance for applications no matter where they are deployed, without compromising payload security.
Organizations are struggling to find the right solutions to manage the rapid growth of unstructured data. Whether you are storing file, object, or streaming data - Dell Technologies has a solution for you. In this webinar, we will cover the latest innovations including the scale-out NAS PowerScale Family, built for simplicity at any scale to handle any data, anywhere with intelligent insights. We will also highlight the benefits of ECS, our cloud scale, geo-distributed object storage. And for customers who want to capture real-time insights, we will cover the Streaming Data Platform, a software engine that ingests and analyzes data in its natural form. Don't miss out on this action-packed session.
What’s in it for you?
▪ Hear firsthand from an expert in Dell EMC’s Unstructured Data Storage Offerings
▪ Find out where PowerScale, ECS, and the Streaming Data Platform can fit into your environment
▪ Understand how these solutions, combined with DataIQ, can help you unlock the full potential of your data.
Principal Cloud Security Consultant, Jake Necessary, CloudreachRecorded: Sep 24 202020 mins
Discover the importance of securing your cloud journey as Cloudreach Principal Cloud Security Consultant, Jake Necessary discusses establishing a cloud provider provenance and criteria for trust, security and critical thinking during your cloud journey, and building a pursuit squad and purpose built teams for the cloud journey using the Six Thinking Hats model.
Dave Schmitt and Sean Song Jiang, Cisco IoTRecorded: Sep 24 202052 mins
The last 5 years have seen a marked increase in digitization of the electric grid, as well as attacks against it. While the implementation of compliance measures has brought attention to the problem, operators continue to face scalability challenges for their cybersecurity programs. Join this webinar and learn:
1.How to leverage your existing network to gain the necessary visibility,
2.What you can do to reduce your risk profile, and
3.How you can build a modern security architecture that is truly scalable for your organizations
Sander Vinberg Threat Research Evangelist, F5 | Byron McNaught Sr. Technical Marketing Manager, F5 | Ray Pompon, F5Recorded: Sep 24 202062 mins
While gathering data for the 2019 Application Protection Report, F5 Labs focused on the theme of how trends in application architecture are driving risk. The results were hugely impactful—the attack techniques that bad actors employ have not only remained viable, but are still quite profitable.
In our upcoming webinar, F5 Labs researchers are diving into what we learned from the 2019 report and what actions organizations need to take to stay protected.
In this webinar you will learn:
- What the growing correlation means between sector and breach modes
- How and why attackers are targeting the retail sector using an injection technique known as formjacking
- More about credential abuse and phishing and the causes of the growing number of API breaches
- How to reap the benefits of the emerging architectures without increasing risk
Dan Fein, Director, Email Security Products, Darktrace; Brandon Dunlap, ModeratorRecorded: Sep 24 202055 mins
The future of work remains unpredictable and uncertain. More than ever before, business leaders need to remain confident that their operations can continue securely. However, 94% of cyber-threats still originate in the inbox, and ‘Impersonation attacks’ that expertly mimic the writing style of trusted contacts and colleagues are on the rise. Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. . Join Darktrace and (ISC)² on September 24, 2020, at 1:00 p.m. Eastern for expert insight into how cyber AI is the only tool that can keep pace with the rapidly evolving threat landscape facing organization’s inboxes every day. The webcast will examine:
· Exploration of the most recent email threat trends and statistics
· Overview of Darktrace’s latest developments to secure the email environments of the dynamic workforce
· Case studies and use cases from industry leading customers
Ravi Busi - Enterprise Solutions Architect FortinetSep 29 20201:00 amUTC51 mins
You're invited to a demonstration of a live environment incorporating Secure SD-WAN and a Cloud Security Services Hub Architecture in AWS and Azure. We’ll showcase how SD-WAN at the edge can also extend to the Public Cloud to provide cloud onramp, native cloud integrations and leverage multiple paths to access cloud-hosted services. You’ll see how cloud workloads benefit from the security posture provided by Fortinet and how high-availability can be implemented to minimize downtime.
John Rakowski; VP of Strategy, LogicMonitorSep 29 20203:00 amUTC50 mins
A recent study suggests that 64% of IT executives believe transformation trends come at the cost of continuous availability. These trends usually start with, and are the primary drivers of, cloud migration.
There are inevitable risks and challenges in adopting new technology, and migrating to any cloud platform – whether public or private – is not easy. Tactical decisions need to be made between lift-and-shift or re-architecting services for the cloud – and making the right decisions has major impact on whether cost and agility benefits will be realized.
Join John Rakowski, former Forrester analyst and VP of Strategy at LogicMonitor, as he discusses tactics to mitigate cloud migration risk so you can plan, move, and optimize with confidence.
In this webinar, you’ll learn:
- Factors that introduce risk to a migration and how to minimize their impact
- Common migration challenges that can be avoided
- How to use monitoring data to better guarantee success
Benjamin Nawrath, Fachbereichsleiter IT Systemtechnik und CISO, Energie SüdbayernSep 29 20207:00 amUTC46 mins
Deutsche KRITIS-Betreiber stehen immer wieder im Visier der Hacker. Cyber-Kriminelle, Hacker und staatlich finanzierte Akteure haben heute die Motive und die Fähigkeiten, erfolgreich anzugreifen, um sensible betriebliche und Kundendaten zu stehlen, Unternehmen zu erpressen oder kritische Systeme zu stören oder sogar zu zerstören.
Energie Südbayern (ESB) ist ein Energieversorger und -dienstleister, der Erdgas für rund 160.000 Haushalte in Süddeutschland bereit stellt. Als größter regionaler Anbieter beschäftigt ESB ungefähr 370 Angestellte.
Benjamin Nawrath, Fachbereichsleiter IT Systemtechnik und CISO bei ESB, ist dafür verantwortlich, die Verfügbarkeit, Integrität, Authentizität und Vertraulichkeit der komplexen IT-Infrastruktur (einschließlich 2.000 IP-Adressen) zu gewährleisten.
Seit knappen drei Jahren hat die ESB die Kombination aus InsightVM und InsightIDR, den Rapid7-Lösungen für Schwachstellen-Management und Incident Detection and Response, im Einsatz. In dieser Zeit konnte Herr Nawrath nachweislich die Reaktionszeiten auf Incidents um 60% reduzieren, das Bedrohungsniveau durch Schwachstellen senken, und die Einhaltung des deutschen IT-Sicherheitsgesetzes (ITSG) sicherstellen.
In diesem Webcast berichtet Benjamin Nawrath über seine Erfahrungen mit den Rapid7-Produkten und beantwortet Fragen wie:
Warum hat er sich für Rapid7 entschieden?
Wie geht die ESB mit dem Thema Cloud um?
Wie lief die Implementierung, wie groß war der damit verbundene Aufwand?
Wie lange hat es gedauert, bis erste Ergebnisse sichtbar waren?
Wie sieht die tägliche Arbeit mit den Lösungen aus?
Pierrick Martel, Product Marketing ManagerSep 29 20208:00 amUTC20 mins
Welcome to the age of modern and holistic IT Monitoring: Smart Monitoring.
IT architectures are rapidly evolving and so should the way they’re being managed and monitored. The time has come to accelerate the replacement of old and expensive solutions that don't keep up.
This 30-minute webinar introduces Centreon, a unique monitoring platform, highlighting: IT Edition. It enables instant, enterprise-grade, cloud-to-edge monitoring for all.
During this webinar you will learn:
- How the use of Centreon enlarges your monitoring from the Cloud to the Edge
- How Automation will make your monitoring implementation quick and successful
- How a modern user experience will increase your productivity and reduce Mean Time To Repair
- How you can benefit from Centreon IT Edition free of charge
Dominik Friedel, NTT; Frank Miller, Schneider Electric; Gerd Koenig, HUBER+SUHNER; Amir Shehadeh, ioki - a DB companySep 29 20208:00 amUTC60 mins
Smart Building, Smart Mobility, Smart Grid - Cities and regions are getting connected and intelligent. "Smart City" established itself as the guiding principle for urban development projects. Technologies like Cloud, Artificial Intelligence, Internet of Things, Blockchain tend to be the essential building blocks for different smart city concepts and edge data centers will be their foundation. Data is forming the core, that is used to make citizens' lives easier, more efficient and safe.
• How can these technologies get implemented and applied in the best way?
• How will data be handled and leveraged in this context?
• How will appropriate solutions look like in the future?
The NTT Technology Experience Lab have brought together several highly experienced experts from different fields to give you valuable insights and answer your questions about this topic.
• Dominik Friedel & Christopher Stumm, Business Development Manager, NTT Ltd.
• Frank Miller, Senior Key Account Manager, Schneider Electric
• Gerd Koenig, Account Manager bei HUBER+SUHNER
• Amir Shehadeh, International Business Development Manager, ioki - a DB company
Experts from BT - Tristan Morgan, Steve Benton, John Ashdown, and Aaron LloydSep 29 20209:00 amUTC30 mins
In a rapidly shifting threat landscape, understanding adversary behavior and the biggest threats to your business is a constant challenge. The increasing number of threat actors, the loss of the network perimeter with cloud and a rise in remote working and connected devices to the network, all increase the number and types of threats you are exposed to.
Join us in the second webinar of our security insights and trends series as we discuss how best to take effective action to prevent incidents occurring in the first place.
Nompumelelo Mokou and Jacques Schalkwyk from Dimension DataSep 29 20209:30 amUTC60 mins
Intelligent Customer Experience Webinar
This webinar uncovers the power that data analytics and automation has to help you manage your workforce, both from remote locations and from the office. Our solution will empower you with insights on employee behavioural dynamics and their operational productivity levels; facilitating a deep understanding of how to support your employees for maximum productivity and business continuity.
Nompumelelo Mokou- Dimension Data
Jacques Schalkwyk - Dimension Data
Karthik Kannan, Sr. Product ManagerSep 29 202010:00 amUTC53 mins
The digital transformation is affecting enterprise networks driving a heightened need for infrastructure agility. It requires a rethinking of traditional approaches and focuses on business outcomes.
Watch our on-demand webinar the webinar to learn more about:
- The various network infrastructure management challenges posed by the digital transformation
- How to achieve network infrastructure agility
- The advantages of Network Automation
Yishay Yovel, Chief Marketing Officer at Cato NetworksSep 29 202011:00 amUTC52 mins
It’s no secret that enterprises are looking beyond MPLS for their new WANs. For some, it’s the rigidity and high costs of MPLS services; for others, it’s MPLS’s complexity and incompatibility with the cloud. But how exactly will migrating to SD-WAN help you overcome MPLS’s limitations?
Find out on our next webinar, as Yishay Yovel, Chief Marketing Officer at Cato Networks shares the stories of businesses from around the globe who made the transition to SD-WAN.
Join us to hear:
- How DSM Pharmaceuticals and Fisher & Company solve global latency issues without paying through the nose.
- The ways UMHS and Pet Lovers Center, with its 100+ site Cato implementation, deliver direct, secure Internet access without deploying a heap of branch office security appliances.
- What Brady PLC and Adroll did to optimize cloud access at the branch and on the road.
- How companies reduce costs and optimize global voice and UCaaS delivery without relinquishing the control of MPLS.
Thomas Sterber | Cisco MerakiSep 29 202012:00 pmUTC26 mins
In den letzten 3 Jahren hat Meraki in die eigene API-Fähigkeit investiert. Mittlerweile werden täglich durchschnittlich über 30 Millionen API-Aufrufe auf dem Meraki Dashboard getätigt, was etwa 20% aller unserer Kunden ausmacht.
IT-Teams nutzen unsere Cloud-APIs für eine Vielzahl von Anwendungsfällen wie Netzwerkkonfiguration, Überwachung, Reporting und Automatisierung. Lernen Sie in unserem Webcast mehr darüber!
As part of a themed week on the viewer experience, this webinar will focus specifically on Android TV, examining the vendor environment, including deployment options and key vendor partnerships.
In considering the route to launching Android TV services, it will explore:
-Video delivery and playback, including adaptive bitrate streaming
-Hardware: Smart TVs and set top boxes
-The viewer experience: User interface and quality of experience
-Content discovery: Personalisation, apps and voice search
-Understanding audiences: Managing and analysing viewer data
-Monetisation platforms and commerce opportunities
Akhilesh Dhawan, Director, Product Marketing and Florin Lazurca, Sr. Technical Marketing Manager, Secuirty, of CitrixSep 29 20201:00 pmUTC49 mins
In these trying times of catastrophic business disruptions, IT teams around the world have heroically implemented remote access for millions of displaced employees. But the rules of engagement continue to change as workers’ personal and corporate devices intermingle, introducing an exponentially larger attack surface. Have you developed a long-term strategy for secure remote access?
Using a zero trust approach to deploy a secure digital workspace mitigates risk, providing access policies for the time of authentication and continuing protection while the user is working. Security remains in place across all types of applications in the cloud, on premises, or delivered through SaaS.
Join this webinar as Akhilesh Dhawan, Director, Product Marketing and Florin Lazurca, Sr. Technical Marketing Manager, Secuirty, of Citrix, discuss:
- Why fine tuning with security must be part of any savvy long-term strategy
- How to implement a single, secure point of access for corporate resources
- Why VPN solutions may not be the best answer for your workers or your enterprise
- How Citrix defines “zero trust” and why it’s critical for remote working and BYOD scenarios.
- Register now to learn how to add contextual and continuous security to your remote access strategy.
Seamus McLoughlin- Senior Lastpass Solutions Consultants, Natasha Griffin- Marketing Manager for IAM at LogMeInSep 29 20201:00 pmUTC40 mins
Make Remote Work Simple and Secure:
The way in which we work has metamorphized in the past few months. The majority of work has transitioned to remote spaces and online access. Keeping our employees safe is more important than ever. In this webinar we look at how you can successfully roll out the world's most popular password manager across your workforce securing your employees from data breaches and identity theft.
We review deployment tips and strategies to ensure that your remote workforce is able to access the applications and sites they need while remaining secure.
In this session, we cover:
-Automated user creation and management
-Remote software installation
-Recommended day one policies
-Resource tool kits available to raise awareness among your workforce
Riley Bruce, Technical Product Manager at Code42Sep 29 20203:00 pmUTC24 mins
66% of data breaches involve an insider. 73% go undetected for months. Detect & respond faster to the data risks looming inside. Why is insider threat on the rise? In spite of heavy investments into DLP or UEBA solutions, the problem is far from solved. Let Code42 show you how signal, speed and simplicity can enable you to solve insider threat in 3 clicks. No pitch, no introduction, just a technical product tour geared around you!
• UNIQUE DATA-CENTRIC APPROACH THAT PROVIDES A HOLISTIC SOLUTION TO INSIDER THREAT
• GAIN VISIBILITY INTO DATA RISKS THAT LIVE ACROSS ENDPOINTS & CLOUD
• TAKE ACTION AND SPEED YOUR OVERALL INCIDENT RESPONSE PROCESS
Charuhas Ghatge, Sr. Portfolio Marketing Manager, Nuage Networks from NokiaSep 29 20203:00 pmUTC60 mins
SD-WAN, as name states, software-defined wide-area networks use software to control the connectivity, management and services between data centers and remote branches or cloud instances. Like its bigger technology brother, software-defined networking, SD-WAN decouples the control plane from the data plane.
We also discuss the need, benefits, use cases of SD-WAN and then look at Nuage Networks SD-WAN 2.0, architecture and case studies.
Cricket Liu and SriKrupa SrivatsanSep 29 20203:00 pmUTC60 mins
Networks today are more and more distributed. Applications and data no longer only reside in a company’s centralized datacenter or cloud infrastructure. Data now gets generated and consumed outside of centralized datacenters and SaaS adoption has skyrocketed. This is where edge computing and related network and security services (like DDI and DNS security) come into the picture.
Join us for our upcoming “Coffee Chat with Cricket” to discuss at a high level what the edge is, what’s driving its adoption and how cloud hosted/managed networking and security stacks help provide agility, scale, local survivability and security for the edge. As always, we will also spend a considerable about of time answering questions from the audience.
Robert Lancaster, Apstra Network Architecture Guru and Alan Fagan, EPS Global IT industry expertSep 29 20203:00 pmUTC37 mins
Imagine you could build a cost-effective data center network that was half the price to deploy and even cheaper to manage. A network that was more agile than your present proprietary one, and easier to automate, scale, secure, provision and upgrade.
Join us for Data Center Solutions: Open Networks, a co-sponsored webinar where EPS Global and Apstra will walk you through how you can make automation a reality.
This 30 minute webinar with time for Q&A is being presented by Robert Lancaster (Apstra): guru of Network architecture, Software Defined WAN and Security; and Alan Fagan (EPS Global), an IT industry expert with over 20 years selling the infrastructure that lives in the data center.
Juergen Knecht, Usman Sindhu, Tam Ayers, and Kristen HoytSep 29 20203:00 pmUTC55 mins
Using intelligence and automation can help you ensure resilience for your critical business operations—supporting both your customers and workforce. Join us to hear the real-world benefits Ferguson Enterprises has seen on its digital transformation journey.
Ferguson is the largest distributor of plumbing supplies in the U.S. By modernizing, this innovative company helped create efficient IT Operations that’s responsive to both customers’ and employees’ needs. Learn how in our webinar on:
-Scaling IT operations to meet the needs of a dynamic business environment
-Laying the foundation of a modern incident and change management
-Tying service management to operations gaining complete visibility of infrastructure changes
-Uplifting operational intelligence with modern event management
Stephane Hauradou, Product MarketingSep 29 20203:00 pmUTC60 mins
As storage systems embrace NVMe and all-flash, the need for scalability coupled with constantly evolving application requirements prompt SoC architects to look for ways to differentiate and future-proof their designs.
In this presentation we look at current storage architectures and propose an innovative way to design next-generation storage SoCs centered around the use of embedded PCIe switching.
We then introduce PLDA’s PCIe switch IP along with some real-world use cases, and explore the various IP features and capabilities that enable differentiation and future-proofing of SoCs in storage applications and beyond.
Ben Grissinger, Cloud SMESep 29 20203:00 pmUTC60 mins
Securing your cloud environment should not mean sacrificing the speed and agility of cloud application development and operations.
In this webinar, learn how security teams using SecureCloud can accelerate a company’s digital transformation and move to the cloud by giving security, devops, and cloud operations teams a cloud-native automation solution for security policy. Topics covered:
• Why traditional IT security processes and approaches don’t work for cloud-native
• Align devops, security, and cloud-ops to create a security-first approach to cloud security
• Automate security in a CI/CD process
• Best practices for getting started
Brad Winston, HP Senior Security Specialist; Glenn Pitchford, Spicehead and PermiaCare IT DirectorSep 29 20204:00 pmUTC66 mins
HP Senior Security specialist Brad Winston, along with Spicehead and PermiaCare IT Director Glenn Pitchford, discuss ways to mitigate users and prevent security attacks at the endpoint level. Attendees learned about HP security features, new predictions about data breaches/ransomware attacks, and much more.
Mike Shishman | VP Americas, XalientSep 29 20204:00 pmUTC57 mins
Join us for our upcoming live webinar: Building a business case for SD-WAN.
In the webinar we will cover:
- Common misconceptions associated with SD-WAN
- The business case applied to SD-WAN use cases and a real-life case study
- Highlighting the benefits of SD-WAN and tying these to your organisation's objectives
This webinar will be hosted by Mike Shishman, Xalient's VP of Americas, with presenters Tom Grace, Pre Sales Manager and Chris Conerby, Technical Consultant.
Xalient has a proven track record in helping enterprises develop successful SD-WAN business cases, with consideration to wider business objectives as well as minimising disruption in transitioning to the new SD-WAN environment.
Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, Managing Director at Cloud Security ZeroSep 29 20204:00 pmUTC59 mins
The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and technology leaders that cling to legacy architectures put enterprises at risk. Secure Cloud Transformation is a practical cyber security approach that prioritises security and user performance to align with today’s way of working.
The session will be hosted by Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, who will share experiences from his time at a manufacturing and transportation services company with 12,000 users in over 100 locations and 70 countries
They will discuss how enterprise IT leaders can:
• Improve customer digital experience while safeguarding sensitive information
• Increase user performance while minimising risk
• Drive revenue and scalability while controlling costs
Are you ready for a secure cloud transformation? Sign up for this webinar today!