Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Kubernetes & Zero Trust Security: Supporting a CARTA with Anomaly Detection
    Kubernetes & Zero Trust Security: Supporting a CARTA with Anomaly Detection
    Christopher Liljenstolpe, CTO, Solutions, Tigera Recorded: Mar 20 2019 75 mins
    Learn how Anomaly Detection supports, what Gartner has termed, a continuous adaptive risk and trust assessment (CARTA) when building a CaaS platform using Kubernetes. Anomaly Detection expands the zero trust network security model and continuously assess the application and network risk that enables adaptive policy adjustments. Anomaly Detection identifies outliers in Kubernetes clusters by building profiles of typical workloads and components to know when they start to deviate from the norm. It also manages network risk by continuously monitoring for activities such as reconnaissance scan, service connections anomaly, service bytes anomaly, and pod outlier activity detection.
  • Failsafe SD-WANs
    Failsafe SD-WANs
    Andrew Gottlieb, VP, SD-WAN Solutions, Oracle Communications Recorded: Mar 20 2019 25 mins
    A failsafe SD-WAN is an SD-WAN that delivers both MPLS-class high availability and high QoE predictable application performance for both TCP-based apps and real-time apps like VoIP and video conferencing. In this presentation, we will discuss Talari’s approach to fail-safe SD-WAN levering the Mode Core Private Global Network to deliver high-availability, high-performance, high-security, cost-effective cloud/SaaS, DC, and branch access.
  • Rethinking Enterprise Security Models
    Rethinking Enterprise Security Models
    Lee Fisher, Head of Security Business EMEA, Juniper Networks Recorded: Mar 20 2019 22 mins
    No matter where we look, everyday there is news of another hack, another data breach and another headache for security teams to deal with. Is it time to look at the security models we use and ask, if they are not effective today, how are they expected to be suitable going forwards? What models should our businesses adopt?

    Lee Fisher, Head of Security Business EMEA, at Juniper Networks discusses how security has matured, and proposes a new approach to protect our future.
  • Enterprise CDN Best Practices: A Technical Deep Dive
    Enterprise CDN Best Practices: A Technical Deep Dive
    Armand Sultantono, Technical Solutions Architect at NGINX Recorded: Mar 20 2019 32 mins
    If you deliver content over the internet to a global audience and care about performance, you're likely using a content delivery network. CDN is a popular use case for advertising, media, online gaming, commerce, mobile, healthcare, even government and education because users can access web pages and apps much faster. What you may not know is most major CDN providers use NGINX under the hood. Commercial CDN services can be expensive to scale, limited in fine-grain control and customization, and offer fewer performance optimizations that you would want. If your enterprise CDN bill is astronomically high, and you need more control and customizations, it will be more cost effective to build your own.

    Watch this webinar to learn how a CDN works, when it makes sense to build your own CDN, and jump into a technical deep dive on how a CDN solution performs with NGINX Plus, with performance comparisons and a live demo.
  • Expert Q&A 5 Steps to Implementing Security Automation
    Expert Q&A 5 Steps to Implementing Security Automation
    Joe Schreiber, Technical Director, Business Development, Tufin & Karen Crowley, Sr. Product Marketing Manager, Tufin Recorded: Mar 20 2019 46 mins
    Join automation expert Joe Schreiber on March 20th as he shares his experiences automating himself out of a job (in a good way), and discusses where to start and how to avoid risk.

    Joe will present his five steps and answer questions from the audience on how to:

    Collaborate with the rest of your team on automation
    Organize your multi-vendor toolbox and use APIs to ensure success
    Empower your teams to write reusable, value-driven code
    Leverage modern applications in containers, microservices, and serverless environments
    Got questions? Send them to Joe ahead of time to be included in the discussion.
  • Monitoring your Hybrid Operations in vRealize
    Monitoring your Hybrid Operations in vRealize
    Saurabh Chandratre & Peter Haagenson Recorded: Mar 20 2019 33 mins
    Join our Pivotal Cloud Foundry experts to dive into PCF architecture to understand how full-stack visibility (FSV) can ensure better reliability for your apps deployed with PCF on HCI or in AWS. Learn how to discover and monitor the interdependencies between PCF components, understanding and correcting problems -- even those that are managed automatically by PCF with visibility into the relationships between the components, along with their behavior & state.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Recorded: Mar 20 2019 85 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the Verizon Insider Threat Report and the current cybersecurity threat landscape.

    We'll cover:
    •The time it takes to discover a breach after the first action
    •5 insider threat types identified by our caseload
    •Top 3 insider threat motivations
    •Top industries suffering sensitive data breaches

    Our Verizon Threat Research Advisory Center presenters will be:
    •John Grim, Senior Manager, Investigative Response - America
    •Domingo Jesus Alvarez-Fernandez, Senior Dark Web Hunter, Threat Intelligence
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Panel: Network Security and Compliance best practices for Financial Institutions
    Panel: Network Security and Compliance best practices for Financial Institutions
    Asher Benbenisty, Director Product Marketing; Yitzy Tannenbaum, Product Marketing Manager (AlgoSec) Recorded: Mar 20 2019 24 mins
    Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.

    There’s a better way to manage your network security!

    Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.

    Topics include:

    •How to overcome security management complexities with automation
    •How to pass compliance audits in the face of demanding regulations
    •Key industry metrics that compare security environments within and beyond the finance industry
    •Real financial customers case studies
  • Webinar: Un Piano Applicabile Per Segmentare la Tua Rete
    Webinar: Un Piano Applicabile Per Segmentare la Tua Rete
    Flavio Di Cosmo, Pre-Sales Engineer SEEMEA Recorded: Mar 20 2019 28 mins
    Una rete segmentata rende operativa le policy di sicurezza, consente uno stato di compliance continua con il minimo sforzo e offre opzioni di mitigazione per gli attacchi informatici. Ma la segmentazione della rete non è un compito facile!

    Unisciti agli esperti di Tufin il 20 Marzo 14:30 mentre condividono consigli utili per la segmentazione della rete, tra cui:

    •Insidie da evitare durante la creazione di una strategia di
    segmentazione
    •Framework per la segmentazione
    •Linee guida per l'applicazione e il mantenimento di una rete
    segmentata
  • Reducing Operational Costs with Better Network Management in the Cloud
    Reducing Operational Costs with Better Network Management in the Cloud
    Guido Kragten, Sales Enablement Cloud Platforms, EMEA Recorded: Mar 20 2019 63 mins
    Whether you’re expanding a network to support new initiatives, navigating through growing security challenges, or planning a refresh of older technology; keeping costs down and saving time for your IT Team is key.

    Join our webinar and learn how Aruba delivers the industry’s most robust and reliable networking solutions for small and midsize businesses - help reduce planning, deployment and operational costs with features such as:

    •Zero-Touch Provisioning
    •Comprehensive Alerting
    •Integrated User Analytics
    •Scheduled and On-Demand Reporting
    •Automated Firmware Updates
    •All from a single interface
  • Séminaire en ligne: Plan d'action pour la segmentation de votre réseau
    Séminaire en ligne: Plan d'action pour la segmentation de votre réseau
    Nicolas Liard, Pre Sales Engineer France, Benelux Recorded: Mar 20 2019 49 mins
    Un réseau segmenté opérationnalise votre politique de sécurité, permet un état de conformité continue avec un minimum d'effort et fournit des options d'atténuation des cyberattaques. Mais la segmentation du réseau n’est pas une tâche facile !

    Rejoignez les experts de Tufin pour partager des conseils pratiques sur la segmentation du réseau, notamment:

    • Les pièges à éviter lors de la création d’une stratégie de segmentation
    • Cadre de segmentation
    • Lignes directrices pour appliquer et maintenir un réseau segmenté
  • 2019 年インターネットセキュリティ脅威レポート(ISTR): 新しい脅威の状況
    2019 年インターネットセキュリティ脅威レポート(ISTR): 新しい脅威の状況
    滝口 博昭, CISSP, マネージドセキュリティサービス 日本統括, 株式会社シマンテック Recorded: Mar 20 2019 60 mins
    ランサムウェアが減少の兆候を見せる中で、それに代わり新たな攻撃方法が出現してきています。ステルス性の高い手法により、攻撃者は気づかれないまま行動を起こすことが可能になり、企業のリスクが高まっています

    このウェビナーでは、このような傾向と、以下の内容について説明します。

    • クリプトジャッキングとランサムウェアが減少の兆候を見せる中、2018 年にはフォームジャッキングが急増しました。一方で、企業は引き続き標的型ランサムウェアの問題に直面しています。

    • ツールの現地調達およびサプライチェーン攻撃が新しい脅威の状況を代表するものになりました。

    • クラウドユーザーは、クラウドストレージからのデータ漏えいや下位チップの脆弱性によって複数の面で課題に直面しています

    • 標的型攻撃グループは攻撃活動の対象に対する関心を高めており、破壊的なマルウェアを採用するグループが増加しています。

    今すぐ登録し、是非ご参加ください。
  • SD-WAN Migration Strategies for Varying Network Architectures
    SD-WAN Migration Strategies for Varying Network Architectures
    Jaspreet Bhatia, Senior Technical Product Manager at VeloCloud, now part of VMware Recorded: Mar 20 2019 58 mins
    In this webinar, we go a level deeper into SD-WAN Migration by focusing on its architecture and its ability to adapt to the varied network requirements of global enterprises. Topics will also include best practices and recommendations for a successful SD-WAN transformation for both regional and worldwide deployments.
  • To SIEM, Not to SIEM? Find Out Your Options
    To SIEM, Not to SIEM? Find Out Your Options
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Mar 19 2019 42 mins
    A security information and event management (SIEM) platform has been touted as the cornerstone of cybersecurity. But, can such a stand-alone platform address your IT security challenges and compliance reporting needs? With the growing complexity of SIEM solutions and a shortage of people with cybersecurity skills to manage them, many organizations are looking for alternatives to building their own in-house SIEM and staffing a security operations center (SOC).

    In this webinar, security expert, Narayan Makaram, Sr. Director of Product Marketing at Arctic Wolf Networks, will examine the following:

    - Business drivers for a SIEM
    - What is/is-not included in a SIEM
    - SIEM deployment options
    - Outsourcing considerations – MSSP vs MDR

    Save your seat now to learn more!
  • Cloud Security: Thinking Beyond the Perimeter
    Cloud Security: Thinking Beyond the Perimeter
    Robert Arandjelovic, Director Product Marketing, Symantec and Featuring Guest Speaker, Heidi Shey, Senior Analyst, Forrester Recorded: Mar 19 2019 55 mins
    Traditional perimeters vanish as organizations move to the cloud and employees work in a world of both sanctioned and unsanctioned applications. Companies must rethink their approach to securing data in this new environment.

    Join us on this webinar with Robert Arandjelovic from Symantec and guest speaker Heidi Shey from Forrester Research as they discuss;

    - The inherent security challenges of cloud

    - Security strategies and imperatives

    - How organizations are approaching and need to approach cloud security today.

    Please Join Us, Register Today
  • Web Application Security for  Continuous Delivery Pipelines
    Web Application Security for Continuous Delivery Pipelines
    Christian Treutler Recorded: Mar 19 2019 59 mins
    Learn how to secure your modern web applications for continuous delivery, and how to solve the challenges proposed by integrating a modern web application firewall (WAF).
  • If Cloud is the Problem DataOps is the Solution
    If Cloud is the Problem DataOps is the Solution
    Kirit Basu - VP of Product - StreamSets Recorded: Mar 19 2019 44 mins
    According to research firm Gartner, at least 75% of large and global organizations will implement a multicloud-capable hybrid integration platform by 2021. Join StreamSets Head of Product Management, Kirit Basu, and Head of Product Marketing, Clarke Patterson as they discuss how StreamSets customers are taking a DataOps approach to hybrid-cloud integration.

    We explore how Fortune 500 customers are using StreamSets to streamline Apache Kafka and Data Lake projects using principles adopted from DevOps.

    During this webinar, we will discuss:

    -Pitfalls to avoid for any hybrid-cloud project
    -Key requirements to ensure continuous movement of data across any cloud
    -How StreamSets customers are using the platform to drive real value from DataOps
  • Network Automation: Getting from Automatable to Automated
    Network Automation: Getting from Automatable to Automated
    James Kelly Recorded: Mar 19 2019 50 mins
    Technology is constantly moving on, and business is constantly moving on with it. Automation is the key to keeping your enterprise on pace, not only with disruptive innovations, but with emerging security threats to your infrastructure, too.

    Now in the multicloud era, automation is an imperative to drive operational reliability, security and speed without tradeoffs.

    In this webinar, you’ll learn:

    -Why network automation is not the same as automated networks
    -How network reliability engineering can enable operational simplicity
    -The five-step journey towards automated NetOps
  • The Email Security Goal: ONE Single Solution
    The Email Security Goal: ONE Single Solution
    Ken Bagnall, Vice President, Email Security, FireEye, moderated by Christopher Porter, Chief Intelligence Strategist, FireEye Recorded: Mar 19 2019 50 mins
    FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape. In this webinar:

    -Get a brief overview on the latest email threat trends
    -Learn about the must haves for email security solutions and the benefits of having one provider
    -Find out about additional email security capabilities that can help you have an adaptable solution
    -Hear about a use case where FireEye helped detect and block impersonation techniques that the incumbent solution missed
  • 5G READY: SECURE AND MODERNIZE YOUR 4G/LTE NETWORK
    5G READY: SECURE AND MODERNIZE YOUR 4G/LTE NETWORK
    Paul Nicholson, Sr. Director of Product Marketing, and Yasir Liaqatullah, VP of Product Management at A10 Networks Recorded: Mar 19 2019 56 mins
    Most mobile operators are moving ahead with their 5G plans, some tentatively and others aggressively. Those who don’t act, face the very real prospect of being left behind in the greatest technology transformation in decades.

    To Modernize your 4G/LTE networks for 5G, we will outline four strategic investments that mobile operators should consider today while delving into the myths and realities around them. These four areas are:
    •Upgrading network management
    •Consolidating network functions
    •Boosting security at key protection points
    •Virtualizing network functions

    In the security portion of this webinar, we also spotlight key concerns where modern Gi/SGi firewalls and advanced machine learning powered DDoS protection are essential. By carefully investing in upgrades to support specific 5G use cases, network operators can monetize their near-term investments and at the same time modernize the existing infrastructure in preparation for the eventual migration to a full 5G architecture.
  • Are you ready for a future based on orchestration?
    Are you ready for a future based on orchestration?
    Keith Langridge, Adrian Comley, David Llewellyn-Jones, Stephen Moss from BT Recorded: Mar 19 2019 24 mins
    “We always overestimate the change that will occur in the next two years and underestimate the change that will occur in the next ten.” Bill Gates

    It’s not the deployment of SD-WAN that is the major change in your network. Nor the move from physical to virtual devices. It’s the orchestration and service chains of networking functions that brings truly transformational change to your IT organisation.

    In this webinar you’ll discover:
    • how technology can transform your service beyond SD-WAN
    • the importance of new programming languages on delivering these services
    • and how new skills and support can make this possible.
  • Open Demo: Network Automation with Ansible, March 18
    Open Demo: Network Automation with Ansible, March 18
    Eric McLeroy Recorded: Mar 19 2019 59 mins
    Ansible's simple automation framework means that previously isolated network administrators can finally speak the same language of automation as the rest of the IT organization, extending the capabilities of Ansible to include native support for both legacy and open network infrastructure devices. Network devices and systems can now be included in an organization's overall automation strategy for a holistic approach to application workload management.
  • Network Automation: Getting from Automatable to Automated
    Network Automation: Getting from Automatable to Automated
    James Kelly, Enterprise Marketing, Juniper Networks Recorded: Mar 19 2019 50 mins
    Technology is constantly moving on, and business is constantly moving on with it. Automation is the key to keeping your enterprise on pace, not only with disruptive innovations, but with emerging security threats to your infrastructure, too.

    Now in the multicloud era, automation is an imperative to drive operational reliability, security and speed without tradeoffs.

    In this webinar, you’ll learn:

    -Why network automation is not the same as automated networks
    -How network reliability engineering can enable operational simplicity
    -The five-step journey towards automated NetOps
  • Automate proactive security and reliability workflows
    Automate proactive security and reliability workflows
    Red Hat Recorded: Mar 18 2019 35 mins
    Businesses constantly face the pressure to increase efficiency, agility, and innovation while adhering to compliance standards and regulations. As demand grows to respond faster to market changes, even the most skilled IT teams are challenged.
    Join this webinar to learn how Red Hat® Ansible® Tower, Red Hat Insights, and Red Hat Satellite 6 together provide a complete, automated, proactive security solution.

    We’ll cover:
    • Useful examples and details about the why and how to use these tools together.
    • How to abstract Satellite 6 to use as a dynamic inventory source.
    • How to use Insights to detect issues and create playbooks.
    • How to use Ansible® Tower to automate with workflow and reporting.

    Featured Presenters:
    Justin Lacey, Architect, Red Hat Consulting, Red Hat
    Allen Eastwood, Managing Architect, Red Hat Consulting, Red Hat
    Dustin Scott, Managing Architect, Red Hat Consulting, Red Hat
  • Infrastructure in the Cloud: A Chat with Cisco Meraki
    Infrastructure in the Cloud: A Chat with Cisco Meraki
    David Van Schravendijk, Product Marketing Manager at Cisco Meraki Recorded: Mar 15 2019 9 mins
    In this episode of Mode Radio, Cisco Meraki product marketing manager David van Schravendijk speaks with Jo McDougald about how Meraki is making infrastructure management easier for companies by moving key infrastructure components to the cloud. Jo and David also discuss the tremendous and growing importance of security in today’s IT environment.
  • The Round the Clock Third Party Advantage
    The Round the Clock Third Party Advantage
    Brandon Dobrec, LookingGlass Cyber Solutions and Paul Roberts, Security Ledger Mar 20 2019 6:00 pm UTC 60 mins
    Vendors, suppliers, and independent subsidiaries are gaining more and more access to your network and sensitive data because today’s business models include outsourcing of non-mission critical programs and tasks, which brings a whole new world of risk to your organization. These not so new cyber risks make traditional perimeter defense no longer enough. Companies need continuous visibility and monitoring of their external partners threat landscapes. Use a cyber situational awareness platform that provides you with a map of your cyber risks you can identify vulnerabilities before the adversary does.

    In this webinar, LookingGlass Product Manager, Brandon Dobrec and Security Ledger Editor-in-Chief, Paul Roberts will discuss what you need to assess vendors in the modern cyber environment, providing you with the right map to assess your external risk.

    This webinar will answer:

    - Why point-in-time scorecards are a necessary component of third party risk management, but are woefully inadequate for proactively defending against future attacks

    - How a cyber situational platform delivers an outside-in view of your network, allowing you to see gaps in your network

    - Tools, capabilities, features, and functionalities are needed to assess vendor risk – continuous monitoring, alerting, reporting, and dynamic collection & scoring, among others

    - Common attack vectors, why these vectors remain open, and what attack vectors are emerging regularly
  • Anuta Networks Academy: Episode-11: ATOM Closed-Loop Automation Use-cases
    Anuta Networks Academy: Episode-11: ATOM Closed-Loop Automation Use-cases
    Dilip Krishna, Anuta Networks Mar 20 2019 6:00 pm UTC 8 mins
    Closed-Loop Automation ensures the system works as intended by closely monitoring network analytics and taking corrective actions. In this video, we discuss the 5 real-world applications of CLA for Telecom providers, App Delivery, Financial Services, Managed Services, and SD-WAN.
  • End-User Experience Monitoring: Nothing Else Matters
    End-User Experience Monitoring: Nothing Else Matters
    Alex Duncan, Senior Director of Microsoft Solutions Mar 20 2019 7:00 pm UTC 45 mins
    Monitoring is critical to any IT organization and most organizations have advanced monitoring of their core IT infrastructure. While this is important, the need to bring monitoring closer to the end-user is becoming of greater importance. With the proliferation of SaaS applications and more complex integrations of applications and datasets, end-user experience monitoring will help close the visibility gap to IT organizations, reducing help desk calls and increasing productivity.

    Riverbed’s SteelCentral Aternity tool can assist organizations with making this vision a reality.
  • Rethinking Enterprise Security Models
    Rethinking Enterprise Security Models
    Lee Fisher, Head of Security Business EMEA, Juniper Networks Mar 21 2019 3:00 am UTC 22 mins
    No matter where we look, everyday there is news of another hack, another data breach and another headache for security teams to deal with. Is it time to look at the security models we use and ask, if they are not effective today, how are they expected to be suitable going forwards? What models should our businesses adopt?

    Lee Fisher, Head of Security Business EMEA, at Juniper Networks discusses how security has matured, and proposes a new approach to protect our future.
  • Mitigating Security Risks on Your Cloud Journey
    Mitigating Security Risks on Your Cloud Journey
    Tim Fong, Product Marketing Lead, Security Solutions & Derek Yee, Product Marketing Lead, Performance Solutions @ Cloudflare Mar 21 2019 4:00 am UTC 43 mins
    Whether you are just exploring moving workloads to the cloud, or are fully cloud-enabled, one thing is certain: security has changed from a purely on-premise environment.

    As cybersecurity risks continue to grow with more advanced attackers and more digital surface area, how you think about staying secure without compromising user experience must adapt.

    During this talk, you will:

    -Hear how global consistency, agile controls, and predictable costs are goals and principles that matter in this new environment
    -Be able to evaluate your current plans against a "customer security model"
  • Wired Security -Don`t go breaking my Network!
    Wired Security -Don`t go breaking my Network!
    Richard Leadbetter, Technical Sales Specialist, EMEA & Derin Mellor, ClearPass Specialist, EMEA Mar 21 2019 10:00 am UTC 45 mins
    We’re all waking up to the fact that we need to start securing our wired edge networks. In theory this should be no different from securing wireless; and covered by the same access policies. The trouble is that the wire has always worked, instantly – and understandably we don’t like to mess with that! How do we recommend that wired security is approached to ensure a successful deployment? Join us to find out!
  • Infovista SD-WAN through the Channel
    Infovista SD-WAN through the Channel
    Mike Wilkinson,CPO,Infovista, Jon Howes, SVP Global Channels and Stan Gorski, Global Channel Mktg. Mar 21 2019 3:00 pm UTC 60 mins
    Please join Infovista CPO Mike Wilkinson, and SVP Global Channels, Jon Howes, for an exclusive channel only SD-WAN webinar.
    We invite invite you, our global partner family, to join us for a live 30 minute presentation followed by Q&A.
    Take home valuable insights and tools to enable your sales, marketing and technical teams on this groundbreaking market development.
    Be the first to Ipanema SD-WAN!
  • 100G Enabled High-Performance Visibility
    100G Enabled High-Performance Visibility
    Nadeem Zahid, VP Product Management/Marketing and Kevin Lio, Director Product Management Mar 21 2019 3:00 pm UTC 60 mins
    As companies enter the digital business era, demand for high-speed 100GbE at the core and edge of the network to support bandwidth-intensive applications grows. However, the ability to provide accurate real-time visibility to monitor multiple links at full line-rate is a challenge that legacy monitoring architectures struggle to handle. The network packet brokering solutions from cPacket provide network visibility you can trust, delivering reliable real-time data to the right security and network monitoring tools.

    In this webinar you will learn how to:

    · Establish an effective multi-tier packet brokering solutions to gain visibility into enterprise deployments

    · Distributive pre-ingress and post-egress packet processing and smart ports to achieve network visibility without dropping packets

    · Deliver the right data to the right security and performance monitoring tools to scale NetOps and SecOps
  • Infoblox #3: DNS….. One of the Best Weapons for Securing Networks?
    Infoblox #3: DNS….. One of the Best Weapons for Securing Networks?
    Chris Kissel, IDC, Research Director, Worldwide Security Products; Dawn Bedard, Sen Technologist; Elevi Assocs; B. Dunlap Mar 21 2019 5:00 pm UTC 60 mins
    Today’s sophisticated cybersecurity attacks often unfold in the blink of an eye. To respond quickly, your security teams need to see security incidents as they happen to ensure that attempts to hack your server environment are thwarted before entry into your machines. Whether detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks – DNS can help with this and much more. But are you leveraging it as part of your cyber strategy? Nearly all threats use the DNS system therefore threats in your network can easily be seen in your DNS data. Join Infoblox and (ISC)2 on March 21, 2019 at 1:00PM Eastern as we bring in experts from IDC and ELEVI for a discussion on how leveraging DNS can help identify attacks as they happen or even prevent them before they happen, remediate attacks faster, and help detect and stop malware from spreading.
  • The Evolution of DataOps at GSK (GlaxoSmithKline)
    The Evolution of DataOps at GSK (GlaxoSmithKline)
    Chuck Smith - VP of Data Strategy - GlaxoSmithKline | Bryan Duxbury - Chief Technologist - StreamSets Mar 21 2019 5:00 pm UTC 58 mins
    GlaxoSmithKline is a pharmaceutical company that has pioneered a transformation of its R&D data and analytics infrastructure. Creating a new drug can take anywhere from 8 years to 20 years for a pharmaceutical company and GSK aimed to shorten that development time by giving over 8,000 scientists access to trial data. GSK is focused on bringing siloed data together into a primary data and information platform where users across the enterprise can consume all the data in different ways.

    In order to deliver these capabilities GSK has set up a Center of Excellence (COE) around data delivery and dataops. The team is responsible for dynamically scaling its data flows to meet the demands of new data sources. They have evolved the data practices over time to automate aspects of data acquisition and delivery utilizing bot-driven pipelines.

    VP of Strategy at GSK Chuck Smith joins us for a look at the solution and talks about the future.

    During this webinar, we will discuss:

    -Building a DataOps practice
    -High-level solution and architecture overview
    -Best practices for automation
  • 4 Best Practices to Meet Compliance Requirements in Kubernetes Environments
    4 Best Practices to Meet Compliance Requirements in Kubernetes Environments
    Pawan Shankar, Senior Product Marketing Manager, Sysdig & Binoy Das, Solutions Architect, Amazon Web Services Mar 21 2019 5:00 pm UTC 45 mins
    With the rise of technologies like Docker, Kubernetes, and underlying cloud infrastructures, enterprises are moving towards cloud-native architectures that leverage microservices to run their critical business applications. While this shift has tremendous business advantages, it also creates significant security and compliance challenges.

    In this webinar, Sysdig & AWS experts will explore the 4 key steps you must take to ensure you are continuously meeting your security and compliance requirements for your microservices stack. Learn how to:

    >Leverage compliance policies for scanning images in your CI/CD pipeline
    >Scan Kubernetes and Docker environments and visualize compliance posture
    >Enforce runtime container compliance
    >Investigate policy violations post-mortem by using forensics after container is disposed
  • Anuta Networks Academy: Episode-12: Anuta ATOM Case Studies
    Anuta Networks Academy: Episode-12: Anuta ATOM Case Studies
    Dilip Krishna, Anuta Networks Mar 21 2019 6:00 pm UTC 11 mins
    In this video, we share some of Anuta ATOM customer deployments including Tata Communications, Neustar, F5 Networks, An Energy Provider in APAC and a Financials Services Enterprise in the US.
  • A SD-WAN Service that Ensures your Network Serves your Business Needs
    A SD-WAN Service that Ensures your Network Serves your Business Needs
    Michael Leonard & Jonathan Biggs Mar 21 2019 6:00 pm UTC 60 mins
    Managing the wide area network can be a challenge for small business that have limited IT resources. As the use of applications grows organizations need to add bandwidth and connect to the cloud with high performance. They need to ensure that critical traffic like voice is given high priority and that they have tools to ensure performance.

    In this webinar with AT&T and VMware we will show you how you can improve the quality of your WAN and increase visibility into network performance while reducing the resources that you dedicate to managing your WAN. You will learn how you can access applications from the cloud with ease and get better voice quality for your remote sites. Together, AT&T is offering a cloud-delivered SD-WAN service to all of your business needs.

    Join this webinar to:

    Discover the benefits of cloud-delivered SD-WAN for your small business
    Find out how other businesses like yours are implementing cloud-delivered SD-WAN
    Learn about the AT&T SD-WAN NOW managed service offering
  • MITRE ATT&CK™ Framework & The Nature of Intent
    MITRE ATT&CK™ Framework & The Nature of Intent
    Gary Gagnon, CSO MITRE; David Wolpoff, Co-Founder, Randori; Keith Mccammon, CSO, Red Canary Mar 21 2019 7:00 pm UTC 60 mins
    The MITRE ATT&CK framework is the most comprehensive knowledge base for adversary tactics and techniques, but how does the nature of adversarial intent fit into the matrix?

    Join Gary Gagnon, CSO of MITRE, and industry experts for a panel discussion on MITRE ATT&CK and how organizations are correctly and incorrectly applying it in cybersecurity today.
  • Balancing Prevention, Detection & Response: Your Guide to Success
    Balancing Prevention, Detection & Response: Your Guide to Success
    Alan Foster, Senior Solutions Engineer & Justin Buchanan, Senior Solutions Manager Mar 21 2019 7:00 pm UTC 45 mins
    Security teams today understand the need to invest across threat prevention, detection, and incident response. But with strained teams, siloed technologies, and ever-looming compliance audits, where do you start?

    Join us for a special session with Justin and Alan, who will share prioritization guidance from working with hundreds of security teams, as well as key findings from an all-new Rapid7 Threat Report. We’ll cover:

    1. How teams are bringing automation to their vulnerability management program
    2. How to prioritize prevention across your modern network, from remote workers to cloud environments
    3. Top alerts & attacker trends, based on findings from Rapid7’s 24/7 Managed Detection and Response service
    4. Using the MITRE ATT&CK framework to assess your current detection capabilities
  • Webinar: Das Reifegradmodell für die Verwaltung von Sicherheitsrichtlinien
    Webinar: Das Reifegradmodell für die Verwaltung von Sicherheitsrichtlinien
    Marco Miska, Technical Account Manager EMEA Mar 26 2019 9:00 am UTC 60 mins
    Ihre Teams haben Schwierigkeiten, mit der Häufigkeit von Netzwerksicherheitsanfragen Schritt zu halten, während sie gleichzeitig versuchen die Agilitätsinitiativen Ihres Unternehmens zu unterstützen und die Sicherheit zu wahren.

    Sie kennen die Vorteile der Automatisierung, fragen sich aber wahrscheinlich: "Wo fangen wir an?"

    Besuchen Sie die Experten von Tufin am 26. März um 10.00 Uhr, um nützliche Tipps für den Einstieg in die Zero-Touch-Automatisierung zu erhalten:

    • Warum aktuelle Ansätze nicht funktionieren
    • Wie können begrenzte Ressourcenherausforderungen überwunden werden?
    • Die Schritte, die Sie unternehmen müssen, um das ultimative Ziel zu erreichen: Zero-Touch-Automatisierung
  • Understanding Microservice Latency: Overview of New Relic Distributed Tracing
    Understanding Microservice Latency: Overview of New Relic Distributed Tracing
    Sean Carpenter & Stephen Crowley Mar 26 2019 10:00 am UTC 39 mins
    Software teams, working in an environment where there are many services involved in servicing a request, need to deeply understand the performance of every service, so they can more effectively resolve performance issues, measure overall system health, and prioritise high-value areas for improvement.

    New Relic Distributed Tracing is designed to give software teams an easy way to capture, visualise, and analyse traces through complex architectures, including architectures that use both monoliths and microservices.
  • Airheads Tech Talks: Cloud Guest SSID on Aruba Central
    Airheads Tech Talks: Cloud Guest SSID on Aruba Central
    Akhil R, Aruba TAC Team Mar 26 2019 10:00 am UTC 90 mins
    Aruba Central user may need a centralized web-server to host captive portal page for their distributed networks across the globe like coffee shops, restaurant or hotels.

    Aruba central 2.0 has a new feature called Cloud Guest or Guest Management that allows administrator to create a splash page for guest users using Web server and radius server running in the cloud.

    During this webinar we will cover the below topics:

    · Quick introduction to Cloud Guest SSID on Central
    · Need for Cloud Guest SSID in the field
    · Different Authentication Types
    · Configuration
    · Verification and Troubleshooting
  • Authentication, Security, and Performance for the Internet of Things
    Authentication, Security, and Performance for the Internet of Things
    Dan Goldstein, Product Strategy Mar 26 2019 11:00 am UTC 45 mins
    Gartner estimates by the end of 2020 over 20 million Internet of Things (IoT) devices will be online. Every day the automotive, aviation, consumer goods and utilities industries (just to name a few) are pushing new boundaries in how customers interact with technology. While this evolution unlocks incredible potential, security and performance challenges put IoT device manufacturers and providers at risk of security incidents and unable to meet customers' rapidly growing expectations.

    Security-wise many devices are still treated like machines from early in the century: release patches on Tuesdays and cross our fingers our users update. Performance-wise centralized cloud providers are not built to deliver ultra low-latent responses to millions of devices with a global footprint.

    Join our webinar and take a look at how Cloudflare is helping IoT manufacturers and providers meet emerging security and performance challenges.
  • La sécurité Intelligente
    La sécurité Intelligente
    Gert De Wever, Security CSE, EU North & Koen Chiau, Sales & Channel Manager BeNeLux, Aruba Security Solutions Mar 26 2019 1:00 pm UTC 75 mins
    Mars, c'est le mois de la Cybersécurité !
    C'est l'occasion de (re)découvrir l'offre de sécurité Aruba à 360º !
    Mardi 26 mars à 14h, nos experts Sécurité d'Aruba Belux, Gert De Wever & Koen Chiau aborderont pour vous les 360º de l'offre sécurité d'Aruba :
    · Le défi
    · Les 4 piliers de la sécurité : identifier, protéger, détecter et remédier
    · Mise en place et automatisation de la sécurité
    · Approche 360° de l'expérience utilisateur sur le réseau
    · Demo live
    · Q&A
  • Running Kubernetes on AWS EC2 with Avi Networks
    Running Kubernetes on AWS EC2 with Avi Networks
    Bhushan Pai, Lei Yang Mar 26 2019 3:00 pm UTC 50 mins
    Azure Kubernetes Service (AKS) is offered by Microsoft Azure as a fully-managed Kubernetes orchestration service.
  • Parallel Wireless Unified 2G/3G/4G/5G Open vRAN
    Parallel Wireless Unified 2G/3G/4G/5G Open vRAN
    Zahid Ghadialy, Sr. Dir., Strategic Mktg and 3G/4G Blogger and Babak Jafarian, Dir, Strategic Business Communications Mar 26 2019 3:00 pm UTC 60 mins
    The telecoms industry is capital intensive, so every dollar and every cent spent on new infrastructure needs to be accounted for. The biggest expense for mobile operators has always been the RAN, accounting for around 60 % of CAPEX (and 65 % of OPEX). Older (2G, 3G) technologies are becoming more expensive to maintain alongside with 4G and soon 5G. The Open Compute model of the data center has the potential to help operators to move away from proprietary hardware to a virtualized network architecture. Some of TIP’s (Telecom Infrastructure Project) initiatives by Facebook) highest-profile activities are aimed specifically at the RAN, where the proprietary nature of several interfaces has stopped operators from using more than one vendor. The software-based approach for older Gs is unheard of where by virtue of the original design, it’s impossible to reconfigure legacy 2G and 3G networks to support newer communications standards such as 4G, and eventually 5G. In this webinar learn how Parallel Wireless Open RAN technology, designed on x86 across baseband processing platform, radio hardware, and radio and core software, simplifies MNOs business models to support ALL current, present, and future Gs for a better service to the end users at much lower cost. We will present recent case studies from TIP Summit from operators like Telefonica, MTN and Vodafone. www.parallelwireless.com
  • Field Testing Single Mode Fiber to support 100Gig and beyond for Campus and Data
    Field Testing Single Mode Fiber to support 100Gig and beyond for Campus and Data
    Jim Davis, Fluke Networks Mar 26 2019 3:00 pm UTC 71 mins
    This presentation will look at some of the requirements for field testing Single Mode fiber to make sure it will support the new applications you are planning to run on it. Starting with inspection and cleaning it will answer many of those little questions, “can I use that click pen from UPC multimode connectors on APC connectors?, How do I inspect APC connectors?”

    From there the presentation will move on to the calculation of a loss budget, what is the correct budget, and what wavelengths should be tested. We will look at the best practices in Tier I loss testing to assure the minimum of uncertainty in our test results. The presentation will explain how this can be done for both single connectors such as LC and SC as well as MPO connections.

    Finally, we will look at troubleshooting the fiber using an OTDR and give an introduction to the identification of common events in Single Mode OTDR traces.

    Attendees will earn 1 BICSI CEC
  • Introduction to Managed SD-WAN
    Introduction to Managed SD-WAN
    Ashwath Nagaraj (Founder & CTO, Aryaka) Mar 26 2019 4:00 pm UTC 45 mins
    As the hype cycle around SD-WAN reduces and enterprises continue to deploy hundreds of boxes across different sites, scalability is emerging as the primary challenge for growing global organizations. Network managers have to juggle multiple vendors while managing configuration, patches and security loopholes, complicating and slowing down SD-WAN adoption. Managed SD-WAN solutions are growing rapidly, but not all vendors are created equal. Some vendors offer cloud, but don’t own the network. Other service providers offer managed WANs, and yet others offer professional management. How do you differentiate between the options and pick the right managed SD-WAN for your organization?

    In this webinar you will join industry experts to learn:

    - Fundamental building blocks of a managed SD-WAN architecture
    - Pros and cons for each of the different management and operational models
    - Total cost of ownership (TCO) benefits of a 100% managed SD-WAN for a global deployment
  • Hadoop Creator Doug Cutting: How to Operationalize Machine Learning and Advanced
    Hadoop Creator Doug Cutting: How to Operationalize Machine Learning and Advanced
    Doug Cutting - Hadoop Creator & Chief Architect - Cloudera | Arvind Prabhakar - Co-Founder & CTO - StreamSets Mar 26 2019 5:00 pm UTC 56 mins
    When streaming data meets machine learning and advanced analytics, the innovation possibilities can be endless. Operationalization of data movement in a hybrid cloud architecture is key to making your technology investments deliver on their promises. Without it comes frustrated developers, failed projects and technology disillusionment.

    Join Doug Cutting, Apache Hadoop creator and Chief Architect at Cloudera, and Arvind Prabhakar, co-founder and CTO at StreamSets as they discuss how to use DataOps to avoid common pitfalls associated with adopting modern analytics platforms.