Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Stronger, Better, Faster: Solving the performance challenges of the modern web
    Stronger, Better, Faster: Solving the performance challenges of the modern web
    Pat Meenan, Distinguished Engineer @Cloudflare & Kornel Lesinski, Performance Engineer @Cloudflare Recorded: May 17 2019 63 mins
    The internet is changing - make sure your applications don’t get left behind

    Time is the most valuable commodity that we all inevitably never seem to have enough of. As more and more digital services compete for users’ attention, they’re willing to spend less time waiting for applications and web pages to load. At the same time, the architecture that powers these services is becoming more complex, and increasing resource demands are leading to longer load times.

    In this webinar, we’ll look at how the building blocks of the modern web affect real-world page loading, and what developers and sysadmins can do to make sure that their applications and domains deliver minimal load times for maximum user satisfaction. We’ll hear from Cloudflare’s web performance leader Patrick Meenan to learn about:

    - The foundational elements of the web, and how they impact web performance and site speed
    - The common mistakes that slow down pages, and how you can avoid them
    - New web standards, and how to prepare your domains for them
    - How cloud infrastructure models are affecting page performance across the web
    - A technical overview of HTTP/2 prioritization and JavaScript improvements, and how they will improve page load times
    - The advanced technologies that will shape the future of the web in years to come
  • Degrees of Application Refactoring to Cloud Native
    Degrees of Application Refactoring to Cloud Native
    Chris Presley, Director of Consulting; Alex Zadoroshnyi; DevOps Technical Director; Pierig Le Saux, Principal Consultant Recorded: May 17 2019 54 mins
    What is application refactoring? Should you refactor or not? Should you lift and shift, partially refactor, or completely refactor your apps when porting to the cloud? Chris Presley, Alex Zadoroshnyi and Pierig Le Saux discuss these topics and more in the first part of our Application Migration webinar series.
  • Stronger, Better, Faster: Solving the performance challenges of the modern web
    Stronger, Better, Faster: Solving the performance challenges of the modern web
    Pat Meenan, Distinguished Engineer @Cloudflare & Kornel Lesinski, Performance Engineer @Cloudflare Recorded: May 17 2019 63 mins
    The internet is changing - make sure your applications don’t get left behind

    Time is the most valuable commodity that we all inevitably never seem to have enough of. As more and more digital services compete for users’ attention, they’re willing to spend less time waiting for applications and web pages to load. At the same time, the architecture that powers these services is becoming more complex, and increasing resource demands are leading to longer load times.

    In this webinar, we’ll look at how the building blocks of the modern web affect real-world page loading, and what developers and sysadmins can do to make sure that their applications and domains deliver minimal load times for maximum user satisfaction. We’ll hear from Cloudflare’s web performance leader Patrick Meenan to learn about:

    - The foundational elements of the web, and how they impact web performance and site speed
    - The common mistakes that slow down pages, and how you can avoid them
    - New web standards, and how to prepare your domains for them
    - How cloud infrastructure models are affecting page performance across the web
    - A technical overview of HTTP/2 prioritization and JavaScript improvements, and how they will improve page load times
    - The advanced technologies that will shape the future of the web in years to come
  • Have no Fear, Security Automation is Here
    Have no Fear, Security Automation is Here
    Sydney Coffaro, InsightConnect Product Specialist Recorded: May 16 2019 25 mins
    Security automation is a hot topic today, as security teams are looking to effectively leverage technology to make their security operations run more smoothly. With automation all the rage, comments like “we should be automating more” are becoming an ongoing theme. Dedicating time and resources to implement automation is often viewed as a huge level of effort, but adding automation to your most time-intensive security processes doesn’t have to be an intimidating undertaking. Did you know that with a small investment, you can realize tremendous ROI and value from automation, faster than ever before?

    In this demo of InsightConnect, you will learn about:
    1. Overview of automation workflow building blocks
    2. Real use cases teams struggle with today, including phishing, SIEM investigation and response, patching, and more
    3. How you can integrate security automation and orchestration into your existing SecOps programs
    4. How automation will improve efficiency across the processes and tools you’re executing manually today
  • Going beyond “reasonable security measures” to align with CCPA and GDPR
    Going beyond “reasonable security measures” to align with CCPA and GDPR
    Andy Wyatt, Senior Technologist Recorded: May 16 2019 44 mins
    Don’t let third-party code (continue to) steal your customer information.

    While 2018 was the year of GDPR, the new California Consumer Privacy Act (CCPA) is coming in 2020 and chances are your web apps are still not fully compliant. Both of these privacy regulations require that businesses take adequate precautions to protect customer information and prevent unauthorized access. Unfortunately, third-party tags or scripts in your web apps make it difficult to comply with this requirement.
    All third-party code included in your web apps executes in the browser and has access to the same cookies and form fields that your first-party code does, leaving your customers’ data at risk for exfiltration through formjacking or cookie stealing. If you don’t take steps to prevent third parties from accessing sensitive information that customers enter on your website, you won’t be compliant.

    The unfortunate reality is that the web was not built with privacy in mind, but there are ways to secure your customer data.


    In this webinar, we’ll cover:

    - The current ‘backdoors’ that exist in your web apps due to third-party code
    - Why existing tag management and security measures are not enough
    - How to defend customer information from being leaked from your web apps
  • Everything You Wanted to Know...But Were Too Proud to Ask - The Memory Pod
    Everything You Wanted to Know...But Were Too Proud to Ask - The Memory Pod
    Alan Bumgarner, Intel; Alex McDonald, NetApp; John Kim, Mellanox Recorded: May 16 2019 62 mins
    Traditionally, much of the IT infrastructure that we’ve built over the years can be divided fairly simply into storage (the place we save our persistent data), network (how we get access to the storage and get at our data) and compute (memory and CPU that crunches on the data). In fact, so successful has this model been that a trip to any cloud services provider allows you to order (and be billed for) exactly these three components.

    We build effective systems in a cost-optimal way by using appropriate quantities of expensive and fast memory (DRAM for instance) to cache our cheaper and slower storage. But currently fast memory has no persistence at all; it’s only storage that provides the application the guarantee that storing, modifying or deleting data does exactly that.

    Memory and storage differ in other ways. For example, we load from memory to registers on the CPU, perform operations there, and then store the results back to memory by using byte addresses. This load/store technology is different from storage, where we tend to move data back and fore between memory and storage in large blocks, by using an API (application programming interface).

    New memory technologies are challenging these assumptions. They look like storage in that they’re persistent, if a lot faster than traditional disks or even Flash based SSDs, but we address them in bytes, as we do memory like DRAM, if more slowly. Persistent memory (PM) lies between storage and memory in latency, bandwidth and cost, while providing memory semantics and storage persistence. In this webcast, SNIA experts will discuss:

    •Traditional uses of storage and memory as a cache
    •How can we build and use systems based on PM?
    •What would a system with storage, persistent memory and DRAM look like?
    •Do we need a new programming model to take advantage of PM?
    •Interesting use cases for systems equipped with PM
    •How we might take better advantage of this new technology
  • Scale your application to new heights with NGINX and AWS
    Scale your application to new heights with NGINX and AWS
    Damian Curry Technical Business Development Manager at NGINX and Juan Villa Partner Solutions Architect at AWS Recorded: May 16 2019 56 mins
    In this webinar we will discuss how AWS and NGINX can complement each other to create highly scalable, high performance and secure web applications. We will cover the different ways that NGINX can integrate with AWS services such as NLB, Route53 and PrivateLink to add new layers of security and functionality to your high traffic website, streaming service or IOT system.

    Join this webinar to learn
    - How to simplify your stack with NGINX products
    - The benefits of NGINX Plus vs hardware load balancers
    - When to use NGINX vs AWS ELB Solutions
    - How NGINX can integrate with different AWS services
  • Better. Faster. Greener: Optimize the Data Center with Supermicro X11 Servers
    Better. Faster. Greener: Optimize the Data Center with Supermicro X11 Servers
    Jim Sangster, Supermicro & Jeremy S. Nicholes, Intel Recorded: May 16 2019 49 mins
    The industry’s largest portfolio of servers & storage is now even better than before. With over 100 new SuperServer and SuperStorage systems supporting the 2nd Generation Intel® Xeon® Scalable processor there is bound to be a no-compromise workload-optimized system for your exact needs.
    Join Supermicro & Intel for an insight into the continued focus on Resource-Savings to ensure your data center is optimized to reduce acquisition costs, reduce TCO and help in the reduction of e-waste.
  • How We Approached Evaluation of ALM Octane and Now Run Agile Testing
    How We Approached Evaluation of ALM Octane and Now Run Agile Testing
    Gerd Fladrich, Risang Sidik Recorded: May 16 2019 60 mins
    This webinar is brought to you by the Vivit Testing Quality ALM Special Interest Group (SIG).

    Join this webinar that will demonstrate how BNP Paribas started and performed evaluation of ALM Octane and is now using the tool to run complete agile testing lifecycles. The testing lifecycle will be presented as a live demo that follows Behavior-Driven Development (BDD) methodology and uses Gherkin notation for defining test suites.

    The testing lifecycle starts with definition of requirements and user stories, heavily builds on test automation and advanced reporting, manages and synchronizes defects across tools, and feeds learnings from testing back into the requirements. It uses an integrated development and testing infrastructure including products like Confluence, Jira, Micro Focus ALM, Micro Focus ALM Octane, Jenkins, GIT, Cucumber, IntelliJ, TestCafe, and others.

    BNP Paribas’s journey with agile test automation using ALM Octane started in 2017. The webinar presents in a nutshell how evaluation of ALM Octane was approached and conducted. It explains how new methods were introduced with the objective to leverage full tool functionality. The initiative has soon helped to increase testing efficiency and created important business value.

    Webinar participants will learn:

    • How BNP Paribas has conducted evaluation of ALM Octane
    • Why ALM Octane is much more than just a successor of ALM/Quality Center
    • How ALM Octane eases flexible management of its entire surrounding tool chain
    • Why methodology like BDD shall precede tools, and not vice versa
    • How Gherkin establishes a common language for the entire agile development lifecycle that helps integrating business, development, and testing
    • How to use ALM Octane for pipeline management, reporting, defect synchronization, import of performance testing and BPT results, integration of in-sprint testing etc.
  • Segurança de Acesso: O que se conecta à nossa rede e como nos proteger
    Segurança de Acesso: O que se conecta à nossa rede e como nos proteger
    Gustavo Denes, Network Sales Specialist, Aruba & Jordi Garcia, Network Engineer, Aruba Recorded: May 16 2019 51 mins
    Já em 2019, 92% das empresas no segmento industrial terão adotado alguma tenologia de Internet das coisas “IoT” e 77% acreditam que a forma como adotam e gerem essas novas tecnologias será um diferencial competitivo no mercado. Registe-se no nosso próximo webinar e descubra como os negócios estão a utilizar IoT hoje, o que esperar para o futuro e como se proteger de possíveis ameaças!
  • BT masterclass in Domain Name System (DNS) security and protecting your network
    BT masterclass in Domain Name System (DNS) security and protecting your network
    Keith Langridge, Craig Hamilton, Paul Crichard, Tim Rooney Recorded: May 16 2019 18 mins
    Malware is today’s fastest growing attack vector. The AV-Test Institute, an independent IT security research institute, has identified over 865 million malware programs in existence. And they claim to register over 350,000 new malicious programs and potentially unwanted applications per day.

    Every network has DNS servers and attackers seeking information from behind your organisations’ firewalls are increasingly using DNS as a backdoor into corporate networks. This represents a real and growing threat that you can’t ignore.

    In this webinar, we have focused on:
    •How DNS security practices can help you improve you overall network security
    •The DNS firewall and the early detection of malware-infested devices
    •Alternative DNS security measures you can put in place

    Presenters:
    Keith Langridge – VP, network services, BT
    Craig Hamilton – Principal sales engineer, BT
    Paul Crichard – Chief technical officer, security, BT
    Tim Rooney – Product management director, Diamond IP, BT
  • ゼロトラストに基づくセキュリティ対策 ~ネットワーク編~
    ゼロトラストに基づくセキュリティ対策 ~ネットワーク編~
    石橋 寛憲, シニアプリンシパルセールスエンジニア, 株式会社シマンテック Recorded: May 16 2019 60 mins
    ウェブやメールなど、ネットワークを通じてアクセスするコンテンツには、良いもの、悪いもの、と判断できるものだけではなく、よく分からないものも数多く存在します。そして、それらを区別するのが非常に困難になっています。この様な状況の中、ゼロトラスト(信頼しない)前提でのセキュリティ対策をどうすれば良いのか?と悩まれている方も多いのではないでしょうか。

    当Webinarでは、ゼロトラストに基づくセキュリティ対策を、ネットワークの切り口で実現するソリューションついてご紹介します。
  • Cyber Security 101
    Cyber Security 101
    Anand Guruprasad, Solutions Engineer @ Cloudflare & Krishna Zulkarnain, Marketing Director, APAC @ Cloudflare Recorded: May 16 2019 35 mins
    Are you aware of the current security threats to your business? Are you prepared to handle the next big DDoS attack? What can you do to be prepared?

    At Cloudflare, we want to share our unique position — with more than 14 million domains interacting with 175 data centres worldwide, we can draw unparalleled insights into attack trends and what these attacks look like.

    Join this webinar and learn:

    - Three factors that we see are leading customers to a growing exposure to security threats
    - The business impact and potential costs of security threats
    - Threat mitigation strategies against volumetric layer 3/4 attacks, intelligent Layer 7 attacks, and bots
  • Application Awareness with the Power to Take Action
    Application Awareness with the Power to Take Action
    David Davis, Partner & Vexpert, ActualTech Media and Bassam Khan, VP, Product & Technical Marketing Engineering, Gigamon Recorded: May 16 2019 54 mins
    Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.

    What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.

    Join Gigamon and ActualTech Media in this webinar and learn how to:
    - Unleash visibility to secure and optimize your network
    - Discover applications that you didn’t even know were running on your network
    - Increase overall performance of your network and shared components
    - Spot potential security vulnerabilities before they become a problem

    Join Gigamon and ActualTech Media in this webinar to learn how to discover applications that you didn’t even know were running on your network.

    Watch as we share insight and demonstrate live how to increase overall performance as well as spot potential security vulnerabilities before they become a problem.
  • CURO Financial Depends on Virtual Instruments
    CURO Financial Depends on Virtual Instruments
    Virtual Instruments Recorded: May 15 2019 6 mins
    A fast growing financial institution requires 100% uptime for their customers. Virtual Instruments delivers with end-to-end IT infrastructure management solutions.
  • The tenets of RHEL 8 Beta: Architecture, use cases, & more
    The tenets of RHEL 8 Beta: Architecture, use cases, & more
    Gunnar Hellekson, Red Hat and Rex Backman, Red Hat Recorded: May 15 2019 39 mins
    Join us for an interview with Gunnar Hellekson, senior director at Red Hat, who leads a team of Red Hat Enterprise Linux product managers.

    During the webinar, we’ll discuss how Red Hat Enterprise Linux product managers, along with others, worked together to define the:

    •Architecture for RHEL 8 Beta
    •Major use cases that resulted in RHEL 8 Beta

    Featuring:
    Gunnar Hellekson, Senior Director, Product Management, Global, Red Hat
    and
    Rex Backman, Senior Principal Product Marketing Manager, Red Hat
  • Apstra Intent-Based Data Center Automation 3.0
    Apstra Intent-Based Data Center Automation 3.0
    Michael Wood Recorded: May 15 2019 61 mins
    Apstra's recent release of AOS 3.0, the award-winning Intent-Based Data Center Automation system, enables businesses to increase application reliability and availability, simplify deployments and operations through automation, and reduce costs (OpEx and CapEx).

    The latest release provides several major advancements including:

    - Multidomain Unified Group-Based Policy
    - Enterprise Cloudification features
    - Advanced vSphere Integration
    - Significant Intent-Based Analytics enhancements
  • Why Adopt CA UIM Release 9 Service Pack 1 (CA UIM 9.1.0) & How to Upgrade Today
    Why Adopt CA UIM Release 9 Service Pack 1 (CA UIM 9.1.0) & How to Upgrade Today
    Ashish Aggarwal Recorded: May 15 2019 37 mins
    CA UIM Release 9 Service Pack 1 (CA UIM 9.1.0) is officially GA! Join Product Manager Ashish Aggarwal on May 15th at 12 PM ET as he walks through the reasons why you should adopt CA UIM 9.1.0. In this webinar you will learn about:

    1.New features in CA UIM 9.1.0 that will help you monitor your infrastructure more efficiently and securely while adding new capabilities and integrations.

    2.A step-by-step guide on how to upgrade to CA UIM 9.1.0 with ease and reliability.

    3.Resources that will make this upgrade process as seamless as possible.

    We hope to see you there!
  • Webinar: Capgemini talks Gaining Operational Efficiency in Network Operations
    Webinar: Capgemini talks Gaining Operational Efficiency in Network Operations
    Geoffrey Hughes, Capgemini, Former CISO, Architect, Compliance Officer, Karen Crowley, Sr. Product Marketing Manager, Tufin Recorded: May 15 2019 52 mins
    Join us on May 15th at 11am ET/4pm UK time to hear Capgemini talk about the challenges of improving operational efficiency in the age of increasing network complexity and digital transformation.
    Former CISO, Security Architect and Compliance Officer, Geoff Hughes of Capgemini will address:
    •Why organizations struggle to deploy automation at scale
    •Best practices for getting started with automation
    •The role application security plays in digital transformation
    Register now for this 30-minute discussion to learn how you can improve operations and meet business agility goals with automation
  • Avoiding the risks of vulnerable endpoints
    Avoiding the risks of vulnerable endpoints
    Bob Tarzey, Bernard Parsons Recorded: May 15 2019 28 mins
    An interview with Industry Analyst Bob Tarzey, discussing how a security-focused operating system can help organizations optimize their end user device strategy
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    John Grim, Senior Manager, Investigative Response - America Recorded: May 15 2019 70 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the Data Breach Investigations Report (DBIR) and the current cybersecurity threat landscape.

    This month's theme: Data Breach Investigations Report (DBIR)

    We'll cover:
    •Key findings based on thousands of breaches analyzed
    •Threat actors, their motives and their tactics
    •Impacted victim industries and targeted assets

    Our Verizon Threat Research Advisory Center presenters will be:
    •Alex Pinto, Head of Verizon Security Research Team
    •John Grim, Senior Manager, Investigative Response - America
    •Dustin Maxwell Tobin Shubin, Threat Intelligence
    •David Kennedy, Managing Principal, Open Source Intelligence

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • Understanding the 3rd-, 4th-, and 5th- party calls your website makes
    Understanding the 3rd-, 4th-, and 5th- party calls your website makes
    Andy Wyatt, Senior Product Marketing Manager, Instart Recorded: May 15 2019 42 mins
    How to audit your current website and tags for potential third-party issues.

    The nature of JavaScript is that all code — both first- and third-party, shares all the same resources, has access to all the same data, and has use of all the same variables.

    Third-party services are a great way to add functionality, but it’s crucial to have visibility and control over them to ensure they don’t impact the performance, reliability, or security of your site. Do you worry about the performance and security risks third-party services may pose for your users? Are you struggling with finding and addressing issues due to third-party outages, variable collisions, JavaScript errors, and other third-party service reliability concerns? Have you been reading about the Magecart attacks and wondering how to prevent them?

    In this webinar, you'll learn about:

    - Common issues third-party services cause
    - How to audit your website and third-party services for potential issues
    - What can be done when a third-party service causes a performance, reliability or security issue
  • Automating Simple Network Operations With Ansible
    Automating Simple Network Operations With Ansible
    John Walter, Solutions Architect, Training and Certification, Red Hat Recorded: May 14 2019 45 mins
    Ansible® is an automation and configuration management technology used to provision, deploy, and manage compute infrastructure across cloud, virtual, and physical environments. Specifically, it can be used by network administrators to centrally manage the switches, routers, and other devices in an organization's network infrastructure. This webinar, part of a series conducted by the Red Hat® Training and Certification team, will provide a demonstration of how to deploy and manage network devices using Ansible Playbooks.

    In this webinar, our expert will cover:
    •Writing effective playbooks for network automation.
    •Automating specific network administration use cases.
    •Using Ansible Playbooks to target devices from various hardware vendors, including Cisco, Juniper, and Arista.
    •Red Hat Training’s Ansible curriculum.

    Join us to build the skills that will help you successfully manage your network devices with Ansible.
  • Webinaire: 5 signes clairs dont vous avez besoin pour automatiser les opérations
    Webinaire: 5 signes clairs dont vous avez besoin pour automatiser les opérations
    Anthony Le Pipe, WEMEA Sales Engineer May 21 2019 8:30 am UTC 60 mins
    Pourquoi automatiser? Pourquoi maintenant? L'automatisation est essentielle à la transformation numérique, essentielle pour réduire la surface d'attaque et obligatoire pour garantir la conformité continue. Rejoignez-nous le mardi 21 mai pour notre diffusion Web "5 signes clairs dont vous avez besoin pour automatiser les opérations de sécurité réseau" pour apprendre:

    - Comment accélérer en toute sécurité le processus de changement de réseau
    - Meilleures pratiques pour démarrer avec l'automatisation
    - Lignes directrices pour atteindre l'objectif de l'automatisation Zero-Touch

    Faites de l’automatisation l’un de vos objectifs pour 2019 et réduisez le temps et les efforts consacrés aux tâches manuelles liées aux opérations de pare-feu. Les cinq indicateurs clairs peuvent vous aider à élaborer une analyse de rentabilisation et à obtenir l'adhésion de la direction à l'optimisation de l'agilité et de la sécurité avec l'automatisation et l'orchestration des stratégies de sécurité de Tufin.
  • How to better manage mixed data center environments
    How to better manage mixed data center environments
    Ofer Lior, EMEA Business Development Manager and Dror Shenkar, Chief Architect May 21 2019 9:00 am UTC 60 mins
    In this webinar, learn how to replace manual, hardware-defined application provisioning and management with a highly automated, software-defined resource model and orchestration layer that enables flexibility, simplified on-demand capital efficiency, and lower TCO.

    • Does the shift from on-premise, private clouds to co-location and public/hybrid clouds demand more visibility and operational control than you think you can deliver?
    • Fortunately, data center management tools keep a vigil on power, thermal consumption, server health, and utilization, allowing better control no matter your cloud’s shape.
    • Learn how DCM enables real-time monitoring and precise management to lower operational costs and optimize infrastructure for today even as you’re forecasting for tomorrow.
  • Webinar: 5 segni chiari che è necessario automatizzare le operazioni di sicurezz
    Webinar: 5 segni chiari che è necessario automatizzare le operazioni di sicurezz
    Flavio Di Cosmo, SEMEA Sales Engineer May 21 2019 12:30 pm UTC 60 mins
    Perché automatizzare? Perché ora? L'automazione è fondamentale per la trasformazione digitale, essenziale per ridurre la superficie di attacco e obbligatoria per garantire la conformità continua.

    - Come accelerare in modo sicuro il processo di modifica della rete
    - Best practice per iniziare con l'automazione
    - Linee guida per raggiungere l'obiettivo di Zero-Touch Automation

    Rendilo uno dei tuoi obiettivi del 2019 per adottare l'automazione e ridurre il tempo e gli sforzi da dedicare alle attività manuali relative alle operazioni del firewall. I cinque segni chiari possono aiutarti a costruire il business case e ottenere il buy-in di gestione per massimizzare l'agilità e la sicurezza con Tufin Security Policy Automation and Orchestration.
  • A Day in the Life - Tips and Best Practices from 3 CISSPs
    A Day in the Life - Tips and Best Practices from 3 CISSPs
    James Packer, CISSP, London; Chuan-Wei Hoo, CISSP, Singapore; James R. McQuiggan, CISSP, United States; B. Dunlap (Moderator) May 21 2019 2:00 pm UTC 60 mins
    More than 130,000 information security professionals have invested time, determination and resources to attain the CISSP certification. Join (ISC)² members from different regions on May 21, 2019 at 10:00AM Eastern as we discuss what pain points, issues and challenges they encounter in their day-to-day work life, as well as solutions, tips and best practices they have developed along the way. We’ll also examine how the CISSP certification has helped them with their job and career.
  • Reconsider TCPdump and Move Forward with Modern Troubleshooting
    Reconsider TCPdump and Move Forward with Modern Troubleshooting
    Chad Tripod May 21 2019 3:00 pm UTC 32 mins
    Are you tired of troubleshooting with TCPdump on your traditional load balancers? Avi Networks has a modern load balancing platform to the rescue. Learn how you can reconsider your decades-old CPU-intensive logging tools – and gain intuitive, real-time analytics, faster time-to-resolution, modern SSL / TLS encryption, and (most importantly) happy IT teams focused on delivering applications.
  • Achieving uCPE success with ADVA and Intel
    Achieving uCPE success with ADVA and Intel
    Prayson Pate, CTO, ADVA Edge Cloud & Sab Gosal, Segment Director, Communications Infrastructure Devices, Intel May 21 2019 3:00 pm UTC 60 mins
    The uCPE market is hot right now because it enables cloud-centric deployment of services like SD-WAN, firewall, IoT, and micro-cloud. But service providers and enterprises are concerned about performance, scalability and complexity. This webinar will talk about the trends and opportunities for uCPE, how ADVA and Intel can address the challenges, and some real-world use cases for uCPE.
  • Cloud Vision 2020: The Future of the Cloud
    Cloud Vision 2020: The Future of the Cloud
    Jeff Behl, Chief Product Officer at LogicMonitor and William Fellows Research Vice President and Founder of 451 Research May 21 2019 3:00 pm UTC 58 mins
    Your cloud journey is underway. That’s a fact. So what’s next and how can you best prepare your organization for long term success? Cloud Vision 2020: The Future of the Cloud from LogicMonitor provides answers. Compiled from the predictions of more than 300 industry influencers, this report outlines of the future of the cloud and contains valuable insights and tips for IT leaders preparing for and continuing on in their transition to the cloud.

    Join Jeff Behl, LogicMonitor Chief Product Officer and William Fellows, VP of Research for 451 Research’s Cloud Transformation Channel as they reveal the survey results and discuss ramifications for the market.

    Cloud Vision 2020: Future of the Cloud Webinar will cover:
    -Will Enterprises ever be 100% in the cloud?
    -What trends are actually driving cloud engagement today?
    -What will the drivers to the cloud be in 2020?
    -Which cloud vendors will gain/lose market share?
    -How can these findings be applied to your cloud strategy?

    Learn why Forbes, USA Today, and TechRepublic are talking about LogicMonitor’s Cloud Vision 2020 study. Follow the conversation on Twitter, using the hashtag #CloudVision2020
  • Connecting Core to Edge: Investigating Two Multicloud Deployment Use Cases
    Connecting Core to Edge: Investigating Two Multicloud Deployment Use Cases
    Dominic Romeo – Director Product Management | TierPoint and Will Pittman – Ecosystem Director | Megaport May 21 2019 4:00 pm UTC 60 mins
    Analyst firm Gartner predicts that by 2022, more than 50% of enterprise-generated data will be created and processed outside of the data center or cloud, up from less than 10% in 2019.

    As a result, businesses are increasingly leveraging both hyperscale data centers and cloud deployments closer to the edge to support their IT strategies and digital transformation initiatives.

    Rapid growth in multicloud IT deployments is driving an increased need to consider options for connectivity. Dedicated, fast, and globally-reaching connectivity is key to bringing the cloud closer to the edge where businesses reside and need services.

    Join TierPoint and Megaport for an in-depth look at two multicloud use cases. Our experts will give their insights into how the demand for both hyperscale and edge computing can be combined with cloud connectivity to make cloud strategies a reality.
  • New Landscape of Network Speeds
    New Landscape of Network Speeds
    David Chalupsky, Intel; Craig Carlson, Marvell; Peter Onufryck, Microchip; John Kim, Mellanox May 21 2019 5:00 pm UTC 75 mins
    In the short period from 2014-2018, Ethernet equipment vendors have announced big increases in line speeds, shipping 25, 50, and 100 Gigabits-per -second (Gb/s) speeds and announcing 200/400 Gb/s. At the same time Fibre Channel vendors have launched 32GFC, 64GFC and 128GFC technology while InfiniBand has reached 200Gb/s (called HDR) speeds.

    But who exactly is asking for these faster new networking speeds, and how will they use them? Are there servers, storage, and applications that can make good use of them? How are these new speeds achieved? Are new types of signaling, cables and transceivers required? How will changes in PCIe standards keep up? And do the faster speeds come with different distance limitations?

    Watch this SNIA Networking Storage Forum (NSF) webcast to learn how these new speeds are achieved, where they are likely to be deployed for storage, and what infrastructure changes are needed to support them.
  • Extending Firewalls to Kubernetes to Not Break Existing Security Architectures
    Extending Firewalls to Kubernetes to Not Break Existing Security Architectures
    Amit Gupta, VP of Product Management, Tigera May 21 2019 5:00 pm UTC 75 mins
    Security teams use firewalls to secure their production environments, often using a zone-based architecture, and Kubernetes does not deploy well to that architecture. Application teams are launching new business-critical applications on Kubernetes and are aggressively moving to production. A clash is bound to happen.

    In this webinar, we will describe an approach to extend firewalls to Kubernetes that will accelerate deployment to production, save time & money, and preserve existing security processes and investments.
  • Preventing web skimming attacks like Magecart
    Preventing web skimming attacks like Magecart
    Andy Wyatt, Sr. Product Marketing Manager, Instart May 22 2019 12:00 am UTC 45 mins
    Regardless of how web skimmers infect your website, preventing your customer's personal information like credit card numbers, social security numbers, passwords and more from being skimmed is the only way to actually protect your website and your customers.

    In this webinar, we’ll cover:

    -How web skimming attacks like Magecart work and how they are notably different than traditional breaches
    -How this vulnerability is impossible to solve with the current security tools and infrastructure
    -Why preventing data exfiltration from the browser is the only way to fully protect yourself from web skimming attacks.
  • Запуск серверов Dell EMC 14G на базе новых процессоров Intel MLK
    Запуск серверов Dell EMC 14G на базе новых процессоров Intel MLK
    Никита Степанов, Системный инженер Dell Technologies May 22 2019 8:00 am UTC 60 mins
  • Taking the “Oh” out of IoT >  Partecipa LIVE al webinar
    Taking the “Oh” out of IoT > Partecipa LIVE al webinar
    Tommaso Cabrelle, Territory Manager Nord-Est Italia, Aruba May 22 2019 9:00 am UTC 60 mins
    Entro il 2019 il 92% delle realtá industriali avranno adottato tecnologie Intenet of Things, e il 77% crede che le stessa cambieranno profondamente il settore manufatturiero. Ma come viene utilizzata questa tecnologia al momento? Cosa ci si aspetta per il futuro, a livello di business? Unisciti a noi per scoprilo!
  • Checking a Box is Not Enough : Handling Lawful Consent in a Post-GDPR World
    Checking a Box is Not Enough : Handling Lawful Consent in a Post-GDPR World
    Simon Hill, Chief Legal and Compliance Officer, Certes Networks May 22 2019 1:00 pm UTC 45 mins
    Handling lawful consent in GDPR is one area that can be especially tricky. Companies need to be particularly aware of new rights for consumers and notification requirements as these types of regulated responsibilities are not just limited to Europe. Any enterprise that provides a service whereby personal data is processed, are impacted by GDPR requirements.

    So, companies may think they have obtained sufficient consent regarding personal data and transparency only to find out that they have failed to obtain valid consent.

    In this interactive webinar, Certes Networks will cover:

    • What Did We Learn in 2018?
    • What is Important in 2019?
    • Getting Back to Basics
    • The Top Three Keys to Sufficient Consent
    • Case Studies

    On behalf of Certes Networks, we look forward to your participation.
  • Defensive Security Techniques You Can Use Now
    Defensive Security Techniques You Can Use Now
    Nick Bennett, Director, FireEye Mandiant & Matt McWhirt, Sr. Manager, FireEye Mandiant May 22 2019 3:00 pm UTC 60 mins
    Many organizations struggle with how to prioritize hardening and protective security actions.

    Based on 15+ years of frontline incident response experience, FireEye Mandiant consultants have identified a number of technical and programmatic defensive trends and best practices to help you prepare for incidents and mitigate their impact.

    Join our webinar, where Mandiant incident response experts Nick Bennet and Matt McWhirt will discuss the following topics:

    • Five technical categories to consider when implementing preventative security
    • Proven tips to effectively execute network segmentation, endpoint hardening and other critical tasks
    • Common pitfalls in evidence destruction, investigation techniques and remediation timing
    • Recommendations for enabling effective remediation and the power of operational playbooks

    Register today to learn how to better handle your organization’s next security incident.
  • CSA Study: Security Challenges in Cloud Environments
    CSA Study: Security Challenges in Cloud Environments
    John Yeoh, Director of Research (CSA) & Yitzy Tannenbaum Product Marketing Manager (AlgoSec) May 22 2019 3:00 pm UTC 60 mins
    Cloud computing provides improved security, agility, and flexibility. However, integrating this new service into legacy IT environments comes with great concern.

    In a recent report published by the Cloud Security Alliance (CSA), security, data loss and compliance were identified as the top 3 concerns when moving to the cloud. In the face of increasingly complex environments, cloud visibility and expertise are essential to ensuring a manageable, secure and fluent transition to a native cloud, hybrid or multi-cloud environment.

    Join our special webinar with John Yeoh, Director of Research with expertise in cybersecurity, cloud computing, information security, and next generation technology from the Cloud Security Alliance (CSA).

    We will cover various topics from the new CSA report Cloud Complexity: The Use of Hybrid and Multi-Cloud Environments, including:

    • Workloads being used in or moved to the cloud and how they are being deployed/migrated
    • Types of cloud platforms being used by companies
    • Common security challenges faced by companies when moving workloads to the cloud
    • Methods of managing risk and vulnerabilities in the cloud environment
    • Causes of network or application outages and the amount of time it took to remediate
  • Mist vs Meraki - Not All Clouds are Created Equal
    Mist vs Meraki - Not All Clouds are Created Equal
    Wes Purvis and Gene Sawyer May 22 2019 3:00 pm UTC 69 mins
    The cloud brings a variety of benefits to network management – from simplified configuration to faster troubleshooting. But, not all clouds are created equal.

    In the past 10+ years, new technologies like microservices and AI have emerged that have made first-generation cloud platforms obsolete.

    Join us for a deep dive into both the Mist and Meraki solutions, comparing/contrasting how you can leverage the different cloud architectures to do the following:

    -Deploy access points simply and quickly
    -Roll out new features on an ongoing basis
    -Monitor and optimize the wired/wireless user experience
    -Proactively troubleshoot problems
    -Collect and use detailed analytics
  • SD-WAN Service Growth and Automation through Industry Alignment
    SD-WAN Service Growth and Automation through Industry Alignment
    Pascal Menezes, CTO, MEF; Mark Gibson, Director of Product Management, Amdocs; David Ball, Principal Engineer, Cisco May 22 2019 3:00 pm UTC 60 mins
    SD-WAN is evolving from single-vendor DIY models used by enterprises looking for speed, access and cost benefits to a managed service that complements many service providers’ solution portfolios with a focus on application awareness, provisioning efficiency, and access options. MEF is soon to officially publish the industry’s first SD-WAN services standard (MEF 70) that defines an SD-WAN service and its various attributes. This is your opportunity to get up to date with the standard and its impact to your business and the broader industry ecosystem. Starting with the industry’s business challenges, you will explore SD-WAN’s role in the evolution from on-premise to cloud-based applications, and the value of a standard service in the context of managed services. Covering terminology, use cases, and the framework for automation, you’ll understand the full benefits of the service standard and the developments underway for the next phase of standards work, including application security for SD-WAN. Visibility on future certification and the critical role of a common language and APIs for automation will be presented. Join our CTO and industry subject matter experts in exploring this new service standard.
  • See vRealize 7.5 with True Visibility
    See vRealize 7.5 with True Visibility
    John Dias, Brian Williams & Peter Haagenson May 22 2019 3:00 pm UTC 45 mins
    VMware's vRealize Operations expert, John Dias, joins the Blue Medora team to discuss the exciting new updates to vROps 7.5 including application operations for packaged apps and updates to hyper-converged infrastructure operations.
  • SD-WAN Architecture Series: The Evolution of Today’s Enterprise
    SD-WAN Architecture Series: The Evolution of Today’s Enterprise
    Michael Leonard, Product Marketing Manager at VeloCloud, now part of VMware May 22 2019 5:00 pm UTC 60 mins
    SD-WAN is changing the way that organizations run their business. The continuum it offers enables new and enhanced offerings to become available that simplify, expand, and optimize all network activity.

    In this webinar, we’ll explore how SD-WAN architecture provides the flexibility needed to make the necessary enhancements. Which includes enablement of secure transport, expanding bandwidth for multiple applications, video offerings, and enabling sophisticated analytics, all while turning the network into a profit center.
  • To Outsource, or Not To Outsource: Best Practices for IT Security
    To Outsource, or Not To Outsource: Best Practices for IT Security
    Ryan LaSalle, Global Managing Director, Growth & Strategy - Accenture Security, Narayan Makaram - Arctic Wolf May 22 2019 5:30 pm UTC 62 mins
    With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

    By attending, you’ll:

    - Understand best practices for working most effectively with third party providers
    - Discover what security functions can be handled by third parties and what should be kept in-house
    - Recognize how to avoid common pitfalls of working with third parties
    - Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it

    Save your seat now to learn more!
  • Building RHEL 8 Beta: Upstream and downstream - Better Together
    Building RHEL 8 Beta: Upstream and downstream - Better Together
    Stefanie Chiras, VP & GM, RHEL Business Unit, Red Hat, Denise Dumas, VP Software Engineering, Global, Red Hat May 22 2019 6:00 pm UTC 38 mins
    Listen in as Stefanie Chiras, vice president and general manager of the RHEL Business Unit, and Denise Dumas, vice president of Software Engineering Global at Red Hat discuss the importance of the open source community and its contribution and impact on the development of Red Hat Enterprise Linux 8 Beta.

    In this webinar, we’ll cover:
    •The upstream and downstream processes
    •How the upstream and downstream processes came together resulting in the world's leading operating system
  • Cyber State of Mind: 2019 Threat Landscape Review
    Cyber State of Mind: 2019 Threat Landscape Review
    LookingGlass’ Vice President of Customer Support, James Carnall, and CyberEdge’s Co-founder & CEO, Steve Piper May 22 2019 6:00 pm UTC 60 mins
    As we move toward the halfway point in the year, it might be a good time to evaluate the effectiveness of your organization’s security posture. According to CyberEdge’s 2019 Cyberthreat Defense Report, 78% of enterprises were victimized by a successful cyberattack last year. Is your organization next?

    CyberEdge surveyed 1,200 IT security professionals from 17 countries and 19 industries and learned:

    -56% of organizations were compromised by ransomware
    -45% of ransomware victims paid the ransom
    -13% of a typical IT budget is spent on security
    -84% of organizations are experiencing an IT security skills shortage
    -Malware, ransomware, and spear-phishing cause the most headaches

    Join LookingGlass’ SVP of Delivery & Support, James Carnall, and CyberEdge’s Co-founder & CEO, Steve Piper, as they review insights from CyberEdge’s sixth-annual research study. They’ll also provide answers to important questions, such as:

    -What are the weakest links in current security postures?
    -What’s standing in the way of IT security professionals?
    -What are the hottest security technologies for 2019?

    All webinar registrants will receive a complimentary copy of CyberEdge’s 2019 Cyberthreat Defense Report. Register now!
  • How To Gain Comprehensive Visibility and Security for Your Hybrid Environment
    How To Gain Comprehensive Visibility and Security for Your Hybrid Environment
    Reggie Best, President of Lumeta Solutions, FireMon | Ed Young, Product Manager of Lumeta Solutions, FireMon May 22 2019 7:00 pm UTC 60 mins
    Maintaining continuous security and compliance requires comprehensive visibility across your hybrid environment. You need to adapt and scale your security measures as your environment grows, as your hybrid environment shifts, or as new threats are detected. But without a true understanding of the scope of your assets and where all of your workloads reside, your efforts will be futile.

    Learn how FireMon’s Lumeta CloudVisibility can extend comprehensive network and endpoint discovery with real-time infrastructure visibility, change monitoring, and leak-path detection for your migration to the hybrid cloud across your on-premises, virtual, software-defined, cloud and hybrid environments.