Network infrastructure professionals understand that a reliable and secure infrastructure is crucial to enabling business execution. Join the network infrastructure community to interact with thousands of IT professionals. Browse hundreds of on-demand and live webinars and videos to learn about the latest trends in network computing, SDN, WAN optimization and more.
Data Centers vary widely in nature and can be roughly classified as hyperscale, multi-tenant, and private. A critical and common component in the operation of such data centers is the installation and maintenance of the physical cabling infrastructure. A fundamental change taking place is the evolution from cables using classic connectors on copper (RJ-45) or fiber optics (LC) to cables terminated by pluggables such as SFP or QSFP. This represents a new challenge as these cables, called Active Optical Cable (AOC) or Direct Attach Copper (DAC), are not easily validated and tested.
Freeport-McMoRan faced immense connectivity and bandwidth issues in its copper mines located in remote locations. Moreover, this S&P 500 company was also looking to revolutionize their IT infrastructure by bringing secure access to cloud-based applications on Microsoft Azure.
Join this webinar to hear directly from the experts at Freeport-McMoRan on how it leveraged VeloCloud SD-WAN to greatly improve user experience with assured Application Performance and simplified access to Microsoft Azure.
Attend this webinar to learn:
- How Freeport-McMoRan quadrupled its bandwidth to support terabyte-sized file transmissions
- Dramatically improved the network user-experience with VeloCloud SD-WAN
- How legacy issues, such as non-performing circuits, can easily be fixed and optimized with VeloCloud SD-WAN
- How Virtual VeloCloud Edge can easily run on Microsoft Azure to optimize access to cloud applications
This webinar is brought to you by the Vivit DevOps Special Interest Group.
Businesses need to be more responsive to market changes and meeting customer demand for improved services and better user experiences. In order to meet such high expectations and be competitive in your market, it requires great flexibility and speed throughout the organization. DevOps enables your software development, infrastructure and operations teams to identify and eliminate inefficiencies through communication, collaboration, and automation.
Join us for this webinar to learn:
•How you can build a culture of DevOps
Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.
Steve Reynolds, CTO, Imagine Communications
Steve Reynolds is Chief Technology Officer at Imagine Communications and responsible for the technical strategy and roadmap of the company, as well as managing business development, partner relationships, and M&A activity. Reynolds brings 20 years of technology leadership in the cable industry to Imagine Communications. At Comcast, he served as Senior Vice President of Premises Technology overseeing the strategy, roadmap and development of all technologies employed in service delivery to the customer premises. Prior to Comcast, Reynolds was Senior Vice President of Technology at OpenTV Incorporated, a world leader in digital and interactive television technology.
Host: Limor Schafman, Content Development Director, TIA
To create greater competitive advantage and better customer experience, organisations need to build their digital capabilities with innovative solutions and initiatives.
WhiteSpider is an expert in Software Defined Technologies - the building blocks of a digital infrastructure - and one of Cisco's leading partners in designing and delivering Application Centric Infrastructure
In this webinar we will be looking at how Software Defined Technologies are supporting organisations as they create digital capabilities through:
1. Enabling Scalability and Agility: Be able to rapidly scale, and react quickly to the changes in business requirements.
2. Delivering intelligence: Detailed, predictive and actionable analytics
3. Developing automation: Solutions that enable orchestration and automation reducing the need for, and cost of, human intervention.
4. Promoting collaboration: Simplifying and unifying the communication between IT and Business.
We will be looking at specific examples of where WhiteSpider has enabled these capabilities through solutions we have delivered in Motor Racing, Healthcare and Manufacturing.
The growing migration of business critical applications to SaaS based solutions and public cloud platforms signals a fundamental shift in IT infrastructure. The cloud requires organizations to take a fresh look at their security posture in the light of new threats and an expanding deployment surface. We will discuss the emerging security requirements as results of these shifts and provide recommendations to securely operate in cloud environments
Cyberattacks are getting more sophisticated, using a combination of strategies to penetrate the organisation and often for financial gain. Tune in to hear from Singtel's Abdullah Sheikh and Trustwave SpiderLabs researcher Thanassis Diogos as they describe the latest multi-vector attacks uncovered just recently in the financial industry, a modern ‘bank heist’ that uses technical and non-technical methods, with potential to expand across the globe.
The webinar will show you the steps taken by this criminal network and how easy it was for them to divert on average USD$5 million in cash for every target they reached. Understand what measures our experts recommend to ensure your organisation doesn’t become a victim of a similar attack in 2018.
HP and Staples Business Advantage present:
Governance, Compliance & Print Security - Three keys to protecting business
• The rise of IoT and its evolving role in Security Challenges
• IoT Standards & Framework Developments in CyberSecurity
• Governance and its role in mitigating risk
• And More: Influential Mega Trends, Risks & Hidden Costs
Ron Chestang – GCIH, CEH, CISM
Print Security Advisor
Ron joined HP, Inc. from one of the big four consulting firms where he performed IT Security consulting in Oil and Gas Industry in Houston, Texas. Ron also has over 15 years’ experience as a Cyber Officer in the US Air Force where he received the nation’s most comprehensive cyber security training and the highest level AF security certifications. During his tenure with the AF, Ron participated in numerous cyber exercises and operations including wartime cyber efforts coordinating defense of the nation’s top secret information and coordinating offensive efforts.
Ron has numerous industry Cyber Security Certifications including the EC Council Certified Ethical Hacker, SANS GIAC Certified Incident Handler, and the ISACA Certified Information Security Manager Certification.
Technology Account Executive
Staples Business Advantage
Mike Mayberry our Staples Technology Solutions Healthcare Technology Account Executive has been part of the Staples family for 10 years. Mike started with Staples on our Small Business Account sales team before moving to our retail team as a Sales Manager. Mike joined the Technology Commercial Contract team in 2011 providing IT solutions to our Mid-Market customer. After spending two and a half years with the Mid Market team Mike transitioned to the Commercial team working with F-500 customers. Recently Mike helped launch the new Healthcare team within Staples Technology Solutions and is now working to provide relevant IT solution thought-out our Healthcare base.
Whether it is a new ransomware campaign or stealthy targeted attack, your endpoints are being attacked and are often the last line of defense in your fight against the cybercriminals. In this webinar, you will understand how endpoints are the final frontier for security and how you must be resilient in using the latest prevention and protection technologies.
Learn how the power of machine learning and artificial intelligence are changing the endpoint protection landscape. Gone are the days of daily signature updates, maxed out performance impact, and the lack of security effectiveness against both known and unknown threats. It is time explore the new world of endpoint security.
As an organization grows the number of use cases the data center needs to support increases with it. What starts out as a NAS for file sharing, moves to a SAN for database applications, and then storage for data protection. As the organization hits full stride it might look at arching to limit growth and a mobility solution to support a distributed workforce. The problem is each one of these storage types are silo’ed and have to be implemented, operated and maintained separately. As a result, storage ends up consuming a large chunk of the IT budget.
Hybrid transaction/analytical processing (HTAP) refers to capabilities to perform OLAP (online analytical processing) and OLTP (online transaction processing) at the same time on a same database system. Oracle Database has always held the edge in HTAP because its version-based concurrency model means that analytical workloads do not block transactional workloads. In this webcast, we will examine how Vexata Scalable Storage Systems utilize technologies such as NVMe Flash and Intel Optane (3D XPoint) can be used to take HTAP to the next level. This webcast will include a demonstration of HTAP running on Oracle 12c with the Vexata VX-100 Scalable Storage System.
You will learn about:
- Detailed explanation of Hybrid transactional/analytic environments
- Best practices for architecting Oracle Hybrid database systems
- How Vexata maximizes transactional and analytic workloads
The shift to the cloud is modernizing government IT, but are agencies' storage models keeping up with that transition? When it comes to big data, the proper system is necessary to avoid major data bottlenecks and accessibility challenges, allowing agencies to get the right information to the right people at the right time. Flash storage is the latest technology that improves scale, speed, and efficiency of data storage. Join us for a panel discussion on the challenge of scale, increased demand for user-focused data management tools, and security and risk reduction with sensitive data.
- Paul Krein, Chief Technology Officer, Red River
- Joe Paiva, Chief Information Officer, International Trade Administration, U.S. Department of Commerce
- Linda Powell, Chief Data Officer, Consumer Financial Protection Bureau
- Ashok Sankar, Director, Solutions Strategy, Public Sector and Education, Splunk
- Nick Psaki, Principal, Office of the CTO, Pure Storage
Join the Cradlepoint team for a live webinar on November 16, 2017, at 9am PT for an introduction to Cradlepoint's new tier, NetCloud Manager Enterprise, and new features available within NetCloud.
Webinar attendees will learn about:
— New tier and features in NetCloud Manager Enterprise
— How Cradlepoint NetCloud Manager Enterprise enhances branch office and in-vehicle networking
— New naming and features in NetCloud Perimeter (formerly NetCloud Engine)
This webinar will provide attendees an overview of capabilities of VirNOS virtual network function (VNF) and the use cases. We will cover virtualizing services at the customer edge and how service providers can enable services such as VPN and IPSec to their end customers at lower OPEX. The presenter will also discuss vPE/vRouter running at the data center or cloud providing MPLS WAN services.
Today, organizations of all sizes are under siege from an unceasing tide of malware as tens of millions of new malware samples are discovered every month. With ample security budgets, skilled security teams, and cutting-edge-at-a-cost technologies at their disposal, large enterprises are well-positioned to protect themselves against the deluge of malware knocking at their door. Yet malware presents especially daunting challenges for SMBs as they face the same threats as enterprises, but with far fewer resources at their disposal.
Through threat correlation and scoring, SMBs have a powerful new way to detect and kill malware that other solutions miss.
In this webinar we will discuss:
• The threat landscape for SMBs
• Known, unknown, and evasive malware
• The need for network and endpoint threat correlation
• Threat scoring: a force multiplier
Learn how NGINX Plus supports service discovery and load balancing in the NGINX Microservices Reference Architecture (MRA).
More specifically, join this webinar to learn:
- Get the latest answers to your questions about implementing microservices
- Learn about the challenges others are facing in development and deployment
- Ask questions about converting monolithic apps to microservices
- Get an update on the NGINX Microservices Reference Architecture
As organizations move to an agile DevOps model, they are confronted with one major question: How can they manage existing information-security processes to ensure data privacy?
Since data breaches are not going to go away, organizations really need to focus on how to make breaches irrelevant so that in the event of a breach the data either will not be accessed, or if it is it won’t be in usable form.
In this webinar, created for application developers and data security resources, CSPi will not only review best practices but also present a software framework to show how organizations can achieve uncompromised enterprise-wide security. Created for application developers and data-security resources, this webinar will also show you how this new approach complements established InfoSec security requirements and maintains the agile benefits of DevOps – all while providing the automated protection of critical data under any use.
Don’t miss this webinar! Register today.
Join us for this valuable webinar to learn how you can:
1.Uniformly and automatically apply security policies across the enterprise, including containers and VMs as they spawn.
2.Offload core-intensive security functions while improving application performance.
3.Secure critical assets in all cases – in motion, at rest, and in use.
If nothing else, the last 12 months have proved that we can never overestimate what can happen when you combine poor security hygiene with politics, human ingenuity and human error - if we can believe the latest headlines.
Wannacry, NotPetya and Equifax have dominated headlines but it’s not hard to compile a much larger list if you look a little bit deeper. And while past results are no guarantee for future performance, it is that time of the year to look ahead to see what might be in store for 2018. However, looking ahead without taking the past into account can only give a partial perspective.
This Fortinet “Threats on the Horizon” summit presentation will summarize what we have seen so far in 2017 and present our perspective for what we can expect in 2018.
Watch a demonstration of two iPhone hacks - malicious profiles and malware (spyware) - to see how a hacker can take full control of a device, steal credentials, control and manipulate communications, steal identities and remotely record conversations without detection.
In each case, see how Symantec Endpoint Protection Mobile (SEP Mobile, formerly Skycure), the leading Mobile Threat Defense solution, protects the device and data from these attacks.
Join Oxford VP of Policy and Standards Scott Croskey as he delves into the finer requirements and directives of the DoD's clarified DFARS Cyber Security Requirements, restating that full compliance is required for contractors no later than December 31, 2017.
Are you a Government Contractor or Subcontractor?
Are you concerned about any current compliance issues?
Has your Organization received an assessment yet?
The Oxford Solutions team is on the front lines, making sure that our clients and companies of all sizes are making sure they can report accurately and in a timely manner on developing legislation. Scott Croskey will pose questions and further analysis on DFARS requirements this year and beyond.
The promise of workflow modernization through automation is great — speed, efficiency, and productivity are the hallmarks. But, the process to get there can be complex: How do you prioritize and modernize those designated workflows as you move to new platforms or implement new processes and ways of working? With workflow modernization, your organization can become fully cross functional, enabling all teams to collaborate to create automation content.
In this webinar, we’ll show you the strategic approach to workflow automation and provide actionable guidance on to make operations more repeatable, predictable, and automated. You’ll learn how to:
- Bring a DevOps mindset and approach to the network
- Create fully automated workflows that are interchangeable between projects
- Extend the power of Ansible automation across the enterprise
Organizations on the journey to digital transformation are encountering new challenges with managing risk. Not only are complex digital transformation initiatives making it difficult for organizations to fully grasp their entire risk profile but digital transformation is also resulting in new types of risk for the company. Organizations with strong risk aversion are in danger of preventing or stifling innovation and change. How can organizations manage risk and create a strategy that empowers digital transformation? What have organizations learned on the road to digital transformation that can help others early on in the journey?
The clock is ticking and it’s time to act as Europe’s most demanding and far reaching Data Security regulation to date has been published. This webinar from IBM Cloud will examine the key requirements of GDPR, and look at how we can IBM's Cloud and Data security capabilities to simplify your GDPR Readiness journey.
What You Will Learn
The impact of the Regulation and its key principles
What data protection by design and by default means for organisations
The foundational principles of data protection
Practical application of data protection by design and by default in the Cloud - Data security, encryption capabilities, data breach notification, Multi Cloud SaaS offerings, IBM Cloud services and our Technical and Operational Measures.
What does signing of 24 IBM Cloud infrastructure and PaaS services means in terms of data protection adherence under GDPR.
Listen to Kevin Curtis, Distinguished IOT Architect – Connected Cities, Verizon Enterprise Solutions (VES) talk about how digital transformation occurs when information technology (IT) and operational technology (OT) data assets are effectively integrated, to realize new business outcomes and to create transformative value, not previously possible.
Throughout rapid expansion, globalization and going public, GoDaddy was challenged to scale operational and incident response framework in new ways.
In this detailed talk, join Tom Duran, Site Reliability Manager at GoDaddy, as he takes you through the transformation from a largely manual incident process to a fully automated lights-out incident response model.
In our future 5G world, your users will not only need to be connected all the time, they will also require access to fast, agile services. The question is: Will your network be ready to support multiple best-in-class wired and wireless access technologies?
“Technology Convergence: Support Multiple Wired and Wireless Access Technologies” explores how virtualization allows for a converged access platform that simplifies management of your access network and lowers your overall system total cost of ownership. The webinar walks you through a working proof of concept developed by Intel, Casa Systems, and Kyrio that brings together vCCAP, vWAG, vEPC, and other VNFs running within an open-source NFVI. Addressed as well is how this solution can be expanded for other operator needs through flexible and generalized SDN/NFV principles.
A rapid rate of change complicates every facet of datacenter management, and server-centric compute models are too cumbersome for today’s highly variable workloads. Is it possible to optimize resources and operations in such dynamic environments? In this presentation, learn how to replace manual, hardware-defined application provisioning and management with a highly automated, software-defined resource model and orchestration layer that enables flexibility, simplified on-demand capital efficiency, and lower TCO. Find out how to compose more agile pools of datacenter resources, and simultaneously drive up IT efficiency, optimize energy requirements, increase datacenter resilience, and strengthen disaster recovery plans.
Crees que estas protegido frente a las APTs? Te explicamos cómo funcionan y como protegerse
Los ataques de hoy en día se han vuelto cada vez más sofisticados, lo que ha provocado que las medidas de seguridad tradicionales ya no sean eficaces. Las organizaciones deben adoptar nuevas estrategias de Ciberseguridad que permitan una mayor protección, adaptándose a estas nuevas amenazas.
En este webinar FireEye y Minsait, la unidad de negocio de Indra encargada de la transformación digital de las empresas, muestran qué son las Amenazas Persistentes Avanzadas (Advanced Persistent Threats), cómo funcionan y qué medidas se deben implementar en las organizaciones para protegerse ante las APTs que utilizan el correo electrónico como principal vector de ataque.
5G will bring several groundbreaking new technologies into play with its new air interface and Radio Access Network (RAN) architecture extensions. It will also need an emerging software defined infrastructure, one that provides greater topology flexibility, essential to deliver on the promises of high availability, high coverage, low latency and high bandwidth connections that will open up new parallel industry opportunities.
Edge Cloud unlocks many new doors and one of the keys to its enablement lies in the elasticity and flexibility of the underlying infrastructure. This webinar will discuss several use cases for edge computing along the road to 5G including VR/AR, autonomous cars and IoT, and how Multi-Access Edge Computing solutions allows testing and trials of solutions today.
Container technology is impacting how we think about persistent storage for applications and microservices. In turn, software-defined storage will impact how storage is dynamically provisioned and managed for containerized applications.
Red Hat® OpenShift Container Platform is the container application platform that brings Docker and Kubernetes to the enterprise. Closely integrated with Red Hat® Gluster Storage, together they advance seamless, containerized storage that is uniquely differentiating the future of storage in a container-driven datacenter.
Join this webinar to learn how container-native storage built with Red Hat Gluster Storage, and tightly integrated with Red Hat OpenShift Container Platform, can help you:
- Gain autonomy and control over the storage provisioning experience.
- Persist registries, logging, and metrics on a single storage platform.
- Support file, block, and object storage on a single storage platform for your container orchestration platform.
- Hear from a customer who uses Red Hat Gluster Storage as their container storage solution.
Listen to GlobalData's Peter Jarich – VP, Consumer Services and Service Provider Infrastructure talk about who is in the lead for 5G test trials and deployments and what regions of the world we can expect the next generation of network communications?
The ability to intelligently monitor, manage, and control both IT and OT assets represent huge value drivers for companies looking to onboard IoT solutions. But the factors behind IoT strategy decisions are complex; different parties seek to scale their connected endpoint infrastructure, yet lack a common set of tools to operationalize intended efficiency improvements. In this webinar, we’ll focus on the realm of security, where IT tools (i.e. DNS security) have direct applicability to OT (IoT) applications. The challenge is implementing an integrated model at IoT scale, which requires ML/AI.
Join Ryan Martin, Principal Analyst at ABI Research, and Sanat Kamal Bahl, Director of Product Marketing at Cisco IoT Cloud, as they examine the technologies in each domain that—when deployed successfully—improve agility and decision-making, build in security, and increase the exchange of ideas between departments. In doing so, we will explore success metrics for improving the intelligence of enterprise systems and the trends underpinning the convergence of IT and OT.
Bot은 자동화된 프로그램으로, 웹사이트의 정보를 수집하거나, credential abuse와 같은 악성행위를 수행합니다. Bot으로 인한 피해는 IT 측면의 퍼포먼스 저하 뿐만 아니라, 매출 감소, 경쟁력 저하, 비즈니스 기회 상실과 같이 비즈니스에 심각한 영향을 끼치는 경우까지 퍼져 있습니다. Bot을 운영하는 쪽은 심지어 차단을 회피하기 위한 여러 가지 기술까지 활용하여 지속적으로 대응하기 때문에, 차단만이 모든 문제를 해결해 주는 방법은 아닙니다. 점점 다양해지고 지속적으로 변화하고 발전하는 Bot의 공격 방법 등을 알아보고, 이를 효과적으로 관리하기 위한 접근방법 및 기술에 대해 알아봅니다.
Per decenni, la protezione antivirus (AV) è stata la base per la sicurezza degli endpoint, nonostante tutti i suoi limiti. Per affrontare le minacce sempre piu evolute, le organizzazioni devono dotarsi di una soluzione integrata di endpoint che possa migliorare le loro difese.
Il 29 novembre, Marco Rottigni, Senior Manager, Product Marketing di FireEye, offrirà una panoramica di dettaglio sui seguenti punti:
• Perché i prodotti per la sicurezza degli endpoint non sono sufficienti a fornire una protezione efficace
• Le funzionalità necessarie per dotarsi di una soluzione completa per la protezione degli endpoint:
-AV con Threat Intelligence
-Detection e Response
-Behaviour e Exploit
-Visibilità e automazione
• Come la soluzione FireEye Endpoint Security consente di passare rapidamente dall'individuazione all'indagine e alla remediation, tutto con un solo agente
Partecipa a questo webinar come primo passo verso un approccio più intelligente e flessibile alla sicurezza degli endpoint.
There has been an important clarification around what constitutes a data breach listen in to update yourselves and ensure you don’t fall foul of the regulation.
When the legislation comes into effect in May 2018, compromised data will be among the most seriously regulated and highly penalized issues a company can face, so a practical and coherent understanding of the regulation is critical to mitigating any penalties your organization will face.
In our latest webinar, Blueliv’s Head of Cyber Threat Intelligence, Nahim Fazal, and Legal Expert Pedro López will be providing specialist insight and guidance around aspects of GDPR specifically relating to a data breach. Building on our recent whitepaper, they will explain how to plan and manage the impact of the incoming updated legislation on your business.
Pedro López is an expert in legislation relating to cybersecurity. When it comes to GDPR, the devil is truly in the detail, and he’ll be explaining how to ensure compliance without getting lost in jargon.
Nahim Fazal’s experience in the industry enables him to explain not just how to mitigate the consequences of a data breach, but how to reduce the risk of exposure and ensure that any losses – from customers to financial to reputational – are minimal.
The webinar will be followed by a short Q&A and demonstration of how threat intelligence can shield your organization from the worst impact of the updated GDPR.
Pedro López, Legal Advisor and GDPR expert at Martin Andino Law firm
Nahim Fazal, Cyber Security Development Manager at Blueliv
Learn how to adapt the core ideas in the classic 12-factor application model to a modern microservices architecture optimized for continuous delivery.
More specifically, join this webinar to learn:
- The history of the 12-factor app and the problems it solves
- Industry changes that have happened since the 12-factor app was introduced
- What each of the current 12 factors are
- How each of the 12 factors needs to be updated to fit microservice needs
Today, multi-cloud is the new norm for cloud adopting organizations. The organizations that thrive will be those that can adapt their multi-cloud and hybrid-cloud architecture to simply and reliably deliver applications. According to IDC, 94% of organizations are already reassessing, modifying, or overhauling their network to facilitate app delivery for a cloud-first world. Wanting to dive deeper, Citrix commissioned IDC to conduct a custom survey of 900 organizations to uncover how enterprises were meeting the network requirements for cloud adaptation.
Join guest speaker Brad Casemore, IDC’s Research Director, Datacenter Networks and George McGregor, Citrix Senior Director of Product Marketing, as we present the results of this unique survey, which delves into the infrastructure required to deliver applications and what changes are needed from the traditional datacenter approach as apps move to the cloud.
Attend this on-demand webinar and discover:
•How your peers adapt application delivery network and infrastructure for cloud
•Data to support what’s working and not working
•The top concerns preventing successful cloud adoption
IT Ops and DevOps for the modern enterprise offers many benefits — increased agility and productivity, leaner operations, and hybridized hosting options — but digital transformation isn’t easy, especially if you’re not asking the right questions, addressing the right issues.
Creating a culture that embraces modern operations is still a challenge, especially when maintaining reliability and security is a paramount requirement for decentralized business IT models. Not to mention justifying the costs of transformation to your CIO.
Dive into the “new normal” for enterprise Modern Ops with this informative Moogsoft / xMatters webinar event, and find out the 5 questions that every CIO needs to ask in 2018.
Over the past thirty years, not much has changed in the architecture of industrial control systems. During this time, however, there have been fundamental transformations in the world of Information Technology (IT). In this webinar, we explain the business benefits that can be derived by implementing software defined industrial control systems that leverage software-based techniques from the IT industry. We describe a straightforward process for transitioning to this new architecture, managing the risks and reaping the benefits.
Did you know millions of hosts (Domains, Subdomains, or IP Addresses) pop up every day and many of these have lifespans of less than 24 hours.
Many organizations choose to set Secure Web Gateway policies to block users from going to uncategorized sites because of the risk they represent, even though many may be legitimate destinations for business purposes.
In a similar fashion, many enterprises choose to block sites that have a heightened risk rating, but are not conclusively risky. This leads to website over-blocking and unhappy end users. Some sites are known to be good, others are known to be bad, the problem comes for those in the middle where insight/information is lacking.
Key Learning Objectives:
•Learn about the world’s largest civilian threat intelligence service and how it will protect you from Malware attacks
•Learn how to set policies to send any traffic with inconclusive risk or uncategorized by Global Intelligence Network down a Web Isolation path.
•Learn how to boost productivity for businesses without incurring any additional risk.
Machine learning (aka Artificial Intelligence) can be found in the marketing literature of a number of new solutions and offerings in the marketplace. But what exactly is it? FUD? Magic Dust? The “Next Big Thing”? There’s a lot of confusion and a lot of questions around this topic. What’s the false positive detection rate? How often does it need to be updated? Does it scale well? Join Sophos and (ISC)2 to explore these questions and more on November 30, 2017 at 1:00PM Eastern in our next ThinkTank webcast.
As companies shift towards the cloud for their application environments, IT organizations are tasked with finding the most effective methods and solutions to quickly and securely connect their corporate networks to external cloud environments while maintaining the integrity of their corporate security models. Digital transformation and software-defined options are driving IT teams to re-think the existing direction of their WAN to cost-effectively connect to multiple and geographically diverse VPCs. In this session, we outline a solution we’ve recently implemented which includes the adoption of an SDN methodology when securely connecting to geographically diverse VPCs with AWS Direct Connect and transit VPCs.
One of the main aims of the NFV-concept is to replace dedicated proprietary network hardware with flexible and scalable software-based solutions. However, all but one of today’s VNF solutions demonstrate benefits in terms of flexibility and scalability, but not the levels of performance that the industry demands.
NFWare, an innovative network software vendor, has risen to meet the challenge by developing virtual networking products to provide hardware-like performance alongside all the benefits of a virtual solutions. NFWare’s product line includes three products: vCGNAT (up to 200 Gbps per VM), vADC (up to 40M CPS per VM) and vURL-Filtering (up to 20M CPS and 100M concurrent sessions per VM).
At the webinar, NFWare will tell more about technologies that allowed to achieve outstanding performance levels, as well as discussing what this new technology means for an industry that is always in search of faster, better ways of working.
A whole new era of cloud-native applications is here. From blockchain and IoT, to AI and machine learning, AR/VR, containers and microservices, the possibilities for modernizing your IT infrastructure are endless.
With these advanced technologies and the widespread adoption of open source comes greater security risks, the explosion of firewall, and implications on IT teams to adopt, integrate, transition, and digitize at lightning speed.
Join this expert panel with Russ White, Network Architect at LinkedIn, Tarak Modi, President & CTO of TekNirvana, and Bala Kalavala, Founder & CIO of Adiya, Inc. as they discuss and explore in-depth the most important technology trends and how to apply them in 2018.
- Decentralized applications - a closer look at containers and microservices, blockchain, AI, VR and IoT
- Network disaggregation and the changing engineering landscape
- DevOps, agile and software-defined networking
- A technical deep dive into cloud, open source and security in 2018 and beyond
- Challenges in adapting to modernization of enterprise IT - People and Process
In this webinar, learn about the Proxy Model, the Router Mesh Model, the Fabric Model, and the Ingenious app – all part of the NGINX Microservices Reference Architecture.
More specifically, join this webinar to learn
- When to take the leap into deploying microservices
- Why you should consider adopting the MRA for your app
- How to choose a model that works for your app
- How to start the process of converting a monolith to microservices