Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Serverless Language Translation On-the-Fly with Microsoft Translator
    Serverless Language Translation On-the-Fly with Microsoft Translator Johnathan Flowers Recorded: Jul 18 2018 22 mins
    Cognitive services have hit the mainstream. Delivered through powerful, easy-to-use APIs, businesses can harness the power of artificial intelligence and machine learning and integrate them directly into their applications.

    With Microsoft’s exciting release of Translator v3, we just announced our Translator BLOCK - bringing the power of the Microsoft AI platform to PubNub. Using the BLOCK, you can now quickly and accurately translate natural text and speech into a number of different languages with no additional servers or logic required. With Functions, all language translation takes place in the network.

    In this webinar, we’ll introduce you to the new BLOCK, and show you how easy it is to implement powerful translation capabilities into your realtime app.
  • NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM ED
    NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM ED Ulf Mattsson, Dick Morrell, Juanita Koilpillai Recorded: Jul 18 2018 60 mins
    NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM EDT

    Financial Services and GDPR: The next 60 days….

    In response to GDPR and Privacy Shield changes, entities in the Financial Services Industries have taken initial steps to identify gaps and modify their public facing privacy policies. This session will focus on what these heavily regulated industries will have to do in the next 60 days to establish and maintain a legally defensible position with respect to privacy and security of personal data not only to comply with regulation but to be poised to do business in the 21st Century.
  • Flexible Cyber Threat Intelligence at the Network’s Edge
    Flexible Cyber Threat Intelligence at the Network’s Edge Ken Hosac, VP of IoT Strategy, Cradlepoint Recorded: Jul 18 2018 58 mins
    Network security needs are changing right before our eyes. Digital transformation is shifting workloads to the cloud, increasing mobile workforces, and expanding IoT footprints — and network on-ramps.

    From branch locations to in-vehicle networks and IoT devices, cyberattacks become more advanced by the day. Today’s diverse network architectures and security needs make scalable solutions and flexible cyber threat intelligence essential. Many organizations want the cost savings and efficiencies of the cloud without having to sacrifice the level of security to which they’re accustomed.

    Join Cradlepoint's Ken Hosac, VP of IoT Strategy, for this live webinar to explore the blending of legacy and next-generation measures to keep enterprise networks secure.

    Hosac has helped drive Cradlepoint’s growth and development through roles in strategic planning, product management, solution strategy and thought leadership. He frequently represents the company at industry conferences and events, and served on the original Advisory Board for the IoT/M2M Evolution Magazine. Hosac has 25 years of experience in marketing, sales, R&D and manufacturing. Prior to joining Cradlepoint, he served as VP of Marketing for Casabyte (later acquired by JDS Uniphase). He also served as VP of Business Development for GoAhead Software (later acquired by Oracle). Hosac earlier spent 10 years at Hewlett Packard with cable modems and head-ends, set-top boxes, and personal computers in a variety of engineering and engineering management roles. He holds a B.S. degree in Electrical Engineering and an M.S. degree in Manufacturing Engineering, both from Stanford University.
  • Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Three reasons to choose Citrix Workspace over VMware Workspace ONE Amandeep Nagra, Sr. Product Marketing Manager, Workspace services, Citrix Recorded: Jul 18 2018 57 mins
    Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.

    With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.

    Some of Citrix Workspace key advantages include:
    • Higher user productivity and a better experience
    • Stronger security which extends to the cloud
    • joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario

    Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
  • Verizon Threat Research Advisory Center - Insider and Privilege Misuse
    Verizon Threat Research Advisory Center - Insider and Privilege Misuse David Kennedy and John Rudolph, Verizon Global Security Recorded: Jul 18 2018 79 mins
    Leverage Threat Intelligence where it matters most.

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Insider and Privilege Misuse

    Our Verizon Threat Research Advisory Center presenters will be:

    • John Rudolph, Principal Consultant, Identity and Access Management
    • Steve Atnip, Senior Analyst, Threat Intelligence
    • David Kennedy, Managing Principal, Open Source Intelligence
    • Laurance Dine, Managing Principal, Investigative Response – EMEA

    For this month's theme of 'Insider and Privilege Misuse' we'll feature John Rudolph, Principal Consultant, Identity and Access Management who'll discuss insider threat motivations, common denominators, and countermeasures, to include the Zero Trust approach. We'll then touch base on the IR Pulse and trends in our caseload, followed by:

    • Current Intelligence
    • Attacks & Threat Indicators
    • Latest Malware Trends
    • Significant Vulnerabilities
  • Attacker’s Advantage - Understand How & Why Cyberattackers Beat Your Defence
    Attacker’s Advantage - Understand How & Why Cyberattackers Beat Your Defence Robert Healey, Senior Director Marketing, Asia Pacific, Tenable Network Security Recorded: Jul 18 2018 60 mins
    In its inaugural report, Tenable Research explores who has the first-mover advantage – cyber criminals or security teams? What’s the difference in time between when an exploit is publicly available for a given vulnerability and the first time that security teams actually assess their systems? And why does this even matter to your organization?

    The research team analyzed the 50 most prevalent critical and high-severity vulnerabilities from just under 200,000 vulnerability assessment scans over a three-month period. What did they find?

    Alarmingly, all too often, the attackers have the advantage. On average, they have a seven-day head start on defenders. Threat actors are sprinting ahead, exploiting vulnerabilities before security teams have even left the starting blocks – before businesses even know they’re at risk.

    Join Tenable and (ISC)² on Jul 18, 2018 (Wed) at 14:00 (Singapore Time) to understand how and why cyber attackers are beating your defence.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
    Moderator: Tony Vizza, CISSP Director, Cybersecurity Advocacy for APAC, (ISC)²
  • AI Ready Infrastructure For Deep Learning Deployment at Scale
    AI Ready Infrastructure For Deep Learning Deployment at Scale Michael Lang Senior Solutions Architect, NVIDIA ANZ and Michael Boots, Head of FlashBlade Sales ANZ, Pure Storage ANZ Recorded: Jul 18 2018 52 mins
    The era of Artificial Intelligence is here. Enterprises face an extraordinary opportunity to innovate and lead. However, real-world AI initiatives are often stalled by scale-out storage infrastructure complexities.

    In this webinar we’ll explore new approaches to enable AI-at-scale for enterprises, delivering time-to-insight in hours rather than weeks. We will also cover details and customer successes with AIRI™, the industry’s first complete AI-ready storage infrastructure, architected by Pure Storage® and NVIDIA® to extend the power of NVIDIA DGX™ systems.
  • A Framework to turn IoT Technology into Operational Capability for Mining
    A Framework to turn IoT Technology into Operational Capability for Mining Pieter van Schalkwyk, CEO, XMPro Recorded: Jul 17 2018 58 mins
    Digital Transformation through IoT that focuses on digital exploration, agile mining operations, connected assets, and next gen safety brings significant benefits to mining companies and mining technology suppliers alike. Mining organizations that don’t embark on IoT-enabled Digital Transformation will find it more challenging to compete in uncertain resources cycle. With more than 80% of IoT projects not progressing beyond POC stages according to Gartner, there is a disconnect between IoT technology and IoT capabilities.

    This stems from a technology-centric approach to IoT that focus on connected “things” and less on the expected business outcomes. A July 2017 McKinsey study found that 70% of their respondents identified “integrating IoT solutions into existing business workflows” as a capability gap. The IoT challenge that mining companies now face is less of a technology problem and more of a business process problem.

    This webinar presents a framework that provides the business architecture for using IoT that connects IoT technology to operational capability and business outcomes. The I2OC framework focus on aligning IoT technology with benefits such as increased asset availability, reduced downtime, reduced costs, increased efficiencies, and improve safety and governance. Pieter uses a practical mining example to present the I2OC framework.
  • Reducing Risk by Examining Threats that are Forming in the Cyber Ecosystem
    Reducing Risk by Examining Threats that are Forming in the Cyber Ecosystem Michael Suby, VP of Research at Frost & Sullivan, and James Carnall, VP of Customer Support Group at LookingGlass Recorded: Jul 17 2018 63 mins
    In the highly dynamic online landscape of misinformation, fake news, gossip, and the trading of absconded data, organizations must expand their cybersecurity arsenals in protecting their brands, personnel, facilities, and sensitive information. They must take into account what exists outside the perimeter in the greater cyber ecosystem: the surface, dark, and deep web. Locating and assessing these threats, however, is a challenge for even experienced threat hunters. The tools and techniques are non-standard. You should ask yourself, “Is my security team ready to tackle what lies beyond the perimeter?” If not, let us shed light on this topic. Register for LookingGlass' "Threats Beyond the Perimeter" webinar on Tuesday, July 17 @ 2 pm ET to hear Michael Suby, VP of Research at Frost & Sullivan and James Carnall, VP of Customer Support Group at LookingGlass discuss how these scenarios may affect your brand, employees, and facilities.
  • Harnessing Cybersecurity Automation
    Harnessing Cybersecurity Automation Holly Schipper, Product Marketing Manager, Cybersecurity. Juniper Networks Recorded: Jul 17 2018 21 mins
    An understaffed security workforce is struggling to protect your evolving enterprise from ever changing cyber threats. Automation could be the answer to hardening your security posture in these shifting sands. However, the task of implementing automation across such a diverse and continuously morphing environment presents a challenge.

    In this webinar, we will discuss the benefits, complexities and best practices of implementing security automation.
  • SD-WAN & Hybrid WAN in the Art of Digital Network Transformation
    SD-WAN & Hybrid WAN in the Art of Digital Network Transformation Joel Stradling, Research Director, Global Data, Peter Juffernholz, Associate VP Global Network Services, TATA Communications Recorded: Jul 17 2018 61 mins
    GlobalData research reveals that around 70% of businesses have either deployed or are deploying SD-WAN technology. Businesses are moving more and more of their IT estate into cloud platforms which is the driver for SD-WAN adoption. Of course, this easily enables SD-branches for enterprises to make their businesses more agile and cost-effective.

    Join this webinar to understand the benefits and real-life experiences of end-users who have deployed hybrid WAN and SD-WAN services. Hear our speakers discuss the link between their analysis and the over-arching theme of enterprise digital transformation along with security, cloud, and applications. Get deep insights on how current enterprise WANs are transforming, and the drivers causing the change as we approach 2020. We will share insights from case-studies based on industrial applications of SD-WAN and hybrid VPNs across a handful of industry segments.

    From this webinar, you’ll get a clear picture of how you can transform your network through tactical migration to hybrid VPN and SD-WAN.


    · What does Digital Transformation mean to the Enterprise
    · Drivers for Digital Transformation: Network & IT
    · What should a fully managed hybrid/SD-WAN solution look like in 2020?
    · Industry-specific challenges: Manufacturing, Services and Logistics
    · SD-WAN/Hybrid WAN Case-studies
    · Recommendations and Executive Summary
    · Q&A
  • A pragmatic approach to service assurance in 5G network slicing
    A pragmatic approach to service assurance in 5G network slicing Anton Basil, Vice President – Technology, Veryx Technologies Recorded: Jul 17 2018 42 mins
    Many leading network operators as well as network equipment manufacturers have already recognized network slicing as an ideal network architecture for 5G deployment. It provides the flexibility for network operators to slice one physical network into dedicated virtual networks, logically separated from one another and dedicated for different types of services, with different characteristics and requirements.
  • Incident Remediation: Could this have been prevented?
    Incident Remediation: Could this have been prevented? Manfred Erjak, Consultant, Professional Services Recorded: Jul 17 2018 31 mins
    Third and final part of our 'Breach Response Preparedness Series', a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.

    Recovering from a large-scale incident is not an easy task. When compromised by an Advanced Persistent Threat, one must plan the efforts ahead of time to succeed in fully remediating and eradicating the attacker from the environment.

    During this webinar, we will discuss:
    - How to best remediate from such an event;
    - The different stages of the preparation, when it is the best time to remediate, and how to classify actions;
    - Examples of real investigations and remediation efforts to illustrate common complications like remediating too early, remediating partially and working with third party IT providers

    Join your host Manfred Erjak, Professional Services Consultant, for a 25-minute webinar to discuss the latest incident remediation trends.
  • Why Threat Intelligence should be a key tool in your security portfolio
    Why Threat Intelligence should be a key tool in your security portfolio Fleming Shi, Senior Vice President, Advanced Technology Engineering, Barrcuda; Brianna Fischer, Product Marketing, Barracuda Recorded: Jul 17 2018 50 mins
    Knowing which threats are trending right now—and which vectors criminals are using to attack you—is the key to optimizing and fine-tuning your security policies and solutions for effective protection.
    Barracuda collects a vast flow of real-time information and uses big data analytics to crunch those numbers in order to deliver up to date, actionable insights. In this interactive live session with Brianna Fischer and Fleming Shi will discuss:

    • Latest threats in cyber security
    • Real world examples of using threat intelligence in defending against cyber attacks
    • How to use threat intelligence to fine tune your security policies
    • How to gain access to the information you need to stay ahead of the biggest cyber threats

    Register to learn the fastest, easiest way to get the information you need to stay ahead of the biggest cyber threat trends.
  • AI and the new Cyber Battlefield
    AI and the new Cyber Battlefield Simon Bryden, Consulting Systems Engineer, Fortinet Recorded: Jul 17 2018 48 mins
    As the scale and complexity of cyber attacks grows faster than ever, new ways must be explored to fight back.

    Using machines to perform tasks such as malware analysis and real-time anomaly detection means a faster time to protection, frees up analyst time for more advanced research, and marks a big step forward in the battle against cyber crime.

    This session discusses how you can leverage machine learning and other artificial intelligence techniques to enhance and extend your existing detection methods.
  • Impact of a Law Firm Data Breach
    Impact of a Law Firm Data Breach Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Recorded: Jul 17 2018 3 mins
    Check out this webinar clip from our insightful talk on "Overcoming The Cybersecurity Skills Shortage in Law Firms" to understand which areas of a law firm can be affected by a data breach.

    To see the full webinar, click here: https://arcticwolf.com/resources/webinars/?utm_source=Arctic+Wolf+Networks&utm_medium=brighttalk&commid= 330632
  • Containers and Kubernetes: Visibility through CloudLens
    Containers and Kubernetes: Visibility through CloudLens Sushil K. Srinivasan, Sr. Product Manager, Ixia, a Keysight Business. Chris Hein, Partner Solutions Architect, Amazon Recorded: Jul 13 2018 35 mins
    As systems evolved from physical servers to virtual machines to the public cloud to containers, the design focus shifted from building a single robust, stable component to building a more stable microservice oriented system where individual service components can be modified or replaced without affecting the overall system. Enterprises in this evolution cycle continue to have a mix of their applications running on physical hardware, virtualized platforms, in public cloud infrastructures and Kubernetes container clusters.

    During this webinar, experts from AWS and Ixia, a Keysight business will share:
    •Strategies to provide packet visibility to your workloads in any environment
    •Insights into planning and implementing strategies
    •Review emerging designs and best practices

    You will also see a step-by-step demonstration of how you can establish packet visibility into your workloads in Physical, Virtual, Cloud, Container or in a Kubernetes Cluster by continuing to maximize on your existing investment in APM, NPM and IDS tools.

    Register to watch this webinar and demo now.
  • Containers Infrastructure EcoCast
    Containers Infrastructure EcoCast Josh Williams, Product Manager Recorded: Jul 12 2018 18 mins
    Learn how you can improve container troubleshooting and performance using next-gen monitoring techniques; why containers are the future of enterprise workloads; how real companies are adopting container technology; and what you’ll need to prepare yourself for containers in the datacenter or the cloud.
  • Developing an effective Software-Defined-WAN Strategy for your business
    Developing an effective Software-Defined-WAN Strategy for your business John Elliott, Principal Consultant, Carousel Industries Recorded: Jul 12 2018 43 mins
    With a wide range of SD-WAN solutions from dozens of vendors, how do you determine what’s best for your business?

    With the adoption of cloud, and support for rich media applications and mobile users, network managers are moving towards a software-defined approach to evolve their WAN, but selecting the right vendor and consumption model can be overwhelming.

    This webinar provides a decision framework for developing your strategy and making the right choices for your business.

    In this webinar, you will learn:

    • The specific capabilities SD-WAN solutions should be delivering
    • MPLS vs SD-WAN and the pros and cons of each
    • How to navigate the SD-WAN vendor landscape
    • The predominant SD-WAN consumption models, and the benefits and pitfalls of each
  • Network reliability for your WAN and beyond
    Network reliability for your WAN and beyond Jason Poole, Principal Product Marketing Manager, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Recorded: Jul 12 2018 52 mins
    A reliable network is crucial to the delivery of applications. Digital transformation is driving enterprise IT to re-evaluate their application delivery capabilities to ensure that the business continues to grow and innovate while delivering the best possible experience to branch users. This talk examines the expectations of the WAN and how to use it to effectively deliver virtualized applications from a centralized location, as well as the trend of cloud migration of IT resources as it pertains to user experience and WAN cost reduction.

    In this webinar you will learn how:
    •Intelligent traffic-steering allows Internet and SaaS breakout from the branch
    •To ensure secure, cost-effective access to traditional and modern applications from the branch
    •Real-time application classification can help utilize WAN links efficiently
    •To use SD-WAN to improve the HDX experience for branch users
  • [Ep.18] Ask the Expert: What I Wish I Knew About SDN & Automation Years Ago
    [Ep.18] Ask the Expert: What I Wish I Knew About SDN & Automation Years Ago Darien Hirotsu, Solution Architect, SDN Essentials and Kelly Harris, Senior Content Manager, BrightTALK Recorded: Jul 12 2018 49 mins
    This webinar is part of BrightTALK's Ask the Expert Series.

    Join Darien Hirotsu, Solution Architect at SDN Essentials and Kelly Harris, Senior Content Manager at BrightTALK, as they take a technical deep dive into software-defined networks and automation.

    Darien will answer questions related to trends from the field, including:

    - Building the development pipeline
    - Lessons learned building automation solutions

    He will share expert insight into what he wish he had known about software-defined networking and automation years ago, and help you jump start your SDN solutions.

    Audience members are encouraged to send questions to the expert which will be answered during the live session.
  • Mind the Gap: The 5 Most Common Cloud Security Oversights
    Mind the Gap: The 5 Most Common Cloud Security Oversights Jacob Serpa, Product Marketing Manager, Bitglass, Brandon Dunlap (Moderator) Recorded: Jul 12 2018 60 mins
    Even with a renewed focus on security, cloud applications have introduced new risks that many organizations have yet to address. Powerful productivity platforms have been widely deployed in an effort to enable employee communication and facilitate collaboration. Apps enabling employee communication and collaboration cannot be secured with traditional firewalls and gateways. They require a fundamental rethinking of security – a shift from endpoint and network-centric protection to data protection. Join Bitglass and (ISC)2 on July 12, 2018 at 1:00PM Eastern as we explore the five most common security oversights that may put your cloud data at risk.
  • Marie Curie, Open Source, Kickstarter and Women in Tech
    Marie Curie, Open Source, Kickstarter and Women in Tech Mandy Whaley, Director of Developer Experience, Cisco Recorded: Jul 12 2018 49 mins
    Think of Marie Curie. Would you expect to find a fascinating number of similarities between the Curie's treatment of their work in the early 1900's and today's tech industry? I certainly didn't…

    Join Mandy Whaley to explore how the Curie's used an approach similar to modern Open Source licensing to open the process for isolating radium to the scientific community, and how the limitations at the time on the rights of women to own intellectual property influenced this decision.

    Also, learn how Marie Curie also used a strategy similar to Kickstarter to raise funds to buy radium for her own research, and how all of these experiences and lessons can help us today.
  • It takes Deep Learning to Harness the Internet!
    It takes Deep Learning to Harness the Internet! Wes Jensen, CEO & Co-Founder (Netrolix) Recorded: Jul 12 2018 49 mins
    Netrolix leverages artificial intelligence to analyze network data to improve throughput by making more intelligent routing decisions. AI-WAN combines Netrolix Software Defined Gateways (SDG) with the company’s Machine Learning controller technology that provides deep analysis of network routes to identify the least congested and fastest data path through the network.

    The Software Defined Gateway (SDG) is a multifunction network appliance that can be deployed as a router, switch, firewall, or SD-WAN appliance.

    This provides full SD-WAN capabilities with intelligent switching of data across IP, multiprotocol label switching (MPLS), virtual private LAN service (VPLS), and virtual private network (VPN) connections, or it can be deployed as a termination point for carrier services.

    The Machine Learning controller platform analyzes real-time and historical information on network performance including data center locations, service provider tendencies, current congestion issues, time of day, and historical traffic patterns.

    Lastly, the Security Shield enhances these capabilities through the creation of unique security profiles for each device, location, and network in an enterprise. The Machine Learning technology analyzes data from these devices to spot traffic anomalies that are consistent with malware or network attacks.
  • Integrate your Micro Focus IT Operations into a Single Pane of Glass 4D Solution
    Integrate your Micro Focus IT Operations into a Single Pane of Glass 4D Solution Ed Willhide Recorded: Jul 12 2018 59 mins
    edgeSuite is a fully secure, system control plane that integrates your applications and data into SPoG (Single Pane of Glass) in a 4D solution. edgeSuite is unique in the marketplace because it incorporates the data within your environment, and the methods used to manage your business to create a single tool for both back-end and front-end solutions. When you are dealing with multiple data sets and multiple data sources, you are faced with the problem of complex navigation of different software solutions, and the inability to access them simultaneously in an efficient and effective way. Come to our webinar and learn how you can optimize your current Micro Focus investments. Seeing is believing!

    What you will learn:

    •How our ETV technology collects data for visualization and actionable response
    •How our Click-to-Write-Back and Click-to-Navigate technologies streamline operations over your digital transformation suite
    •How to create Role-Based views
    •How a Single Pane of Glass solution is built
  • Rethinking Security
    Rethinking Security Adrian Rowley, Technical Director EMEA Jul 19 2018 9:00 am UTC 45 mins
    This webinar looks at how to eliminate complexity, increase efficiency of security tools, and improve confidence in the overall security posture of your organisation.
    Adrian Rowley, Gigamon’s Technical Director for EMEA, will discuss todays challenges in network security and how these can be resolved.
    Attendees will learn how you can:
    •Maximise network availability and operational simplicity of security tool upgrades with its integrated inline bypass technology
    •Deliver unmatched depth and breadth of traffic intelligence that is essential to increasing efficiency of overburdened security and networking tools, while decreasing complexity
    •Minimise Total Cost of Ownership and increase ROI by an average of 153%
    Join Adrian Rowley to see why only Gigamon provides a full solution for networking tools and inline and out-of-band security tools across on-premises, remote, virtual and cloud environments.
  • Implementing next-gen PON technologies over existing fiber infrastructure
    Implementing next-gen PON technologies over existing fiber infrastructure Steven Van Den Bergh, Nokia and Guillaume Lavallee, EXFO Jul 19 2018 2:00 pm UTC 75 mins
    This webinar, jointly hosted by the TIA Fiber Optics Tech Consortium and the Association for Passive Optical LANs, will discuss Passive optical LANs (POL) technology, comparing POL and traditional Ethernet switching architectures, and reviewing the Telecommunications Industry Association (TIA) standards applicable to the design and testing of POL solutions to address considerations such as splitters, connectors and signals.
  • Can computers be creative? Integrating AI in media content workflows
    Can computers be creative? Integrating AI in media content workflows IBC365 | Adobe | GrayMeta | Channel 4 | EBU Jul 19 2018 3:00 pm UTC 75 mins
    Artificial intelligence (AI) and machine learning are starting to transform the way content is created, managed and delivered.

    New cognitive-computing tools are enhancing creativity, eliminating mundane repetitive work and unlocking new value from content.

    AI is suddenly everywhere: the ready availability of powerful AI services from all the major cloud providers means hundreds of media technology products are plugging into AI and offering new ways of working.

    This webinar cuts through the hype to reveal how media companies are actually using AI tools throughout the content supply chain - from aiding craft and creative work in post-production, automating metadata extraction and compliance, to making smart content recommendations to audiences. Our speakers will explain how best to use AI, what we can and can't do, and how it will continue to change workflows into the future.

    Michael Gamböck, Senior Strategy Relations EMEA, Creative Cloud Video, Adobe
    Josh Wiggins, Chief Commercial Officer, GrayMeta
    Neil Taylor, Lead Data Strategist for Commercial Innovations, Channel 4
    Jean-Pierre Evain, Principal Project Manager, EBU Artificial Intelligence Committee
  • Master DNS Security for a Bulletproof, Tier One Network
    Master DNS Security for a Bulletproof, Tier One Network Tony Scott, DJ Goldsworthy, D.J. Long, Cricket Liu, Victor Danevich Jul 19 2018 6:00 pm UTC 90 mins
    You're charged with building a bulletproof, tier one secure network. If your Domain Name System (DNS) goes down, nothing else matters. And, DNS is the leading attack vector for cyber villains. Say “Hack no! ” to DNS threats.

    Join guest speaker Tony Scott, former CIO of the United States, Microsoft, and the Walt Disney Company, alongside leading practitioners from Aflac and McAfee in this live panel discussion. This unique gathering of industry experts will discuss their perspectives on building a safe, secure network and actionable best practices in this era of cloud and mobile. Moderated by Infoblox Chief DNS Architect Cricket Liu, this discussion will give you an opportunity to hear from the experts and ask questions about.

    - What leading organizations are doing to secure their DNS
    - When to best utilize DNS data, network context, and threat intelligence in your security operations
    - How to integrate DNS data with your security ecosystem to accelerate threat mitigation and remediation
    - How Aflac blocked nearly 37 million threat connections with < 100 false positives

    Save your spot now.







  • Top Five Benefits of Versa SD WAN
    Top Five Benefits of Versa SD WAN Danny Johnson, Dir-Verizon, Helen Wong, Verizon, Rob McBride, Dir-Versa Jul 24 2018 3:30 am UTC 60 mins
    Join us and our strategic partner, Versa Networks, for a discussion on Managed SD WAN Security Branch solutions. Through real use cases in deployments at scale, we will discuss how Managed SD WAN can help increase bandwidth, agility and reliability - while maintaining security.
  • Обзор решений Dell EMC VMware Validated Design
    Обзор решений Dell EMC VMware Validated Design Андрей Николаев, специалист Dell EMC по облачным платформам Jul 24 2018 8:00 am UTC 60 mins
    Построение программно-определяемого ЦОД на базе гиперконвергентных платформ Dell EMC и технологий VMware. Обзор решения Dell EMC VMware Validated Design.
    Вебинар проводится при поддержке компании Intel®
  • Repenser la sécurité
    Repenser la sécurité Yann Samama, Consutlant Solutions de Sécurité Jul 24 2018 8:30 am UTC 45 mins
    Les évolutions technologiques, les nouvelles normes, l’augmentation constante du trafic, la complexité des infrastructures réseau au sein desquelles l’information est de moins en moins visible, ainsi que les cyber-menaces de plus en plus sophistiquées ont un impact majeur sur les entreprise et les obligent à repenser l’architecture de sécurité.

    Yann Samama discutera des défis actuels en matière de sécurité et comment ils peuvent être surmontés en abordant les sujets majeurs tels que :

    * Augmenter la disponibilité du réseau tout en simplifiant la  connectivité des outils grâce à une solution de module bypass
    * Disposer d’une visibilité en tout point réseau afin d’améliorer de l’efficacité de l’ensemble des outils connectés  tout en réduisant la complexité de leur exploitation
    * Diminuer les coûts OPEX et CAPEX via un  ROI très court-termisme

    Découvrez les raisons pour lesquelles Gigamon propose la solution la plus complète et efficace pour la connectivité des outils en mode « inline et Out of band » au sein des environnements physiques, virtuels et de cloud public.
  • [US/UK] Network security at the speed of DevOps
    [US/UK] Network security at the speed of DevOps Anner Kushnir, VP Technology Jul 24 2018 3:00 pm UTC 60 mins
    DevOps methodologies have become extremely popular to enable agile application development and delivery.
    Unfortunately, when it comes to the associated network connectivity, such as whenever a new application needs to connect to an external resource, the process breaks. The application developer then needs to open change requests and wait for approvals which effectively breaks the continuous delivery cycle. As a result security is in the uncomfortable position of being a bottleneck and an impediment to innovation.

    In this webinar, Anner Kushnir, AlgoSec’s VP of Technology will describe how the innovative 'Connectivity as Code' approach can be implemented to overcome these challenges, and seamlessly weave network security into the existing CI/CD pipeline in order to fully automate the application delivery process end-to-end.

    Attend this webinar to learn how to:
    •Seamlessly manage network connectivity as part of the DevOps process for faster, more agile and problem-free application delivery
    •Avoid external out-of-band network connectivity problems that require separate and manual handling
    •Ensure continuous compliance and auditability throughout the application delivery process
    •Get clearly documented application connectivity requirements which help prevent disruptions to the business
    •Bridge the gap between application developers and network security throughout the entire application lifecycle
  • Reliable & Agile Network Connectivity for Digital Signage
    Reliable & Agile Network Connectivity for Digital Signage Michael Dickens, Sr. Solutions Engineer & Joe Wagner, Solutions Engineer at Cradlepoint Jul 24 2018 4:00 pm UTC 60 mins
    Consumers are no longer just observers in the world of signage; today they can engage in an enriched, interactive viewing experience.

    However, to become digital, applications need a secure, reliable network solution, providing faster ROI and added value. When digital signage is connected to the Internet, it’s possible for businesses to gain real-time intelligence and respond to information quickly. Wireless connectivity lets the network move fast to adjust messages as frequently as necessary. Businesses can also manage a single wireless network — with devices connecting across the world — from a single, remote location. Additionally, keeping digital signage on its own wireless network, physically separate from the main network, strengthens cybersecurity by shrinking a company’s attack surface.

    Digital signage solutions may encompass many features including:

    - Industrial monitoring
    - Sensors
    - Ambiance for & customer experience
    - Data analysis & delivery plans for assisted selling
    - Product information
    - Brand messaging & marketing
    - Real-time intelligence & customer engagement
    - Self-service applications
    - Wayfinding

    Digital signage can reach consumers in a way that print and static signage can only dream of, and the adoption of digital signage is only growing as cloud, mobile, and wearables become the norm. However, implementation of these applications will not be successful without a constant, secure network connection.

    Join Cradlepoint for a live webinar on July 24, 2018, at 9:00 am PT to learn about trends and advancements in digital signage and how reliable connectivity and cloud management impact and enable deployments.

    Michael Dickens is a Senior Solutions Engineer at Cradlepoint. Over his 8-year tenure at Cradlepoint, he has brought the company from a consumer based applications company to full robust enterprise solutions. In his previous careers, he worked on DoD networks, ISPs, data center management, and he attended Boise State University.
  • What's new in ONAP Beijing Release?
    What's new in ONAP Beijing Release? Amar Kapadia, Co-founder Aarna Networks, Inc. Jul 24 2018 4:00 pm UTC 45 mins
    Are you worried about orchestrating your NFV/SDN network services and edge computing applications? The Linux Foundation Open Network Automation Platform (ONAP) promised to be a key component of next generation networks to orchestrate, configure, monitor and automatically manage complex services and applications. With the recent Beijing release, the ONAP community has fortified software stability, harmonized northbound APIs with standard bodies, improved ONAP deployment using Kubernetes, added important functional features and created two new projects. If you have not followed the release too closely, join us for this webinar and learn all about it. In this webinar, you will learn:
    •What is ONAP?
    •How can ONAP help you?
    •What is new in the Beijing release?
    •How can you get involved?
  • Open source Kubernetes run-time security with Falco
    Open source Kubernetes run-time security with Falco Michael Ducy Jul 24 2018 5:00 pm UTC 30 mins
    Cloud Native platforms such as Kubernetes and Cloud Foundry help developers to easily get started deploying and running their applications at scale. But as this access to compute starts to become ubiquitous, how you secure and maintain compliance standards in these environments becomes extremely important. In this talk we'll cover the basics of securing Cloud Native platforms such as Kubernetes. We will also cover open source tools - such as Anchore, and Sysdig Falco - that can be used to maintain secure computing environment. Attendees will leave with a good understanding of the challenges of securing a Cloud Native platform and practical advice on using open source tools as part of their security strategy.
  • SD-WAN – The Lynchpin in a Transforming Virtual Cloud Network
    SD-WAN – The Lynchpin in a Transforming Virtual Cloud Network Zeus Kerravala, Principal Analyst & Founder, ZK Research Jul 24 2018 5:00 pm UTC 60 mins
    Networking is in a constant state of change, but the with the advent of cloud and virtualization, the current evolution is altering the way we’ve traditionally understood it. The Virtual Cloud Network is about virtualization, connecting data centers and branches and cloud to each other in a seamless and flexible manner that supports this evolution for the next several decades. The lynchpin to this new architecture is SD-WAN, with its pervasive, scalable, and adaptable framework.

    In this webinar, Zeus Kerravala of ZK Research, discusses how SD-WAN is transforming networking and enabling the adoption of Virtual Cloud Network to occur.
  • 2018 Security Congress Preview – Cloud Security
    2018 Security Congress Preview – Cloud Security Mike Brannon, Dir, Infrastructure & Security, National Gypsum; Tim Sills,Accudata; Tyler Smith, IT Analyst, John Deere Jul 24 2018 5:00 pm UTC 75 mins
    (ISC)2 will hold its Security Congress 2018 in New Orleans, LA, October 8th – 10th. This conference will bring together 2000+ attendees and over 100 educational sessions. One of the 13 tracks that are being offered with focus on Cloud Security and challenges practitioners face when dealing with all things cloud. On July 24, 2018 at 1:00PM Eastern, join (ISC)2 and several of the speakers who’ll be presenting in the Cloud track as we preview their sessions, get an idea of what will be discussed and discuss the state of cloud security today.
  • 11ax Wi-Fi What you need to know for 2018
    11ax Wi-Fi What you need to know for 2018 Nathanial Moore, CWNE Systems Engineer, UK Aerohive Networks Jul 25 2018 10:00 am UTC 45 mins
    Are you ready for 802.11ax? This fast approaching IEEE standard addresses some of today’s biggest high density and performance challenges – increasing capacity by up to 4x; improving spectral efficiency to benefit both 2.4GHz and 5GHz bands in a variety of environments.

    Today’s 802.11ac standard already presents many fantastic capabilities for capacity and performance. So if you’re reviewing your network, which is right for you: 11ac or 11ax? And what will be the benefits of upgrading from 11ac?

    Join us for this 30 minute quick-hit, reviewing 11ax’s most important components:

    • PHY and MAC layer enhancements for better traffic management
    and efficiency
    • Downlink & uplink OFDMA; 8 x 8 MU-MIMO; Spatial re-use
    • Considerations for clients and wider network enhancements
  • The Dark Side of SD-WAN
    The Dark Side of SD-WAN Yishay Yovel, vice president of marketing at Cato Networks Jul 25 2018 1:00 pm UTC 60 mins
    If you are considering deploying SD-WAN in your network, you probably hear a lot about its benefits. But, you may be unsure what it will take to move from your legacy MPLS and VPN network to SD-WAN. What problems will you face and how will you tackle them?

    In this live webinar, Join Yishay Yovel, vice president of marketing at Cato Networks, to learn:

    - Key planning considerations when migrating to SD-WAN
    - Availability and capacity guidance for augmenting or replacing MPLS services with Internet services
    - The impact of SD-WAN deployment on security, global connectivity, WAN management
    - When to launch and how to fund the SD-WAN project
  • Webinar: An Actionable Plan for Segmenting Your Network
    Webinar: An Actionable Plan for Segmenting Your Network Erez Tadmor,Sr. Product Manager, Tufin & Dan Rheault, Sr. Product Marketing Manager, Tufin Jul 25 2018 3:00 pm UTC 60 mins
    A segmented network operationalizes your network security policy, enables a demonstrable state of continuous compliance, and provides mitigation options for cyberattacks.

    Our advice: organizations must go back to the basics to accomplish this crucial project.

    This webinar will cover actionable tips for network segmentation based on the experience of over 2,000 organizations. We will share:
    •Common pitfalls to avoid
    •How to start segmenting your network today
    •Tips for applicable enforcement
    •Q&A from the attendees
  • DPDK 18.05 New Features
    DPDK 18.05 New Features Tim O’Driscoll, Software Product Marketing for DPDK, Intel Jul 25 2018 3:00 pm UTC 45 mins
    This webinar will describe the new features introduced in the most recent DPDK release, 18.05. It will also describe some of the features planned for the next release, 18.08, which is due in August.

    Key features included in the 18.05 release include: changes to the memory subsystem to allow dynamic allocation of memory, creation of a new API to support hardware and software acceleration of compression, extension of the vhost-user library to support a hardware accelerated data path, support for crypto operations via virtio, and the addition of port representors which provide a generic framework for virtual function management in DPDK.
  • Network Verification: Are Error-Free Networks Really Achievable?
    Network Verification: Are Error-Free Networks Really Achievable? Nikhil Handigol, Co-Founder Forward Networks Jul 25 2018 5:00 pm UTC 30 mins
    It is now possible to proactively verify large enterprise networks are error-free, end-to-end. Network verification makes it possible to certify updates before pushing them live, to avoid outages and accelerate change windows. Join Forward Networks Co-Founder Nikhil Handigol to learn how this new network analysis technology can greatly simplify network IT and ensure 100% policy compliance. Includes a live demo.
  • A CTO’s Perspective: Network Security for the Cloud Generation
    A CTO’s Perspective: Network Security for the Cloud Generation Dr. Hugh Thompson, CTO Symantec and Mark Urban, VP Product Strategy & Operations, Symantec Jul 25 2018 5:00 pm UTC 30 mins
    Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. Traditional approaches to network protection are going away as the concept of a secure perimeter disappear.

    In this webcast we’ll look at today’s new business paradigm, the challenges we now face, along with best practices for building a secure network in the cloud.

    Join Hugh Thompson, CTO of Symantec, and Mark Urban, VP Product Strategy & Operations, Symantec as they share their vision for Cloud Generation Network Security and how they see leading companies of all sizes prepare for the future.

    In this session they’ll discuss:

    •. A security insider’s view of market trends and the 24/7/365 demands of a distributed workforce

    •. The increased complexity of managing full security stack with limited resources

    •. The technical challenges of securing cloud applications

    •. Cloud solutions that solve cloud problems

    It promises to be an insightful event for all security, network and IT professionals. After their presentation the speakers will also take questions from the audience.

    We highly encourage you to register and reserve your spot today.

    Register Now
  • Sicherheit neu überdenken
    Sicherheit neu überdenken Daniela Fusaro, Senior Solutions Architect Jul 26 2018 8:00 am UTC 45 mins
    Dieses Webinar befasst sich mit der Beseitigung von Komplexität, der Steigerung der Effizienz von Sicherheitstools und der Verbesserung des Vertrauens in die allgemeine Sicherheitslage Ihres Unternehmens.

    Daniela Fusaro, Senior Solutions Architect, diskutiert die heutigen Herausforderungen im Bereich der Netzwerksicherheit und wie diese gelöst werden können.

    Die Teilnehmer lernen, wie man:
    * Netzwerkverfügbarkeit und einfache Handhabung der Upgrades von Sicherheitstools durch integrierte Inline-Bypass-Technologie maximiert
    * Unerreichte Tiefe und Breite der Traffic-Intelligenz bereitstellt, die für die Steigerung der Effizienz überlasteter Sicherheits- und Netzwerktools unerlässlich ist, während gleichzeitig die Komplexität verringert wird
    * Gesamtbetriebskosten verringert und den ROI um durchschnittlich 153 % steigert

    Melden Sie sich bei Daniela Fusaro an, um zu erfahren, warum nur Gigamon eine Komplettlösung für Netzwerktools sowie Inline- und Out-of-Band-Sicherheitstools in lokalen, Remote-, virtuellen und Cloud-Umgebungen bietet.
  • Media at the Edge: A new content technology perspective
    Media at the Edge: A new content technology perspective IBC365 | Schneider Electric | BASE Media Cloud Jul 26 2018 3:00 pm UTC 60 mins
    What you will learn:

    - What is Edge computing and why it will be key to broadcasting, media and entertainment

    - How edge computing is rapidly evolving to provide content anywhere and everywhere through the IoT and soon across 5G networks
    - What mobile edge computing means for production, processing and video distribution
    - How new consumer experiences, VR, AR, UHD streaming will be driven by the availability of edge infrastructure
    - Protecting the physical and digital assets. How to secure the critical IT infrastructure which will house valuable content at the edge of the network

    Steven Carlini, Senior Director Data Centre Global Solutions, Schneider Electric
    Damon Neale, Chief Technology Office, BASE Media Cloud
  • 30 minutes to a more secure, predictable, and stable infrastructure
    30 minutes to a more secure, predictable, and stable infrastructure Amaya Gil Pippino, senior technical marketing manager, Red Hat Jul 26 2018 3:00 pm UTC 30 mins
    To keep pace with digital transformation and the rapid changes it brings, modern IT infrastructures have become increasingly complex. However, this complexity often equals added risk. To succeed, businesses must reduce downtime—and ultimately help their stakeholders succeed.
    If you are using the management and provisioning capabilities of Red Hat® Satellite, you may find additional benefit from adding Red Hat Insights to monitor your IT environment. Insights helps to reduce complexity by proactively identifying and remediating issues before business operations are affected.

    In this short webinar, you'll learn:

    > Why Red Hat Insights might be of interest to your team.
    > How to quickly and easily get your team started with Red Hat Insights.
    > How to use Red Hat Ansible® Automation to streamline large and small deployments.
    > The answers to your question from Red Hat experts.
    > Get proactive infrastructure management by viewing your entire Red Hat ecosystem from one Satellite dashboard—to quickly view risks to stability, security, availability, and performance and get clear, prioritized, and actionable remediation instructions.
  • Best practices for Forensics and Incident Response in Containers
    Best practices for Forensics and Incident Response in Containers Knox Anderson Jul 26 2018 5:00 pm UTC 30 mins
    Almost 5 years, 48,000+ github stars, and tens of thousand of production deployments later we can safely say containers are a technology that is a here to stay. Theyre developer friendly, easy to operationalize, and allow organizations to provide stable and secure services to their customers.

    While there are clear best practices for what it takes to build and run containers, there isn't as much knowledge around the performing forensic analysis of incidents that occur inside your containers.

    In this webinar we'll cover:

    - How containers change incident response and forensics

    - Best practices around forensic data collection in container environments

    - Compare opensource and commercial forensics options

    - A live demo of multiple forensics investigations using Sysdig Inspect: an opensource container forensics tool
  • Unleash the Power of NVMe Fabrics
    Unleash the Power of NVMe Fabrics Rick Walsworth, Venky Nagapudi Jul 26 2018 5:00 pm UTC 60 mins
    This webcast will provide an architectural view of the NVMe over Fabrics, the different technology approaches, and best practices to consider when evaluating this technology. During this session, you’ll be provided with real-world use cases and examples as well as the benefits of NVMe for the following key areas:
    -How to migrate services from standard SCSI based to NVMe-oF based
    solutions using FC
    -Detailed architectural analysis and benefits achieved by deploying NVMe-
    oF via GbE.
    -Tradeoffs and decision to utilize mixed mode FC and GbE deployments.

    In addition to the presentation, there will be a brief demo of the Vexata
    NVMe-oF solution presented to show how the system performs for high frequency, enterprise use cases.
  • Operational Insights: How a Security Expert Defends Your Network's Blind Spots
    Operational Insights: How a Security Expert Defends Your Network's Blind Spots Sam McLane, Head of Security Engineering, Arctic Wolf Networks; Narayan Makaram, Sr. Director of Product Marketing Jul 26 2018 5:30 pm UTC 45 mins
    With an ever-changing threat landscape, the need for skilled security experts who can address your real business risks is at an all-time high. IT organizations who do not have the budget to hire security experts, are looking for help to hunt and triage advanced attacks, weed out false-positives, and address cyber threats that truly matter to their business.

    In this upcoming webinar, get key insights from Sam McLane, CTSO, at Arctic Wolf Networks (AWN), on the importance of having a Concierge Security Engineer(CSE) on your side, who can act as your trusted advisor for your IT team.

    By attending, you will:

    - Discover the role of a CSE in AWN's SOC-as-a-service offering
    - Understand how a CSE-based service is different from other managed-SIEM/SOC services
    - Explore real life examples of how a CSE tackles security issues proactively for our customers

    About our speaker:

    Sam McLane leads CTSO at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University. Sam holds a master of science in mathematics from Temple University and a bachelor of science in mathematics from Washington and Lee University.