Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Connect SaaS to SD-WAN: Optimize your WAN for the Cloud
    Connect SaaS to SD-WAN: Optimize your WAN for the Cloud
    Irwin Lazar of Nemertes Research, top Unified Communications expert Recorded: Aug 21 2019 47 mins
    What SD-WAN means for SaaS and UCaaS. How to provide a breakout at the branch and how to overcome global delivery challenge of real-time communications
  • Modernize Your SAP Environment with Red Hat and AWS
    Modernize Your SAP Environment with Red Hat and AWS
    Sherry Yu, Principal Partner Success Architect, SAP, Red Hat and Sabari Radhakrishnan, Principal Solution Architect, AWS Recorded: Aug 21 2019 55 mins
    Organizations can no longer delay serious consideration of modernizing their data centers. Among those are many SAP customers who will be required to migrate to SAP HANAⓇ by 2025.

    In this webinar, learn about the benefits of modernizing your data center with the premier partners for SAP HANA, Red Hat and Amazon Web Services (AWS).

    We’ll examine:

    • How AWS and Red Hat can accelerate your journey to SAP S4/HANA.
    • Technical considerations and best practices for SAP HANA and cloud migration.
    • Benefits of scalable, on-demand, elastic infrastructure with enterprise support.
  • Gaining Complete Visibility of Your Environment with Attack Surface Monitoring
    Gaining Complete Visibility of Your Environment with Attack Surface Monitoring
    Tori Sitcawich, Product Marketing Manager; Jon Hart, Principal Security Researcher Recorded: Aug 21 2019 56 mins
    Join Rapid7 experts for an in-depth look into Attack Surface Monitoring with Rapid7s Project Sonar research and industry reports. Learn how data from these sources can be leveraged in Rapid7s industry-leading vulnerability management solution, InsightVM, to provide complete visibility into your environment.

    During this webinar, youll learn about:

    1. The importance of having complete visibility of both your organizations known and unknown assets
    2. Rapid7s unique research project, Project Sonar, that regularly catalogs the public internet
    3. Industry reports released by Rapid7 based on data from Project Sonar, among other sources
    4. How data from Project Sonar can be leveraged within Rapid7s industry-leading vulnerability management tool, InsightVM
  • The Dangers of Siloed Security
    The Dangers of Siloed Security
    Ken Dang, Senior Product Marketing Manager, SonicWall Recorded: Aug 21 2019 49 mins
    Complete security. One viewpoint.

    A splintered security platform opens threat gaps and adds overhead costs and complexity.. See how you can unify, monitor and manage all your security ecosystem with the Capture Security Center.
  • Towards Autonomous Fine-Grained Network Management
    Towards Autonomous Fine-Grained Network Management
    Dr. Kevin Tang Recorded: Aug 21 2019 32 mins
    The current Internet is largely a heterogeneous network in the sense that it is a network that is formed by many different networks owned by different identities. Its ability to work with vastly different technologies under very different circumstances in parallel certainly has brought crucial flexibility and incentives for its growth. On the other hand, its heterogeneity has also led to rigid and coarse management which makes Internet’s performance insufficient to support the fast growing traffic with increasingly stricter quality of service requirements. Today, with the rise of cloud computing and software-defined networking, it is now possible to move towards autonomous fine-grained network management. In this talk, we birefly examine opportunities that come from three different aspects: space (finer traffic split), time (faster network load balancing) and application (route different applications differently). We study both the idealized fine-grained network management, which sets a limit for the best possible outcome, and algorithms that take into account important practical factors to approach that limit. The talk ends with some example virtual network functions (VNFs) that can be built under fine-grained network management to further improve network performance
  • Getting to Yes: How to Justify your Network Packet Broker Purchase
    Getting to Yes: How to Justify your Network Packet Broker Purchase
    Zeus Kerravala, Principal Analyst at ZK Research & Gordon Beith, Sr. Product Marketing Director, Gigamon Recorded: Aug 21 2019 57 mins
    “Is it worth it?” is a question you must overcome when purchasing new equipment. Fortunately, when it comes to next-generation network packet brokers (NG-NPBs), getting to Yes is easier than you think.

    The latest data from ZK Research shows that next-generation NPBs have grown from simply a nice-to-have to a must-have technology, making it easy to green light your purchase:

    •Winning organizations deploy next-generation NPBs for a faster, more agile infrastructure with fewer disruptions during updates
    •Enables faster transition to hybrid, multi-cloud model without ever losing out on management and security
    •Eliminates blind spots, so fewer security tools are needed

    Arm yourself with the right information to justify your next-generation NPB purchase before you fall into the widening gap between winners and losers. You – and your infrastructure – deserve it.
  • NTT 2019 Digital Means Business Benchmarking Report
    NTT 2019 Digital Means Business Benchmarking Report
    Wayne Speechly -VP: Advanced Competencies – NTT Ltd. Recorded: Aug 21 2019 60 mins
    Key highlights from the NTT 2019 Digital Means Business Benchmarking Report which provides insights and analysis from surveying more than 1,150 executives across five regions, 15 countries, and 11 industry verticals.

    Digital is starting to gain meaningful traction in organizations. They’re focusing internally to see quick wins but are still grappling with prioritization and organization-wide execution of digital transformation.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    John Grim, Senior Manager, PS Advisory Services Recorded: Aug 21 2019 81 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Erika Gifford, Senior Manager, GSS | Security Operations Advisory
    •Hayden Williams, Senior Manager, VTRAC | Investigative Response
    •John Grim, Managing Principal, VTRAC | Innovations and Development
    •David Kennedy, Managing Principal, VTRAC | Open Source Intelligence

    Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes knowledge of your environment and its unique threats, effective teamwork, and just as importantly, a rigorous Incident Response (IR) Plan. We'll introduce our monthly listeners to the VIPR Report – the Verizon Incident Preparedness and Response Report. We'll provide a high-level overview of our findings across three years of IR Plan assessments and data breach simulations. Insight will include:

    •Observations and recommendations across the six phases of incident response
    •Top takeaways for building a solid IR Plan and capability
    •Breach Simulations Kits and using these resources to run data breach tabletop exercises

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Creating the Future of Work - Empowering a cloud-enabled workforce
    Creating the Future of Work - Empowering a cloud-enabled workforce
    Tony Muraki-Hart, Enterprise Architect, CANCOM & Toby Brown, Lead EMEA Domain Specialist, Citrix Recorded: Aug 21 2019 42 mins
    In collaboration with Microsoft & Citrix, CANCOM have developed this Webinar to help you pursue your cloud with confidence.

    Business is transforming, and IT is leading the charge into the digital age. Cloud computing is a critical enabler of this digital transformation. Now, the hub of worker productivity — the desktop — is transitioning to the cloud, thanks to innovations from Citrix and Microsoft.

    What's driving cloud investments today?
    Improving the speed of IT service delivery
    Greater flexibility to react to changing market conditions
    Enabling business continuity
    Improving customer support or services

    Watch this webinar to find out how you can:
    Deliver easy, secure access across devices
    Connect people and places, securely
    Reduce time to market for new products

    Start your transformation today. https://info.cancom.co.uk/move_to_cloud_with_citrix_microsoft
  • 제로트러스트 세상에서 보안 태세 정의하기
    제로트러스트 세상에서 보안 태세 정의하기
    김 현 도, Senior Solution Engineer, Akamai Technologies; 한 준 형, Technical Account Manager, Akamai Technologies Recorded: Aug 21 2019 57 mins
    일반적으로 제로트러스트 접근방식에는 접근시도과 신원 확인, 그리고 기기확인이라는 3가지 핵심 축으로 살펴볼 수 있습니다.

    이전 웨비나에서는 아이덴티티 기반 접근 방식을 클라우드 프록시와 함께 사용하여 내부 어플리케이션에 보다 안전하게 액세스 하는 방법을 살펴보았습니다.

    이번 웨비나는 두가지 파트로 나뉘어 집니다. 첫번째 부분에서는 앞서 언급한 3가지 제로트러스트 접근 핵심축에 대해 좀 더 자세히 알아보고 사용자와 접근 장비에 대한 의미에 대해 더 살펴보는 과정을 통해 제로 트러스트 아키텍처를 구현하는 방안에 대해 알아보겠습니다.

    두번째 부분에서는 Web에서 API로 전환되는 보안의 트렌드에 대해 살펴보겠습니다.
    여기서 우리는 모바일 어플리케이션의 폭발적인 증가와 함께 웹에서 API로 공격이 이동하는 API의 공격 트랜드와 Credential Fraud의 라이프 사이클을 살펴볼예정입니다.

    발표자: 김 현 도, Senior Solution Engineer, Akamai Technologies
    발표자: 한 준 형, Technical Account Manager, Akamai Technologies
    진행자: 박 선 영, Senior Business Development Manager, APAC, (ISC)²
  • Webinar: How to Build a Change Workflow to Increase Control
    Webinar: How to Build a Change Workflow to Increase Control
    Maya Malevich Director of Product Marketing, Tufin & Ruth Gomel Director Product Design, Tufin Recorded: Aug 21 2019 58 mins
    “The only thing that is constant is change.” However, change can also be risky.

    Network security changes may lead to broken connectivity, exposure to cyberattacks, or even compliance violations that may result in an audit failure. How do you control and document changes to firewall access?

    Join this session to learn best practices for building a change workflow to:
    • Ensure all changes are documented and audit-ready
    • Enforce a security policy check within every change to improve control
    • Increase efficiency and eliminate errors through automation

    Register now to gain insight into what an effective workflow looks like and how you can streamline the change process you currently use.
  • Digital Transformation and SD-WAN Architecture: a CIO Perspective
    Digital Transformation and SD-WAN Architecture: a CIO Perspective
    Steve Woo, Co-Founder and Senior Director of Product Management at VeloCloud, now part of VMware Recorded: Aug 21 2019 50 mins
    Digital transformation has fundamentally changed how organizations across the globe conduct business. The success of an enterprise’s digital transformation will ultimately determine the rise or fall of that organization.

    While IT transformation—the enabler of digital transformation—is easily identifiable in enterprise data centers, branch offices have started to catch up. SD-WAN is the platform that leads enterprise edge transformation — the next frontier of IT transformation.

    What are the top concerns of CIOs when it comes to the edge transformation? What are the tools and best practices available from a CIO perspective? Join this webinar to hear Steve Woo, co-founder of VeloCloud, now part of VMware, discuss SD-WAN architecture, deployment models, and emerging features, and how SD-WAN is a transformative tool that helps organizations add customer value, improve economics, and mitigate risks while reducing costs.
  • The Importance of Risk Management Solutions in the “Age of the Breach”
    The Importance of Risk Management Solutions in the “Age of the Breach”
    Matt Duench, Product Marketing Manager, Arctic Wolf Recorded: Aug 20 2019 33 mins
    As you read this, a business somewhere is falling victim to a new cyberattack and potentially losing millions of dollars. That’s because on average it takes hackers only a week to exploit new vulnerabilities, while businesses take four months to patch them. Don’t let your company be next.

    Attend this important webinar on vulnerability assessment and risk management where security expert Matt Duench from Arctic Wolf examines the challenge of breaches, how they happen, and what you can do to stop them. Find out:
    - Why the cybersecurity skills shortage leaves companies especially vulnerable
    - How to extend your perimeter security with risk management
    - How a SOC-as-a-service provides comprehensive security for companies of every size
  • Prep Your Business to Face 2019’s Most Advanced Cyber Threats
    Prep Your Business to Face 2019’s Most Advanced Cyber Threats
    Brook Chelmo, Senior Product Marketing Manager, SonicWall Recorded: Aug 20 2019 38 mins
    The speed and progression of the cyber arms race requires a constant, detailed and unwavering commitment to threat analysis.

    Reserve your spot to gain a better understanding of what’s at stake as we explore:

    •New intelligence on shifts in malware and ransomware strategies
    •Insight on changes to cryptojacking attacks
    •Overview of record-breaking IoT malware
    •Shocking spikes in encrypted threats
  • Kubernetes in the Cloud (Part 3): Stateful Workloads
    Kubernetes in the Cloud (Part 3): Stateful Workloads
    Ingo Fuchs, NetApp; Paul Burt, NetApp, Mike Jochimsen, Kaminario Recorded: Aug 20 2019 58 mins
    Kubernetes is great for running stateless workloads, like web servers. It’ll run health checks, restart containers when they crash, and do all sorts of other wonderful things. So, what about stateful workloads?

    This webcast will take a look at when it’s appropriate to run a stateful workload in cluster, or out. We’ll discuss the best options for running a workload like a database on the cloud, or in the cluster, and what’s needed to set that up.

    We’ll cover:
    •Secrets management
    •Running a database on a VM and connecting it to Kubernetes as a service
    •Running a database in Kubernetes using a `stateful set`
    •Running a database in Kubernetes using an Operator
    •Running a database on a cloud managed service

    After you watch the webcast, check out our Kubernetes Links & Resources blog at http://bit.ly/KubeLinks
  • Increase Network Resilience and Optimize Uptime with Inline Bypass
    Increase Network Resilience and Optimize Uptime with Inline Bypass
    John Lehane Senior Product Marketing Manager, Gigamon, Haider Jarral Technical Marketing Engineer, Gigamon Recorded: Aug 20 2019 37 mins
    IT teams are adding newer and more Digital Transformation capable tools. Deployment agility and network resiliency are primary concerns. Inline appliances present potential points of failure in the network. Whether due to a power outage, software malfunction, or processing bottlenecks, failing inline tools can disrupt the very applications and services they are meant to protect.

    With bypass protection, traffic continuity can be maintained as new tools are deployed and tools outages occur.

    Join us to learn how the Gigamon Visibility Fabric with Inline Bypass can enhance the day-to-day operations for Network Operations teams. Topics covered include;

    • Enhancing Infrastructure resiliency and availability
    • Reducing operating and monitoring Costs
    • Improved operation efficiencies and cooperation between IT teams
    • Step by step GUI configuration examples
  • Modern Streaming Data Stack with Kinetica & StreamSets
    Modern Streaming Data Stack with Kinetica & StreamSets
    Matt Hawkins - Principal Solutions Architect - Kinetica | Mark Brooks - Solutions Architect - StreamSets Recorded: Aug 20 2019 60 mins
    Enterprises are now faced with wrangling massive volumes of complex, streaming data from a variety of different sources, a new paradigm known as extreme data. However, the traditional data integration model that’s based on structured batch data and stable data movement patterns makes it difficult to analyze extreme data in real-time.

    Join Matt Hawkins, Principal Solutions Architect at Kinetica and Mark Brooks, Solution Engineer at StreamSets as they share how innovative organizations are modernizing their data stacks with StreamSets and Kinetica to enable faster data movement and analysis.

    During this webinar, we will discuss:

    -The modern data architecture required for dealing with extreme data
    -How StreamSets enables continuous data movement and transformation across the enterprise
    -How Kinetica harnesses the power of GPUs to accelerate analytics on streaming data
    -A live demo of StreamSets and Kinetica connector to enable high speed data ingestion, queries and data visualization
  • (ISC)²’s Digital Transformation Journey - Part 2
    (ISC)²’s Digital Transformation Journey - Part 2
    Bruce Beam, (ISC)²; Beth Paredes, (ISC)²; Sommer Hess, (ISC)²; Brandon Dunlap (Moderator) Recorded: Aug 20 2019 58 mins
    (ISC)² recently completed our multi-year Digital End-to-End Transformation (DETE) project, which positions us to deliver a more a seamless and user-friendly experience to all members. In addition to revamping our online presence, we launched a new Learning Management Systems where members can access all the courses developed by our Professional Development Institute. In Part 2 of the (ISC)² Digital End-to-End Transformation (DETE) will examine how (ISC)² executed the plan for the project, following the AGILE Project Management framework and the buy-in and support from other departments and stake holders within the organization. Additionally, there was board governance and oversight to contend with. Join Bruce Beam, CIO; Beth Paredes, Sr. Corporate Member Services Manager; and Sommer Hess, Director PMO, Quality and Training on August 20, 2019 at 1:00PM Eastern for a discussion on these items and the speed bumps that were run into on this project.
  • Level Up with Dell Technologies
    Level Up with Dell Technologies
    Paul Zonfrillo and Mark Green, Strategic Pathways and Neil Swoyer, Dell EMC Recorded: Aug 20 2019 5 mins
    Are you an IT professional looking to get more of your initiatives funded?
    •Level Up teaches attendees how to connect your technology strategy to business outcomes.
    •Learn how to craft and deliver an effective pitch to business executives
    • Elevate the perception of IT within the business
  • Driving Increased Productivity with Your Vulnerability Management Program
    Driving Increased Productivity with Your Vulnerability Management Program
    Tori Sitcawich, Product Marketing Manager, Rapid7 Recorded: Aug 20 2019 46 mins
    In today’s world, security teams are faced with challenges that can oftentimes hinder the productivity of their vulnerability management programs. These challenges include working with operations teams, demonstrating ROI to leadership, and finding ways to accelerate remediation. In this session with Rapid7, learn about best practices to overcome these challenges and improve collaboration, communication, and overall productivity.

    We’ll cover:
    1. How to break down organizational silos
    2. How to track meaningful progress and build effective reports for leadership
    3. How to effectively make automation a part of your day-to-day remediation workflow
  • Micro Detail.  Macro Intelligence.
    Micro Detail. Macro Intelligence.
    Tom Foottit, Senior Director, Product Management, Accedian Recorded: Aug 20 2019 36 mins
    Why granular, high quality data is critical for optimal end-user experience in the 5G era.
  • Getting more from Azure Part 3: SQL Database
    Getting more from Azure Part 3: SQL Database
    John Noakes and James Wilson Recorded: Aug 20 2019 18 mins
    Microsoft Azure – which offers an open, flexible, enterprise-grade cloud computing platform is helping our clients do just that; helping them increase agility, do more and control costs with IaaS and PaaS.

    Whether you’ve already migrated some of your workloads or you’re considering migrating to Azure, this webinar shares best practice for operating, managing and securing SQL Database through the Azure platform.
  • Simple Network Misconfigurations Equals Big Vulnerabilities - How to Avoid It
    Simple Network Misconfigurations Equals Big Vulnerabilities - How to Avoid It
    Avivi Siman-Tov, Director of Product, AlgoSec Recorded: Aug 20 2019 34 mins
    Misconfigurations aren’t simply inconvenient errors but serious security threats. According to Gartner, 99% of all firewall breaches will be caused by misconfigurations by 2020 and misconfigurations made OWASP’s latest list of Top 10 most critical web application security risks.

    A single change to a network device can have far-reaching effects on your business and create security holes for cybercriminals, impact your regulatory audit, and even cause costly outages that bring your business to a standstill! This is true whether on-premise or in the cloud.

    In this webinar, Avivi will present several examples of common misconfigurations, including device changes, business application connectivity changes, and data center migrations. He will also reveal specific techniques to help you avoid misconfigurations.

    Watch the webinar to learn how to:

    •Monitor cloud services to take a proactive stance against misconfigurations
    •Understand and map your entire network before you make a change
    •Understand the impact of changes to your entire hybrid network
    •Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole
    •Use network management automation to avoid common misconfigurations
    •Avoid common mistakes when making changes to your network security devices
  • Digital Transformation and SD-WAN Architecture: a CIO Perspective
    Digital Transformation and SD-WAN Architecture: a CIO Perspective
    Steve Woo, Co-Founder and Senior Director of Product Management at VeloCloud, now part of VMware Recorded: Aug 20 2019 50 mins
    Digital transformation has fundamentally changed how organizations across the globe conduct business. The success of an enterprise’s digital transformation will ultimately determine the rise or fall of that organization.

    While IT transformation—the enabler of digital transformation—is easily identifiable in enterprise data centers, branch offices have started to catch up. SD-WAN is the platform that leads enterprise edge transformation — the next frontier of IT transformation.

    What are the top concerns of CIOs when it comes to the edge transformation? What are the tools and best practices available from a CIO perspective? Join this webinar to hear Steve Woo, co-founder of VeloCloud, now part of VMware, discuss SD-WAN architecture, deployment models, and emerging features, and how SD-WAN is a transformative tool that helps organizations add customer value, improve economics, and mitigate risks while reducing costs.
  • Three Secrets to SD-WAN Success
    Three Secrets to SD-WAN Success
    Dan Shelton, Director Product Management at Zscaler Recorded: Aug 20 2019 39 mins
    Will 2019 be the year of SD-WAN?
    With more than 60% of branch traffic bound for the internet, organisations are turning to SD-WAN to provide intelligent routing and to directly, quickly, and securely connect branch users to the internet and the cloud applications they need to do their jobs.

    But, navigating the journey to secure SD-WAN can present challenges. How do you prepare for your SD-WAN deployment and ensure you can achieve your intended outcomes? Join this webinar to learn from a real-world example:

    - What is driving SD-WAN and the core issues impeding deployments
    - How to get the most out of your SD-WAN deployment
    - Why it is critical to address security before you begin your SD-WAN journey

    About the Speaker:
    Dan Shelton is an IT Executive and Change Agent with over 20 years experience in managing large multi-faceted global IT organisations. Prior to joining Zscaler, Dan served as the Senior Director for Global Networks & Telecom at Kelly Services where he led a large-scale, multi-phased Digital Transformation Program that leveraged several cloud-based infrastructure and security services to positively impact business operations across 900 locations in 22 countries.
  • Application Awareness with the Power to Take Action
    Application Awareness with the Power to Take Action
    David Davis, Partner & Vexpert, ActualTech Media and Bassam Khan, VP, Product & Technical Marketing Engineering, Gigamon Aug 22 2019 1:00 am UTC 54 mins
    Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.

    What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.

    Join Gigamon and ActualTech Media in this webinar and learn how to:
    - Unleash visibility to secure and optimize your network
    - Discover applications that you didn’t even know were running on your network
    - Increase overall performance of your network and shared components
    - Spot potential security vulnerabilities before they become a problem

    Join Gigamon and ActualTech Media in this webinar to learn how to discover applications that you didn’t even know were running on your network.

    Watch as we share insight and demonstrate live how to increase overall performance as well as spot potential security vulnerabilities before they become a problem.
  • 2019 年クラウドセキュリティ脅威レポート: クラウドセキュリティの最新トレンドを学ぶ
    2019 年クラウドセキュリティ脅威レポート: クラウドセキュリティの最新トレンドを学ぶ
    髙岡隆佳, 株式会社シマンテック、エバンジェリスト Aug 22 2019 6:00 am UTC 60 mins
    クラウドセキュリティに関するお客様の認識は、現状と一致していますか?

    シマンテックは、クラウドセキュリティを取り巻く環境についての認識を把握するために、世界中のセキュリティに関する意思決定者を対象に調査を行い、その結果とシマンテックが監視する実際のデータを比較しました。

    株式会社シマンテックのエバンジェリストである髙岡隆佳が、以下についてご説明します。

    • 『2019 年クラウドセキュリティ脅威レポート』の主な内容。
    • セキュリティ脅威の実例、およびクラウドセキュリティに対する認識と進化し続けるクラウドの脅威とのギャップ。
    • ゼロトラストセキュリティアーキテクチャを使った、進化し続ける攻撃への対処方法と、実装のためのベストプラクティス。
  • Automation for a Continuously Aware Data Center
    Automation for a Continuously Aware Data Center
    Nlyte Aug 22 2019 8:00 am UTC 45 mins
    This webinar will show you how Nlyte’s Asset Explorer's discovery application continuously improves asset accuracy in your Nlyte DCIM implementation.

    See how you can:

    - Improve capacity planning and resource utilization
    - Improve and increase SLAs and Support responsiveness by reducing MTTR and RCA
    - Eliminate manual audit efforts improving efficiency and accuracy of workflows
    - Accelerate implementation or expansion of DCIM with auto-discovery and auto-updating of asset data

    We look forward to seeing you there!
  • Security Symposium - Morning Sessions
    Security Symposium - Morning Sessions
    Red Hat Aug 22 2019 1:00 pm UTC 210 mins
    Join Red Hat senior principal security global technical evangelist and strategist, Lucy Kerner, talking about automating security and compliance for hybrid environments. Followed by Dan Walsh, senior consulting software engineer, sharing container security and container technologies like kubernetes, buildah, and podman. Followed by a short Q&A, join live to submit your questions on August 22.
  • Meraki Automation – Multi-Org Management
    Meraki Automation – Multi-Org Management
    Matthew DeNapoli, Developer Advocate, Cisco DevNet Aug 22 2019 3:00 pm UTC 45 mins
    Meraki’s Dashboard is a great and powerful tool for network management and monitoring but it’s limited by the very thing that makes it powerful; it has to be everything to everyone and that granularity can make it overwhelming to use on a day-to-day basis. All enterprises, large and small, have their own way of doing things and this pertains to network management and monitoring as well. In this session, you’ll be introduced to APIs, code, and tools that will allow an organization to build out dynamic interactions with the Meraki platform that aligns with the way that their teams do the business of networking.
  • WebRTC and You
    WebRTC and You
    Adam Bavosa Aug 22 2019 4:00 pm UTC 20 mins
    Have you ever thought about building your own Skype or Google Hangouts video chat? It is necessary in futuristic connected shared experiences. Here’s the easy way to do it!
    Adam will go over: - What WebRTC is - Why it is important for developers - How it works - The necessary code to integrate WebRTC into a video chat app - and finally, write a simple website that uses WebRTC. Audience members need only a basic understanding of front-end web development to be engaged.
    PubNub has been an essential resource for WebRTC app development since its inception. Adam Bavosa has taken it upon himself to learn how to develop thoroughly with PubNub and WebRTC, so he can spread the word, and reduce friction for developers building video chat.
  • How Gigabit Performance and Predictable Pricing are Disrupting the Wireless WAN
    How Gigabit Performance and Predictable Pricing are Disrupting the Wireless WAN
    Johna Till Johnson, Nemertes; Donna Johnson, Cradlepoint Aug 22 2019 4:00 pm UTC 45 mins
    Technology professionals tend to think of wireless WAN services as a tradeoff: Convenience at the expense of cost and performance.

    No more. 5G speeds range from 1 to 10 Gbit/s (depending on configuration), and carriers are moving towards flat-rate pricing models that encourage the use of 5G services. Coupled with technologies like SD-WAN, 5G will enable companies to deploy wireless in novel, game-changing ways.

    Tune into this webinar with Johna Till Johnson of Nemertes and Donna Johnson of Cradlepoint to find out how, and learn what it will take to put WWAN to work in your environment.

    About Nemertes — Nemertes is a global research-based advisory and consulting firm that analyzes the business value of emerging technologies. Since 2002, we have provided strategic recommendations based on data-driven operational and business metrics to help organizations deliver successful technology transformation to employees and customers. Simply put: Nemertes’ better data helps clients make better decisions.
  • Automation for a Continuously Aware Data Center
    Automation for a Continuously Aware Data Center
    Nlyte Aug 22 2019 4:00 pm UTC 45 mins
    This webinar will show you how Nlyte’s Asset Explorer's discovery application continuously improves asset accuracy in your Nlyte DCIM implementation.

    See how you can:

    - Improve capacity planning and resource utilization
    - Improve and increase SLAs and Support responsiveness by reducing MTTR and RCA
    - Eliminate manual audit efforts improving efficiency and accuracy of workflows
    - Accelerate implementation or expansion of DCIM with auto-discovery and auto-updating of asset data

    We look forward to seeing you there!
  • Ultralight Data Movement for IoT with SDC Edge
    Ultralight Data Movement for IoT with SDC Edge
    Guglielmo Iozzia - Big Data Lead - Optum | Pat Patterson - Technical Director - StreamSets Aug 22 2019 5:00 pm UTC 34 mins
    Edge computing and the Internet of Things bring great promise, but often just getting data from the edge requires moving mountains.

    During this webinar, we will discuss:

    -How to make edge data ingestion and analytics easier using StreamSets Data Collector edge, an ultralight, platform independent and small-footprint Open Source solution for streaming data from resource-constrained sensors and personal devices (like medical equipment or smartphones) to Apache Kafka, Amazon Kinesis and many others.

    -We'll provide an overview of the SDC Edge main features, supported protocols and available processors for data transformation, insights on how it solves some challenges of traditional approaches to data ingestion, pipeline design basics, a walk-through some practical applications (Android devices and Raspberry Pi) and its integration with other technologies such as StreamSets Data Collector, Apache Kafka, and more.
  • Security Symposium - Afternoon Sessions
    Security Symposium - Afternoon Sessions
    Red Hat Aug 22 2019 5:00 pm UTC 210 mins
    The afternoon session is back with presentations and demos on using automation to enforce security guidelines, security capabilities in the latest release of Red Hat Enterprise Linux, and understanding security & mitigating risk.
  • Managing and Securing the Sprawling Edge with SD-WAN
    Managing and Securing the Sprawling Edge with SD-WAN
    Open Systems Aug 22 2019 5:00 pm UTC 59 mins
    Enterprises are increasingly deploying Internet of Things (IoT) technology to collect data at the edge of their networks to improve operations, implement personalized customer experience, and inform decision-making across the enterprise.

    As more endpoints join the mix, network complexity increases. Routing all data through a central data center is becoming increasingly impractical. The ‘edge’ itself is becoming more complex. Organizations must re-evaluate their networks from the ground up to deal with this sprawling edge.

    Join Jason Bloomberg, President of analyst firm Intellyx, and Moritz Mann, Head of Product Management at Open Systems, to hear how IoT, edge computing, and AI are changing the way organizations manage and secure their networks.

    Viewers of this webinar will:

    - Gain a broad understanding of how IoT and AI are driving innovation in edge computing
    - Understand how these technologies are raising the bar on security and management
    - Learn how SD-WAN technology is being reinvented to tackle modern enterprise network challenges
  • Gigamon Part #2 - Unleash the Power of True Application Visibility
    Gigamon Part #2 - Unleash the Power of True Application Visibility
    John Gudmundson, Senior Product Marketing Manager, Brandon Dunlap (Moderator) Aug 22 2019 5:00 pm UTC 60 mins
    You know that metadata helps you separate signal from noise, reduce time-to-threat-detection and improve overall security efficacy. But did you know that application metadata helps you monitor user experience, troubleshoot problematic apps, understand “Shadow IT” usage and improve security posture within your organization? Join Gigamon and (ISC)² on August 22, 2019 at 1:00 PM Eastern as we discuss the growing need for application-aware network operations and how Gigamon Application Metadata Intelligence provides the deep application visibility needed to rapidly pinpoint performance bottlenecks and potential network security risks. You’ll see how next-gen network packet brokers enhance metadata with intelligence and insights from traffic flows and discover how to understand the performance and control of hundreds of critical apps.
  • How to Detect Targeted Ransomware with MITRE ATT&CK™
    How to Detect Targeted Ransomware with MITRE ATT&CK™
    Dick O'Brien, Principal Editor, Symantec & Adam Pennington, Principal Cyber Security Engineer, MITRE Aug 22 2019 5:00 pm UTC 60 mins
    Cyber criminals are turning to targeted ransomware at an accelerated pace, motivated no doubt by the success of recent attacks. Join experts from Symantec and MITRE as we explore the latest research and best practices for detecting targeted ransomware in your environment.

    We will cover:

    • The latest trends in attacks

    • An in depth look at GoGalocker

    • How to use the ATT&CK™ knowledge base to describe these threats

    • Mitigations and defenses for dealing with Gogalocker

    Please Join Us, Register Today
  • Breach Detection and Response:Establishing Incident Response Processes and Plans
    Breach Detection and Response:Establishing Incident Response Processes and Plans
    Josh Rickard, Security Research Engineer, Rebekah Wilke, SOAR Advocate, at Swimlane Aug 22 2019 5:00 pm UTC 45 mins
    Many organizations lack adequate personnel, processes, procedures and technologies to detect breaches in real time. They have an even harder time responding promptly and accurately.

    In this webcast, Swimlane Research Engineer Josh Rickard and SOAR Advocate Rebekah Wilke will discuss the importance of establishing sufficient incident response processes and clear guidelines surrounding incident response plans.

    The two security orchestration, automation and response (SOAR) experts will outline how formulating, implementing and maintaining an up-to-date, robust breach detection and incident response plan will:

    - Reduce mean time to detection (MTTD) and mean time to resolution (MTTR).
    - Ease analyst burnout, enabling retention.
    - Allow analysts the opportunity to focus on anomalous behavior that could have a larger impact on the business.
    - Expedite disaster recovery for reduced security risk.
  • Scaling DevOps Episode 3: Scaling Environment Complexity and Orchestration
    Scaling DevOps Episode 3: Scaling Environment Complexity and Orchestration
    Roni Dover, Director of Sales Innovation & Alex Azrah, Senior Engineer Aug 22 2019 5:30 pm UTC 17 mins
    DevOps cloud environments are becoming more complex and heterogeneous in the technologies and infrastructure types they include. As environments are shifting left to provide early integration with production architectures, they can include a combination of VMs, Kubernetes instances, serverless functions, and PaaS services and also the orchestration to set everything up, import data and artifacts and glue everything together. In this episode, we will discuss the challenges of automation complex environments end-to-end and as always bring up some principles that can help us manage that complexity.
  • Episode Three: The E-rate Fear Less Solution
    Episode Three: The E-rate Fear Less Solution
    Holly Davis, CEO Komplement Business Development Consulting Aug 22 2019 6:00 pm UTC 2 mins
    How to cost-effectively protect K-12 networks.

    The E-rate program is critical for K12 organizations that lack the funding to procure appropriate networking and cybersecurity solutions, such as firewalls and wireless security. But understanding the program — as well as confirming your E-rate eligibility — can be daunting.

    In this third episode of our E-rate series, expert Holly Davis discusses:

    •School eligibility
    •Discounts levels
    •Competitive bidding process.

    Watch the entire video series for valuable insights to help you confidently approach E-rate funding.



    For questions about the SonicWall solutions for K-12, and their E-rate eligibility, please contact Holly Davis, Komplement CEO and E-rate advisor to SonicWall, at holly@komplement.us.
  • Case Study: Real-World Breach Response
    Case Study: Real-World Breach Response
    Brian DiPaolo, Chief Technology Officer; Mark Holdsworth, Managed Services Practice Manager Aug 22 2019 7:00 pm UTC 60 mins
    Accudata’s customer, a large ecommerce services provider, detected malware in an email sent to customers. However, their IT team discovered the malware was just the tip of the iceberg and began to dig deeper. Realizing the scope and magnitude of the breach, Accudata’s security and managed service teams were brought in to mitigate the attack and quickly began the remediation process.

    In this 60-minute presentation, Chief Technology Officer Brian DiPaolo and Managed Services Practice Manager Mark Holdsworth detail the challenges of identifying and eliminating an active attacker in order to bring the business back online.
  • Platform of the Future - Efficiency (Part 5)
    Platform of the Future - Efficiency (Part 5)
    Fady Sharobeem, Systems Engineer, Cisco Meraki Aug 27 2019 1:00 am UTC 9 mins
    IT can be a complex topic for all businesses. In this 5 part video series, we’ll cover how Meraki is changing the industry and simplifying IT with modern technology.

    Learn how to build a full Meraki stack from scratch as well as taking advantage of APIs for variety of use cases.
  • Migrating to AWS and Cloud-native architecture Through App Connectivity
    Migrating to AWS and Cloud-native architecture Through App Connectivity
    Philip Griffiths Aug 27 2019 7:00 am UTC 30 mins
    Modern businesses are migrating towards cloud-first architectures, containerized microservices, and DevOps cultures in order to be innovative and rapidly bring new applications to market.
    But there’s a problem: Traditional networking technologies weren’t designed to support today’s complex application development environments. They are inflexible, complicated to manage and open enterprises to a host of new security challenges. The webinar will be delivered by NetFoundry, an Advanced Technology partner for AWS, as well as utilise customer challenges and use cases.

    Join this webinar to learn on:

    The ‘3rd option’ for connecting to AWS; private network benefits without private network hardware and wires
    How application connectivity (or ‘AppWANs’) increase your businesses agility and efficiency
    The benefits of app connectivity being integrated into your favourite tools like AWS CloudEndure and CloudFormation
    The role of Zero Trust in securing the world of application development
    The benefits of automating networking within CI/CD pipelines and workflows
    How Connectivity-as-Code based solutions can reshape your DevOps strategy

    If you are responsible for the development and deployment of applications, infrastructure or migrations, you won’t want to miss this educational webinar.

    Live online Aug 27 09:00 am European Summer, 10:00 am Finnish Summer
  • Airheads Tech Talks: SD-WAN-Health Check and Dynamic Path Selection
    Airheads Tech Talks: SD-WAN-Health Check and Dynamic Path Selection
    Rajesh P, Aruba TAC Aug 27 2019 9:00 am UTC 90 mins
    Health checks must be enabled to determine the path availability of each WAN uplink. When enabled, the gateway will send UDP or ICMP probes to an IP or FQDN of a host to determine if the path is available to accommodate traffic. The primary use case for health checks is to verify that each ISP’s network is operational and prevent branch traffic from being forwarded into a black hole.

    Aruba gateways can implement DPS policies to determine the WAN uplinks that are selected for specific users, applications, and destinations. The selected forwarding path could be a single WAN uplink or traffic could be load balanced between a group of WAN uplinks. The destination IP address of the traffic will determine if the traffic is steered towards a VPN tunnel or forwarded directly to the Internet. The DPS policy effectively selects an uplink and the gateway’s routing table or policy-based routing (PBR) rules will determine the next hop.

    Agenda:

    1. Introduction to Health Check and DPS
    2. Features and basic setup requirements
    3. Uplink health check configurations
    4. DPS Policies Configurations
    5. DPS policies verification
    6. DPS Traffic Verification
    7. Flow with routing plus DPS
  • Create a Foundation for Agency Innovation with Dell Technologies
    Create a Foundation for Agency Innovation with Dell Technologies
    Ryan Vance, John Abrams and Al Ford, Dell Technologies Aug 27 2019 2:00 pm UTC 60 mins
    We empower U.S. government agencies with the people, process and technology to protect our nation’s digital future. Come learn how our data center solutions can fit any agency’s need for transformation from the edge to core to cloud. In addition, we will also discuss how data analytics provides you with the opportunity to increase your speed to decision as well as accuracy to decision. Our speaker will also share examples in which an intelligence layer is being added to the data or data analytics capabilities, which include: cyber, RPA, inferencing and multi-INT.

    Register for this webinar today to learn more!

    Click the "Attend" button and select from the "Add to Calendar" options. Open the calendar reminder and click on the link to register through GoToWebinar.

    Go to the URL below to test your system.
    https://support.logmeininc.com/gotowebinar/system-check-attendee
  • PREMIER uCPE Solutions
    PREMIER uCPE Solutions
    Mike Neff, AVP Virtualized Solutions & Biz Dev., KGPCo and Pate Prayson CTO of Edge Cloud at ADVA Aug 27 2019 3:00 pm UTC 60 mins
    While service providers understand the benefits of virtualized products and services, few have experienced it. It is clear to them that they must evolve their network rather than continue the status quo. As the effort to transform legacy network services increases, service providers will seek the most efficient and cost-effective means in which to do so. KGPCo will be the catalyst for such an evolution.
  • OpenShift roadmap: what the next year means to you, to us, and the industry
    OpenShift roadmap: what the next year means to you, to us, and the industry
    Mike Barret, Rob Szumski, Marc Curry, Brian "Redbeard" Harrington and Tushar Katari - Red Hat Aug 27 2019 3:30 pm UTC 55 mins
    Come to this session to see what it OpenShift means to you. What are the technology enhancements in 2019 and into 2020 that will change the way we think about compute, development, and how we best use these technologies on-premise and in public clouds. In a first look, we'll demonstrate new features and explain where we're taking Red Hat OpenShift and why. Don't miss this session!

    Presenters:
    Mike Barret, Director of Product Management, Red Hat
    Rob Szumski, Product Manager, Red Hat
    Marc Curry, Senior Principal OpenShift Product Manager, Container Infrastructure, Red Hat
    Brian "Redbeard" Harrington, Principal Product Manager, Red Hat
    Tushar Katari, OpenShift Product Manager, Red Hat
  • 3 pitfalls to avoid with hybrid multicloud
    3 pitfalls to avoid with hybrid multicloud
    Eric Schabell, global technology evangelist director, Red Hat Aug 27 2019 4:30 pm UTC 60 mins
    The hype about cloud computing is present daily. From cloud to hybrid cloud to hybrid multicloud, businesses hear that this technology is the way to ensure their digital future. As they ponder choices about cloud environments, businesses must continue the daily work of enhancing the customer experience and improving the agile delivery of applications.

    In this webinar, we’ll use real customer experiences to highlight the top 3 lessons those customers learned as they transitioned to hybrid multicloud environments. We’ll look closely at:
    - What hybrid multicloud means for your business.
    - Decisions that affect application delivery.
    - How to deal with legacy applications, likely the most important resources to your business.
  • Fibre Channel and Security
    Fibre Channel and Security
    Nishant Lodha, Marvell; Brandon Hoff, Broadcom; J Metz, Cisco Aug 27 2019 5:00 pm UTC 75 mins
    Fibre Channel has long been known to be a very secure protocol for storage. Even so, there is no such thing as a “perfectly secure” technology, and for that reason it’s important to constantly update and protect against threats.

    The sheer variety of environments in which Fibre Channel fabrics are deployed makes it very difficult to simply rely only on physical security. In fact, it’s possible to access different storage systems by different users, even when spanned over several sites. Fibre Channel enables security services to specifically address these concerns, and prevent misconfigurations or access to data by non-authorized people and machines.

    This webcast is going to dive deep into the guts of security aspects of Fibre Channel, looking closely at the protocols used to implement security in a Fibre Channel fabric. In particular, we’re going to look at:

    •The definitions of the protocols to authenticate Fibre Channel devices
    •What are the different classes of threats, and what are the mechanisms to protect against them
    •What are session keys and how to set them up
    •How Fibre Channel negotiates these parameters to insure frame-by-frame integrity and confidentiality
    •How Fibre Channel establishes and distributes policies across a fabric

    Please join us to learn more about the technical considerations that Fibre Channel brings to the table to secure and protect your data and information.