Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Renewing your IT culture with Red Hat Ansible Automation
    Renewing your IT culture with Red Hat Ansible Automation
    Abraham Snell, Senior Solutions Architect, Red Hat Recorded: Sep 28 2020 42 mins
    Whatever your role in IT, you know managing technology is tough, yet it pales in comparison to managing organization-wide relationships.

    In this breakout session, a senior IT analyst of Southern Company, a leading energy company, will share how they're using Red Hat Ansible Tower to reduce OS patching labor hours by approximately 90% and at the same time positively impacting longstanding social divides. He'll discuss:

    How, with automation, they forged a path that started the renewal of a large portion of the company’s IT culture.
    How these cultural changes are leading to greater synergies, efficiencies, improved relationships, and better quality of life
  • Reimagine Supply Chain Innovation: Redefine Customer Experiences & Drive Growth
    Reimagine Supply Chain Innovation: Redefine Customer Experiences & Drive Growth
    Sultan Aziz Senior Director, Product Supply Strategy Management Johnson & Johnson Recorded: Sep 28 2020 43 mins
    This keynote address will highlight IIC member Johnson & Johnson's journey to supply chain excellence. Sultan Aziz Senior Director, Product Supply Strategy Management at Johnson & Johnson will share the company's extensive experience in supply chain associated with pharma, over-the counter medications, and consumer goods and will share their best practices and guidance. Discover how IoT adoption, under the umbrella of the Digital Operating Model, is a critical component & enabler for the overall Supply Chain Innovation Engine.

    * Start with customer and business needs & opportunities to DEFINE “What to innovate for” and direct & guide the innovation work to address business needs.

    * Gain EXTERNAL INSIGHTS – discover and explore the broad & global innovation “Eco-System” for potential value creation opportunities, that fit the “defined needs”. SCOUT & SCREEN value creation opportunities and prioritize for further evaluation.

    * EVALUATE the prioritized solutions, demonstrate & validate in a “Proof of Concept”

    * TEST and proof feasibility of the solutions in the “Real World”, and gain understanding of the requirements for enabling factors.

    * DEPLOY & SCALE the proven solutions as integrated & sustainable supply chain capabilities.
  • 5G: The Future of Public Safety
    5G: The Future of Public Safety
    Amelia Powell, Arshdeep Sawhney, Jamie Italiano Recorded: Sep 28 2020 74 mins
    Verizon Response Solutions are ready when you are.

    We’re committed to help keep first responders ready. Response ready. Because every second counts when you answer the call. Local, state and federal public safety agencies can stay prepared, connected and aware with our emergency response–ready solutions.

    We understand public safety needs and work continually to meet them by supporting you with the reliable, secure coverage you deserve. We’re helping build innovative emergency response solutions that could someday run fast and reliably on our 5G Ultra Wideband. With our 5G Ultra Wideband, first responders could potentially help protect and save lives in entirely new ways–and be response ready.
  • Smart Sanitization: Solving the Back to Work Effort by Fighting Covid-19
    Smart Sanitization: Solving the Back to Work Effort by Fighting Covid-19
    Syed Ahmed, Founder & CEO @SAVORTEX® Recorded: Sep 28 2020 22 mins
    SAVORTEX® is a multi-award winning British IoT hand-hygiene technology company that has over 400 projects deployed internationally to multinational companies such as Gatwick Airport, The Shard, Euro Garages, Wates and RBS to name a few. Covid-19 has brought hand-hygiene to the forefront of global business, a sector forecast to grow from $2.7bn to $36.6bn by 2026. With 1 in 5 people not washing hands and considering that 80 percent of all infections are transmitted by touch, it’s costing employers $225.8 billion annually. During this webinar presentation, Syed Ahmed, Founder and CEO, will highlight the launch of the first Smart hand sanitiser which has the ability to report users who do not sanitise their hands as a hygiene risk and deny access if required, to make buildings safer.
  • Incident Response & Truth In Advertising
    Incident Response & Truth In Advertising
    Cali Pitchel Schmidt, Porter Novelli, Vice President Strategic Planning Recorded: Sep 25 2020 31 mins
    Cali Pitchel Schmidt, Porter Novelli, Vice President Strategic Planning

    The internet has fundamentally changed the relationship between brands and consumers. The consumer has access to more information than ever before, and this shift in power has broad implications for the way in which brands talk to the market, especially in times of crisis or reputation risk. There are two non-negotiable rules for incident response—tell the truth and take responsibility. Being prepared (and proactive) is key to successfully navigating an always-on communications culture—in good times and in bad. In this session, we’ll cover how to operationalize the truth across your business before a crisis; the right time to think about reputation management; and how to communicate to your customers and the broader market in the case of an incident.
  • Blackberry #3: Preparing for the Future of Work
    Blackberry #3: Preparing for the Future of Work
    Ebudo Osime, BlackBerry, Threat Intelligence Analyst Recorded: Sep 25 2020 55 mins
    Part three will examine how a Zero Trust security strategy built on AI-based security technologies could better prepare you to face the modern threat landscape. We will walk through some current, pervasive threats to gain a better understanding of why and how the unique features of AI-driven technologies are better suited to prevent, detect, and respond to them.
  • Blackberry #2: Combating Cyber Chaos with Unified Endpoint Security
    Blackberry #2: Combating Cyber Chaos with Unified Endpoint Security
    John McClurg, CISO, BlackBerry (formerly Cylance) Recorded: Sep 25 2020 55 mins
    In Part two, we’ll discuss strategies for securing remote workers using Zero Trust. As millions of us have grown accustomed to and continue working from home, the delineation between work and home has become increasingly porous. Devices – no matter the environment in which they are situated – must be secure without any performance trade-offs. We will explore how emerging solutions like continuous authentication and unified endpoint security that leverage AI, machine learning, and automation could play a critical role in deploying a robust Zero Trust security framework to secure all devices – anytime, anywhere.
  • Blackberry #1: Zero Trust Framework: What’s the Best Approach to Implement It?
    Blackberry #1: Zero Trust Framework: What’s the Best Approach to Implement It?
    Rich Thompson, VP of Sales Engineering, BlackBerry (formerly Cylance) Recorded: Sep 25 2020 56 mins
    In this first part, we’ll explore the important preliminary questions about whether Zero Trust should be a priority for your organization and provides guidance on defining trusted users and devices, and how to integrate identity and network. It will address how to build a business case for Zero Trust, addressing business drivers such as cloud environments and business continuity needs.
  • Adapting to the New Normal: What does it mean?
    Adapting to the New Normal: What does it mean?
    Spencer Pitts Recorded: Sep 25 2020 59 mins
    As Companies evolve and navigate through this situation we start to see some distinct phases and thinking emerging for IT. Responds, Reflect and Rethink. In this session VMware will explain how Workspace One can help through IT provide employees with what they need through these phases and what the main things they need to consider now but going forward too.
  • How a leading utility company secures network infrastructure continuity
    How a leading utility company secures network infrastructure continuity
    Pam Cyr - SVP Business and Corporate Development, Tufin and Henry Pea Sales Engineering Director, APAC - Tufin Recorded: Sep 25 2020 63 mins
    Watch this panel discussion led by industry leaders, Dr. Juergen Tusch, Head of Telecommunications at Innogy Westenergie GmbH, Reuven Harrison CTO at Tufin, and John Jacobs, VP Global Solutions Architecture at Fortinet.

    This expert panel will discuss how the German utility services company, Innogy Westenergie GmbH, protects and simplifies network operations while maintaining mission-critical infrastructure via automation and zero trust architecture.

    Panelists will discuss lessons learned on:
    • How to enable secure infrastructure changes, and in parallel, reduce Germany’s global energy footprint
    • Simplifying network operation via automation to enhance productivity, speed, and accuracy
    • Best practices of how to s
  • Security Briefing | Protecting User Data from Web Skimming Attacks
    Security Briefing | Protecting User Data from Web Skimming Attacks
    Aseem Ahmed, Senior Product Manager, Cloud Security Recorded: Sep 25 2020 59 mins
    Modern websites today interact with third parties to provide enriching features like marketing automation, personalization, analytics, social media, login and payments to name a few. This setup although necessary, creates a broad attack surface for your website and its users.
    With surge in online transactions across banking, commerce and media & entertainment providers, threat actors such as Magecart are increasingly targeting businesses and its users with web skimming (Javascript based) attacks. Such attacks lead to loss of sensitive information such as credit card details, user credentials and other sensitive data.

    In this live security briefing, you will learn about:
    - Threats to your JavaScript ecosystem posed by groups like Magecart
    - Different approaches to defending from client-side script attacks
    - Current state of script protection and its gaps
    - How these attacks are carried out via a live demo
    - How to request and use data from a complimentary page integrity report from Akamai
  • Network Security and Data Center Appliance Market Quarterly Update (2Q20)
    Network Security and Data Center Appliance Market Quarterly Update (2Q20)
    Mauricio Sanchez, Research Director Recorded: Sep 24 2020 3 mins
    In this presentation, Mauricio Sanchez will provide some highlights of the Network Security market in 2Q20
  • The New Realities of Healthcare IT
    The New Realities of Healthcare IT
    MEDHOST, Pacific Dental Services and AdventHealth Recorded: Sep 24 2020 92 mins
    According to the Department of Health and Human Services, healthcare data breaches increased by 196% from 2018 to 2019 and are expected to see a double digit increase in 2020. Given its valuable data, connected devices and the need for constant data access to ensure continuity of care, Healthcare organizations have been and will likely always be a prime target for cyberattacks. While awareness around these issues has drastically improved, the threat is still as real as it has ever been

    Please join us for a conversation on September 15 as we bring healthcare leaders from MEDHOST , Pacific Dental Services and AdventHealth together to discuss the new realities and challenges facing healthcare IT teams today.

    During our dialogue, our panel of industry leaders will dissect cybersecurity topics relevant to today's ever changing environment including securing IOT devices, cloud adoption, Zero Trust, regional site visibility and the effects of COVID-19, work from home and skill shortage within security teams.
  • Start your NetOps and SecOps Automation Journey
    Start your NetOps and SecOps Automation Journey
    Murali Palanisamy, Chief Solutions Officer Recorded: Sep 24 2020 43 mins
    NetOps and SecOps teams everywhere are striving to perfect an approach to service delivery, that is, both rapid and effective. Automation brings value to organizations by delivering applications faster, simplifying routine tasks, reducing costs and improving business agility. NetOps and SecOps automation also helps tighten industry standards and ensures continued compliance.

    The results of automation are compelling for businesses of all sizes, and by taking a careful step-by-step approach, it is easy to apply these solutions to your network, ultimately promoting a more agile data center.

    Watch our webinar to learn more about -
    - What are NetOps and SecOps automation
    - Why automation matters?
    - The evolution toward NetOps and SecOps automation
    - The step-by-step approach one should take to implement automation
  • Everything I needed to know about Cloud Computing, I learned from a dog
    Everything I needed to know about Cloud Computing, I learned from a dog
    Matt Rotkis, Dell Technologies & Matt Johnson, Davenport Group Recorded: Sep 24 2020 41 mins
    Digital transformation and cloud computing are not new concepts. Recent global events have put further emphasis on the need to scale applications and IT services in a distributed and automated fashion. As more customers, partners and employees work remotely, there is increased traffic to your applications for flexible remote workforce enablement and this highlights a realization of existing IT limitations.

    Organizations have become more a-tune that an all cloud or a cloud first strategy isn’t working like they thought it would. Organizations are repatriating at a record pace and struggling to determine the best strategy to balance the requirements of the business with IT resources.
    Join Dell Technologies and Davenport Group as we embark on a journey into the cloud operating model. Learn how to build an organizational strategy that supports better business, customer and employee outcomes.


    •What is cloud vs a cloud operating model; is there a difference?
    •Cloud Economics
    •The “laws” of the cloud
  • Optimize Your Environment with VMware Cloud Foundation, Pure Storage, and ePlus
    Optimize Your Environment with VMware Cloud Foundation, Pure Storage, and ePlus
    Vaughn Stewart, VP of Technology Alliances- Pure Storage | Jeremiah Stuppy, Solutions Director, Data Center- ePlus Technology Recorded: Sep 24 2020 49 mins
    Many enterprises are seeking to optimize scalability, operational simplicity and their hybrid cloud architecture through adopting VMware Cloud Foundation (VCF). VCF provides the next generation of VMware on-prem and focuses on reinventing operations and life-cycle management, enabling hybrid cloud, and streamlined deployment of containers and virtual machines to tenants.

    Join ePlus and Vaughn Stewart, VP of Technology Alliances, Pure Storage, to learn how enterprises are modernizing their VMware environments with VCF on FlashStack and gaining advantages like….

    - Enable flexibility and infrastructure consolidation supporting VCF workload domains
    - Ability to deploy VCF on Fibre Channel, iSCSI or NVMe-oF
    - Gain the agility to scale the infrastructure on demand without data re-balancing
    - Gain 99.9999+% availability, advanced business continuance and backup by running VMware on Pure Storage
    - Reduce the cost of VCF infrastructure
    - Gain up to 10X operational & management simplicity over the direct attached storage

    ePlus and Pure Storage have a unique and powerful solution for modernizing your VMware environment with VMware Cloud Foundation on FlashStack; from automated deployment on existing fabrics to optimized operations, scaling and data protection.

    Speakers:

    -Jeremiah Stuppy, Solutions Director, Data Center- ePlus Technology
    -Vaughn Stewart, VP of Technology Alliances- Pure Storage
  • Key Drivers of Multi-Cloud Networking Success
    Key Drivers of Multi-Cloud Networking Success
    Scott Raynovich and Atif Khan Recorded: Sep 24 2020 53 mins
    Multi-cloud is one of the most significant trends influencing enterprises in the recent years. Fueled by the application migrations from on-premise data centers to one or multiple public cloud and SaaS offerings, multi-cloud has quickly gained ground and has proven to be one of the most disruptive forces behind the Enterprise IT.

    Join us for an interactive discussion with Scott Raynovich, Founder and Chief Technology Analyst of Futuriom and Atif Khan, Co-Founder and CTO of Alkira. You will hear the insights from the recently published Futuriom “The Future of Multi-Cloud Networking” report and learn how Alkira is reinventing networking for the cloud era by allowing enterprises to have networks that are consumed as-a-service, built for the cloud and behave like the cloud.
  • ENVOY DATA AND FEITIAN TECHNOLOGIES Business Partnership
    ENVOY DATA AND FEITIAN TECHNOLOGIES Business Partnership
    Eric Balushian and Louise Houser FEITIAN Technologies US and Ted LeSueur from EnvoyData Corporation Recorded: Sep 24 2020 33 mins
    ENVOY DATA AND FEITIAN TECHNOLOGIES Business Partnership Joint Webinar
  • Behind the scenes at Arctic Wolf with Sam McLane, CTO
    Behind the scenes at Arctic Wolf with Sam McLane, CTO
    Sam McLane, CTO, Arctic Wolf; Charles Johnson and Mark Holdsworth, Accudata Recorded: Sep 24 2020 30 mins
    Managed Detection and Response (MDR) providers offer a wide range of services. Some may be right for your business, but some may not. How do you choose the right MDR provider?

    Accudata’s Solution Architect team provides design and architecture services for many different solutions, from data center migrations to deploying contact centers. One solution we’ve seen across the board that’s been attractive to our customers is MDR. A few weeks ago, we reviewed what is compelling in this space. In this webinar, we’ll showcase one of our favorites, Arctic Wolf.

    Join Accudata’s Cybersecurity Practice Manager Charles Johnson and Managed Services Practice Manager Mark Holdsworth as they sit down and talk with Arctic Wolf CTO Sam McLane on Thursday, September 24, at noon. They’ll discuss Arctic Wolf, how they’re different, what they do well, and what they’re working on next.
  • Strengthen your Multicloud Strategy with SD-WAN
    Strengthen your Multicloud Strategy with SD-WAN
    Jaspreet Bhatia, Product Manager at VeloCloud, now part of VMware Recorded: Sep 24 2020 49 mins
    The increasing adoption of cloud services makes traditional backhauling—along with its centralized security stack—obsolete. Organizations today rely heavily on cloud-delivered applications to effectively serve their employees and customers across locations beyond their enterprise infrastructure. However, the quality of experience and application performance for the end user primarily depend on the quality of the network connecting users to applications deployed on- or off-cloud.

    Further, with so many options for security, mid-mile, analytics, compute, IaaS, and network exchanges, SD-WAN needs to be intelligent to selectively steer traffic to these clouds based on each business use case.

    This webinar describes the comprehensive set of capabilities and common features that VMware SD-WAN™ by VeloCloud® offers to drive your multicloud strategy. Learn how VMware SD-WAN delivers optimal performance for applications no matter where they are deployed, without compromising payload security.
  • Unlock your data potential with Dell EMC's Unstructured Data Portfolio
    Unlock your data potential with Dell EMC's Unstructured Data Portfolio
    Dell Technologies Recorded: Sep 24 2020 46 mins
    Organizations are struggling to find the right solutions to manage the rapid growth of unstructured data. Whether you are storing file, object, or streaming data - Dell Technologies has a solution for you. In this webinar, we will cover the latest innovations including the scale-out NAS PowerScale Family, built for simplicity at any scale to handle any data, anywhere with intelligent insights. We will also highlight the benefits of ECS, our cloud scale, geo-distributed object storage. And for customers who want to capture real-time insights, we will cover the Streaming Data Platform, a software engine that ingests and analyzes data in its natural form. Don't miss out on this action-packed session.

    What’s in it for you?
    ▪ Hear firsthand from an expert in Dell EMC’s Unstructured Data Storage Offerings
    ▪ Find out where PowerScale, ECS, and the Streaming Data Platform can fit into your environment
    ▪ Understand how these solutions, combined with DataIQ, can help you unlock the full potential of your data.
  • Securing the Cloud Journey
    Securing the Cloud Journey
    Principal Cloud Security Consultant, Jake Necessary, Cloudreach Recorded: Sep 24 2020 20 mins
    Discover the importance of securing your cloud journey as Cloudreach Principal Cloud Security Consultant, Jake Necessary discusses establishing a cloud provider provenance and criteria for trust, security and critical thinking during your cloud journey, and building a pursuit squad and purpose built teams for the cloud journey using the Six Thinking Hats model.
  • Building a modern grid security architecture
    Building a modern grid security architecture
    Dave Schmitt and Sean Song Jiang, Cisco IoT Recorded: Sep 24 2020 52 mins
    The last 5 years have seen a marked increase in digitization of the electric grid, as well as attacks against it. While the implementation of compliance measures has brought attention to the problem, operators continue to face scalability challenges for their cybersecurity programs. Join this webinar and learn:
    1.How to leverage your existing network to gain the necessary visibility,
    2.What you can do to reduce your risk profile, and
    3.How you can build a modern security architecture that is truly scalable for your organizations
  • F5 Labs Breach Trends: New Architectures, Old Attacks
    F5 Labs Breach Trends: New Architectures, Old Attacks
    Sander Vinberg Threat Research Evangelist, F5 | Byron McNaught Sr. Technical Marketing Manager, F5 | Ray Pompon, F5 Recorded: Sep 24 2020 62 mins
    While gathering data for the 2019 Application Protection Report, F5 Labs focused on the theme of how trends in application architecture are driving risk. The results were hugely impactful—the attack techniques that bad actors employ have not only remained viable, but are still quite profitable.

    In our upcoming webinar, F5 Labs researchers are diving into what we learned from the 2019 report and what actions organizations need to take to stay protected.

    In this webinar you will learn:

    - What the growing correlation means between sector and breach modes

    - How and why attackers are targeting the retail sector using an injection technique known as formjacking

    - More about credential abuse and phishing and the causes of the growing number of API breaches

    - How to reap the benefits of the emerging architectures without increasing risk

    Register Today
  • Darktrace #1: Securing the New Normal: Cyber AI for Email
    Darktrace #1: Securing the New Normal: Cyber AI for Email
    Dan Fein, Director, Email Security Products, Darktrace; Brandon Dunlap, Moderator Recorded: Sep 24 2020 55 mins
    The future of work remains unpredictable and uncertain. More than ever before, business leaders need to remain confident that their operations can continue securely. However, 94% of cyber-threats still originate in the inbox, and ‘Impersonation attacks’ that expertly mimic the writing style of trusted contacts and colleagues are on the rise. Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. . Join Darktrace and (ISC)² on September 24, 2020, at 1:00 p.m. Eastern for expert insight into how cyber AI is the only tool that can keep pace with the rapidly evolving threat landscape facing organization’s inboxes every day. The webcast will examine:

    · Exploration of the most recent email threat trends and statistics

    · Overview of Darktrace’s latest developments to secure the email environments of the dynamic workforce

    · Case studies and use cases from industry leading customers
  • Dynamic Cloud Demonstration
    Dynamic Cloud Demonstration
    Ravi Busi - Enterprise Solutions Architect Fortinet Sep 29 2020 1:00 am UTC 51 mins
    You're invited to a demonstration of a live environment incorporating Secure SD-WAN and a Cloud Security Services Hub Architecture in AWS and Azure. We’ll showcase how SD-WAN at the edge can also extend to the Public Cloud to provide cloud onramp, native cloud integrations and leverage multiple paths to access cloud-hosted services. You’ll see how cloud workloads benefit from the security posture provided by Fortinet and how high-availability can be implemented to minimize downtime.
  • How to Build an Effective Cloud Migration Strategy
    How to Build an Effective Cloud Migration Strategy
    John Rakowski; VP of Strategy, LogicMonitor Sep 29 2020 3:00 am UTC 50 mins
    A recent study suggests that 64% of IT executives believe transformation trends come at the cost of continuous availability. These trends usually start with, and are the primary drivers of, cloud migration.

    There are inevitable risks and challenges in adopting new technology, and migrating to any cloud platform – whether public or private – is not easy. Tactical decisions need to be made between lift-and-shift or re-architecting services for the cloud – and making the right decisions has major impact on whether cost and agility benefits will be realized.

    Join John Rakowski, former Forrester analyst and VP of Strategy at LogicMonitor, as he discusses tactics to mitigate cloud migration risk so you can plan, move, and optimize with confidence.

    In this webinar, you’ll learn:

    - Factors that introduce risk to a migration and how to minimize their impact
    - Common migration challenges that can be avoided
    - How to use monitoring data to better guarantee success
  • Case Study: Schutz und Compliance für einen deutschen Energieversorger (German)
    Case Study: Schutz und Compliance für einen deutschen Energieversorger (German)
    Benjamin Nawrath, Fachbereichsleiter IT Systemtechnik und CISO, Energie Südbayern Sep 29 2020 7:00 am UTC 46 mins
    Deutsche KRITIS-Betreiber stehen immer wieder im Visier der Hacker. Cyber-Kriminelle, Hacker und staatlich finanzierte Akteure haben heute die Motive und die Fähigkeiten, erfolgreich anzugreifen, um sensible betriebliche und Kundendaten zu stehlen, Unternehmen zu erpressen oder kritische Systeme zu stören oder sogar zu zerstören.

    Energie Südbayern (ESB) ist ein Energieversorger und -dienstleister, der Erdgas für rund 160.000 Haushalte in Süddeutschland bereit stellt. Als größter regionaler Anbieter beschäftigt ESB ungefähr 370 Angestellte.

    Benjamin Nawrath, Fachbereichsleiter IT Systemtechnik und CISO bei ESB, ist dafür verantwortlich, die Verfügbarkeit, Integrität, Authentizität und Vertraulichkeit der komplexen IT-Infrastruktur (einschließlich 2.000 IP-Adressen) zu gewährleisten.

    Seit knappen drei Jahren hat die ESB die Kombination aus InsightVM und InsightIDR, den Rapid7-Lösungen für Schwachstellen-Management und Incident Detection and Response, im Einsatz. In dieser Zeit konnte Herr Nawrath nachweislich die Reaktionszeiten auf Incidents um 60% reduzieren, das Bedrohungsniveau durch Schwachstellen senken, und die Einhaltung des deutschen IT-Sicherheitsgesetzes (ITSG) sicherstellen.

    In diesem Webcast berichtet Benjamin Nawrath über seine Erfahrungen mit den Rapid7-Produkten und beantwortet Fragen wie:

    Warum hat er sich für Rapid7 entschieden?
    Wie geht die ESB mit dem Thema Cloud um?
    Wie lief die Implementierung, wie groß war der damit verbundene Aufwand?
    Wie lange hat es gedauert, bis erste Ergebnisse sichtbar waren?
    Wie sieht die tägliche Arbeit mit den Lösungen aus?
  • An Industry First: The Best of IT Monitoring Free - EMEA
    An Industry First: The Best of IT Monitoring Free - EMEA
    Pierrick Martel, Product Marketing Manager Sep 29 2020 8:00 am UTC 20 mins
    Welcome to the age of modern and holistic IT Monitoring: Smart Monitoring.

    IT architectures are rapidly evolving and so should the way they’re being managed and monitored. The time has come to accelerate the replacement of old and expensive solutions that don't keep up.

    This 30-minute webinar introduces Centreon, a unique monitoring platform, highlighting: IT Edition. It enables instant, enterprise-grade, cloud-to-edge monitoring for all.

    During this webinar you will learn:
    - How the use of Centreon enlarges your monitoring from the Cloud to the Edge
    - How Automation will make your monitoring implementation quick and successful
    - How a modern user experience will increase your productivity and reduce Mean Time To Repair
    - How you can benefit from Centreon IT Edition free of charge
  • 共抗疫情:Akamai零信任远程办公实践
    共抗疫情:Akamai零信任远程办公实践
    孟焯,Akamai 高级技术顾问 Sep 29 2020 8:00 am UTC 53 mins
    疫情牵动了每个人的心,面对疫情企业管理层响应号召改集中办公、现场办公为在家办公、远程办公。此时,能最快适应远程办公,并用最低的成本,提高运行效率、守住安全底线的企业才能够经得住考验。在这次在线分享中,Akamai的安全专家将从当前企业远程办公应用面临的问题出发,深入探讨基于零信任安全模型下的远程办公解决方案,并用实际的案例分析与最佳实践为您提供可行的参考。
  • Smart City - Solving challenges with Data at the edge
    Smart City - Solving challenges with Data at the edge
    Dominik Friedel, NTT; Frank Miller, Schneider Electric; Gerd Koenig, HUBER+SUHNER; Amir Shehadeh, ioki - a DB company Sep 29 2020 8:00 am UTC 60 mins
    Smart Building, Smart Mobility, Smart Grid - Cities and regions are getting connected and intelligent. "Smart City" established itself as the guiding principle for urban development projects. Technologies like Cloud, Artificial Intelligence, Internet of Things, Blockchain tend to be the essential building blocks for different smart city concepts and edge data centers will be their foundation. Data is forming the core, that is used to make citizens' lives easier, more efficient and safe.

    • How can these technologies get implemented and applied in the best way?
    • How will data be handled and leveraged in this context?
    • How will appropriate solutions look like in the future?


    The NTT Technology Experience Lab have brought together several highly experienced experts from different fields to give you valuable insights and answer your questions about this topic.

    Presenter:
    • Dominik Friedel & Christopher Stumm, Business Development Manager, NTT Ltd.
    • Frank Miller, Senior Key Account Manager, Schneider Electric
    • Gerd Koenig, Account Manager bei HUBER+SUHNER
    • Amir Shehadeh, International Business Development Manager, ioki - a DB company
  • Airheads Tech Talk: ArubaOS Switch config management using AirWave
    Airheads Tech Talk: ArubaOS Switch config management using AirWave
    Sreedhar Rajagopal, Technical Lead, Aruba ERT Sep 29 2020 9:00 am UTC 90 mins
    AirWave can push configurations to Aruba Switches. We will be covering the config management for Aruba OS switch using template and snippet.

    Join this webinar to learn more about:
    · This feature description.
    · The flow diagram.
    · AirWave and Switch Configuration.
    · Troubleshooting.
    · Discussion on known issues.
    · FAQ

    Your webinar details follow:

    Date & Time: Tuesday, 29 September 2020 at 11:00 CET

    Speaker: Sreedhar Rajagopal, Technical Lead, Aruba ERT

    For previous webinars do check our Airheads webinar page:
    https://www.arubanetworks.com/en-gb/resources/webinars/#category-airheads
  • The evolution of threat detection
    The evolution of threat detection
    Experts from BT - Tristan Morgan, Steve Benton, John Ashdown, and Aaron Lloyd Sep 29 2020 9:00 am UTC 30 mins
    In a rapidly shifting threat landscape, understanding adversary behavior and the biggest threats to your business is a constant challenge. The increasing number of threat actors, the loss of the network perimeter with cloud and a rise in remote working and connected devices to the network, all increase the number and types of threats you are exposed to.

    Join us in the second webinar of our security insights and trends series as we discuss how best to take effective action to prevent incidents occurring in the first place.
  • Let's be serious, data serious
    Let's be serious, data serious
    Nompumelelo Mokou and Jacques Schalkwyk from Dimension Data Sep 29 2020 9:30 am UTC 60 mins
    Intelligent Customer Experience Webinar

    This webinar uncovers the power that data analytics and automation has to help you manage your workforce, both from remote locations and from the office. Our solution will empower you with insights on employee behavioural dynamics and their operational productivity levels; facilitating a deep understanding of how to support your employees for maximum productivity and business continuity.

    Speakers:
    Nompumelelo Mokou- Dimension Data
    Jacques Schalkwyk - Dimension Data
  • The Path to Network Infrastructure Agility
    The Path to Network Infrastructure Agility
    Karthik Kannan, Sr. Product Manager Sep 29 2020 10:00 am UTC 53 mins
    The digital transformation is affecting enterprise networks driving a heightened need for infrastructure agility. It requires a rethinking of traditional approaches and focuses on business outcomes.

    Watch our on-demand webinar the webinar to learn more about:
    - The various network infrastructure management challenges posed by the digital transformation
    - How to achieve network infrastructure agility
    - The advantages of Network Automation
  • 5 MPLS Migration Challenges SD-WAN Solves
    5 MPLS Migration Challenges SD-WAN Solves
    Yishay Yovel, Chief Marketing Officer at Cato Networks Sep 29 2020 11:00 am UTC 52 mins
    It’s no secret that enterprises are looking beyond MPLS for their new WANs. For some, it’s the rigidity and high costs of MPLS services; for others, it’s MPLS’s complexity and incompatibility with the cloud. But how exactly will migrating to SD-WAN help you overcome MPLS’s limitations?

    Find out on our next webinar, as Yishay Yovel, Chief Marketing Officer at Cato Networks shares the stories of businesses from around the globe who made the transition to SD-WAN.

    Join us to hear:

    - How DSM Pharmaceuticals and Fisher & Company solve global latency issues without paying through the nose.
    - The ways UMHS and Pet Lovers Center, with its 100+ site Cato implementation, deliver direct, secure Internet access without deploying a heap of branch office security appliances.
    - What Brady PLC and Adroll did to optimize cloud access at the branch and on the road.
    - How companies reduce costs and optimize global voice and UCaaS delivery without relinquishing the control of MPLS.
  • Deutsch - APIs erfolgreich einsetzen
    Deutsch - APIs erfolgreich einsetzen
    Thomas Sterber | Cisco Meraki Sep 29 2020 12:00 pm UTC 26 mins
    In den letzten 3 Jahren hat Meraki in die eigene API-Fähigkeit investiert. Mittlerweile werden täglich durchschnittlich über 30 Millionen API-Aufrufe auf dem Meraki Dashboard getätigt, was etwa 20% aller unserer Kunden ausmacht.

    IT-Teams nutzen unsere Cloud-APIs für eine Vielzahl von Anwendungsfällen wie Netzwerkkonfiguration, Überwachung, Reporting und Automatisierung. Lernen Sie in unserem Webcast mehr darüber!
  • Android TV: Inside Google’s TV platform
    Android TV: Inside Google’s TV platform
    IBC365 | 3SS Sep 29 2020 1:00 pm UTC 75 mins
    As part of a themed week on the viewer experience, this webinar will focus specifically on Android TV, examining the vendor environment, including deployment options and key vendor partnerships.
    In considering the route to launching Android TV services, it will explore:

    -Video delivery and playback, including adaptive bitrate streaming
    -Hardware: Smart TVs and set top boxes
    -The viewer experience: User interface and quality of experience
    -Content discovery: Personalisation, apps and voice search
    -Understanding audiences: Managing and analysing viewer data
    -Monetisation platforms and commerce opportunities
  • A zero trust model: continuous security for remote digital technology users
    A zero trust model: continuous security for remote digital technology users
    Akhilesh Dhawan, Director, Product Marketing and Florin Lazurca, Sr. Technical Marketing Manager, Secuirty, of Citrix Sep 29 2020 1:00 pm UTC 49 mins
    In these trying times of catastrophic business disruptions, IT teams around the world have heroically implemented remote access for millions of displaced employees. But the rules of engagement continue to change as workers’ personal and corporate devices intermingle, introducing an exponentially larger attack surface. Have you developed a long-term strategy for secure remote access?

    Using a zero trust approach to deploy a secure digital workspace mitigates risk, providing access policies for the time of authentication and continuing protection while the user is working. Security remains in place across all types of applications in the cloud, on premises, or delivered through SaaS.

    Join this webinar as Akhilesh Dhawan, Director, Product Marketing and Florin Lazurca, Sr. Technical Marketing Manager, Secuirty, of Citrix, discuss:

    - Why fine tuning with security must be part of any savvy long-term strategy
    - How to implement a single, secure point of access for corporate resources
    - Why VPN solutions may not be the best answer for your workers or your enterprise
    - How Citrix defines “zero trust” and why it’s critical for remote working and BYOD scenarios.
    - Register now to learn how to add contextual and continuous security to your remote access strategy.
  • How to deploy LastPass across your remote workforce
    How to deploy LastPass across your remote workforce
    Seamus McLoughlin- Senior Lastpass Solutions Consultants, Natasha Griffin- Marketing Manager for IAM at LogMeIn Sep 29 2020 1:00 pm UTC 40 mins
    Make Remote Work Simple and Secure:
    The way in which we work has metamorphized in the past few months. The majority of work has transitioned to remote spaces and online access. Keeping our employees safe is more important than ever. In this webinar we look at how you can successfully roll out the world's most popular password manager across your workforce securing your employees from data breaches and identity theft.

    We review deployment tips and strategies to ensure that your remote workforce is able to access the applications and sites they need while remaining secure.

    In this session, we cover:
    -Automated user creation and management
    -Remote software installation
    -Recommended day one policies
    -Resource tool kits available to raise awareness among your workforce
  • Code42 Product Demo: Solving Insider Threat in 3 Clicks
    Code42 Product Demo: Solving Insider Threat in 3 Clicks
    Riley Bruce, Technical Product Manager at Code42 Sep 29 2020 3:00 pm UTC 24 mins
    66% of data breaches involve an insider. 73% go undetected for months. Detect & respond faster to the data risks looming inside. Why is insider threat on the rise? In spite of heavy investments into DLP or UEBA solutions, the problem is far from solved. Let Code42 show you how signal, speed and simplicity can enable you to solve insider threat in 3 clicks. No pitch, no introduction, just a technical product tour geared around you!

    Learn about…

    • UNIQUE DATA-CENTRIC APPROACH THAT PROVIDES A HOLISTIC SOLUTION TO INSIDER THREAT

    • GAIN VISIBILITY INTO DATA RISKS THAT LIVE ACROSS ENDPOINTS & CLOUD

    • TAKE ACTION AND SPEED YOUR OVERALL INCIDENT RESPONSE PROCESS
  • SD-WAN for the Digital Transformation
    SD-WAN for the Digital Transformation
    Charuhas Ghatge, Sr. Portfolio Marketing Manager, Nuage Networks from Nokia Sep 29 2020 3:00 pm UTC 60 mins
    SD-WAN, as name states, software-defined wide-area networks use software to control the connectivity, management and services between data centers and remote branches or cloud instances. Like its bigger technology brother, software-defined networking, SD-WAN decouples the control plane from the data plane.
    We also discuss the need, benefits, use cases of SD-WAN and then look at Nuage Networks SD-WAN 2.0, architecture and case studies.
  • Coffee Chat w/ Cricket: Connectivity, Local Survivability & Security at the Edge
    Coffee Chat w/ Cricket: Connectivity, Local Survivability & Security at the Edge
    Cricket Liu and SriKrupa Srivatsan Sep 29 2020 3:00 pm UTC 60 mins
    Networks today are more and more distributed. Applications and data no longer only reside in a company’s centralized datacenter or cloud infrastructure. Data now gets generated and consumed outside of centralized datacenters and SaaS adoption has skyrocketed. This is where edge computing and related network and security services (like DDI and DNS security) come into the picture.


    Join us for our upcoming “Coffee Chat with Cricket” to discuss at a high level what the edge is, what’s driving its adoption and how cloud hosted/managed networking and security stacks help provide agility, scale, local survivability and security for the edge. As always, we will also spend a considerable about of time answering questions from the audience.
  • Data Center Solutions: Open Networks
    Data Center Solutions: Open Networks
    Robert Lancaster, Apstra Network Architecture Guru and Alan Fagan, EPS Global IT industry expert Sep 29 2020 3:00 pm UTC 37 mins
    Imagine you could build a cost-effective data center network that was half the price to deploy and even cheaper to manage. A network that was more agile than your present proprietary one, and easier to automate, scale, secure, provision and upgrade.

    Join us for Data Center Solutions: Open Networks, a co-sponsored webinar where EPS Global and Apstra will walk you through how you can make automation a reality.

    This 30 minute webinar with time for Q&A is being presented by Robert Lancaster (Apstra): guru of Network architecture, Software Defined WAN and Security; and Alan Fagan (EPS Global), an IT industry expert with over 20 years selling the infrastructure that lives in the data center.
  • Recipes to creating modern IT operations
    Recipes to creating modern IT operations
    Juergen Knecht, Usman Sindhu, Tam Ayers, and Kristen Hoyt Sep 29 2020 3:00 pm UTC 55 mins
    Using intelligence and automation can help you ensure resilience for your critical business operations—supporting both your customers and workforce. Join us to hear the real-world benefits Ferguson Enterprises has seen on its digital transformation journey.

    Ferguson is the largest distributor of plumbing supplies in the U.S. By modernizing, this innovative company helped create efficient IT Operations that’s responsive to both customers’ and employees’ needs. Learn how in our webinar on:

    -Scaling IT operations to meet the needs of a dynamic business environment
    -Laying the foundation of a modern incident and change management
    -Tying service management to operations gaining complete visibility of infrastructure changes
    -Uplifting operational intelligence with modern event management
  • Building Smart Scalable Storage SoCs with Embedded PCIe Switching
    Building Smart Scalable Storage SoCs with Embedded PCIe Switching
    Stephane Hauradou, Product Marketing Sep 29 2020 3:00 pm UTC 60 mins
    As storage systems embrace NVMe and all-flash, the need for scalability coupled with constantly evolving application requirements prompt SoC architects to look for ways to differentiate and future-proof their designs.

    In this presentation we look at current storage architectures and propose an innovative way to design next-generation storage SoCs centered around the use of embedded PCIe switching.

    We then introduce PLDA’s PCIe switch IP along with some real-world use cases, and explore the various IP features and capabilities that enable differentiation and future-proofing of SoCs in storage applications and beyond.
  • SecureCloud Webinar: Cloud-Native Security without Compromise
    SecureCloud Webinar: Cloud-Native Security without Compromise
    Ben Grissinger, Cloud SME Sep 29 2020 3:00 pm UTC 60 mins
    Securing your cloud environment should not mean sacrificing the speed and agility of cloud application development and operations.

    In this webinar, learn how security teams using SecureCloud can accelerate a company’s digital transformation and move to the cloud by giving security, devops, and cloud operations teams a cloud-native automation solution for security policy. Topics covered:
    • Why traditional IT security processes and approaches don’t work for cloud-native
    • Align devops, security, and cloud-ops to create a security-first approach to cloud security
    • Automate security in a CI/CD process
    • Best practices for getting started
  • Taking Security OUT of Your Users’ Hands
    Taking Security OUT of Your Users’ Hands
    Brad Winston, HP Senior Security Specialist; Glenn Pitchford, Spicehead and PermiaCare IT Director Sep 29 2020 4:00 pm UTC 66 mins
    HP Senior Security specialist Brad Winston, along with Spicehead and PermiaCare IT Director Glenn Pitchford, discuss ways to mitigate users and prevent security attacks at the endpoint level. Attendees learned about HP security features, new predictions about data breaches/ransomware attacks, and much more.
  • Building a business case for SD-WAN
    Building a business case for SD-WAN
    Mike Shishman | VP Americas, Xalient Sep 29 2020 4:00 pm UTC 57 mins
    Join us for our upcoming live webinar: Building a business case for SD-WAN.

    In the webinar we will cover:

    - Common misconceptions associated with SD-WAN

    - The business case applied to SD-WAN use cases and a real-life case study

    - Highlighting the benefits of SD-WAN and tying these to your organisation's objectives

    This webinar will be hosted by Mike Shishman, Xalient's VP of Americas, with presenters Tom Grace, Pre Sales Manager and Chris Conerby, Technical Consultant.

    Xalient has a proven track record in helping enterprises develop successful SD-WAN business cases, with consideration to wider business objectives as well as minimising disruption in transitioning to the new SD-WAN environment.
  • The CIO Mandate for Secure Cloud Transformation
    The CIO Mandate for Secure Cloud Transformation
    Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, Managing Director at Cloud Security Zero Sep 29 2020 4:00 pm UTC 59 mins
    The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and technology leaders that cling to legacy architectures put enterprises at risk. Secure Cloud Transformation is a practical cyber security approach that prioritises security and user performance to align with today’s way of working.

    The session will be hosted by Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, who will share experiences from his time at a manufacturing and transportation services company with 12,000 users in over 100 locations and 70 countries

    They will discuss how enterprise IT leaders can:

    • Improve customer digital experience while safeguarding sensitive information

    • Increase user performance while minimising risk

    • Drive revenue and scalability while controlling costs

    Are you ready for a secure cloud transformation? Sign up for this webinar today!