Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Simplifying Data Integration for the Cloud
    Simplifying Data Integration for the Cloud Jill Reber, CEO, JayJay Zheng, Technical Director & Eric Greenfeder, Chief Architect, Primitive Logic Recorded: Oct 19 2017 54 mins
    The rapid adoption of enterprise cloud-based solutions brings data integration as one of the greatest challenges. The challenge grows on increasingly numerous SaaS applications with lack of suitable connectors that fit your business needs. Join this webinar led by Primitive Logic team to see how data integration can be simplified for your cloud. This talk introduces the generic declarative zero-coding approach using Informatica Cloud Rest Connector as an example and illustrates its practical features, as well as best practices and hidden gems.

    Moderator: Jill Reber, CEO, Primitive Logic
    Panelists: JayJay Zheng, Technical Director & Eric Greenfeder, Chief Architect, Primitive Logic
  • The TEK Center: Real World Testing for Real World Applications
    The TEK Center: Real World Testing for Real World Applications The TEK Center Recorded: Oct 19 2017 5 mins
    At Berk-Tek, we put the customer at the heart of everything we do. This statement stands true in the TEK Center’s research and development labs. A network is only as strong as the cables used to connect it and the applications lab works to ensure that every Berk-Tek cable performs beyond your expectations. By employing industry-leading research, advanced testing procedures and sophisticated modeling for emerging technologies, the applications lab translates expanding network requirements into leading edge cabling solutions that perform beyond the standard.
  • Transitioning Load Balancing to the Cloud
    Transitioning Load Balancing to the Cloud Ethan Banks, Co-Founder, Packet Pushers, Chiradeep Vittal, Distinguished Engineer, Citrix & Derek Yee, Sr. Product Mgr,Citrix Recorded: Oct 19 2017 66 mins
    ADCs have largely become commoditized, and the services they provide are fairly indistinguishable from the sea of competitors on the market today. With many data center architects faced with modernizing their infrastructure, what are the considerations when transitioning applications to new automation frameworks and topologies in the cloud?

    This webinar will focus on key challenges faced by the enterprise when transitioning their load balancers to the cloud.

    What you will learn:

    •The shift to cloud native, software and service-based offerings
    •Support for new application architectures
    •Operational complexities and scale at production
    •Flexibility and support for hybrid topologies in transition
  • How Browser Security Indicators Can Protect You from Phishing
    How Browser Security Indicators Can Protect You from Phishing Chris Bailey, VP Strategy & Business Development, and Kirk Hall, Director of Policy & Compliance Recorded: Oct 19 2017 56 mins
    The move to requiring encryption on all websites is picking up speed, with browsers starting to show UI warnings for unencrypted websites. Roughly 60% of internet page loads already "https", and the number of sites switching to encryption grows every month. This trend is helped by the availability of anonymous, free Domain Validated (DV) SSL certificates from several Certification Authorities (CAs), which include no identity information about the website owner.

    While increased encryption is good for connection security and combating “man-in-the-middle” (MITM) attacks, many phishing and malware fraudsters are using DV certificates to imitate login pages for top sites such as PayPal.com, banking sites, etc. and steal user information. Unfortunately, these fake DV login pages receive a favorable green padlock “Secure” security indicator in the Chrome UI, causing some users to believe Chrome is vouching for the phishing website as safe or trustworthy.

    Join Entrust Datacard's Chris Bailey and Kirk Hall as they discuss:
    • The difference between DV, OV, and EV
    • The issues with current browser UIs to do with certificate information
    • A proposed new UI security indicator to help users and enhance security
  • How to Make Network Analytics Useful for the Whole Business
    How to Make Network Analytics Useful for the Whole Business Kentik Co-founder & CEO Avi Freedman and Forrester Analyst Andre Kindness Recorded: Oct 19 2017 60 mins
    In the new enterprise network reality, boundaries have blurred: the internet is central and out of your control. A modern approach to network analytics is now more important than ever. The good news is that it’s possible to get vastly better insights from network traffic data than ever before, due to the power of cloud and big data systems. The key is to link that network traffic data and show the benefit to the broader business. In this webinar guest speaker Forrester analyst Andre Kindness and Kentik Co-founder and CEO Avi Freedman will help you understand:

    - The changes in enterprise networks that make modern network analytics a must-have
    - Why it’s so important to combine network data with business context
    - Examples of business intelligence driven by network data in IT organizations today
    - How you can gain the business advantage that modern network analytics offers
  • Defending Your Workloads with a Distributed Web Application Firewall (WAF)
    Defending Your Workloads with a Distributed Web Application Firewall (WAF) Guru Chahal Recorded: Oct 19 2017 57 mins
    Avi Networks has launched a new intelligent web application firewall (iWAF) that performs 50X faster than legacy appliances, processing hundreds of Gbps of throughput and over a million transactions per second. As a software-only solution, iWAF operates as a centrally managed fabric across data centers, private clouds, and public clouds. Register for this webinar to learn about the unique capabilities of Avi Networks’ iWAF include:

    Highest-performance web application security
    ● Elastic, automatic scale-out across data centers and clouds
    ● Scalable per-application deployments allow each mission-critical app to get its own WAF

    Analytics-driven, accurate security policies
    ● Real-time security insights eliminate false positives
    ● Visual policy checks prior to enforcement

    Central, simplified policy management
    ● Central management and automation of all distributed iWAF instances
    ● Point-and-click policy configurations, with pre-defined templates for OWASP Core Rule Set
  • How to Design SQL Server Infrastructures for Optimal Performance
    How to Design SQL Server Infrastructures for Optimal Performance Matt Henderson, Director of Microsoft Technology Recorded: Oct 19 2017 57 mins
    Successful analytics and transactional systems start with proper architectural principles and considerations. This webinar will be a detailed walkthrough of all the software and hardware infrastructure below the database server. It will explain how each layer affects database workloads as well as give tools and metrics for determining optimal architectural configurations.

    From this webinar you will learn:

    • How to design SQL server infrastructures for optimal performance
    • How the software and hardware infrastructure affect database performance
    • Tools and metrics to determine appropriate hardware allocations. For example, how many CPU cores, data volumes, tempdb files or GBs of memory are needed for your workload.
    • Tools and metrics to find current bottlenecks, inside and outside of the database server
    • Tools and best practices for monitoring all layers

    Presented by Matt Henderson, who has over two decades of experience in designing high-performance database platforms and over five years working with the latest all-flash storage technologies. He currently is the Director of Microsoft Technologies at Vexata where he helps customers optimize and scale their mission-critical databases.
  • Learn how Proxy Plays a Critical Role in Protecting Your Enterprise
    Learn how Proxy Plays a Critical Role in Protecting Your Enterprise Timothy Chiu - Senior Director of Product Marketing, Symantec Recorded: Oct 19 2017 32 mins
    Solving the most sophisticated security challenges requires an advanced approach that is built upon a proxy-based architecture. This approach allows you to leverage best of breed security technologies to provide a safe and confident cloud and network experience.

    Symantec secure web gateway solutions deliver strong proxy-based security in the form factor your organization needs: on-premises appliance, virtual appliance, in the cloud, or in a unified hybrid combination of these solutions.

    The solution’s unique proxy architecture allows it to effectively monitor, control, and secure traffic to ensure a safe web and cloud experience.

    In this webinar learn:
    • Why Proxy architecture is more important than ever as a critical security component of your network
    • How a web proxy can serve as a platform for advanced threat detection and data protection
    • Why pre-filtering your sandbox with proxy architecture is a smart move for both your SOC and your bottom line.

    Register Today
  • Is contracting right for you?
    Is contracting right for you? Travis O'Rourke, Country Manager, Hays Recorded: Oct 19 2017 14 mins
    Contracting is becoming more and more popular among professionals. In this episode Travis O’Rourke, Head of Hays Talent Solutions in Canada, discusses how you can determine if contracting is the right career path for you.

    For more contracting tips and careers advice, visit our blog Viewpoint: www.haysplc.com/viewpoint
  • Briefing on Demand Part 3 - Talking to Your Developer about Security
    Briefing on Demand Part 3 - Talking to Your Developer about Security Ryan Potter, Director of Cloud Strategy and Alliances, Imperva; Brandon Dunlap (Moderator) Recorded: Oct 18 2017 51 mins
    More and more enterprises are moving their applications into public and private cloud infrastructure. The cloud is becoming more appealing for enterprises as it facilitates business growth due its agility, resiliency and scalability. The advent of a variety of technologies and processes such as containers, micro-services, and DevOps has made rolling out new applications into the cloud very quick and desirable for development teams. Join Imperva and (ISC)2 for an examination of how enterprises move applications to the cloud without forgetting to put security first.
  • Briefings On Demand Part 2 - Security Across Cloud Platforms
    Briefings On Demand Part 2 - Security Across Cloud Platforms Nabeel Saeed, Imperva; Brandon Dunlap (Moderator) Recorded: Oct 18 2017 59 mins
    With the proliferation of cloud deployment options and platforms, management of application security across platforms has become a major problem for security teams. In this webinar, we address challenges posed by cloud proliferation, and how to approach development of a consistent security posture across platforms to better manage risks.
  • Secure and Always-On Connectivity Changes the Game
    Secure and Always-On Connectivity Changes the Game Hosted by Gerri Hinkel, Sr. Marketing Manager for Primary Education Recorded: Oct 18 2017 62 mins
    With so many users and devices on the network at any given time, universities and colleges struggle to keep up with the demand for always-on connectivity. What can you do to optimize your network infrastructure to tackle these challenges?

    Join our networking experts for a webinar that will discuss how Aruba solutions:

    * Provide always-on connectivity with features including RF optimization and controller hitless failover
    * Secure the network and identify risk with with IoT devices pre-authentication and user and entity behavior analytics (UEBA)
    * Provide deeper and predictive network insights
    * Address campus wired pain points with a unified wired AND wireless solution

    Speakers
    Michael Dickman, VP of Global PLM Campus Networking
    Peter Lane, Aruba WLAN PLM
    Danny Jump, Aruba ClearPass PLM
    Dan Comfort, Aruba Cloud PLM
  • Are Your Third Party Vendors Exposing Your Organization to Cyber Threats?
    Are Your Third Party Vendors Exposing Your Organization to Cyber Threats? Eric Olson, LookingGlass Vice President of Intelligence Operations and Nick Hayes, Forrester Senior Analyst – Security & Risk Recorded: Oct 18 2017 59 mins
    By now, the majority of us have likely been inundated with stories about third party data breaches and how one vendor’s vulnerability can cost your organization millions. But how do you know if you’re doing enough to stop third party risk?

    As we enter 2018, new U.S. and European cyber regulations are going into effect, and organizations can no longer check the box when it comes to their vendors’ cybersecurity. You are not only liable for knowing where you are most at-risk, but now you must also understand how that risk affects your organization and identify a solution for mitigating that risk.

    This webinar features guest speaker Nick Hayes, Senior Analyst at Forrester and LookingGlass VP of Intelligence Operations Eric Olson. They will delve into the third party risk landscape: our current state of affairs, and where the industry is moving, as well as how you can take a different approach to third party risk prevention, including:
    • How to see where your vendors are already compromised
    • The importance of actionable intelligence for real-time mitigation
    • Why a continuous monitoring solution is the future of third party risk
  • Today's Predictions for Tomorrow's Connected World
    Today's Predictions for Tomorrow's Connected World Kevin Haley, Director of Product Management for Symantec Security Technology and Response Recorded: Oct 18 2017 31 mins
    In the new world of IoT, smart cities, smart cars and home, our personal devices are more connected than ever before.

    Learn about predicting the future by looking at the past with insights on how to improve the world of IoT that is coming into our homes.

    Register Today
  • Parallel Networks Provide Stronger Security at the Elastic Edge
    Parallel Networks Provide Stronger Security at the Elastic Edge Ken Hosac, VP of Business Development, Cradlepoint Recorded: Oct 18 2017 47 mins
    Enterprises are seeking ways to reduce the scope and complexity of securing their Network’s Edge. Data breaches can cost companies millions of dollars in reduced revenue, shareholder value, fines, and diminished brand loyalty.

    IT managers concerned about their connected-network systems have turned to Parallel Networking to create application-specific networks to protect cardholder data while enabling customer engagement and improving operations.

    Parallel Networking enables organizations with hundreds or thousands of distributed locations to enhance security and PCI Compliance at the Network’s Edge.

    Join Cradlepoint for a webinar to learn about the benefits of Parallel Networking, real customer success examples, and best practices for greater security at the Elastic EdgeSM. 
  • SOC Talk: Automation and Visibility for Faster, More Accurate Response
    SOC Talk: Automation and Visibility for Faster, More Accurate Response Simon Gibson, CISO / Security Architect, Jack Hamm, Principal Information Security Engineer, Graham Melville, Sr. Director Recorded: Oct 18 2017 42 mins
    Join Jack Hamm and Simon Gibson from the Gigamon SecOps as they demonstrate how to use automation and visibility to take the boredom out of repetitive tasks. One of the featured use case will be how to automate tasks to find and block Kaspersky in government organizations.
     
    Security practitioners use a variety of tools and information sources to spot potential threats, evaluate each event and then act to mitigate. They are challenged by little interoperability between security tools, plus the cost of these tools across the network and cloud can be prohibitive.
     
    During this lively webinar, hosted by Security Solutions leader, Graham Melville, you will see how Gigamon and the Phantom security automation and orchestration platform can help you reduce mean time to resolution. The team will show how you can provide wider visibility and automate the tasks your security staff repeats on a frequent basis. 

     
    Simon and Jack will demonstrate:

    •How to generate indicators of compromise to trigger Phantom to execute customized playbooks with specific actions.
    •How to automate tasks to find and block the use of Kaspersky in government organizations.
    •How to streamline dozens of sources to gain insight into security events.
    •How to gain visibility to the necessary traffic from all segments of your networks without buying more security tools.
    •How you can reduce the load and turn on more features on your security tools such as Next Gen Firewalls.
  • Securing All of Your Data on All of Your Clouds
    Securing All of Your Data on All of Your Clouds Ronen Shpirer, Security Solutions Architect, Fortinet Recorded: Oct 18 2017 43 mins
    Your data is created, processed and consumed everywhere in your data center, and in an multi-dimensional hybrid cloud environment.

    Securing and protecting this data seamlessly across these environments in a coherent way is crucial to the effectiveness of your security posture.

    This session will provide a mix of information and live demonstrations on seamlessly securing all of your data on all of your clouds.
  • The Emerging Impact of NVMe-oF and Storage Class Memory
    The Emerging Impact of NVMe-oF and Storage Class Memory Jeff Kato, Senior Analyst & Consultant, Taneja Group Recorded: Oct 17 2017 61 mins
    Join us for a fast-paced and informative 60-minute roundtable as we discuss the latest—and potentially most game-changing—technology disruptors to traditional storage architectures since flash: NVMe over fabric and Storage Class Memory.

    It was just five years ago that Flash technology transformed the traditional storage market forever. Modern flash-first arrays are now the new normal for traditional storage. Will a new shared storage access protocol called NVM express over Fabric (NVMe-oF) combined with the advent of storage class memory (SCM) be equally disruptive to traditional storage over the next five years as NAND flash technology was in the past?

    Vendors are now announcing new products and future architectures to enable them to support these new technologies. With the help of a lively panel of experts from HPE, Pivot3, and Mellanox, we will unpack this topic and explore how their innovative approaches to leveraging Storage Class Memory and NVMe-oF can radically improve storage products and solutions.
  • 2018 Forecast: Clouds Keep Rolling In
    2018 Forecast: Clouds Keep Rolling In Howard Marks, Deep Storage & Bernie Behn, Avere Systems Recorded: Oct 17 2017 57 mins
    Howard Marks looks ahead at the storage trends rolling into IT Operations in the new year.

    Today’s data center is a much more dynamic environment than ever before leaving IT organizations struggling to compete, and or integrate, with public cloud services with tools and hardware designed for the much more static datacenter of yesteryear. In this webinar long time industry observer Howard Marks will examine five of the trends that IT operators should pay attention to in the coming year.

    Our discussion will focus on the promise, tools and challenges involved in moving to hybrid architectures that bridge private data centers and cloud resources to shift workloads, support data-intensive compute operations, manage unstructured data growth, build affordable archives, and prepare for disaster recovery. These technologies will consider macro-level trends as well as solving operational challenges that come with the growth of cloud.

    Infrastructure architects, systems engineers, storage engineers, data strategists, HPC specialists and other enterprise IT professionals will learn:
    - Current environment and challenges in building hybrid infrastructures that support traditional and object storage
    - Five not-to-be-ignored trends ripe for adoption in 2018
    - How compute and storage can mix in the new cloud-enabled world
  • Manage your Secure Access with one view via Pulse One
    Manage your Secure Access with one view via Pulse One Jim Hebler, Partner Velocity Director & Greg Bassett, Senior Director - Solutions Architecture Recorded: Oct 17 2017 32 mins
    How much visibility do you have via Secure Access end-points – from the Data Center, to the Cloud, to Devices and Applications hitting your network?

    Join Pulse Secure for a compelling Webinar Centered on Pulse One – its’ leading edge Monitoring-Visibility Solution. Configured correctly, Pulse One also enhances compliance alliance, segmentation and pro-active management and consolidation for Secure Access at the front-edge of your network.
  • Briefing On Demand Part 1 - Rethinking Security for Hybrid Environments
    Briefing On Demand Part 1 - Rethinking Security for Hybrid Environments Bo Kim, Sr. Director of Information Security, Imperva; Brandon Dunlap (Moderator) Recorded: Oct 17 2017 58 mins
    As more workloads are moved to cloud infrastructure, unique security challenges arise. Join Imperva and (ISC)2 for this webinar where we'll discuss some of the tradeoffs for on-prem and cloud app security, strategies for approaching security in hybrid environments, and the importance of flexible deployment models.
  • Adventures in TI: What is your IP Reputation?
    Adventures in TI: What is your IP Reputation? Guy Rosefelt, Director of PM, APAC Threat Intelligence & Web Security Recorded: Oct 17 2017 48 mins
    Abstract: Can you afford not knowing how bad your provider's IP reputation is? How likely are IP addresses adjacent to you of being infected with malware or participating in botnets?

    NSFOCUS has been tracking the reputation of IP addresses globally by ASN for over a year and recently released the August 2017 Global IP Reputation report. Some interesting patterns have emerged worldwide as the number of IP addresses added to reputation lists continues to increase due to Mirai, WannaCry and other malware infecting the Internet of Things.

    NSFOCUS SecLab is tracking IP reputation across 9 categories, including SPAM, DDoS, botnets, and web attackers. This talk will present global IP reputation trends and rank the countries with the worst IP reputation…and it may not be China.
  • SNIA's New 100-Year Archive Survey: Ten Years Later
    SNIA's New 100-Year Archive Survey: Ten Years Later Thomas Rivera, SNIA-DPCO Co-Chair; Sam Fineberg, SNIA LTR TWG Co-chair; Bob Rogers, CTO, Application Matrix Recorded: Oct 17 2017 60 mins
    Ten years ago, the SNIA 100-Year Archive Task Force developed a survey with the goal to determine the requirements for long-term digital information retention in the data center - requirements needed to frame the definition of best practices and solutions to the retention and preservation problems unique to large,scalable data centers.

    Now in 2017, SNIA presents a new survey developed to assess the following details:

    1. Who needs to retain long term information
    2. What information needs to be retained and for how long
    3. If organizations are able to meet their retention needs
    4. How long term information is stored, secured and preserved

    Join us as we see where we were and where we need to be in the preservation and retention of data.
  • How to Use the NIST CSF to Recover from a Healthcare Breach
    How to Use the NIST CSF to Recover from a Healthcare Breach Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Recorded: Oct 17 2017 60 mins
    Part 6 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    The final piece to the puzzle is the RECOVER function, which is arguably the most important area of the NIST CSF. How quickly can you return to business and clinical operations after a cyberattack occured?

    This webinar will focus on the measures required for a timely recovery and return to normal operations to reduce the impact from a cybersecurity event, with a focus on:

    • Recovery Planning: Processes and procedures are executed and maintained to ensure timely restoration of systems or assets.

    • Improvements: Planning and processes are improved by incorporating lessons learned.

    • Communications: Restoration activities are coordinated with internal and external parties.

    Register Today

    To view upcoming NIST Cybersecurity Framework for Healthcare Series Part 7 https://resource.elq.symantec.com/LP=4235
  • Cloud-Delivered SD-WAN and Security: Best Practices for Branch Transformation
    Cloud-Delivered SD-WAN and Security: Best Practices for Branch Transformation Dhawal Sharma, Director of Product Management, Zscaler, Inc., Rachna Srivastava, Sr. Director of Product Marketing, VeloCloud Recorded: Oct 17 2017 59 mins
    Cloud technology is the key enabler to new business opportunities, improved efficiency, and a sustainable competitive edge. IT requires new ways to rapidly deliver business applications and services in the cloud reliably and securely. This can be achieved by adopting a new approach that allows for agility and security in the cloud-era.

    Attend this webinar to learn about a holistic transformation strategy that brings cloud security and SD-WAN from Zscaler and VeloCloud together for secure, efficient, and cost-effective access to cloud applications and services, over the Internet and beyond.
  • Enable Security and Grow Your Business with the Industry’s leading connect UTM
    Enable Security and Grow Your Business with the Industry’s leading connect UTM Peter Newton, Sr. Director of Product Marketing, Fortinet Oct 24 2017 6:00 am UTC 45 mins
    Join this webinar to understand the benefits of a unified view of your infrastructure and comprehensive security that keeps up with changing network requirements and technologies like cloud services and smart devices.
  • The Security Paradigm: "From the Cloud, To the Cloud, In the Cloud"
    The Security Paradigm: "From the Cloud, To the Cloud, In the Cloud" David Grout, Director, Southern Europe Systems Engineering, FireEye Oct 24 2017 2:00 pm UTC 45 mins
    Cloud adoption is a reality today, every company is moving applications and businesses in the cloud to get more flexibility, agility and to potentially reduce their costs.

    Security operations need to enable this transformation and help the business to activate capabilities in the cloud infrastructure. Risks exist and cannot be ignored if companies want to provide a sustainable and secure environment for themselves and their customers.

    During this webinar, we will describe the main risks associated with cloud adoption and cover how to mitigate those risks.  
  • Top 2017 Cyberattacks & How to Avoid Them in 2018
    Top 2017 Cyberattacks & How to Avoid Them in 2018 Christofer Sears, Sr. Solutions Engineer, CISM, Tufin & Dan Rheault, Sr. Product Marketing Manager, Tufin Oct 24 2017 3:00 pm UTC 45 mins
    2017 has been another year of endless headlines featuring words like "breached," "hacked," and "cyberattack" – many of which were avoidable. Enforcing security policy across the legacy physical network is already challenging, and the addition of virtualized networks including the SDN and public cloud introduce new risks to organizations.

    Join this webinar to learn how to avoid the headlines by making security policy continuously enforceable. Having served in network security roles at Wells Fargo, General Dynamics, St. Jude Medical, and the Army National Guard, Tufin's Senior Solutions Engineer, Christofer Sears, CISM, will share his insight garnered throughout 10 years of experience.

    Key topics include how to:

    • Develop and deploy an enforceable security policy
    • Mitigate the inherent risk of DevOps’ CI/CD agility
    • Contain malware outbreaks like WannaCry
    • Effectively design implementation
    • Create time for proactive security projects
  • Addressing The Security Challenges of the Cloud Generation
    Addressing The Security Challenges of the Cloud Generation Gerry Grealish, Head of Product Marketing, Network and Cloud Security Products Oct 24 2017 4:00 pm UTC 45 mins
    Welcome to the Cloud Generation, where employees demand flexibility and access wherever they are, but can expose your most sensitive data to risk.

    Distributed environments—like mobile and distributed workforces—introduce new attack surfaces that must be protected and increased use of SaaS Cloud Apps are driving the need for new compliance and security controls. The result? Security and IT teams are being forced to rethink network designs to better answer questions like:

    - How do we effectively govern access to data, apps and systems?

    - How can we combat advanced threats targeting our business through the web, cloud and e-mail?

    - How should we secure information that is moving between our network, endpoints and the cloud?

    Join Gerry as he discusses the key Cloud Generation security challenges facing Symantec’s enterprise customers and learn how Symantec’s Cloud-delivered security solutions can be used to protect users, devices and corporate data, wherever it resides.
  • Propel the Future of Retail with SD-WAN
    Propel the Future of Retail with SD-WAN Rachna Srivistava, Sr. Director Product Marketing Oct 24 2017 5:00 pm UTC 60 mins
    Delivering an exceptional user experience to a retail customer is more than just having the right product on-hand. An omni-channel environment will become commonplace and retail organizations must deliver or be replaced by competitors who will. Having the right network to support growth and expansion, while keeping costs under check, is critical.

    In the second session of our Retail Revolution webinar series, VeloCloud will dive deeper with a take on how Cloud-Delivered SD-WAN can help retailers ensure security at each touch point with segmentation and PCI compliance, enhancing the customer engagement anytime, anywhere, and using real-world examples of how customers have used SD-WAN to improve their retail organizations.

    Key takeaways include:

    - Best practices on delivering an exceptional retail customer experience with Cloud-Delivered SD-WAN.
    - Guidance on how to stay secure with a range of features from VeloCloud, along with PCI
    - Optimizing your retail environment to ensure bottlenecks are removed and performance is optimized
    - Simplifying the PCI audit process with the VeloCloud PCI Certified Solution
  • Can Your Network Survive the Miercom Torture Test?
    Can Your Network Survive the Miercom Torture Test? Robert Smithers, CEO at Miercom and Derek Granath, VP Product Marketing at Silver Peak Oct 24 2017 5:00 pm UTC 60 mins
    Join leading independent product assessment group, Miercom and technical experts from Silver Peak as they discuss the performance expectations of today’s networks and how the right SD-WAN solution can improve application availability across the WAN using any type of transport. They will disclose how Silver Peak’s SD-WAN solution, Unity EdgeConnect fared in their aggressive stress test environment and provide a live demo on its performance capabilities.
  • What AI and the Cloud Revolution Mean for Business Communications
    What AI and the Cloud Revolution Mean for Business Communications Curtis Peterson, SVP of Operations at RingCentral Oct 24 2017 7:00 pm UTC 60 mins
    Are you concerned about the advancement of AI and cloud technology and how they will impact your business communications? Or perhaps you’re looking for ways to get your business communications AI ready? If you answered yes to either of these, then save your spot at this webinar now.
     
    The hype surrounding AI and its imminent take-over of the business world is creating a sense of panic. But whereas AI, just like cloud technology, is sure to become a driving force as we look to the future of business communications, there is no need to jump in at the deep end and throw all your resources at it just yet.
     
    Join us for this webinar in which we’ll explain the current state of play for AI (spoiler alert: humans are not going anywhere for a while) and cloud technology and impart some useful ways you can prepare your business communications.

    Chris Peterson, SVP of Operations at RingCentral, will talk you through:
     
    - Key trends in cloud communications
    - The importance of cloud communications
    - Team collaboration
    - Open platforms
    - AI hype vs. reality
    - How your business can create value with AI
  • Rev Up Your Cloud Integrations with Big Data Technology
    Rev Up Your Cloud Integrations with Big Data Technology Eric Greenfeder, Chief Architect, Primitive Logic Oct 24 2017 9:00 pm UTC 60 mins
    This presentation details how to leverage technologies such as Hadoop, MapReduce, Pig and Sqoop to massively scale cloud integrations to services such as Salesforce.com. Attendees will learn how to overcome API limitations, throughput latency and infrastructure scaling challenges to significantly increase integration performance.
  • Why Native Security Features in AWS and Office365 aren't Enough
    Why Native Security Features in AWS and Office365 aren't Enough Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager Oct 24 2017 9:00 pm UTC 60 mins
    Most businesses are rapidly moving to the cloud to be fast and nimble, reduce their cost structure, and reach more customers anywhere, anytime. These new architectures have powerful new capabilities—but also expose businesses to a new universe of risk.

    When dealing with outsourced infrastructure like AWS, or a SaaS solution like Office365, it is easy for IT managers to assume that security is out of their hands, for better or worse. But, this assumption may not always be true. Businesses must develop an active cloud security strategy as they pursue their migrations, and become a proactive security partner with their cloud providers—or they will find themselves vulnerable to attack.

    In this upcoming webinar, hear from security experts at Arctic Wolf Network (AWN), on:

    - The top cybersecurity risks and best practices for securing cloud deployments
    - How AWN security monitoring compliments the native security features in AWS and Office365
    - The role of AWN cloud security in integrating observations from cloud and on-premise systems

    To see how AWN CyberSOC™ can secure your cloud, register now.

    About our speakers:

    Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with in-depthexpertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.

    Louis Evans is a new member of the Arctic Wolf team. He’s passionate about cybersecurity, defeating the next generation of threats, and Alan Turing.
  • Intel's Data Center Game Changer
    Intel's Data Center Game Changer Noel John BDM & Eric Xie, Sr. Application Engineer, Intel Data Center Management Solutions Oct 25 2017 6:00 am UTC 60 mins
    A rapid rate of change complicates every facet of datacenter management, and server-centric compute models are too cumbersome for today’s highly variable workloads. Is it possible to optimize resources and operations in such dynamic environments? In this presentation, learn how to replace manual, hardware-defined application provisioning and management with a highly automated, software-defined resource model and orchestration layer that enables flexibility, simplified on-demand capital efficiency, and lower TCO. Find out how to compose more agile pools of datacenter resources, and simultaneously drive up IT efficiency, optimize energy requirements, increase datacenter resilience, and strengthen disaster recovery plans.
  • Next Generation Security in a Native Cloud World: are you ready?
    Next Generation Security in a Native Cloud World: are you ready? Klaus Gheri, VP & GM Network Security Oct 25 2017 12:00 pm UTC 60 mins
    The Cloud Generation

    The cloud is upon us and with accelerating adoption, it’s impacting the way the world does business. As the cloud has changed the world, products are evolving to meet the challenges. Security solutions like Next Generation Firewalls, Web Application Firewalls and Secure Email Gateways must evolve for this new frontier.

    Join Klaus Gheri, VP Network Security, to discuss how to ensure your organisation can prepare for the cloud generation. During this webinar, he will discuss:

    1. Knowing your security responsibility when it comes to public cloud
    2. How cloud service utilization can cause pressure on your current network architecture and how to alleviate it
    3. How cloud native does not come naturally with many of today’s security products and how to adapt to this new generation
  • Simplify Threat Response Through Integration & Automation
    Simplify Threat Response Through Integration & Automation Anthony Leigh, Systems Engineer, FireEye Oct 25 2017 1:00 pm UTC 45 mins
    FireEye Security Orchestrator helps you improve response times, reduce risk exposure, and maintain process consistency across your security program. It unifies disparate technologies and incident handling processes into a single console that codifies experiences from the frontlines to deliver real-time guided responses.

    In this technical session we hear from an orchestration expert on best practices to simplify and automate security tools and processes. We will look at real-life examples of providing teams with greater control of incident response process for improved efficiency, thus saving time & resources and increasing efficiency and performance. We will also look at orchestration services with incident response playbooks, plug-in development, automation and workflow deployment.
  • Identity, accountability and GDPR -  Where IAM fits in the GDPR puzzle
    Identity, accountability and GDPR - Where IAM fits in the GDPR puzzle James Ware, Security Solutions Architect, KT Secure Oct 25 2017 1:30 pm UTC 45 mins
    In this webinar, presented by KT Secure in association with Ilex, we will be assessing the role of Identity and Access Management when establishing GDPR.
  • Customer Insight: Future-Proof your Colocation Data Center
    Customer Insight: Future-Proof your Colocation Data Center Rhonda Ascierto, Research Director at 451 Research; Greg Jones, VP Strategy - Cloud & SP segment, Schneider Electric Oct 25 2017 3:00 pm UTC 60 mins
    Against the ever-changing and complex hybrid IT landscape, 451 Research surveyed more than 450 colocation customers globally – to understand the changing facets driving colocation demand and how colocation providers can be positioned for success today, and in the future. This research shows that the role of the colocation provider has never been more important – but the threats and challenges will intensify, and the opportunities will be uneven. Led by 451 Research’s Rhonda Ascierto, Research Director – Data Centers, and hosted by Greg Jones, VP Strategy – Cloud & Service Provider segment, Schneider Electric, this webinar will reveal the findings of this research along with actionable guidance colocation providers can use to plan for the future.
  • Gaining Control of Mainframe Software Monthly Licensing Charges with Dynamic Cap
    Gaining Control of Mainframe Software Monthly Licensing Charges with Dynamic Cap Johannes Peeters, Stefan Kochishan CA Technologies Oct 25 2017 3:00 pm UTC 60 mins
    The promise of achieving Service Level Agreements (SLAs) while also lowering Monthly License Charges (MLC) has quickly captured the attention of global business and IT leaders across multiple industries.
    The dilemma: IT must provide the best possible service to the business, while the business must prioritize cost containment strategies. It's a paradoxical situation.
    Now is the time to move from hype to reality.
    This webcast features a panel of CA and user subject experts that will examine real use-cases. The payoff? How automated, dynamic capacity intelligence helps remove the guesswork from MLC pricing – helping to better predict capacity spikes across the IT landscape - leading to significant savings.
  • The Dissolving Perimeter-Security Experts Speak
    The Dissolving Perimeter-Security Experts Speak Patrick Heim, CISO; Hal Lonas, CTO; Dr. Doug Jacobson, University Professor; Dr. Ratinder Ahuja, CEO Oct 25 2017 3:30 pm UTC 60 mins
    Expert panel discusses challenges and strategies. Attendees can download ESG report. Co-sponsored by Webroot. For more information, visit https://www.shieldx.com/webcast-dissolving-perimeter
  • Flexible Cloud Security Amid the Digital Transformation
    Flexible Cloud Security Amid the Digital Transformation Cradlepoint Team Oct 25 2017 4:00 pm UTC 60 mins
    For virtually any enterprise, the number of sites, devices, vehicles, and people needing network access is rapidly growing. Digital transformation is affecting everyone from small, family-run businesses to large multi-national corporations. Thus, it is more important than ever to ensure your networks are secure, flexible, and dynamic enough to respond to ever-changing business needs and constantly emerging threats.

    Join the Cradlepoint team for a live webinar on Oct. 25, 2017, about cloud security issues and trends that apply to modern businesses. 
     
    Topics will include:
    — IoT security (including the implications of Mirai malware)
    — Proprietary vs. standard management protocols
    — Remote office and Point-of-Sale security
    — Tips on how best to manage a dynamic, flexible network. 
  • How to Embrace New Workplace Communication Technology
    How to Embrace New Workplace Communication Technology Simon Dudley, Director of Product Strategy, Logitech & Zane Carroll, Product Development Manager, Staples Business Advantage Oct 25 2017 6:00 pm UTC 60 mins
    Gain valuable insight from our expert speakers.
    Webinar topics include:
    Cross Company Platform Adoption
    -How IT Managers can make every department happy
    Change Management
    -How to deal and adapt when everything changes
    Multi- Communication Solutions
    Communication is Key
    -What to consider when looking at a new communication plan

    Presenter Information:
    Simon Dudley, Director of Product Strategy, Logitech

    Simon Dudley is Director of Product Strategy for Logitech’s Video Collaboration business. Dudley joined Logitech in August 2016. Prior to that, he operated Excession Events, where he consulted organizations on optimizing their use of video collaboration. Dudley also spent a number of years working in sales, marketing, and product management at companies like LifeSize and Polycom, which has given him a holistic view of the video conferencing market.

    Dudley is an expert in the design, implementation and use of visual collaboration tools. He is a sought-after speaker in the collaboration industry, a published author, and the recipient of two patents. A native of the United Kingdom, Dudley currently resides in Austin, Texas.

    Zane Carroll, Product Development Manager, Staples Business Advantage

    Zane Carroll leads the Product Development Office at Staples Technology Solutions. He is collegiately trained as an Audio engineer with a passion for all things technology and quality sound. Throughout his time at Staples, he has supported our Computing & Printing hardware, managed services, and supported the launch of many new product categories, including the tablet, mobility, and most recently Device as a Service offerings here at Staples.
  • How CASB Needs to Evolve to Integrate with Your Security Infrastructure
    How CASB Needs to Evolve to Integrate with Your Security Infrastructure Eric Andrews, VP Cloud Security, Symantec Oct 25 2017 8:00 pm UTC 45 mins
    Rapid adoption of cloud apps and services is driving the need for Cloud Access Security Brokers (CASB)

    It is time for CASB systems to weave into your overall security infrastructure. There are many intersections to consider, such as DLP, Advanced Malware Protection, Web Security and Endpoint where organizations are navigating how to best integrate cloud security solutions into their environment to improve security and reduce operational overhead.

    This talk will explore this next frontier of CASB solutions.

    Register Today
  • How to keep your data safe on your journey to the Cloud
    How to keep your data safe on your journey to the Cloud Phil Maynard, Sr. Director, Technical Sales EMEA Oct 26 2017 10:00 am UTC 60 mins
    Cloud computing is redefining the way organisations across EMEA do business. In addition to Cloud, many are also looking to Software-as-a-Service solutions, such as Office 365, to level the playing field with their better-funded counterparts and access computing resources that were previously beyond their financial means.

    However, given the substantial increase in Ransomware attacks and high-profile data breaches, concerns over IT security, data protection and business continuity remain significant barriers to Cloud adoption.

    During this live webinar, attendees will learn:

    - Why it’s YOUR responsibility to backup & secure YOUR data in the Public Cloud!
    - How to uncover hidden cyber threats that are already lurking within your Office 365 environment
    - Why you need a layered data protection, archiving & security strategy
    - How to fully protect, archive and secure your data
    - How Barracuda has helped thousands of organizations on their journey to the Cloud

    Presenter: Phil Maynard, Sr. Director, Technical Sales EMEA at Barracuda who has over 30 years of experience in Data Storage, Data Protection, BC/DR, Virtualization, Cloud and IT Security.
  • 2017- Une année déjà active pour les groupes APT
    2017- Une année déjà active pour les groupes APT David Grout, Director, Southern Europe Systems Engineering, FireEye Oct 26 2017 12:00 pm UTC 45 mins
    2017 est d’ores et déjà une des années les plus prolifiques en ce qui concerne l’activité des groupes APT. On a en effet depuis le début de l’année plusieurs exemples d’attaques majeures, d’extorsions ou de tentatives d’influences relayées dans la presse.

    Prenons une pause et regardons plus attentivement les TTPs de ces groupes, les techniques Outils et procédures qu’ils utilisent.

    Pendant 45mn nous regarderons dans le détails leurs motivations, leurs approches et nous en définirons les moyens possibles à mettre en place pour limiter voire éviter leur attaques.

    Nous couvrirons plusieurs domaines incluant les groupes sponsorisés par des états avec des volontés de prises d’avantages économiques voir de destructions de l’adversaire comme APT32 ou 33. Nous étudierons aussi les groupe jouant d’influence géopolitique et de fake news comme APT28 ou 29 et nous finirons sur le cyber espionnage (APT10) et les cybers criminels spécialisés dans l’extorsions de fond.
  • Requirements for App Delivery in a hybrid and multi-cloud world
    Requirements for App Delivery in a hybrid and multi-cloud world Nihal Mirashi, Sr. Product Marketing Manager, Citrix & Mikko Disini, Director of Product Management, Citrix Oct 26 2017 1:00 pm UTC 60 mins
    In a cloud-first world, providing a seamless application experience for users can be challenging for IT. Is there a problem with the network or is it the server? Is there an issue with the cloud provider, or is it an issue on the other side? If these scenarios sound familiar, then this webinar is for you!

    What you will learn:

    •Key requirements for application delivery networking in a cloud-first world
    •Common enterprise application delivery use cases and challenges
    •How Citrix is evolving NetScaler to meet the app delivery needs of the cloud-enabled enterprise
  • Network Slicing: Building block of Tomorrow's Network
    Network Slicing: Building block of Tomorrow's Network Anurag Agarwal, Solution Architect, TCS Oct 26 2017 2:00 pm UTC 60 mins
    Next Generation applications like IoT, MBB, AR, VR, V2X, etc. generates wide variety of traffic and with different QoS needs. Today's network is not designed to handled the ever growing varied traffic which chokes the network. Since each of these traffic may have a different QoS needs, one size fit all solution will not work in long run.

    Network slicing is one of the key capabilities than enables flexibility which allows service providers to deploy multiple logical netwok on shared physical infrastructure. It also extensively uses the concept of Network function virtualization (NFV) and Software Defined Network (SDN) to bundle the virtualized network functions into tailored made logical network to handle varied requirement like low latency network, high bandwidth network, reliability, etc. This optimization helps to monetize the investment better and also opens up new revenue streams.

    This session talks about
    - What is network Slicing?
    - How it is related to 5g?
    - What will it do?
    - Who is driving it?
    - TCS Experimentation
  • The Latest Cyber Threats and Expert Tips for Defense
    The Latest Cyber Threats and Expert Tips for Defense Corey Nachreiner, CTO, and Marc Laliberte, Information Security Analyst Oct 26 2017 3:00 pm UTC 60 mins
    In an age where malicious ransomworms shut down hospitals, sneaky nation-state malware disrupts international shipping companies, and banks lose tens of millions to network breaches, to protect themselves, organizations MUST stay current on the adversary’s latest attack techniques, tools, and trends.

    With in-depth threat analysis from the Firebox Feed – a network of more than 33,500 UTM appliances across the world – the Threat Lab team delivers insight into the big security stories making headlines, and the key solutions for defense. Join the Threat Lab’s Corey Nachreiner and Marc Laliberte on October 26 as they share their latest findings and the tips you need to defend your network.
  • How SD-WAN improves Unified Communications
    How SD-WAN improves Unified Communications Alex Falyn Co-founder & CEO S-NET Communications & Robert McBride Director of Enterprise & Telco Solutions at Versa Networks Oct 26 2017 3:00 pm UTC 45 mins
    Whether using an on-premises or cloud based UC solution, reliable and SLA driven connectivity is critical to ensure that your enterprise business productivity and presence is not impacted.

    Join Versa Networks and S-NET Communications as we provide insights into how a software-defined WAN (SD-WAN) delivers the improved and reliable secure connectivity for your enterprise voice and video services. S-NET Communications is an industry expert in cloud communications solutions, removing complexity from IT and enabling enterprises and SMBs to collaborate and connect from any location and any device.

    Learn from their experience in integrating SD-WAN into their portfolio to deliver more secure and reliable services so their customers can attain faster data transfers and a more positive user experience for their business voice services.