Network infrastructure professionals understand that a reliable and secure infrastructure is crucial to enabling business execution. Join the network infrastructure community to interact with thousands of IT professionals. Browse hundreds of on-demand and live webinars and videos to learn about the latest trends in network computing, SDN, WAN optimization and more.
Global networking needs of enterprises have shifted dramatically. It is no longer just about having a static and eminently fair and stable network infrastructure of manually configured routers and deterministic - yet static - MPLS.
The new digital enterprise model demands an underlying global network that is easy to consume, agile to react to business needs and simple to manage. Hence enterprises have turned to SD-WAN with alternative direct internet access (DIA) site-to-site connectivity that augments and replaces MPLS for business-critical applications.
Join us as we discuss:
>> How Teradyne leverages private and public internet connectivity to deliver an optimal application experience for all stakeholders
>> New, recently-released built-in technologies that enable Ayaka to deliver on the needs of WAN transformation for digital enterprises
>> What’s in it for network managers as they drive a Netops approach for their enterprises
>> How to deliver on ‘internet-first’ approaches connectivity, tracking the ‘cloud-first’ approach for applications
Ted Vojnovich, Lenovo; Fred Bower, Lenovo; Tim Lustig, MellanoxRecorded: Oct 22 201962 mins
Software defined storage, or SDS, is growing in popularity in both cloud and enterprise accounts. But what makes it different from traditional storage arrays? Does it really save money? Is it more complicated to support? Is it more scalable or higher-performing? And does it have different networking requirements than traditional storage appliances?
Watch this SNIA webcast to learn:
•How software-defined storage differs from integrated storage appliances
•Whether SDS supports block, file, object, or all three types of storage access
•Potential issues or pitfalls with deploying SDS
•How SDS affects storage networking
•Scale-up vs. scale-out vs. hyperconverged vs. cloud
David Morris, Roy E. Hadley Jr., Reid Eastburn and Skeet SpillaneRecorded: Oct 22 201961 mins
This session will cover why State and Local Governments have headed the list of Ransomware Attacks. Part 1 will delve into why is this the case and Part 2 will address what can be done to prevent these attacks.
Cameron Goedde - Client Solutions Field Marketing | Dell EMCRecorded: Oct 18 201942 mins
Smarter & faster experiences are the driver behind Dell’s 2019 Client Solutions lineup. We have the broadest portfolio to meet all needs. From highly configurable fixed solutions – our OptiPlex desktops and AIOs and our Wyse Thin clients. To the smallest, lightest mobile solutions including Latitude and the XPS to specialty systems – our powerful Precision workstations, including towers, racks and mobile workstations and finally our Rugged devices. We also have a full portfolio of displays and accessories to help build your entire ecosystem.
Diego Lo Giudice, VP, Principal Analyst, Forrester | Jason Hatch, Senior Director, AkamaiRecorded: Oct 17 201957 mins
Businesses experience disengaging clients if their websites and mobile apps don’t respond in 2, 3 seconds. They lose revenue and get bad media coverage when customer experience breaks because of large scale unforeseen load and access from increased user traffic.
Be it an online sale event, a new financial service offering or a new game launch, every organization has planned or unplanned real-life situations where the user traffic increases 2X, 3X compared to normal days.
Pressure is on for app dev and infrastructure teams. As they transform to deliver better apps more frequently, their continuous delivery and Agile + DevOps journeys break too if end to end performance testing at scale is not done regularly to most closely replicate real world conditions and for peaks.
In this session, guest speaker, Forrester VP and Principal Analyst Diego Lo Giudice and, Akamai Senior Director Jason Hatch will share latest performance testing trends on how successful organizations are delivering more frequently while meeting the new pressing requirements of large scale performance load, concurrency and speed.
Join us on 17 Oct, 14:00 Singapore time to learn:
• Application performance needs in the accelerated digital world
• Continuous performance testing meets continuous delivery
• Modern performance testing trends
• How to be ready for the unexpected with 2X, 3X, 4X user traffic
Richard Greenberg, CISSP, OWSAP Foundation; Eitan Bremler - Co-Founder & VP Technology Safe-TRecorded: Oct 16 201933 mins
VPNs have been a cornerstone of secure networking for the last 20+ years. While VPNs have stood the test of time, today, we now know that a true security architecture is hinged upon the concept of Zero Trust Network Access.
Most organizations have already poured a great deal of time and resources into building out their VPN infrastructure. Considering that the technology does exactly what it’s supposed to do, ripping and replacing it may not make much sense.
What if we tell you that you don’t have to rip and replace your VPN in order to start your journey towards Zero Trust Network Access? Join us to this webinar to find out how.
Kevin Haley | Eva Velasquez | Ryan LawlessRecorded: Oct 16 201955 mins
As we wrap up National Cyber Security Awareness month join Symantec and partners The Identity Theft Resource Center and Infolock for our final webinar. Whether you are connecting to networks or collecting customer/consumer data, protection is needed. This group of speakers will help familiarize you on how to check your systems and how to keep others’ data safe.
Topics will include:
- If You Connect, You Must Protect: updating to the latest security software, web browser and operating systems
- Wi-Fi safety
- If You Collect It, Protect It: keeping customer/consumer data and information safe
Manufacturing and critical infrastructure organizations require the right OT solution that can deliver visibility & security from emerging threats. But that is only half the battle. Each environment is a bit different and what may be appropriate for some, will simply not work for others. Whether you are big or small, distributed or centralized will determine the right deployment model for you. Join us as we discuss a variety of deployment best practices based on different organizational models, structures and goals. After all, it is about leveraging the right model for YOUR organization that will ultimately achieve a fully secured environment.
K. Eric Gentry, Managing Principal, VTRACRecorded: Oct 16 201979 mins
Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the social attacks and the current cybersecurity threat landscape.
•The most common social engineering attacks
•New insights on phishing attacks
•Top threat actors in social attacks
Our Verizon Threat Research Advisory Center presenters will be:
•K. Eric Gentry, Managing Principal, VTRAC
•David Kennedy, Managing Principal, Open Source Intelligence
And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
•Current Intelligence Overview
•Attacks and Threat Indicators
•Latest Malware Trends
If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
Marc Bouteyre, VNF Product Management at Ekinops & Kishan Ramaswamy, Product Management at VMwareRecorded: Oct 16 201960 mins
Telcos are facing multiple challenges in adopting the two main disruptive technologies that are NFV and SD-WAN. Some are inherent to their existing networks infrastructure but they also have to face the cost and complexity to integrate functions from different vendors while they need to achieve an economic model of virtualization. By integrating VMware SD-WAN as a virtual edge on Ekinops’ NFVi environment, Telcos get carrier grade quality of services on top of any combination of network underlay (LTE, MPLS, Broadband) and a robust and simple integration of those services on a branch form factor fully integrated into their back-office system (OSS/BSS).
In this webinar, you will learn how the Ekinops and VMware integration:
· Enables Telcos to simplify SD-WAN delivery
· Speeds up their time to market (TTM)
· Opens up a large market opportunity for deploying SD-WAN as a service
. Allows customers to reap the benefits of SD-WAN and virtualization
Jerry Wong, Systems Engineer, InfobloxRecorded: Oct 16 201957 mins
The perimeter has shifted. Your users directly access cloud applications from everywhere and data no longer reside only in data centers. Digital transformations like SD-WAN, IoT and cloud make securing your infrastructure, applications and data complicated. SD-WAN enabled branches directly connect to the Internet, but they don’t have the ability to replicate a full HQ security stack. IoT leads to an explosion of non-standard devices using non-standard protocols, making them harder to secure. Every new change doesn’t equal need for a new security tool.
What’s needed is a scalable, simple, and integrated security solution that leverages existing infrastructure that organizations already own. DNS is critical to the fabric of the internet and any IP based communication (on-premises, cloud, SD-WAN and IoT environments). It serves as the perfect foundation for security because it is simple to deploy, ubiquitous in networks, is needed anyway for connectivity and can scale to the size of the Internet.
Join Infoblox and (ISC)² on Oct 16, 2019 (Wed) at 14:00 (GMT +8) to learn how leveraging DNS as a foundational security architecture for digital transformations can:
• Protect your brand by securing your traditional networks and transformations like SD-WAN, Cloud and IoT
• Reduce time and cost of your enterprise threat defense
• Automate response when it sees things happening and provide data to the rest of the ecosystem
Presenter: Jerry Wong, Systems Engineer, Infoblox
Moderator: Sam Goh, CISSP, GM for Korea and Japan, Ensign InfoSecurity
David Morris, Lance James, Steven Teppler, and Mark RaschRecorded: Oct 15 201961 mins
This session will delve into the legal responsibilities of your Bank's liability and your requirements to protect your banking credentials from the unauthorized transfer of funds as a result of a hack.
Saralyn Dasig | Product Marketing Manager, MV Smart CamerasRecorded: Oct 15 201945 mins
MV security cameras leverage advances in solid state memory technology and Meraki expertise in cloud management. By removing the need for additional on premise hardware and standalone software packages, like the network video recorder (NVR) and video management software (VMS), Meraki MV streamlines and simplifies purchasing, deployment, and monitoring of video security systems. Join us on a live webinar to learn more!
David Morris, Graeme Payne and Reid EastburnRecorded: Oct 14 201961 mins
Tune in for this live interview with Graeme Payne, former VP and CIO for Global Corporate Platforms at Equifax. This session will give you first hand insights into what happened at Equifax, and lessons learned.
Jaap Van Kleef, EMEA Technical ManagerRecorded: Oct 17 201949 mins
Companies of all size are running heterogeneous environments, with physical and virtual servers. As a result, every so often, IT professionals hesitate between deploying agent-based or agentless backup solutions. There is no right or wrong answer; it all depends on your requirements and objectives.
Join our StorageCraft expert, Jaap van Kleef, and learn how you can best protect your VMs and physical machines and keep the business running at all times!
John Smith, Prin. Sec. Engr, ExtraHop; Sean Scranton, RLI Cyber; William Boeck, Lockton; Brandon Dunlap, ModeratorRecorded: Oct 10 201959 mins
More and more companies are offering cyber insurance policies to help mitigate the financial losses an organization might suffer from a cyber incident. With the increase in breaches, intrusions and ransomware incidents, cyber insurance could be right for your organization as a part of the risk mitigation strategy. But there’s a lot of confusion for organizations in determining what a company’s exposure is and what exceptions and exclusions might be in a policy. Organizations are almost forced to think like an underwriter to address these concerns. Join ExtraHop and (ISC)2 October 10, 2019 at 1PM Eastern for a discussion on cyber insurance, demystifying the current insurance landscape and what are the right questions to answer.
Cherie Martin - Product Marketing, ArubaRecorded: Oct 10 201953 mins
Join us October 10th at 10am PDT as we discuss how to:
•Consistently deliver high-quality network and application services
•Reduce help desk tickets
•Identify and resolve issues before they affect your users
This webinar also includes a live demo of Aruba Central, our cloud managed networking solution.
Attend and you may qualify for a free Aruba Instant Access Point and a 90-day trial of Aruba Central.
Rahul Vir, Juniper Networks, Jeff Aaron, Mist Systems, Mitchel Davis, Dartmouth College, and Felix Windt, Dartmouth CollegeRecorded: Oct 10 201960 mins
When it came to deploying a new network across campus, Dartmouth College came to an important realization - students learn best when the network is learning, too.
In this webinar, the Dartmouth IT team is joined by experts from Mist and Juniper to describe how an AI-driven network is being used to deliver new learning experiences on campus.
Watch now, and learn how to:
-Gain visibility into the Wi-Fi user experience
-Quickly troubleshoot network problems with an AI-driven virtual assistant
-Predict network problems before they arise
-Implement personalized location services, such as wayfinding and proximity notifications
Kareem Iskander, Developer Advocate, Cisco DevNetRecorded: Oct 22 201942 mins
Come check out what's new in the Cisco certification suite. Learn all about the new DevNet Certification and what it means to be DevNet Certified. Then we'll take a look at the Enterprise Networking offerings and exam topics and see what DevNet has to offer to help you successfully prepare for the exam. The certification validates a candidate's knowledge of implementing enterprise automated solutions.
Join us for an introduction to Cisco Meraki and our cloud-managed IT products, including wireless APs, security appliances, switches, cameras, and EMM. You'll learn how cloud management offers greater reliability, easier management, and a lower TCO - and we'll show you a demo of the exciting features in the Cisco Meraki dashboard.
Yishay Yovel, Chief Marketing Officer at Cato NetworksOct 23 20192:00 pmUTC45 mins
SD-WAN is all the rage in enterprise networking these days. IT teams are excited about the opportunities SD-WAN creates to transform their WAN to become simple and agile, while improving security, and reducing costs.
As you review and look at your WAN challenges, we would like to share insights and takeaways, following hundreds of SD-WAN customer deployments worldwide, to better aid and inform your enterprise network decisions.
John Burke, CIO and Principal Research Analyst, Nemertes ResearchOct 23 20195:00 pmUTC60 mins
Cloud and Cybersecurity Series [Ep.5]: Application Security Meets Multicloud
Enterprises are developing and buying applications to run everywhere: across multiple clouds, multiple data centers, desktops, mobile devices, and IoT devices. In a multicloud environment, IT needs to take a multipronged approach to securing applications.
We'll how organizations approach securing their applications for the multicloud, ranging from changes in the development process to the embrace of security technologies including IAMaaS, microservice authentication, and enterprise secure cloud access and policy enforcement (ESCAPE).
This webinar presents data from Nemertes' in-depth research study of 335 organizations in 11 countries across a range of vertical industries.
Dr. Ritesh Mukherjee, Vice President of Product Management at 128 Technology with Dino Farinacci and Shawn ZandiOct 23 20195:00 pmUTC60 mins
The imminent advent of 5G, virtual reality (VR), connected cars, Internet of Things (IoT), and smart devices has moved us into the Experience Age. Consumers are now more informed and discriminating than ever before. Network deployments must mirror the adaptive and connected qualities of end users to succeed. In this webinar/panel discussion we will get perspective from network industry stalwarts on what features and functions networks must possess to create and deliver exceptional user experiences. It is time to reinvent the digital future to deliver exceptional user experiences.
Joel Vilaca | Cisco MerakiOct 24 20199:00 amUTC53 mins
Nehmen Sie Teil an einer Einführung in Meraki und in unsere Cloud Managed IT Produkte. Die Einführung beinhaltet eine Vorstellung unserer Wireless-Access Points, Security Devices und Features, Switches, Mobile Device Management und Überwachungskameras.
Sie erfahren, wie unsere Produkte Ihr Netzwerk verlässlicher machen, das Netzwerkmanagement dramatisch vereinfacht und Ihre TCO- Kosten gesenkt werden.
Chuck Petrie & Peter HaagensonNov 21 20194:00 pmUTC60 mins
Join Blue Medora experts, Chuck Petrie & Peter Haagenson, as they discuss the benefits of building a single view for end-to-end monitoring of your healthcare environment. Learn how monitoring Epic alongside the rest of your IT environment can increase reliability, improve productivity and lower cost of ownership.
Jim Hurley, CEO of Wellington Research, and Carolyn Crandall, Chief Deception Officer and CMO at Attivo NetworksOct 24 20195:00 pmUTC60 mins
In this session, industry veteran Jim Hurley, the CEO of Wellington Research and Cyber Source Data, will cover primary research results on cyber effectiveness and how it is influenced by detection and incident response. Additionally, attendees will gain insights into the latest Wellington Research Market Spotlight covering the vendors and market for deception. The primary research includes:
• Data loss rates and time to detection
• Data loss rates and time to respond
• Current market positions of deception vendors and what these mean
• Market cycle and value for deception technologies
• Guidance for sourcing deception vendors
Join in for an insightful and objective look at why Cyber Deception is now a critical security control for organizations small and large.
Karthikeyan Mookkandi, Aruba TACOct 29 201910:00 amUTC90 mins
Aruba’s SD-Branch solution leverages WAN services that interconnect hub and spoke sites to establish VPN tunnels which encapsulate and forward corporate traffic. Each WAN service is referred to as the underlying network while the VPN tunnels form the overlay network.
Reachability and forwarding through the underlay and overlay networks is achieved using IP routing on gateways. The VPNCs and BGWs each implement their own routing tables to determine the next-hop for each IP packet on its way to the desired destination. The routing tables on the BGWs consist of default gateways and static routes while the routing tables on VPNCs consist of default gateways, static, IKEv2, and OSPF routes
1. Introduction to underlay and overlay routing.
2. Configuration of Overlay routing.
3. What is PBR.
4. Traffic using with PBR/DPS
5. Configuration and troubleshooting.
Kamakshi Sridhar, PhD & Nicolas St-Pierre from SandvineOct 29 20193:00 pmUTC60 mins
Learn how Sandvine leverages network policy automation and machine learning to enhance subscriber QoE (Quality of Experience) via dynamic bandwidth allocation across service categories, in near-real time, by analyzing operator-expressed ‘intent’.
Yishay Yovel, Chief Marketing Officer at Cato NetworksOct 30 20193:00 pmUTC52 mins
It’s no secret that enterprises are looking beyond MPLS for their new WANs. For some, it’s the rigidity and high costs of MPLS services; for others, it’s MPLS’s complexity and incompatibility with the cloud. But how exactly will migrating to SD-WAN help you overcome MPLS’s limitations?
Find out on our next webinar, as Yishay Yovel, Chief Marketing Officer at Cato Networks shares the stories of businesses from around the globe who made the transition to SD-WAN.
Join us to hear:
- How DSM Pharmaceuticals and Fisher & Company solve global latency issues without paying through the nose.
- The ways UMHS and Pet Lovers Center, with its 100+ site Cato implementation, deliver direct, secure Internet access without deploying a heap of branch office security appliances.
- What Brady PLC and Adroll did to optimize cloud access at the branch and on the road.
- How companies reduce costs and optimize global voice and UCaaS delivery without relinquishing the control of MPLS.
John McDonough, Developer Advocate, Cisco DevNetOct 31 20193:00 pmUTC38 mins
This webinar will help you start your journey towards Cisco Certified DevNet Specialist in Data Center Automation and Programmability. The webinar takes you on a tour of developer.cisco.com with respect to Data Center Automation and Programmability. You will gain an understating of the technologies tested and the respective weighted percentages of those technologies on the certification exam. You will see how DevNet has aligned the DevNet resources to each section of the certification exam.
Johna Till Johnson, CEO and Founder, Nemertes ResearchOct 31 20193:00 pmUTC60 mins
Cloud and Cybersecurity Series [Ep.6]: Next-Generation Cybersecurity: Policy Process and Organization
Resources are finite. So deploying them wisely is what differentiates successful cybersecurity organizations from those that are less successful. Find out how these successful cybersecurity organizations are structured, what policies they have in place, and what strategies they do—and don’t—follow to protect their enterprise organizations.
Mark Rogov, Dell EMC; Brandon Hoff, Broadcom; J Metz, CiscoNov 6 20196:00 pmUTC75 mins
One of Fibre Channel’s greatest strengths is its ability to scale to thousands and thousands of nodes, while providing predictable performance. So, when we say that Fibre Channel has unmatched scalability, what does that actually mean? And how does it work?
We often hear about “designed from the ground up,” but in this case it’s actually true. From each individual link, to the overall domain architecture, each step along the way is intended to be approached in a scalable fashion.
In this webinar, we’ll be breaking down the pieces of the puzzle that help give Fibre Channel its robustness when you’re working at fabrics even greater than 10,000 nodes. We’ll be talking about:
•What a deterministic storage network is
•Fabric management principles
•Negotiated credit transfers (buffer-to-buffer credits)
•Network Engineering/Design Principles
•Oversubscription and Fan-In Ratios
•Topologies that help scale
•Domains and Fabric limits
•Consistency of performance at scale
Along the way, we’ll be talking about some of the ways that Fibre Channel differs from other popular storage networks as they approach large-scale environments, and how it handles issues that arise in such cases.
Please join us on November 6th at 10:00 am PT/1:00 pm ET for another educational webinar on Fibre Channel!
Cisco DNA Center brings about a new way to manage and visualize your enterprise network. But above and beyond the UI, AI and ML, how do you integrate it into your NetDevOps cycle, and ensure your network is well-validated end-to-end? In this webinar, we’ll demonstrate how to integrate Cisco DNA Center REST APIs with pyATS | Genie, take configuration and operation snapshots, diff them programmatically, and track any changes over time.
Ken LeTourneau, Intel Corporation | Matt Johns, CoreSite | Jaime Schmidtke, Microsoft Azure | Arun Trivedi, Wipro TechnologyNov 7 20196:00 pmUTC60 mins
Cloud plays a crucial role in enhancing the power of AI-driven applications. These technologies are allowing organizations to process structured and unstructured data like never before.
Tune into this live panel discussion with experts in Cloud, AI, Machine Learning and Big Data as they discuss:
- The importance of APIs and machine learning
- Best practices for preparing your cloud infrastructure for AI
- How big data driven from IoT will benefit from the application of AI and ML technologies
Ken LeTourneau, Solutions Architect, Intel Corporation (Moderator)
Matt Johns, VP of Enterprise Sales, CoreSite
Jaime Schmidtke, Cloud Networking Specialist, Microsoft Azure
Arun Trivedi, Partner, Wipro Technology
Matt Johns, VP of Enterprise Sales, CoreSiteNov 7 20197:30 pmUTC30 mins
A 1-on-1, 25-minute interview with an expert discussing in-depth insights from the conference and answering questions from the live online audience. Questions are determined ahead of time and only requires experts to show up and share their knowledge.
Eran Bello, GM at ASOCS Inc.Nov 19 20194:00 pmUTC60 mins
In this webinar ASOCS will present the benefits of full RAN virtualization in both 4G and 5G networks. Leveraging modern open interfaces such as the ORAN Ethernet Fronthaul and open management interfaces will allow network orchestration and automation for use cases spanning from local area network (LAN) to wide area network (WAN).
Ramkumar Radhakrishnan, Aruba TACNov 26 201910:00 amUTC90 mins
The Aruba SD-Branch solution provides a complete suite of solutions for all the needs in a distributed enterprise. This also includes the support for micro-branches (SOHO), where the branch network could be built just using IAPs and switches. This helps in VPN connectivity to access corporate resources to the larger branches, that may need redundant gateways as well as the complete cloud-managed LAN/WLAN.
2. Supported topologies
3. Modes of operation
5. Integration with Clearpass
Abdul Ali Irfaan, Aruba TACDec 17 201910:00 amUTC90 mins
Security is an integral part of the Aruba SD-Branch solution. The security of the Aruba SD-Branch solution is built in layers, from the hardening of the operating system to the integration with best-of-breed security partners like Zscaler.
With these integrations, the Aruba SD-Branch architecture seeks to offer enterprise-grade advanced threat protection in a scalable manner. The integration with Zscaler’s Security as a Service offering provides an extremely simple and scalable solution for advanced threat protection in branch networks.
1. Feature Description
3. Configuring Aruba Branch Gateway
4. Configuring Next-Hop List
5. Add Next-Hop List to Routing Policy
6. Add Routing Policy to User-Role