Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Cloud Bursting 101: What to Do When Computing Demand Exceeds Capacity Cloud Bursting 101: What to Do When Computing Demand Exceeds Capacity Bernie Behn, Principal Engineer & Damian Hasak, Solutions Architect Lead Recorded: Feb 16 2017 47 mins
    Deploying applications locally and bursting them to the cloud for compute may seem difficult, especially when working with high-performance, critical information. However, using cloudbursts to offset peaks in demand can bring big benefits and kudos from organizational leaders always looking to do more with less.

    After this short webinar, you’ll be ready to:

    - Explain what cloud bursting is and what workloads it is best for
    - Identify efficiencies in applying cloud bursting to high-performance applications
    - Understand how cloud computing services access your data and consume it during burst cycles
    - Share three real-world use cases of companies leveraging cloud bursting for measurable efficiencies
    - Have seen a demonstration of how it works

    Presenters will build an actionable framework in just thirty minutes and then take questions.
  • Introducing Fibre Channel NVMe Introducing Fibre Channel NVMe Craig Carlson, FCIA Board of Directors, Cavium, J Metz, FCIA Board of Directors, Cisco Recorded: Feb 16 2017 58 mins
    NVMe is one of the most interesting new developments to happen to storage in the past several years, and NVMe over Fabrics extends these capabilities over a Storage Area Network. Given that 80% of all existing Flash storage solutions deployed are interconnected with Fibre Channel (FC), many questions have arisen about what it is, how it works, and why someone might want to consider using Fibre Channel for NVMe-based solutions.

    In this technical webinar, we’re going to be addressing some of these fundamental questions:

    - How does Fibre Channel and NVMe work together?
    - How is NVMe over Fabrics different from “traditional” Fibre Channel?
    - What changes do I have to make to my Fibre Channel environment in order to get NVMe over Fabrics to work?
    - What would an NVMe over Fibre Channel (FC-NVMe) architecture look like?
    - What advantages would I get using Fibre Channel in an NVMe solution?

    Check out this live webinar to learn more about this exciting new technology from the people who are developing it.
  • If You Can See It, You Can Protect It: Visibility & Cybersecurity If You Can See It, You Can Protect It: Visibility & Cybersecurity Jeff Harris, Ixia -- Glenn Chagnot, Ixia -- Zeus Kerravala, ZK Research Recorded: Feb 16 2017 61 mins
    Where business security is concerned, IT needs to move with speed and without hesitation. Visibility can make all the difference.

    Join our experts from Ixia and ZK Research as they discuss the critical nature of unobstructed visibility in network security. Viewers will learn:

    · The building blocks of the Digital Enterprise and Digitization

    · Why the current state of IT Security is not scalable and how businesses are falling behind

    · How Visibility can tip the Security Scales in IT’s favor by exposing persistent threats and enabling the ability to “see” insider threats.
  • Backup on the Wire: Ransomware Recovery Based on Precision Packet Capture Backup on the Wire: Ransomware Recovery Based on Precision Packet Capture Tyson Supasatit, Product Marketing Manager, Kanen Clement,Senior Systems Engineer, ExtraHop Networks Recorded: Feb 16 2017 20 mins
    ExtraHop, the first and only provider of streaming analytics that transforms network data into actionable insight, today introduced a new version of its award-winning ransomware mitigation offering that, for the first time, allows enterprises to recover ransomware-encrypted files without a backup. The ransomware offering incorporates the ExtraHop platform's proprietary Precision Packet Capture capability, allowing companies to detect ransomware attacks in-progress and recover lost files in minutes, creating an end-to-end solution that puts control back in the hands of the enterprise.

    In this Webinar Tyson Supasatit and Kanen Clement explain how the ExtraHop solution for ransomware detection and file recovery works.
  • From Node to Node: How to Optimize Cassandra Database Performance From Node to Node: How to Optimize Cassandra Database Performance Mike Kelly, CTO, SelectStar Recorded: Feb 16 2017 30 mins
    Because of its high performance, availability and scalability, Apache Casssandra has quickly become a preferred NoSQL open-source database of choice. Even though it’s highly reliable, there are some issues that can arise and cause major issues to your environment – such as running out of node space or dealing with latency issues. Gaining visibility into key metrics with the option to drill-down to root-cause issues can offer the visibility that you need to keep Cassandra operating at peak performance.

    In this 30-minute webinar, SelectStar’s Mike Kelly will highlight:
    · How you can optimize the performance of your nodes
    · Key metrics to track within your Cassandra environment
    · Top methods to optimize your Cassandra database performance
  • Machine Learning: The what, how, and why you need it now Machine Learning: The what, how, and why you need it now Stewart Rogers, Dir. of Marketing Technology, VentureBeat Apr 5 2017 5:00 pm UTC 60 mins
    The short answer is that machine learning is the enemy of a post-truth world: Set loose on large data sets, it’s used to uncover patterns and deliver key insights that help predict how things will unfold in the future. The long answer is that from the transformation of forecasting and predictive analytics to the development of self-driving cars to Microsoft working to prevent blindness in children, machine learning has quickly become the kind of technology that transforms the world, from impactful business use cases to powerful social change.

    McKinsey’s 2016 data and analytics study found 120 potential machine learning applications in 12 industries—and the evolution is accelerating. Join our latest VB Live interactive event for a deep dive into how to measure, understand, and mobilize the data that matters the most for your business using machine learning.

    In this webinar you’ll:

    * Learn how cognitive technologies scale across mobile devices (including cars)
    * Evaluate the value of a machine learning product to your organization
    * Tailor your data structure to optimize for future machine learning initiatives


    Speakers:


    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Wendy Schuchart, Moderator, VentureBeat
  • Keeping Applications Compliant and Secure Using ARA Keeping Applications Compliant and Secure Using ARA Keith Puzey, CA Technologies Recorded: Feb 16 2017 25 mins
    Are you burdened with regulatory mandates that require the proper compliance controls and audit trails? Do last-minute security updates hold-up your application releases—or more problematic, have you missed security patches that impacted the business?

    In this 30-minute webcast:
    -Discover what it means to shift your security thinking left and incrementally improve security as part of your continuous delivery practice.
    -Learn how you can apply the right levels of governance, gain end-to-end transparency and ensure full auditability of your releases.
    -See how an Application Release Automation (ARA) solution like CA Release Automation enables you to deliver applications with the agility and speed required by your business while enabling you to stay in control.

    At the end of this webcast, you’ll have insights into how to mitigate digital risks as you apply continuous delivery practices.
  • Best Options for Failover in Retail Best Options for Failover in Retail Landon Reese, Cradlepoint Recorded: Feb 15 2017 46 mins
    In retail, the rapid adoption of omnichannel services, automation, digitization, IoT and mobile devices, and cloud-based applications has rendered Internet and downtime unacceptable. From helping customers to handling back-office duties, retail staff need 24/7 connectivity to do their jobs effectively.
     
    Retail IT professionals need flexibility and numerous options for providing Internet failover, router redundancy, and business continuity in a variety of locations and circumstances.
      
    At 9 a.m. PT / 12 p.m. ET on Feb. 15, 2017, join Cradlepoint’s Landon Reese to explore the best options for failover in retail, as enterprises look to improve the customer experience and save time, money, and man-hours.
  • Automation for Check Point R80 & Rule Decommissioning Automation for Check Point R80 & Rule Decommissioning Amnon Even Zohar, Director of Cloud Product Management & Maya Malevich, Director, Product Marketing Tufin Recorded: Feb 15 2017 40 mins
    For many enterprises 2017 will be the year they start automating security changes for increased agility across their hybrid network.
    Tufin is ready to provide policy-based automation across legacy and next generation networks, physical FWs and cloud platforms.
    Join us to learn about the enhancements in Tufin Orchestration Suite R16-4:
    •Policy-based automation for Check Point R80
    •End-to-end automation for rule and server decommissioning
    •Built-in enforcement of cloud tag policy
    and much more.
  • LPWAN - How LPWAN networks int for Smart Communities and the Industrial Internet LPWAN - How LPWAN networks int for Smart Communities and the Industrial Internet Yann Gabay - CONNIT; Brian Ray - Link Labs, Tiana McNeil - Ingenu, Jeff Siegel - nwave, Limor Schafman - TIA Recorded: Feb 15 2017 62 mins
    LPWAN (low power wide area network) technologies service a specific and necessary role in the growth of Internet of Things (IoT) connectivity. Not all applications need bandwidth and speed. Sometimes long distance, low energy usage, and long latency is the perfect confluence of service that an IoT application needs. Some examples are city lighting, energy grid and meter management, parking space monitoring, precision irrigation, crop yield management, and many more.

    This webcast will present different LPWAN technologies and discuss a number of questions regarding technology and value assessment, deployment, usage of such networks, and return on investment evaluations.

    - An explanation of LPWAN technology and how it works
    - When to use (and not use) LPWAN technology
    - What issues such networks solve
    - The difference between U.S. and European bands and when this will matter to a company deploying an LPWAN network
    - Key information that cities and companies need to both ask and be ready to answer when planning to deploy an LPWAN network, in order to assess the right fit and to maximize efficiencies such connectivity can bring
    - How LPWAN networks integrate with other network infrastructure in smart community deployments, for example
    - Sample use cases
    - Business models that use LPWAN networks for energy management, asset management, and others
    - How to make money as both a user and deployer of LPWAN networks
    - What returns on investment can be expected and suggested metrics for measurement

    Speakers:
    Yann Gabay, Co-founder and Board Member, CONNIT
    Tiana McNeil, Sr. Business Development Manager, Iot Smart Cities, Ingenu
    Brian Ray, CTO and Founder, Link Labs
    Jeffrey Siegel, CMO, nwave

    This webcast is NOT BICSI accredited.
  • Chasing Shadows: Session 2 - Ansible Tower Chasing Shadows: Session 2 - Ansible Tower Jesse Barker, Red Hat Practice Lead, IIS Technology Recorded: Feb 15 2017 33 mins
    Ansible Tower – Ansible makes everything easier. Its simple, agentless IT automation improves your current processes, migrates applications for better optimization, and does it all in a single language for DevOps practices across your organization.

    Repetitive tasks are automated using a simple, human-readable language that anyone in your IT organization can understand. Ansible’s graphical interface is as intuitive as they come, allowing automation, role-based access control, job scheduling, graphical inventory management and real-time job status updates, all from a single visual dashboard. And because it allows control and reporting capabilities, Ansible Tower is enterprise-ready right away.
  • DDoS Threats of Past, Present and Future DDoS Threats of Past, Present and Future John Ellis, Chief Strategist, Cyber Security (APJ), Akamai & Michael Smith, Chief Technology Officer, Security (APJ), Akamai Recorded: Feb 15 2017 62 mins
    The Fourth Industrial Revolution is in all full swing with the Internet at its core. While the Internet is connecting everyone and everything it also connects us to a variety of nefarious threat actors, who have found ways to exploit and monetize many aspects of our digital world. In recent times, one area has been DDoS, which has become one of the top cyber threats du jour.

    In this webinar, you will learn:

    - Historical developments in the DDoS threat landscape
    - How criminal operators are building out their botnets – discover, infect, operate and maintain
    - Technical examination of new botnet trends such as the Mirai IoT botnet
    - Architectural concepts and design for DDoS mitigation solutions - covering cloud and data centre environments
    - Response strategies to defending and responding to DDoS attacks
    - Predictions for future and next steps.

    Join Akamai and (ISC)² on Feb 15 (Wed) at 13:00 (Singapore time) and learn about the DDoS threats of past, present and future.

    Presenters:
    - John Ellis, Chief Strategist, Cyber Security (Asia-Pacific & Japan), Akamai
    - Michael Smith, Chief Technology Officer, Security (Asia-Pacific & Japan), Akamai

    Moderator:
    - Clayton Jones, Managing Director, Asia-Pacific, (ISC)²
  • Unlocking Innovation with Next Generation Cloud Infrastructure Unlocking Innovation with Next Generation Cloud Infrastructure Jose Simonelli, Architect Services Manager, Red Hat Recorded: Feb 14 2017 39 mins
    Companies are looking to the promise of next-generation and cloud infrastructures to drive innovation within their organization. This places ever growing and changing demands on their IT organizations to be more responsive, agile, cost sensitive, and transparent.

    Though the destination may seem obvious, most companies are unsure of how to get there. Transitioning workloads from legacy or traditional infrastructures to these new robust, flexible cloud infrastructures requires precise planning and execution. It’s more than just moving virtual machines.

    In this session, we’ll discuss the proven approach Red Hat has used to support customers in deploying and migrating to these cloud infrastructures. It not only tackles the technical aspects of the migration but also addresses how we support IT organizations in meeting the new demands being placed on them.

    You’ll learn how to:
    - Radically simplify the orchestration of workload migrations while preserving VM relationships and application ordering.
    - Standardize and automate provisioning for greater agility and quicker time-to-market for new development.
    - Reduce vendor dependency while continuing to use existing infrastructure investments.
    - Reduce operational costs and complexity while increasing responsiveness.
    - Enable teams to manage change.
  • Everything You Wanted To Know about Storage But Were Too Proud To Ask: Buffering Everything You Wanted To Know about Storage But Were Too Proud To Ask: Buffering John Kim & Rob Davis, Mellanox, Mark Rogov, Dell EMC, Dave Minturn, Intel Recorded: Feb 14 2017 64 mins
    Buffers, Queues, and Caches, oh my! Buffers and Queues are part of every data center architecture, and a critical part of performance – both in improving it as well as hindering it. A well-implemented buffer can mean the difference between a finely run system and a confusing nightmare of troubleshooting. Knowing how buffers and queues work in storage can help make your storage system shine.

    However, there is something of a mystique surrounding these different data center components, as many people don’t realize just how they’re used and why. In this pod of the “Too Proud To Ask” series, we’re going to be demystifying this very important aspect of data center storage. You’ll learn:

    •What are buffers, caches, and queues, and why you should care about the differences?
    •What’s the difference between a read cache and a write cache?
    •What does “queue depth” mean?
    •What’s a buffer, a ring buffer, and host memory buffer, and why does it matter?
    •What happens when things go wrong?

    These are just some of the topics we’ll be covering, and while it won’t be exhaustive look at buffers, caches and queues, you can be sure that you’ll get insight into this very important, and yet often overlooked, part of storage design.
  • Tech Demo - Simplify SecOps with Single-Dashboard Monitoring Tech Demo - Simplify SecOps with Single-Dashboard Monitoring Cheryl O'Neil - Dir. Prod. Mktg.; Kedar Dhuru - Sr. Prod. Mgr.; Ido Tzang - System Architect Recorded: Feb 14 2017 39 mins
    Managing data security across a distributed enterprise – deployed on-prem or in the cloud – is a daunting task. Imperva has powerful centralized management and reporting solutions that unify and streamline security operations to simplify distributed management. This webinar will provide an overview of SecureSphere MoM, providing visibility into system wide performance and problem areas by aggregating performance and status metrics for individual MX Management Servers, Gateways and Agents in a single dashboard view.
  • Demystifying the NIST Cybersecurity Framework for Healthcare Demystifying the NIST Cybersecurity Framework for Healthcare Don Kleoppel, Chief Security Officer, Cerner and Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Recorded: Feb 9 2017 51 mins
    As cyber-attacks are growing more sophisticated and focused on the healthcare industry, it is paramount that these organizations put in place an effective, robust, and dynamic approach to identifying, managing and/or mitigating critical threats on an ongoing basis.

    This quarterly webinar series is designed to discuss how healthcare organizations are adopting the 5 core functions of the NIST Cybersecurity Framework-Identify, Protect, Detect, Respond, and Recover- to help them defend against cybersecurity threats on an ongoing basis, prioritize security risks and incidents based on potential impacts, and mitigate the most significant problems first, all while maintaining compliant with HIPAA and other federal and state regulations.

    Join us for Part 1 of this series as Cerner’s Chief Security Officer, Don Kleoppel discusses how Cerner is using the NIST CSF as the foundation to building out their cybersecurity strategy, lessons learned through the process, and what the framework means to not only their organization but also to the customers they serve.

    During this webinar, we will also cover:

    •Mapping current investments to the NIST CSF as well as identifying security gaps to efficiently manage your cybersecurity posture

    •Symantec’s involvement with NIST in building out a framework specific to meeting healthcare requirements and regulations

    •Leveraging the CSF to shift from a “check the box” compliance mindset to an automated risk management approach

    Register Today
  • The 4 Keys to Improving Security Threat Detection The 4 Keys to Improving Security Threat Detection Jason Landry, Dario David, and Greg Copeland Recorded: Feb 9 2017 58 mins
    You can't have network security monitoring without visibility to network data. You can't have visibility without context or you risk overwhelming security tools with irrelevant traffic. You can't add context to data without the performance to apply it at line rate. And you can't have performance without resilience to protect security tools and paths.

    In this webinar, we will show how to combine the four keys to improving security threat detection into a Security Fabric to deliver greater context and intelligent distribution to monitored traffic. You will learn how to create actionable threat intelligence specific to your organization and increase the value of your existing security tool infrastructure.
  • Building an NFV Enabled SDWAN Solution with Intel & Happiest Minds Building an NFV Enabled SDWAN Solution with Intel & Happiest Minds Dharmraj Jhatakia, General Manager – DCT, PES and Purnendu Ghosh, Associate Architect- PES both with Happiest Minds Recorded: Feb 9 2017 40 mins
    This webinar will provide you with practical and technical insights that provide a holistic picture of the emergence of SD-WAN and showcase some of its most compelling use-cases. We will also touch upon how Happiest Minds has architected and implemented this solution on Intel platforms using DPDK on Intel Atom based CPE as well as Intel XEON based NFVI running various VNFs like Firewall, IPS, IDS, Antivirus et al. This SDWAN and CPE solution using DPDK and Intel chipsets provides unmatched flexibility that can help transform expensive and inflexible wide area networks to being cost effective, agile, intelligent and feature rich.
    The session will enable the audience to understand the various deployment topologies and the services that can be provisioned using NFV & SD-WAN and also discern the significant components which enable the entire solution to comply with SLAs similar to current deployments with physical network functions.
  • Lightboard Series: Micro-segmentation Planning – What You Need to Know Lightboard Series: Micro-segmentation Planning – What You Need to Know Sean O’Dell, Systems Engineer, Network & Security Business Unit, VMware Recorded: Feb 9 2017 21 mins
    Series Title: Illustrating the Value of Network Virtualization
    Series Abstract: Join VMware NSX experts for a series of short webcasts focused on the technology and business drivers around network virtualization. Using a lightboard, we’ll illustrate how network virtualization with NSX can support an organization’s strategic initiatives.

    Webcast 1/3
    Title: Micro-segmentation Planning – What You Need to Know
    Abstract: Are you interested in deploying micro-segmentation but not sure where to start? One of the challenges is acquiring a complete picture of what’s going on within the datacenter and understanding your network flows. We’ll show you how to collect and analyze network flows in real time with vRealize Network Insight, providing vital context into the virtual machines and the applications they are originating from or terminating to. Once you understand who is talking to whom and which flows need to be allowed or blocked, you can use that intel to effectively model security groups and firewall rules, making micro-segmentation easier to deploy.

    In this webcast, we will discuss:
    •The key steps you need to know to prepare for micro-segmentation
    •How to collect network flow data to build a picture of your application environment
    •Using network flow information to model security groups and firewall rules
  • Continuous Testing - Webinar 4: Best Practices Continuous Testing - Webinar 4: Best Practices Dirk Hedderich, Business Consultant & Christian Schütz, Business Development Manager, HPE Software Recorded: Feb 9 2017 50 mins
    Durch die Verwendung von agilen Entwicklungsprozessen erhöht sich die Zahl der Testfälle sowie die Frequenz der Testzyklen dramatisch. Es wird immer schwerer, alle Komponenten einer Anwendung mit allen Abhängigkeiten bei permanent reduzierten Budgets und Ressourcen umfassend zu testen. Gleichzeitig nimmt aber die Softwarequalität einer Anwendung einen immer höheren Stellenwert für den Geschäftserfolg ein. Anwendungen müssen nicht nur zuverlässig, performant und sicher sein, sondern auch schnell an veränderte Anforderungen des Marktes und/oder des Business angepasst werden, um wettbewerbsfähig zu bleiben.

    Erfahren Sie in unserer kostenfreien Webinarreihe, wie sich durch den Einsatz von Continuous Testing-Lösungen qualitativ hochwertige Anwendungen schnell, zuverlässig und kontinuierlich bereitstellen lassen und der Ressourcen-Aufwand dabei erheblich reduziert werden kann - mit dem Ergebnis, durch ein schnelleres Go-to-Market einen früheren geschäftlichen Mehrwert zu erhalten!

    Webinar 4: Continuous Testing mit HPE: Best Practices
    Das vierte Webinar schließt die Serie mit interessanten Praxisberichten zum Thema Continuous Testing ab. Erfahren Sie in diesem Webinar, welche konkreten Erfahrungen HPE Kunden und HPE selbst bei der Einführung von Continuous Testing im Unternehmen gemacht und welche Vorgehensweisen und Werkzeugketten sich in der Praxis bewährt haben.
  • The Fundamentals of Testing Ethernet Technology. Part #1 The Fundamentals of Testing Ethernet Technology. Part #1 Ng Chin Keong, Applications Engineer, EXFO Recorded: Feb 9 2017 63 mins
    The surge in web-based, bandwidth-intensive applications has created new opportunities to deliver increasingly advanced services at higher speeds, alongside cutting-edge technologies. With its unmatched scalability and cost-effectiveness, Ethernet/IP has become the underlying technology of data communications and should be well understood by all players in the telecommunications industry.

    This 2-part webinar series addresses the fundamentals of testing Ethernet technology, as well as the tools and standards required in effectively turning up and troubleshooting next-generation Ethernet services.

    In this 2-part webinar series, we will delve deeper into the following topics:

    Webinar #1: February 9, 2017.
    Issuing a birth certificate before delivering Ethernet links
    + Fundamentals of Ethernet technology
    + Physical aspects of data links
    + Bit Error Rate measurements – Are they good enough?
    + Service Activation Methodologies
    - RFC2544
    - ITU.T Y.1564
    + Subscriber Experience (TCP traffic evaluation through RFC 6349)
  • Data Protector zum Wochenstart – Neuigkeiten zu DP und Backup Navigator Data Protector zum Wochenstart – Neuigkeiten zu DP und Backup Navigator Uli Wallscheid ist Technical Consultant im Bereich Information Management und spezialisiert auf Data Protection. Feb 20 2017 8:00 am UTC 90 mins
    Uli Wallscheid wird in bewährter Weise die Neuerungen in Theorie und Praxis vorstellen. Bleiben Sie auf dem Laufenden mit unserer Übersicht und freuen Sie sich auf hilfreiche Informationen, Demo’s und Empfehlungen zum Data Protector. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb. Ein Blick in die Zukunft wird ebenfalls dazugehören.
  • How to Migrate from Traditional WAN to SD-WAN How to Migrate from Traditional WAN to SD-WAN Lin Huang, Sr. Solutions Engineer for APAC, VeloCloud Networks Feb 21 2017 2:00 am UTC 45 mins
    Once your enterprise makes the decision to implement SD-WAN, the question arises: how to migrate the network infrastructure with minimal disruption to business operations. Having the right feature set is important, yes, but it is just as critical to come up with the right strategy of connecting the SD-WAN to the existing network.

    Join this webinar to learn

    - Challenges enterprises face during SD-WAN migration
    - Key considerations for a successful SD-WAN deployment
    - Step-by-step guide to transition from a traditional WAN to SD-WAN

    Lin Huang, VeloCloud's Field Solutions Engineer for APAC, uses real-life customer use cases to discuss the optimal steps to a successful SD-WAN deployment in Asia Pacific.
  • Panel Discussion: Cyber Security Strategies and Trends in 2017 Panel Discussion: Cyber Security Strategies and Trends in 2017 Jeff Costlow, ExtraHop Networks; Francois Raynaud, DevSecCon; Rami Mizrahi, TopSpin Security & Josh Downs, BrightTALK Feb 21 2017 9:00 am UTC 60 mins
    These days it's not a matter of if you'll be breached, but when. Security teams in the modern enterprise must accept that as well as efforts to protect their perimeter, they must also focus on understanding their east-west traffic.

    This panel discussion will look at the trends and technologies influencing cyber security strategy in 2017, in particular those that deal with effectively monitoring your network to ensure your organisation handles vulnerabilities and stays breach free.

    Panelists:

    - Josh Downs, Community Manager - Information Security, BrightTALK (moderator)

    - Jeff Costlow, Director of Security, ExtraHop Networks

    - Rami Mizrahi, VP of R&D, TopSpin Security

    - Francois Raynaud, Founder, DevSecCon

    Tune into this panel conversation if you're a network or security professional looking to hear the latest trends and security best-practices to defend against a constantly evolving opponent.
  • Tech Demo - Imperva Application Protection Portfolio Tech Demo - Imperva Application Protection Portfolio Ajay Uggirala, Director of Product Marketing and Mina Mahdavi, Senior Systems Engineer Feb 21 2017 5:00 pm UTC 60 mins
    Imperva offers comprehensive application protection that has the flexibility to be deployed on-premises or in-the-cloud protecting business-critical applications and infrastructure. This webinar will provide a complete overview of Imperva’s unique application security product portfolio that will enable your organization to defend itself against DDoS attacks, web-based threats and other emerging zero-day attacks. Learn how easy and flexible it is to deploy the solution in any environment and watch a live demo.
  • Best Practices for Protection Against DDoS Attacks Best Practices for Protection Against DDoS Attacks Brian Foust, VP of Customer Engineering & Darren Grabowski, Network Security Team Manager Feb 21 2017 6:00 pm UTC 75 mins
    DDoS attacks can strike at any time, potentially crippling network infrastructure and severely degrading user experience. Depending on the type and severity of an attack, the impact can result in resource damages, lost revenue, decreased productivity and irreparable harm to a company’s brand and resources.

    This webinar will discuss the latest trends in DDoS attacks, who the potential targets are and the effects on assets and organisations. Most importantly, this session will provide you with invaluable information to be prepared for and deal with a DDoS attack, including:
    • How to plan before you get attacked
    • What to do when attacked
    • Basic approaches to DDoS attack mitigation
  • How to Migrate from Traditional WAN to SD-WAN How to Migrate from Traditional WAN to SD-WAN Kangwarn Chinthammit, Director of Deployment, VeloCloud Networks Feb 21 2017 6:00 pm UTC 45 mins
    Once your enterprise makes the decision to implement SD-WAN, the question arises: how to migrate the network infrastructure with minimal disruption to business operations. Having the right feature set is important, yes, but it is just as critical to come up with the right strategy of connecting the SD-WAN to the existing network.

    Join this webinar to learn

    - Challenges enterprises face during SD-WAN migration
    - Key considerations for a successful SD-WAN deployment
    - Step-by-step guide to transition from a traditional WAN to SD-WAN

    Kangwarn Chinthammit uses real-life customer use cases to discuss the optimal steps to a successful SD-WAN deployment.
  • Key Security Insights: Examining 2016 to predict what's coming in 2017 Key Security Insights: Examining 2016 to predict what's coming in 2017 Ken Dang Feb 21 2017 7:00 pm UTC 60 mins
    Cyber-crimes are alive and well on the global stage. Don’t resist taking the necessary defense measures to stop threats from slipping through the cracks. In this SonicWall Security Annual Threat webcast, we’ll present the most common attacks in 2016 and the ways we expect new threats to affect businesses throughout 2017.

    Some report highlights:
    •Ransomware changes in 2016 and the effects on malicious email and exploit kits
    •The growth and challenges of SSL
    •How Internet of Things devices were exploited and different security steps some organizations are taking in response
    •Developments in Android security
    •Changes in Point of Sale Malware compared to 2015 and useful lessons to be learned
  • Why Containers? Discover the Future of IT and Applications Why Containers? Discover the Future of IT and Applications Scott McCarty, Sr. Principal Product Marketing Manager, Red Hat Feb 21 2017 8:00 pm UTC 45 mins
    Containers disrupted the shipping world decades ago and are now prime to alter I.T. in both physical data centers and virtual environments. But, do you fully understand the business value promised by the emergence of container technology?

    Container strategies allow your applications to be easily and efficiently shared and deployed, from a centralized server that allows greater collaboration between groups. In this live webinar with Scott McCarty, Senior Principal Product Marketing Manager at Red Hat, you will learn details about the benefits containers can bring to your business including:

    - Can your problems be addressed using containers
    - Should you containerize your applications
    - How to manage all the containers
  • Mehr Kontrolle, Mehrwert und höhere Kundenzufriedenheit mit Hybrid Cloud Mgmt Mehr Kontrolle, Mehrwert und höhere Kundenzufriedenheit mit Hybrid Cloud Mgmt Markus Knöfel, Presales Consultant, HPE Software Feb 22 2017 8:00 am UTC 60 mins
    Automation spielt in den Unternehmen seit langem eine wichtige Rolle für effizientere und effektivere Prozesse. Die Art der Automation hat sich in den Jahren jedoch von einfachen, singulären Tätigkeiten zur übergreifenden Prozessautomation gewandelt. Damit können Unternehmen schneller, sicherer und kostengünstiger auf geschäftliche Anforderungen reagieren.

    Wie können Sie jedoch am besten vorgehen, um flexibel und schnell auf die Geschäftsanforderungen Ihrer Kunden zu reagieren? In diesem Webinar zeigen wir Ihnen auf, wie sich die Automation mit Lösungen für Server, Netzwerke und Prozesse geändert hat und wie Sie diese Automation per Self-Service Ihren Kunden zur Verfügung stellen können.

    Sie sollten sich für dieses Webinar anmelden, wenn Sie: die Bereitstellung von Services im Rechenzentrum deutlich beschleunigen möchten; die Einhaltung von Richtlinien – auch hinsichtlich der Sicherheit – durchsetzen möchten; mehr über das Lösungsportfolio von Hewlett Packard Enterprise zum Thema Hybrid Cloud Management erfahren möchten.
  • Panel Discussion - AI & Machine Learning in Cyber Security Panel Discussion - AI & Machine Learning in Cyber Security Josh Downs, BrightTALK; John Laliberte, FireEye; Natalino Busa, TeraData & Neill Gernon, AI.Dublin and Atrovate Feb 22 2017 11:00 am UTC 60 mins
    A live online panel discussion focused on the debate around AI and machine learning and how they can automate cyber security; catch more threats and malicious attacks and prove a useful weapon against cyber crime.

    Panelists:

    - Josh Downs, Community Manager - Information Security, BrightTALK (moderator)

    - John Laliberte, VP, Endpoint and ICE, FireEye

    - Natalino Busa, Head of Applied Data, TeraData

    - Neil Gernon, MD, Atrovate & Founder, Dublin.AI
  • Chasing Shadows: Session 3 - Accelerating Service Delivery Chasing Shadows: Session 3 - Accelerating Service Delivery Jesse Barker, Red Hat Practice Lead, IIS Technology Feb 22 2017 3:00 pm UTC 45 mins
    In Session I, we introduced CloudForms as an enterprise-grade cloud management platform that can give you more control over you infrastructure. In Session III, we’ll go deeper; we’ll leverage CloudForms to demonstrate the deployment of applications in VMware and RHEV, working with Red Hat Satellite to manage our content repos and system configuration standards.

    CloudForms – Gone are the days when multiple management tools juggled a complex, hybrid environment. Red Hat CloudForms unifies management and operations, and maintains a consistent user interface and functionality even as you evolve from traditional virtualization to Infrastructure-as-a-Service (IaaS). CloudForms accelerates service deliver, reduces operational costs, improves operational visibility and control, and ensures compliance and governance – no other management tools, no redundant policy implementations, and no extra staff required.
  • IIoT Endpoint Security – The Model in Practice IIoT Endpoint Security – The Model in Practice Marcellus Buchheit, Co-founder, Wibu-Systems AG; Terrence Barr. Head of Solutions Engineering, Electric Imp Inc. Feb 22 2017 4:00 pm UTC 60 mins
    What is your first line of defense against cyberattacks? Secure endpoints! Endpoints are everywhere in the IIoT landscape. Without proper security, Industrial Internet of Things (IIoT) systems are not trustworthy, putting organizations, their missions and the greater public at increased risk. The viability of the IIoT depends on proper implementation of security to counter the growing and ever changing threats that are emerging.

    On February 22, 2017, editors of the IISF and security experts from the Industrial Internet Consortium will discuss the endpoint protection/security model and policy in its Industrial Internet Security Framework (IISF) document and present a real-world customer use case for an approach taken to secure an industrial system.
  • Data Plane Development Kit (DPDK) 16.11 & 17.02 New Features Data Plane Development Kit (DPDK) 16.11 & 17.02 New Features Tim O’Driscoll, Product Marketing Manager for DPDK, Intel Feb 22 2017 4:00 pm UTC 45 mins
    This webinar will describe the new features introduced in the two most recent DPDK releases: 16.11 which was released in November 2016, and 17.02 which is due for release in February 2017.
  • Protect Your Gaming Infrastructure from Hackers and Competitors Protect Your Gaming Infrastructure from Hackers and Competitors Shawn Andrich, Host & Founder, Gamers with Jobs Podcast and Nicole Banks, Sr. Community Manager, Imperva Incapsula Feb 22 2017 6:00 pm UTC 45 mins
    Online gaming is uniquely vulnerable to costly DDoS attacks: how can you protect these platforms from cyber attacks and resulting outages? This webinar will discuss what makes the online gaming industry such a prime target for DDoS and will propose a new solution to address this growing problem.

    Benefits of attending the webinar include:


    - Learning the latest DDoS threats and what it means for your business
    - Why online gaming servers are vulnerable
    - Strategies to combat DDoS attack
  • Quantifying DevOps Outcomes - Digital transformation and the competitive edge Quantifying DevOps Outcomes - Digital transformation and the competitive edge George Miranda, Technical Strategy Feb 22 2017 6:00 pm UTC 30 mins
    This webinar is part one of a four part series that examines how digital transformation enables you to outperform competitors.

    Digital transformation occurs when a company adopts technologies and practices that change it from one that ships its software slowly and painfully to one that ships software quickly while, at the same time, improving its quality and mitigating risk. Businesses that embrace digital transformation outperform their competitors: they capitalize on disruption rather than allowing themselves to be disrupted. They deliver their software faster, with higher efficiency and lower risk. These advances can be quantified to prove their effectiveness.

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey. The first part of our series, focuses on the overall challenges businesses face in the marketplace and how to gauge where you stand. Subsequent webinars will focus on specific measures that move transformation forward.

    Join us to:
    - Learn how industry trends shape your internal challenges
    - Explore how companies have resolved tensions between central IT organizations and development teams
    - Learn how to use industry metrics to determine where you should be focusing your efforts
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you

    Who should attend:
    - Director/VP of technology teams
    - Technology executives
    - Management seeking strategic alignment with business objectives
  • Parallel Data Mover for Lustre* organized by Intel and GRAU DATA AG Parallel Data Mover for Lustre* organized by Intel and GRAU DATA AG Adam Roe, Intel Solutions Architect for the Enterprise and HPC, Kai Hambrecht, Head of Service and Support GRAU DATA Feb 22 2017 6:00 pm UTC 60 mins
    PDM for Lustre is a hardware-independent software solution which enables parallel data transfer by using the HSM API of Lustre. The purpose of the PDM for Lustre is to maximize the copy performance between Lustre and backend technologies like object stores etc. Furthermore the intention is to support HSM setups where data needs to be moved between a high performance user file system and an archive file system. PDM for Lustre can also be used to synchronize or to migrate file systems in a very generic way. In the webinar, we will show the overall functionality and the advantages of the PDM for Lustre customers.

    Highlights:

    --Hardware independent
    --Unlimited throughput
    --Parallel processing
    --Failure handling without any disruption of operation
    --Simple administration
    --Integration with Lustre Release ≥ 2.6

    GRAU DATA AG is a medium-sized software company with its headquarters in Germany. Since 2007, GRAU DATA is focused on the development of software products. The product family of GRAU DATA allows business-critical data to be archived flexibly and with high scalability. GRAU DATA is indirectly or directly represented by partner companies worldwide. Numerous top companies and public institutions use solutions from GRAU DATA.
  • Evolution Towards Autonomy: The Journey to Self-Operating Networks™ Evolution Towards Autonomy: The Journey to Self-Operating Networks™ Douglas Gourlay Feb 22 2017 7:00 pm UTC 60 mins
    Over the past decade we have seen divergence in the architectures deployed in the hyper-scale world from those in the enterprise. We have also seen markedly different application architectures that enable more flexibility in network design. My goal in this session is to have a highly interactive discussion exploring the emerging skills gap in the networking community while also talking about methods to close that gap and enable a data center architecture that provides for scale, mobility, security, and simplicity of operations.
  • Tech Talk: Application Prioritization & Compliance With Business Intent Overlays Tech Talk: Application Prioritization & Compliance With Business Intent Overlays Derek Granath and Adam Fuoss Feb 22 2017 7:00 pm UTC 60 mins
    Implementing business intent overlays streamlines the process of delivering applications with the priority and QoS that business demands. Business intent overlays extend micro-segmentation from the data center across the WAN to help organizations maintain compliance requirements. Learn how to make this manageable with a Silver Peak’s SD-WAN.
  • The Fundamentals of Testing Ethernet Technology. Part #2 The Fundamentals of Testing Ethernet Technology. Part #2 Diong Ming Cheng, Application Engineer, EXFO Feb 23 2017 6:00 am UTC 60 mins
    The surge in web-based, bandwidth-intensive applications has created new opportunities to deliver increasingly advanced services at higher speeds, alongside cutting-edge technologies. With its unmatched scalability and cost-effectiveness, Ethernet/IP has become the underlying technology of data communications and should be well understood by all players in the telecommunications industry.

    This 2-part webinar series addresses the fundamentals of testing Ethernet technology, as well as the tools and standards required in effectively turning up and troubleshooting next-generation Ethernet services.
    In this 2-part webinar series, we will delve deeper into the following topics:

    Webinar #2: February 23, 2017

    Birth certificates: A summary and troubleshooting basics
    +Ideal Birth Certificate testing
    +Troubleshooting
    -What is unique about 100G testing?
    -VLAN scan
    -Through Mode
    -The impact on quality of service (QoS) experience

    Get the insights you need to achieve faster Ethernet service turn-up with first-time-right results!
  • How to Use Big Data to Improve Card Usage and Customer Engagement How to Use Big Data to Improve Card Usage and Customer Engagement Printec and INETCO Feb 23 2017 8:00 am UTC 75 mins
    Digital and self-service payment channels have changed the way banks and customers interact. Less direct interaction means more reliance on “Big Data” for insights that will help you identify ways to better serve your customers, run more effective card programs and capture more wallet share.

    Printec and INETCO invite you to attend a 30-45 minute live webinar, where we will showcase new technologies that will help your financial organization derive better value from customer transaction data. Learn how you can establish real-time insights into:

    - Card usage patterns
    - Profitability and cash flow
    - Application, network or third party service performance

    Can’t make the date? That’s ok. Contact Printec or INETCO if you are still interested in arranging a private discussion on how detailed transactional data can help you to predict next best product, identify customer performance problems, customize the consumer experience, competitively price card services and loans, execute targeted marketing strategies, and much more.
  • The Forgotten Link: Identifying the Weak Point in Your Network The Forgotten Link: Identifying the Weak Point in Your Network Jim Frey, Director of Marketing Feb 23 2017 4:00 pm UTC 60 mins
    There is a transition happening in our industry right before our eyes. Essentially, 1Gbps drops to the wall outlets are being replaced by 10Gbps drops to the ceiling. This is because, as 802.11ac technology advances and A/V applications like HDBaseT come onto the scene, enterprises are requiring more and more Category 6A connections to handle bandwidth demand to devices. But what happens beyond the devices? Your network, like a chain, it is only as strong as its weakest link.

    This webinar will:
    - Show you how this transition from 1Gbps to 10Gbps is creating a problem you may not know you have.
    - Explain the “Forgotten Link” and how this 10X transition is already starting to overwhelm it.
    - Introduce an engineered solution from Berk-Tek that will solve this emerging problem.
  • Lightboard Series: NSX for Multi-site Deployments and Disaster Recovery Lightboard Series: NSX for Multi-site Deployments and Disaster Recovery John Whitman, Senior NSX Systems Engineer, VMware Feb 23 2017 4:00 pm UTC 15 mins
    Series Title: Illustrating the Value of Network Virtualization
    Series Abstract: Join VMware NSX experts for a series of short webcasts focused on the technology and business drivers around network virtualization. Using a lightboard, we’ll illustrate how network virtualization with NSX can support an organization’s strategic initiatives.

    Webcast 3/3
    Title: NSX for Multi-site Deployments and Disaster Recovery
    Abstract: Deploying NSX across multiple datacenters allows organizations to dynamically move and manage workloads between multiple physical locations. The benefits of this capability are immediately clear: workload mobility, resource pooling, central management, consistent security policies across vCenter domains/sites, and disaster recovery. In this session, we’ll illustrate use cases and capabilities, including L2 connectivity without the use of OTV, cross-data center security policies, and isolating networks for disaster recovery testing and validation. In the second part of the session, we’ll dive into how NSX can improve your business disaster recovery plan and strengthen your overall RTO.

    In this session, we will discuss:
    •The many benefits of deploying NSX across multiple data centers
    •Capabilities and use cases for cross-data center connectivity and security
    •Using NSX to improve your disaster recovery plans and strengthen RTO
  • IoT Risk Becomes Real IoT Risk Becomes Real Chris Rodriguez, Senior Industry Analyst Network Security + Tom Bienkowski, Directror Product Mkt, Arbor Networks Feb 23 2017 5:00 pm UTC 60 mins
    Vulnerable IoT devices are plentiful and ripe for abuse by threat actors.
    But what exactly is the value of these devices to DDoS attackers?