Network infrastructure professionals understand that a reliable and secure infrastructure is crucial to enabling business execution. Join the network infrastructure community to interact with thousands of IT professionals. Browse hundreds of on-demand and live webinars and videos to learn about the latest trends in network computing, SDN, WAN optimization and more.
SANS expert Jake Williams and Authentic8’s Head of Special Services, Nick EspinozaRecorded: Feb 20 20207 mins
Renowned SANS expert Jake Williams and Authentic8's Head of Special Services, Nick Espinoza, discuss today's use of OSINT for Cyber Threat Intelligence (CTI). The talk addresses:
- If Counter Intelligence (CI) depends on an organization's maturity level
- If an organization can be too small to have a CTI program
- Why a framework for CI is so challenging to build
- How managed attribution is like CI on steroids
- If it's more important to prioritize spending on CTI tools or processes
You'll also receive instructions on how to participate in the CTI 2020 Survey. Watch the talk and join in the discussion on the magnitude of OSINT in CTI.
Chris Davis Vice President, Smart Cities and Strategic Alliances CIMCON Lighting, Inc.Recorded: Feb 20 202044 mins
Smart cities are driving towards Digital Transformation to improve city operations and citizen services. Innovative outdoor Edge technologies deployed on smart streetlights will accelerate that transformation by powering connected sensors and controls, collecting data, managing devices and cybersecurity, local processing, backhaul over wireless networks, and cloud applications for user displays, alerts, reporting and data analytics.
This webinar introduces an Innovative, outdoor Smart City Edge IoT Platform. Installed on a luminaire, the Edge-based platform performs multiple data functions for connected sensors – capture, analysis, aggregation from multiple sensors, and communication – to cloud SaaS applications. In addition, the Edge platform delivers network flexibility, communicating data to the cloud over both wireless smart grid and cellular networks.
Technology factors driving Edge platform adoption and wireless infrastructures for smart city applications will be discussed:
•Speed data analysis
•Reduce the volume of data transmissions
•Lower hardware compute and storage costs
oMetrics and measurement for real-time analysis
oData analysis plus Artificial Intelligence and Machine Learning
Real and installed “smart” applications using this technology – urban planning, traffic statistics, bicycle and people counting, road condition monitoring, environmental air quality, power line monitoring, video and audio analytics – and their associated benefits will be highlighted.
Bill Lijewski, SHI | Kevin Gallaugher,F5 Networks | Doug Hurd,Cisco Security | Pradeep Pokhariyal, Cisco SecurityRecorded: Feb 20 202038 mins
Encryption is everywhere today—and while it’s great for privacy and data security, encryption also lets attackers embed malware and other malicious threats in encrypted traffic, creating security blind spots for organizations.
Cisco Firepower Threat Defense (FTD) and Web Security Appliance (WSA) are built to block threats, and quickly mitigate any that breach your defenses. But if you deploy Cisco FTD and WSA along with F5 SSL Orchestrator, not only do you optimize their threat mitigation and performance capabilities, you also optimize their ability to stop encrypted threats.
Together, F5 SSL Orchestrator and Cisco’s FTD and WSA deliver top-of-the-line actionability, availability, and superior orchestration. They increase your security posture and threat mitigation, future-proof your existing investments in security solutions, meet or surpass regulatory compliance requirements, and ensure a superior user experience.
Join this webinar to learn more about our joint Cisco & F5 Security Solutions.
•Common pain points of dealing with encrypted traffic, manual versus automated management scenarios, defocusing core function of existing security solutions, and meeting regulatory compliance pain points
•The benefits and alignment of a joint Cisco Firepower Threat Defense or Web Security Appliance and F5 SSL Orchestrator solution
•New ways to manage and solve encrypted traffic blind spots and encrypted threat mitigation
Mark Vaughn, Engineering Director on Integrated Solutions with Presidio and Chris Laffey, Field CTO with DellRecorded: Feb 20 202047 mins
While putting your data in a public cloud offers a level of simplicity, the private cloud can offer better control of your data. How do you develop a cloud strategy that will align workload and data placement with business value?
With a Cloud Right approach, the focus is on creating a flexible cloud strategy that will allow your workloads to move and flex along with the needs of your users and your organization.
Join Presidio and Dell Technologies for a live Q&A to discuss considerations in determining the ideal cloud strategy for your environment.
Ankur Tarnacha, Sanjay Srinivasan & Sasha EmmerlingRecorded: Feb 20 202057 mins
This webinar examines the telco journey to SD-WAN, identifying key success criteria and ingredients to enable enterprises on their road to DX. Several market developments including cloud, IoT, and AI have aggregated to elevate SD-WAN’s role to address customer needs at the edge. The webinar will explore these market developments and the role of technology providers such as VMware in accelerating the telco journey to SD-WAN.
Presented by Ankur Tarnacha, Director at IDC, Sanjay Srinivasan, Chief Architect at Vonage & Sasha Emmerling, Senior Director of Marketing at VeloCloud, now part of VMware
Mike Fratto, Senior Analyst 451 Research, Nadeem Zahid, VP Product ManagementRecorded: Feb 20 202052 mins
Digital transformation relies on creating a distributed IT environment that is optimized for business agility. The features and capabilities IT can deliver to the business quickly and reliably is far more critical than where the application, service components, or services reside. The net result is improved operational IT efficiency, selecting an operating environment that best suits the applications requirements, allowing developers to use the tools and services they know best, integrating applications with minimal disruption, ensuring business continuity, and maintaining good user-experience.
Service assurance can’t be an afterthought. Ensuring applications are delivered as promised and are maintained at high service levels means monitoring that is architecturally aligned with the application environment so that it is continuous and reliable.
In this high-touch webinar, Mike Fratto, Senior Analyst at 451 Research and Nadeem Zahid, VP of Product Management at cPacket Networks, will share their perspectives on:
- How distributed services and applications is giving rise to digital transformation
- The challenges of scale-in and scale-out of those services/micro-services
- The benefits of a unified application-aware traffic view for distributed services for proper service assurance
David Luke, Enterprise Architect at NGINXRecorded: Feb 20 202060 mins
In this webinar David Luke from NGINX will provide an introduction on how Kubernetes, Docker Swarm, RedHat Openshift and others provide container orchestration. David will outline how you should select an appropriate orchestration strategy in today’s ever-changing environment and will give an overview of some of the key commercial offerings proposed by core orchestration technologies.
Stay tuned to this webinar to learn more about:
Problems solved by orchestration including:
•Multi-node cluster setups
•Ingress control and routing
•Next steps into the service mesh control plane overlay
Joel Vilaca | Cisco MerakiRecorded: Feb 20 202053 mins
Nehmen Sie Teil an einer Einführung in Meraki und in unsere Cloud-Managed IT Produkte. Die Einführung beinhaltet eine Vorstellung unserer:
- Wireless-Access Points
- Security Devices und SD-WAN
- Mobile Device Management
- Smarte Kameras
Sie erfahren, wie unsere Produkte Ihr Netzwerk verlässlicher machen, das Netzwerkmanagement dramatisch vereinfacht und Ihre TCO- Kosten gesenkt werden. Außerdem erhalten Sie eine Demo des Meraki Dashboard. Registrieren Sie sich jetzt!
Simon Ratcliffe, Technology Evangelist, EnsonoRecorded: Feb 20 202033 mins
This webinar will examine Edge Computing across a variety of environments and discuss how to build a stable, secure and manageable Edge environment that can form the foundation for transformational change within organisations. Edge is not a new idea but exploiting the Edge effectively does require some new thinking some of which is counter-intuitive in the modern cloud centric world in which we operate. 5G is going to unleash a whole new wave of possibilities around remote devices and as IT functions we are going to be under more and more pressure to deliver on the promise so we need to get our houses in order and build a platform that will act as a springboard and not pitch us flat on our faces.
Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²Recorded: Feb 20 202064 mins
Earning the globally recognized CCSP cloud security certification is a proven way to build your career and better secure critical assets in the cloud.
The CCSP is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration.
In this info-session, you will learn:
- How large is the cybersecurity workforce gap today
- The value of (ISC)² certification
- What you will learn in training for the CCSP exam
- What to expect from the CCSP exam
- How to become endorsed and earn the CCSP certification
- And, ask any question that will support your certification journey
Allen Leibovitch, Sr. Marketing Manager of Supermicro, and Jeff Sharpe, Director, 5G/IoT Solutions & ArchitectureRecorded: Feb 19 202049 mins
One of the many capabilities operators will be rolling out along with their 5G network enhancements is the delivery of Edge-based low-latency applications, improving network connectivity for enterprise applications, massive numbers of devices, and IoT services. The implementation of these new high-availability services will increasingly demand zero-touch provisioning and simplified network management.
Join Supermicro in a webinar discussing how its efficient Edge hardware and innovative solution partners ease deployment of 5G-based services in a distributed, virtualized network.
Wayne Xing, Network Solution Architecture, Visualzero Solutions, 6xCCIE, CISSP, VCP-NVRecorded: Feb 19 202042 mins
Organizations are deploying more applications in the cloud, implementing more devices in branch offices and consuming more bandwidth. Traditional connectivity options such as Multiprotocol Label Switching (MPLS), Frame-Relay, Leased Line etc. can be expensive and slow to provision, and provide limited bandwidth in many locations.
Many organizations are looking for an agile connectivity solution for their digital transformation into the cloud era. SDWAN (software defined Wide Area Network) fundamentally creates a secure scalable fabric with the most limited amount of state on the edge device and performs most of the fabric decision making in the controller. This allows organizations to have the flexibility to make topologies as needed, add segments as needed and to be able to deliver into the environment new and old styles of capabilities while maintaining a well-developed routing environment.
- The combination of app content, app delivery and app consumption are resulting in an evolving WAN situation
- Challenges such as poor application experiences, increased WAN services spend, and a lack of visibility and control are making it difficult for IT to provide the business with a platform to support faster innovation
- Most IT organizations are interested in realizing a common set of benefits such as consistent high-quality user experiences, reduced cost, simplified operations and lower risk
- The journey to the next generation software defined WAN requires considering various technical capabilities such as transport independence, ubiquitous data plane, automatically secure routed endpoints, resiliency, application aware routing, cloud readiness, simple secure network segmentation, centralized policy enforcement and layer 4-7 flexible services insertion
- Migrating to a software defined WAN does not need to be difficult as long as one knows the best approach to a software-defined WAN environment.
Lori MacVittie, Principal Technical Evangelist F5 Networks | Alanna Brown, Sr. Director Community and Dev Relations PuppetRecorded: Feb 19 202044 mins
The Puppet State of DevOps Report:
Top 5 Insights That DevOps Practitioners Should Be Actioning Now
Analysis of survey results from nearly 3,000 technical professionals and executives reveals that organizations which have evolved their DevOps practices to a high level have also achieved a high level of security.
They've done this by successfully integrating security practices into the software development lifecycle from its very earliest stages.
Marco Palladino | CTO & Co-Founder, KongRecorded: Feb 19 202050 mins
Service mesh is the future of application connectivity, and it delivers immediate value to any architecture by increasing the security, reliability and observability of our application traffic. At the same time, our industry has made it challenging to understand and deploy service mesh in production – but it doesn't have to be this way.
In this webinar, Kong CTO & Co-Founder Marco Palladino will take you from understanding the basics of service mesh to conceptualizing the most advanced topics, while demonstrating how your team can easily deploy service mesh in production in a few minutes on both modern Kubernetes platforms and more traditional VM-based ones.
- The key concepts, benefits and pitfalls of service mesh
- Why leveraging service mesh results in reliable modern applications
- How your team can deploy service mesh in production in a few minutes
Alex Mayberry, Senior Cloud Consultant, Red Hat & Paul Begovich, Senior Consultant, Red HatRecorded: Feb 19 202056 mins
In today’s market, many compliance and regulatory guidelines call for isolated environments. With that comes an ever-present challenge to design and deliver solutions that are created to operate in a connected state. While seemingly unique, this is a common situation that can impact many sectors of a business.
During this webinar, we’ll cover several solutions for the most common problems that arise when deploying in disconnected environments and how to mitigate them.
You’ll walk away with an understanding of the following:
• Cross section of industry sectors employing disconnected enclaves
• Example deployment scenarios and approaches
• Need for collaborative development of standard approaches within services
• Need for product teams to consider these use cases when developing
Phil Sweany, Red Hat Certified Architect (RHCA), Red Hat Training, Red HatRecorded: Feb 18 202042 mins
Any enterprise can learn leading protocols and methods for creating efficient, easily managed, cross-platform virtual and cloud application environments. Even experienced virtualization experts can discover significant new virtualization features and capabilities.
Join this webinar for an overview of facilitating migration to the hybrid cloud, turbocharging legacy applications and services, and reviewing today’s enterprise virtualization goals with a fast-paced tour of the key changes in the newest Red Hat® Virtualization 4.3 release.
We’ll discuss these new features:
• Solutions for integration and migration of VMware legacy virtual machines
• New hyperconverged infrastructure features for efficient, integrated storage on virtualization hosts, easier-to-manage VM migration, and high-availability policies
• New techniques for resilient scaling and automation, including a self-hosted management engine
• Enhanced logical networking, including Open Virtual Network (OVN) software-defined networking using Neutron providers
• Shared images and applications across legacy virtualization and hybrid cloud environments
Alysia Eve Senior Manager, Product Marketing Citrix and Omar ElNaggar Director, Product Management CitrixRecorded: Feb 18 202045 mins
Citrix Workspace offers a unified, secure and intelligent experience where users get instant access to all apps, desktops, and files from one easy-to-use interface across all devices. Users now have an actionable and personalized view into all their systems to help organize, guide and automate work, while IT still has the data visibility and control they’ve come to expect.
In our interactive webinar, Citrix Product Director Omar ElNaggar will demonstrate the evolution of Citrix Workspace with intelligent features. During the webinar, you’ll get a firsthand view into:
- The new end user environment with Workspace intelligence.
- Our Microapps service and how to configure and launch a microapp – Utilizing APIs available within SaaS, web, or home-grown applications, microapps allow users to receive notifications and take action without needing to launch the full application.
- Additional features that are in development, such as virtual assistance.
Tanner Payne, Sr. Sales Engineer at ExtraHop and Holger Schulze, CEO at Cybersecurity InsidersRecorded: Feb 18 202049 mins
SecOps teams that embrace proactive threat hunting have a huge opportunity to improve their effectiveness in 2020 and beyond. 44% of respondents to the Cybersecurity Insiders Threat Hunting survey indicated that threat hunting should be a top priority, and 71% said their SOC doesn't spend enough time searching for emerging and advanced threats. This webinar will cover:
- 2020 Cybersecurity Insiders Threat Hunting Survey Results
- Trends, gaps, and areas for improvement in threat hunting
- Proven best practices security operations teams can use to accelerate and improve their threat hunting practices using existing data sources and tools.
Arta Shita, Quali; Christine Bentsen, BroadcomRecorded: Feb 18 20209 mins
Check out the latest QualiFYI episode with Broadcom's Christine Bentsen, Head of Product Marketing of Continuous Testing, as she discusses how to alleviate bottlenecks using automated test environments to continuously improve quality and more. With host Arta Shita.
Karthik Krishnaswamy, Director of Product Marketing at NS1Recorded: Feb 18 202029 mins
Are you unable to drive agility because of cumbersome and repetitive network administration tasks and processes? Are you using appliances that prevent you from embracing cloud or collaborate with DevOps?
Learn how organizations address these challenges and break down silos between network operations and DevOps teams by modernizing their infrastructure using API-first DNS, DHCP, and IPAM solutions.
Andy Hutchinson, Sales Engineer, GigamonRecorded: Feb 18 202035 mins
Let’s face it: in the 21st century whatever network buzzwords we have in our I.T. enterprise are really focused on application delivery. How does the network enable the business, and more specifically the applications that the business needs to run. So why focus network visibility exclusively on packets, when it is the applications that are important to our users and our customers?
With Gigamon Application Intelligence, you can visualize the applications running across your network and make decisions for your environment based on applications, not just packets. Register for this webinar to learn how, within your existing infrastructure you can:
· Achieve full visibility to applications on your network and the resources they consume
· Filter out low-risk traffic, for improved detection performance
· Understand how application metadata can benefit network security and performance measurements
Brock Peterson & Peter HaagensonRecorded: Feb 18 202049 mins
Join Blue Medora's own Brock Peterson to learn about the full-stack monitoring solution that is changing how enterprises view their environment. See how you can troubleshoot your issues the right way, the first time around with relationship-aware monitoring of the full stack.
Kelly LeBlanc, VP of Marketing at 6WIND and Yann Rapaport, VP of Product Management at 6WINDRecorded: Feb 18 202031 mins
Internet Service Providers (ISPs) are replacing legacy hardware Border Routers with software on white box servers. Through advancements with Border Router software and Intel® Xeon® server architecture, ISPs can now benefit from virtualized software solutions without sacrificing features and performance. Join the Webinar to learn how global ISPs are transitioning to white box strategies for BGP-based border routers.
For more information, read the Intel / 6WIND Solution Brief:
Shawn Purtell Principal Technical Marketing Manager, Red Hat and Ahmed Sabbour Product Marketing Manager, MicrosoftFeb 21 20202:00 pmUTC38 mins
Red Hat® OpenShift® Container Platform, based on Kubernetes, helps organizations develop, deploy, and manage container-based applications seamlessly across physical, virtual, and public cloud infrastructures. Combined with the power of the Microsoft Cloud via Azure, organizations can quickly move existing applications to the cloud, get new products to market, and deliver innovation to customers.
Marketing managers from Microsoft and Red Hat will discuss both OpenShift Container Platform on Azure as well as Azure Red Hat OpenShift, a fully managed OpenShift service on Azure. Jointly engineered, operated, and supported service by Microsoft and Red Hat, Microsoft Azure Red Hat OpenShift enables you to quickly build and run your apps on a trusted enterprise Kubernetes platform. Empower developers to innovate with a consistent experience, built-in continuous integration/continuous delivery (CI/CD) pipelines, and a wide range of supported technologies and streamlined workflows.
In this webinar we will cover how to:
- Create fully managed Red Hat OpenShift clusters in minutes with self-service deployment.
- Easily add or remove nodes to match resource demand.
- Use Azure Active Directory integration allows control access to your cluster through an integrated sign-on experience.
Sherry Yu, Principal Partner Success Architect, Red Hat and Sabareesan Radhakrishnan, Principal Solutions Architect, AWSFeb 24 20202:00 pmUTC59 mins
SAP HANAⓇ and S/4HANA play an important role in many companies’ global operations to support mission-critical business functions. The need for maximized system availability has become more and more crucial. Join Red Hat and AWS to review the latest, high availability (HA) solutions for SAP HANA database and applications such as S/4HANA, and how to build a strong SAP platform in a hybrid environment. This session will review the latest HA solutions based on SAP HANA System Replication in Scale-Up and HANAScale-Out, as well as HA solutions based on Enqueue Replication, including the new ENSA2 methodology. It will also review the status of SAP HA-Interface certification. The HA solutions covered in this session are ready for deployment in a hybrid environment.
After completing this webinar, you should become more familiar with HA solutions for SAP HANA and S/4HANA and feel confident to choose Red Hat and AWS as your preferred solution provider.
Anthony Le Pipe | WEMEA Sales EngineeringFeb 25 20209:00 amUTC60 mins
Renforcez vos équipes grâce à l’automatisation du firewall développé par Tufin. Donnez-leur la possibilité d’apporter des changements rapides et simples, de manière efficace tout en restant conformes.
Participez à ce webinaire le 25 février pour découvrir comment les améliorations apportées à Tufin Orchestration Suite R19-3 GA peuvent vous aider :
•Automatisez les modifications des règles du firewall grâce à un processus entièrement vérifiable à l’aide de SecureChange.
•Simplifiez l’adoption de VMware NSX-T.
•Obtenez une meilleure visibilité et une meilleure analyse du chemin d’accès pour Cisco ACI.
Inscrivez-vous dès aujourd’hui pour connaître tous les avantages que présente le déploiement de Tufin Orchestration Suite R19-3.
Si vous ne pouvez pas participer au webinaire en direct, inscrivez-vous ici et nous vous enverrons l’enregistrement.
Joachim Nossek | Sales Engineering, CEMEAFeb 25 202010:30 amUTC60 mins
Stärken Sie Ihre Teams mit der Firewall-Automatisierung von Tufin. Machen Sie es ihnen leichter und schneller möglich, Änderungen effektiv durchzuführen und die Einhaltung von Vorschriften zu gewährleisten.
Nehmen Sie an diesem Webinar am 25. Februar teil, um zu erfahren, wie die Erweiterungen der Tufin Orchestration Suite R19-3 GA Ihnen helfen können:
Automatisieren Sie Änderungen von Firewall-Regeln durch einen vollständig prüfbaren Prozess mit SecureChange
Vereinfachen Sie die Einführung von VMware NSX-T
Überlegene Sichtbarkeit und Pfadanalyse für Cisco ACI
Registrieren Sie sich noch heute, um alle Vorteile der Tufin Orchestration Suite R19-3 zu erfahren.
Wenn Sie am Live-Webinar nicht teilnehmen können, melden Sie sich hier an, und wir senden Ihnen die Aufzeichnung.
Flavio Di Cosmo | Sales Engineering, SEMEAFeb 25 20201:00 pmUTC60 mins
Offri al tuo team l’automazione dei firewall proposta da Tufin. Permetti al tuo team di apportare modifiche efficacemente e rimanere in conformità in maniera più rapida e semplice.
Partecipa a questo webinar il 25 febbraio per scoprire come i miglioramenti di Tufin Orchestration Suite R19-3 GA possono aiutarti a:
•Automatizzare le regole di modifica dei firewall attraverso un processo interamente verificabile con SecureChange
•Semplificare l’adozione di VMware NSX-T
•Guadagnare visibilità superiore e analisi di percorso per Cisco ACI
Registrati oggi per conoscere tutti i vantaggi dell’installazione di Tufin Orchestration Suite R19-3.
Se non puoi partecipare al live webinar, iscriviti qui e ti invieremo la registrazione.
Belkacem Moussouni, Business Development Lead, EMEA - Automation & Management at Red HatFeb 25 20202:00 pmUTC38 mins
Learn how to improve the agility and speed of your hybrid cloud infrastructure with open source IT automation and management - How BP modernizes infrastructure, introduces DevOps with self-service platform.
Presentation live from Open Hybrid Cloud Connection
Anne-Britton Arnett and Phani Konduru (Humana)Feb 25 20203:00 pmUTC25 mins
The US Healthcare system is going through a major transformation. Now, more than ever, with rising costs and patient care requirements, technology has to be the change agent. At Humana, there is a key driver to become much more than a Claims Payer. The mission is to be an integrated care delivery provider, with a focus on well-being and improving the health of the communities in which Humana serves.
At the heart of this transformation is a real-time patient-centric architecture and system that will integrate the company and its diverse functions and recent acquisitions. Learn from the thought leaders from the Analytical, Operational and Architectural side on how they are collaboratively working to develop the next generation system and processes.
Dan Walsh - Consulting Engineer, Red HatFeb 25 20204:00 pmUTC58 mins
This talk examines all of the technologies used to keep containers separate. We will examine concepts of what needs to be considered when containerization is happening. Whether to run your apps in containers, VMs or on bare metal. It will examine technologies like Linux Capabilities, SECCOMP, SELinux, Device Cgroups, Read Only.
Experts from The Realization Group, EuroCCP, and BT RadianzFeb 25 20204:00 pmUTC27 mins
Although the post-trade ecosystem is seen as the ‘plumbing’ of financial services, mainly hidden but crucial, its role in ensuring the industry’s health made it key to global post-crisis regulatory reforms. Firms have now had to deal with over a decade of rapid regulatory changes and the huge operational costs these incur. At the same time, they’ve also been coming to terms with the realities of shrinking margins and the need to both increase efficiencies and work towards a more sustainable business model across the board.
In this webinar, our experts discuss the key challenges facing the industry specifically focusing on data, regulation and technology and how firms are responding to these pressures and investing in technology to help drive their post-trade transformation.
Sai Zeya, Technical Marketing Engineer, Cisco SystemsFeb 25 20204:00 pmUTC60 mins
This session will cover step by step guide to host native docker application on Cisco Catalyst 9000 application environment. We will walk through application networking, application resources profiles and IOS level configuration required to install applications on IOS-XE with Cisco Catalyst 9K switch. We will also cover application orchestration via Cisco DNA Center
Lucy Kerner - Senior Principal Security Global Technical Evangelist and Strategist, Red HatFeb 25 20205:00 pmUTC50 mins
In this session, we’ll discuss how you can improve security and compliance with automation. We'll look at how a combination of Red Hat technologies can help you with security and compliance challenges in the infrastructure, operations, application, and security operations center across a hybrid environment with automation.
Specifically, in your hybrid infrastructure, you’ll learn how Red Hat’s management and automation solutions, Red Hat OpenShift Container Platform, and OpenSCAP can help you.
Grant Duke - NA Commercial Lead | Microsoft and Rob Furrow - Field Marketing Manager | Dell TechnologiesFeb 25 20205:00 pmUTC40 mins
The way we work and the anticipated experience from our end users is rapidly changing. Dell has solutions in market today to address these challenges, and a plan for what the future hold.
In this webinar we will explore the best in class productivity solutions from Microsoft and Dell. We will review how Dell PC’s work best with Windows 10 Pro and Office 365 to deliver client solutions that IT trusts and end users love.
Robert Furrow | Dell
Robert has over 13 Years with Dell as a Sales Leader, Trainer, Customer & Product Consultant. Currently, Rob is a field marketing manager helping support our Commercial and Medium Business sales teams.
Grant Duke | Microsoft Corporation
Grant has nearly 20 years of experience in mobile computing with Microsoft and other technology leaders. In his current role with Microsoft he leads Commercial Sales with Dell North America by aligning the combined strategies of Dell’s Workforce Transformation and the Microsoft Modern Workplace.
Chris Grimm - Solutions Architect, Red HatFeb 25 20206:00 pmUTC48 mins
Configuration Drift, Manual Validation, Human Error; these are all words we often associate with our system security posture. Utilizing today’s automation technologies, these can all be things of the past by taking proven CI/CD concepts and jumping into the world of SecOps.
Applications built on microservices architecture have widely adopted container technology. To deploy container applications in production, application services such as load balancing, application security and analytics need to be modernized. Avi Networks integrates natively into Amazon Elastic Container Service for Kubernetes (EKS) to help autoscale your applications in multi-cloud environments to meet growing demands.
David Turner, SD-WAN Technical Program Mgr & Robert Ford, Principle Tech, Meriplex & Michael Leonard, Sr. Product, VeloCloudFeb 25 20206:00 pmUTC60 mins
Retailers face numerous challenges as they seek to digitally transform their businesses. They need to worry not only about storefronts, but also headquarters, manufacturing and distribution sites, pop-up shops, and ecommerce. Generating a high quality and seamless user experience that meets the increasing consumer demand for convenience is key for the next-generation retail environment. VMware SD-WAN™ by VeloCloud® plays a crucial role in enabling a retail revolution by providing reliable, cost effective network connectivity, increased bandwidth efficiency, secure customer data, and rapid deployment for new sites. Hear from Meriplex and VeloCloud, now part of VMware experts about why SD-WAN is necessary for retail organizations’ network strategy.
Terence Jackson (Thycotic), Ziv Mador (Trustwave), Mark Bagley (Verodin) & Chris Morales (Vectra)Feb 25 20206:30 pmUTC60 mins
Adversaries are growing in numbers and sophistication regularly employing automation, AI and machine learning and continue to be successful in various different attacks.
Join this panel of industry leaders and security experts to learn more about cyber attacks and how to protect your organization in 2020. Viewers will learn about:
- What the experts are seeing when it comes to successful and profitable breaches
- How businesses can be successful in stopping attackers in their tracks
- Expert recommendations for improving security in 2020 and beyond
This panel will be broadcast LIVE during RSA Conference in San Francisco.
Terence Jackson, Chief Information Security Officer, Thycotic
Ziv Mador, VP, Security Research at Trustwave SpiderLabs
Mark Bagley, VP Products, Verodin
Chris Morales, Head of Security Analytics, Vectra