Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Webinarreihe Lean Agile Enterprise: 2 - Agile Softwareentwicklung als Basis
    Webinarreihe Lean Agile Enterprise: 2 - Agile Softwareentwicklung als Basis Katja Gibbels. Presales Technical Consultant, Micro Focus Recorded: Jun 22 2018 58 mins
    Live-Webinarreihe:
    Lean Agile Enterprise - erfolgreiche Umsetzung mit dem Scaled Agile Framework SAFe®

    Um die digitale Transformation erfolgreich zu meistern, müssen Organisationen die Fähigkeit haben, den schnellen Wandel und die Veränderungen des Marktes zu antizipieren und für sich zu nutzen. Immer mehr Unternehmen setzen dabei auf agile Vorgehensweise und führen deshalb die weltweit führende Skalierungsmethode zur Agilität, Scaled Agile Framework (SAFe®), ein.
    Erfahren Sie in dieser kostenfreien Webinarreihe, mit welchen Lösungen und Tools wir Sie dabei unterstützen, SAFe® in Ihrem Unternehmen umzusetzen, um damit dauerhaft wettbewerbsfähig und erfolgreich im Markt bestehen zu bleiben.

    Webinar 2: Agile Softwareentwicklung als Basis für Lean Agile Enterprise
    22. Juni 2018 I 10:00 - 11:00 Uhr

    Erfahren Sie in diesem Webinar, wie Sie Lean Agile Enterprise und die agilen Prinzipien in der Softwareentwicklung umsetzen können. Das Scaled Agile Framework (SAFe®) nutzt dabei SCRUM- und Kanban Methoden, die bereits von vielen Entwicklungsteams angewendet werden, als Basis und ermöglicht somit, die Entwicklung zu Lean Agile Enterprise zu optimieren. Das zweite Webinar dieser Reihe wird Ihnen eine tiefere Sicht darauf geben und stellt vor, wie ALM Octane einen Lean Agile Entwicklungsprozess unterstützen kann.
  • The Need For Automated Asset Management in ICS
    The Need For Automated Asset Management in ICS IndegyTV Recorded: Jun 22 2018 3 mins
    Why is automated asset management and discovery needed in industrial networks
  • The Cyber Threat Landscape in K-12 Schools from the FBI’s Perspective
    The Cyber Threat Landscape in K-12 Schools from the FBI’s Perspective Special Agent Michael Morgan, FBI Recorded: Jun 21 2018 61 mins
    While cyber threats are exponentially increasing in volume, diversity and sophistication, they are rapidly outstripping our ability to safeguard critical data, applications and systems. Join this webinar to hear SA Morgan explain how the FBI addresses the cyber threat, discuss the cyber threat landscape in K-12, and provide prevention and mitigation techniques that you can implement on your campus.
  • What to expect when Ansible meets your organization - what we wish we'd known
    What to expect when Ansible meets your organization - what we wish we'd known Ryan Bontreger, associate platform consultant, Red Hat Scott Knauss, architect, Red Hat Recorded: Jun 21 2018 62 mins
    Thinking about automation in your massive enterprise environment? Ansible® is the wave of the future, but is it right for what you need it to do?

    Join this webinar to hear:
    > About the ins and outs of planning for Ansible in your organization.
    > How to integrate Ansible within your workflow.
    > What not to do with Ansible.
  • Network considerations for hybrid cloud
    Network considerations for hybrid cloud Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Recorded: Jun 21 2018 46 mins
    Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.

    Learn how Citrix networking solutions for hybrid cloud can deliver:

    •Contextual and secure access to applications
    •Website and application protection from internal and external threats
    •Application and network visibility and intelligent analytics
    •Flexibility and performance
  • FCoE vs. iSCSI vs. iSER
    FCoE vs. iSCSI vs. iSER J Metz, Cisco; Saqib Jang, Chelsio; Rob Davis, Mellanox; Tim Lustig, Mellanox Recorded: Jun 21 2018 62 mins
    The “Great Storage Debates” webcast series continues, this time on FCoE vs. iSCSI vs. iSER. Like past “Great Storage Debates,” the goal of this presentation is not to have a winner emerge, but rather provide vendor-neutral education on the capabilities and use cases of these technologies so that attendees can become more informed and make educated decisions.

    One of the features of modern data centers is the ubiquitous use of Ethernet. Although many data centers run multiple separate networks (Ethernet and Fibre Channel (FC)), these parallel infrastructures require separate switches, network adapters, management utilities and staff, which may not be cost effective.

    Multiple options for Ethernet-based SANs enable network convergence, including FCoE (Fibre Channel over Ethernet) which allows FC protocols over Ethernet and Internet Small Computer System Interface (iSCSI) for transport of SCSI commands over TCP/IP-Ethernet networks. There are also new Ethernet technologies that reduce the amount of CPU overhead in transferring data from server to client by using Remote Direct Memory Access (RDMA), which is leveraged by iSER (iSCSI Extensions for RDMA) to avoid unnecessary data copying.

    That leads to several questions about FCoE, iSCSI and iSER:

    •If we can run various network storage protocols over Ethernet, what
    differentiates them?
    •What are the advantages and disadvantages of FCoE, iSCSI and iSER?
    •How are they structured?
    •What software and hardware do they require?
    •How are they implemented, configured and managed?
    •Do they perform differently?
    •What do you need to do to take advantage of them in the data center?
    •What are the best use cases for each?

    Join our SNIA experts as they answer all these questions and more on the next Great Storage Debate.
  • How do enterprises use containers? A discussion of 2018 Docker usage.
    How do enterprises use containers? A discussion of 2018 Docker usage. Eric Carter Recorded: Jun 21 2018 45 mins
    What are the top application components running in containers? What is the lifespan of containers, container images, and services? How is orchestrator adoption changing? What keeps container developers and administrators up at night?

    Join us for a discussion of these topics and more in our review of the 2018 Docker Usage Report - based on a sample of 90,000 containers in real-world deployments.
  • A New Era in Data Storage for Machine Learning and AI Ecosystems
    A New Era in Data Storage for Machine Learning and AI Ecosystems Ashish Gupta Recorded: Jun 21 2018 45 mins
    As enterprises transition their Business Intelligence and Analytics environments to Machine Learning and Artificial Intelligence driven ecosystems, their core data infrastructure has to scale. Focusing only on the compute layers, creates a highly inefficient infrastructure. Vexata with its VX-OS version 3.5 release brings to market transformative economics and breakthrough performance to power these next-generation workloads at scale.e.

    You will learn about:
    • How to scale core data infrastructures for the transition to Machine Learning and Artificial Intelligence workloads
    • What are the key considerations before creating an AI/ML-centric storage infrastructure
    • How Vexata's new VX-OS version 3.5 release addresses these challenges
  • Building for a Better Future: Using SD-WAN to Rebuild a Business Network
    Building for a Better Future: Using SD-WAN to Rebuild a Business Network Rick Rader, IT Director with Myron Steves & Scott Turner and David Turner with Meriplex & Rosa Lear with VeloCloud Recorded: Jun 21 2018 29 mins
    In today’s world, undisrupted network connectivity is critical to ensuring business continuity. As the adoption of virtual instances and cloud migration accelerates, dependence on high quality, high speed, high bandwidth connections becomes a necessity. Outages have far reaching implications and can be detrimental to a business as the networks of yesterday are ill-prepared for the business of today and the future. SD-WAN is changing this scenario. In this webinar, Myron Steves discusses how its implementation of SD-WAN transformed their entire network and prepares them for future growth.

    Presenters:
    Rick Rader, IT Director with Myron F Steves
    Scott Turner, Director of Sales with Meriplex Communications
    David Turner, Principal Technologist with Meriplex Communications
    Rosa Lear, Senior Marketing Manager with VeloCloud now part of VMware
  • Network considerations for hybrid cloud
    Network considerations for hybrid cloud Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Recorded: Jun 21 2018 43 mins
    Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.

    Learn how Citrix networking solutions for hybrid cloud can deliver:

    •Contextual and secure access to applications
    •Website and application protection from internal and external threats
    •Application and network visibility and intelligent analytics
    •Flexibility and performance
  • Ask The Experts: Part 1 Using Automation to fight automation
    Ask The Experts: Part 1 Using Automation to fight automation Laurence Pitt, Global Security Strategy Director at Juniper Networks Lee Fisher Recorded: Jun 21 2018 3 mins
    Laurence Pitt, Security Strategy Director at Juniper Networks discuss how cyber criminals are using automation to stay ahead of security experts preventative measures. They're using automation to create malware, resulting in an increasingly regular number of security breaches. Laurence also discusses the need for businesses to automate the simpler aspects of their security processes, to free up time for human intelligence to spot behavioral abnormalities.
  • 『2018 年インターネットセキュリティ脅威レポート』より、脅威の最新動向についてご説明します。
    『2018 年インターネットセキュリティ脅威レポート』より、脅威の最新動向についてご説明します。 髙岡 隆佳, エバンジェリスト, Symantec Japan Recorded: Jun 21 2018 63 mins
    2017 年には、WannaCry と Petya/NotPetya の爆発的な流行や、コインマイナーの急激な増加などが見られました。デジタル世界のセキュリティ脅威は予想もしない新たなところから出現し、それに対する警戒が必要という状況は変わっていません。量的に増えているだけでなく、脅威を取り巻く世界はますます多様化しています。攻撃者は、新しい攻撃の経路を見いだすことにも、攻撃しつつその痕跡を隠すことにも、さらに懸命になってきました。

    シマンテックのエバンジェリストである髙岡 隆佳が、『2018 年インターネットセキュリティ脅威レポート(ISTR)』についての所見をお伝えします。主な内容は、次のとおりです。

    - コインマイニングのゴールドラッシュ到来
    - ランサムウェアの傾向が変化
    - 
数字で見る標的型攻撃
    - 
ソフトウェアサプライチェーンの感染
    - モバイル脅威の急増

    今すぐ登録
  • Creating Collaborative Huddle Rooms—How to Select the Right Tools and Technology
    Creating Collaborative Huddle Rooms—How to Select the Right Tools and Technology Brian Fichter, Director, Video Collaboration, Carousel Industries & Chris Thorson, Sr. Director, Polycom Recorded: Jun 20 2018 46 mins
    While traditional video conference rooms remain an anchor in most organizations, today’s accessible video technology means any space can be turned into a video collaboration space. In fact, With the growth in remote workers, the need for collaborative meeting spaces is on the rise to connect on and offsite workforces.
    Regardless of what solutions you are using today — Polycom, Microsoft, WebEx or GoToMeeting, to keep up with the demands of the modern workforce, you should be able to easily integrate legacy functionality with new capabilities.

    During this webinar, collaboration technology experts from Carousel and Polycom will discuss how you can:

    • Maximize capabilities within multi-vendor platforms for investment protection
    • Design collaborative workspaces with high quality audio, HD content and business-class video
    • Drive adoption with easy to use technology that doesn’t scare people away
  • Webinar: Accelerate Technical Sales through Self-Service Demos
    Webinar: Accelerate Technical Sales through Self-Service Demos Pascal Joly, Dir Techology Partnerships, Quali, Matt Branche, Services Lab Engineer, Broadcom Recorded: Jun 20 2018 37 mins
    Featuring: Industry Experts from Broadcom and Quali
    Are you spending too much time prepping demos? Not enough time running killer customer demos? That’s the challenge with demoing complex technology products: they’re hard to setup.

    Join us with industry experts from Broadcom and learn how to create a self-service catalog of demo environments that can serve your sales team effectively, how these environments can be deployed in minutes with built in orchestration, and how to expose "one-click" commands in the sandbox for demoing complex technology products. To be sure, there will also be a live demo :)
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation
    When the Walls Come Tumbling Down – Network Security for the Cloud Generation Mike Chen, Director of Product Marketing, Symantec and Tim Murphy, Sr. Manager Network Product Marketing, Symantec Recorded: Jun 20 2018 60 mins
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:

    - Why you should embrace cloud-based network security

    - The tools you need to provide protection against a variety of attacks

    - Why a proxy belongs at the center of your cloud service

    - Cloud migration strategies

    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today
  • Learn to Fight Cloud Sprawl and Eliminate Service Outages
    Learn to Fight Cloud Sprawl and Eliminate Service Outages Vid Sista, Director of Technology Solutions Recorded: Jun 20 2018 15 mins
    Adding automation to your IT environment is one of the best ways to fight cloud sprawl and help eliminate service outages. In this 15-minute webinar, Accudata’s Director of Technology Solutions Vid Sista will explain:

    How automation solutions enable you to proactively identify service issues
    Why cloud sprawl is a major threat to IT security – and how you can stop it
    What businesses can do to automate their IT services lifecycle
  • Secure Datacenters in Space
    Secure Datacenters in Space Dennis Gatens, Jeff Snyder, Alex Pezold,David Morris Recorded: Jun 20 2018 81 mins
    While everyone is talking about Cloud based data centers, the real migration is to outer space, where satellites continuously orbit the Earth. How will this work and what are the security implications. The Goddard Space Flight Center's lists 2,271 satellites currently in orbit.

    Join this panel of experts as we cover:
    •The migration of data centers to satellites
    •The benefits, risks, vulnerabilities and threats posed to a satellite based datacenters

    Dennis R. Gatens: VP Channel Management & Marketing at Cloud Constellation Corporation

    Jeff Snyder: CTO at Cloud Constellation Corporation

    Alex Perzold:Co-Founder and CEO at TokenEx
  • [Ep.17] Ask the Expert: Data Migration and Third Party Maintenance
    [Ep.17] Ask the Expert: Data Migration and Third Party Maintenance Chris Crotteau, Director of Strategic Product Development & Glenn Fassett, GM - EMEA, Curvature Recorded: Jun 20 2018 61 mins
    How easy is it to move data?

    Between traditional, on-premises data centers, hosted/collocated data centers, and infrastructure as a service (IaaS) through the large cloud providers, where to store your data and run your business critical applications is now a source of significant complexity in the IT world. Understanding your application set and business needs, then determining where best to run those applications and store their data presents a host of challenges both old and new.

    So where does Third Party Maintenance fit into all of this? Or better yet….what IS Third Party Maintenance?

    Join us for an engaging discussion with Curvature’s IT infrastructure experts to learn:

    •What Third Party Maintenance (TPM) is and how it has become a vital market segment focused first and foremost on the client’s needs
    •How TPM can cost-effectively extend the life of IT assets and align the lifetime of those assets to your application and software lifecycles
    •How TPM can enable you to manage major IT infrastructure transitions in a much more cost effective manner

    About the experts:

    Chris primarily works in the Services department as a Solutions Architect developing technological solutions and strategies for clients. As a technology expert, Chris leads a team of technical engineers to develop new tactics and processes for clients from development to design. Chris was named Employee of the Year in 2005 and 2009.

    Glenn is responsible for the strategic growth and expansion throughout Europe. Previously, Glenn managed Curvature’s international operations and led the company’s entry into Europe in 2002, successfully launching Curvature’s Asia-Pacific division in 2007. Prior to leading this international expansion, Glenn managed enterprise accounts as a distinguished member of Curvature’s U.S. sales organization beginning in 1996.
  • Data-Driven IT in Travel & Tourism: How to Maintain a Competitive Advantage
    Data-Driven IT in Travel & Tourism: How to Maintain a Competitive Advantage Tyson Supasatit, PMM at ExtraHop and Jon Randall, Senior Solutions Architect, EMEA at ExtraHop Recorded: Jun 20 2018 33 mins
    The tourism industry is a highly competitive space; be it for airline operators, hotel booking sites, or travel fare aggregators. It is an industry that has been heavily digitised and in which a 2% profit is considered a good year. In this environment, IT teams in travel & tourism are constantly being asked to provide better, more secure digital experiences at less cost. The key to greater efficiency and performances is visibility into complex IT environments, where a single business transaction could involve 30 different hops across Citrix, Sabre applications, and third-party API calls.


    In this webinar, we'll be looking at real-life examples of how IT teams can leverage enterprise-scale IT analytics backed by AI to:

    - Improve application performance in highly complex IT estates
    - Reveal suspicious activity on their network
    - Provide business intelligence for reducing costs and improving profitability
  • The Time for vCPE is NOW!
    The Time for vCPE is NOW! Eyal Aloni & Philip Jerichower, RAD Recorded: Jun 20 2018 43 mins
    White boxes may be general purpose, low-cost and easy to commoditize, but they lack many OAM functions and connectivity options that cannot always be virtualized, yet are still required by operators. In this webinar, we will explain how to bridge these gaps by supplementing universal CPEs (uCPEs) with universal access, enhanced performance monitoring and diagnostics, legacy TDM service support, and 1588 timing synchronization. We will also share typical use cases based on real-live experience of tier 1 operators using white boxes for virtualized business services today.

    Eyal Aloni Head of Service Provider Line of Business - RAD
    Philip Jerichower, Director of International Training, RAD
  • Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting
    Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Jun 20 2018 77 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Cyber-Espionage and Threat Hunting

    Our Verizon Threat Research Advisory Center presenters will be:
    •Chris Novak, Director, Investigative Response
    •Jihana Clemetson, Senior Analyst, Threat Intelligence
    •Marcus Cymerman, Senior Analyst, Network Forensics
    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas

    For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.

    Following the cyber-espionage insights, we'll cover the following topics:

    •Current Intelligence
    •Attacks & Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Parallel Wireless Public Safety LTE
    Parallel Wireless Public Safety LTE Zahid Ghadialy, David Cullerot and Amir Lugasi Recorded: Jun 20 2018 39 mins
    Public safety is moving from outdated communication systems to 4G LTE to meet the need for data in daily operations and emergency situations. However, public safety cannot move to public safety LTE with current commercial LTE architectures because commercial LTE has coverage gaps in areas that may not be commercially viable.

    Parallel Wireless Public Safety LTE communication solution provides a unified resilient LTE network for police, fire, ambulance, and armed forces in tactical operations, emergencies, and day-to-day communication – all at much lower cost. It can even be deployed instantly in ad hoc scenarios as a deployable/man portable solution!

    Please join us on June 20 at 9:00am EDT for a not-to-be-missed webinar where we will discuss our public safety LTE solution which has been installed in 25+ global military, police, and fire deployments and has been selected by a public safety LTE network in Europe.

    In this webinar, you will learn how Parallel Wireless innovative Public Safety LTE architecture addresses the needs of network control, coverage everywhere, and resilience while allowing graceful and cost-effective migration to LTE.
  • Does BYOD Mean Bring Your Own Dissatisfaction?
    Does BYOD Mean Bring Your Own Dissatisfaction? Mike Marks, Riverbed Product Evangelist Recorded: Jun 20 2018 41 mins
    Improve IT performance across all mobile devices and business-critical apps for complete end-user satisfaction.

    Your workforce is mobile. They need fast, reliable and secure access to corporate resources from their smartphones and tablets to be productive no matter where business takes them.

    Enabling a mobile workforce is a business necessity. But, BYOD and the ever-growing number and types of apps and devices complicate matters. While mobile workspaces provide some level of control, enterprises still struggle to deliver 5-star digital experiences to their mobile end users.

    Attend this webinar to:

    Explore key requirements for mobile application and end-user experience monitoring
    See a demo of how SteelCentral delivers real-time performance analytics from the user’s device to back-end infrastructure
    Move beyond access and control to actually measuring and improving end-user experience
  • Four IT Challenges of Software Development Teams & How to Manage Them
    Four IT Challenges of Software Development Teams & How to Manage Them Ofir Agasi, Director of Product Marketing, Cato Networks Recorded: Jun 20 2018 53 mins
    From India to Belarus, organizations are tapping software development talent in emerging markets. These developers often work outside of company offices, leading to four IT challenges that can undermine developer productivity, render cloud-based versioning systems and repositories unusable, complicate onboarding new developers, and increase risk.

    Learn from the experiences of three IT pros supporting distributed development teams, and how Cato Cloud solves those challenges.
  • Dell EMC PowerMax – Tier-0 хранилище на NVMe
    Dell EMC PowerMax – Tier-0 хранилище на NVMe Игорь Виноградов, старший системный инженер Dell EMC Recorded: Jun 20 2018 60 mins
    На вебинаре мы рассмотрим новую СХД от Dell EMC – PowerMax, объявленную на Dell Technologies World. Основное внимание будет уделено архитектурным особенностям PowerMax и выгоде, которую они дают, основным отличиям от предыдущих моделей СХД, а так же рассмотрены текущие тренды в хранении данных. Вебинар проводится при поддержке компании Intel®
  • What's the True ROI of SD-WAN vs MPLS?
    What's the True ROI of SD-WAN vs MPLS? Shamus McGillicuddy, EMA; Randy Taylor, GHD; Joshua Dobies, Riverbed Jun 26 2018 8:00 am UTC 60 mins
    Tired of all the SD-WAN hype? Ready to see real data on ROI, payback, and operational savings? In a new ROI study, Enterprise Management Associates (EMA) quantifies the business benefits of deploying Riverbed SD-WAN. It’s the data you need to build your business case for next-generation cloud networking.


    Join EMA, customer GHD, and Riverbed to learn:

    Key ROI contributors, including connectivity costs, CAPEX savings, and employee productivity gains
    TCO of SD-WAN vs traditional dual MPLS
    Actual ROI achieved at GHD
  • How to Build a Global Internet of Things (IoT) Application
    How to Build a Global Internet of Things (IoT) Application Evan Cummack and Mehdi Medjaoui Jun 26 2018 4:00 pm UTC 45 mins
    Everyone is excited about the vision and promise of IoT. In reality, it's prohibitively difficult for most of us to design, build, deploy and manage an IoT solution.

    When compared with software, IoT tools and platforms are fragmented, manufacturing costs are high, and iteration cycles are long. From a go-to-market and wireless connectivity perspective, it's difficult to build once and deploy globally.

    Once an IoT app is deployed, security vulnerabilities and monitoring challenges can quickly derail an entire project.

    ---
    *A Better Way to Build for IoT *

    2018 represents an inflection point for 'wide area' IoT connectivity, with operators around the world embracing 3GPP standards for low power IoT devices.

    IoT app developers can now take control of how their software connects around the world, from a central management location.

    Utilizing these tools along with a development process that emphasizes security, identity, and global coverage is the way to build a successful IoT app in 2018.

    Join Evan Cummack, Principal Product Manager at Twilio, for an immersive demonstration moderated by Mehdi Medjaoui, ReadWrite API expert and founder of the APIDays Conference.

    ---
    *What’s in it for you?*

    In this immersive webinar, you will learn:
    - How to decide on the best connectivity technology to use for your use case and for your businesses
    - How to ensure your app will connect in the countries you want it to connect in
    - How to route around provider outages or service disruptions before they ever impact your customers
  • Intent-based Networking. Is it real? Are you ready?
    Intent-based Networking. Is it real? Are you ready? Gary Kinghorn Jun 26 2018 4:00 pm UTC 30 mins
    Intent-based networking is generating interest as a next-generation method for automating network changes and validating network policies. What's really feasible today, what benefits does it offer and where can it be deployed? We will show how it can be used to verify network designs and configurations in a fraction of the time. And it's easily deployed today.
  • The Buzz Around Cognitive Computing in Energy & Utilities
    The Buzz Around Cognitive Computing in Energy & Utilities Jeffrey S. Katz Head of Grid Technology Energy, Environment and Utilities industry, IBM Jun 26 2018 4:00 pm UTC 60 mins
    Cognitive systems solve problems the way humans solve problems, by thinking, understanding, reasoning, reacting and interacting. Through simulation of human thought processes, the goal of cognitive computing is to create automated IT systems that are capable of solving problems without requiring human assistance.

    This webinar will explore the application of cognitive computing techniques within the energy sector: increasing the accuracy of outage predictions, optimizing uptime, and enabling customers to monitor and control their monthly energy consumption.
  • VMware Cloud on AWS
    VMware Cloud on AWS Mark Vaughn, Presidio and Samir Kadoo, AWS Jun 26 2018 5:00 pm UTC 60 mins
    In this upcoming webinar you will learn how VMware Cloud on AWS can help your organization simplify operations in a hybrid cloud environment. VMware Cloud on AWS seamlessly integrates VMware compute, storage, and network virtualization capabilities with the full breadth and depth of services and global infrastructure footprint of AWS.

    This offering enables your organization to seamlessly migrate and extend your on-premises VMware vSphere-based environments to AWS, so you can realize the value of a hybrid cloud environment.
  • Surgical Threat Mitigation: Sharpen Your Response
    Surgical Threat Mitigation: Sharpen Your Response Paul Roberts, Security Ledger & Brandon Dobrec, LookingGlass Cyber Solutions Jun 26 2018 5:00 pm UTC 60 mins
    Cyber threat intelligence – when properly gathered, refined, and applied – can help organizations identify business risks and target both protections and mitigations. But what distinguishes high-quality and actionable threat intelligence from low-quality security "noise"? How are cutting edge CISOs and IT security teams applying threat intelligence to respond to incidents and slam shut windows of compromise?

    Find out in this webinar moderated by Paul Roberts, the Editor in Chief at The Security Ledger. Paul will be joined by LookingGlass’ Brandon Dobrec, and an industry speaker. Together they will review the value of threat intelligence to organizations, discuss how cutting edge firms are using threat intelligence to their advantage, and review how to orchestrate threat intelligence to automate mitigation and combat third party risk.

    Tune in on Tuesday, June 26 @ 1PM ET!!
  • What and Where Were the Top IoT Cyber-Threats in 2017?
    What and Where Were the Top IoT Cyber-Threats in 2017? Xiaobing Sun, Principal Security Researcher Jun 26 2018 5:00 pm UTC 60 mins
    In the past few years, with the proliferation of IoT devices, IoT security becomes a hot topic. Earlier this year, researchers at NSFocus put together a “2017 Annual IoT Cybersecurity Report”, surveying the IoT landscape and the new threats from them. In this webinar, we will highlight the important findings and opinions in this report. Topics include:
    •Survey of the exposed IoT devices.
    •Various vulnerabilities in these IoT devices.
    •Threat analysis from these IoT devices.
    •How to protect the IoT devices.
  • Kubernetes Run-Time Security, an Example of Blocking an Application Attack
    Kubernetes Run-Time Security, an Example of Blocking an Application Attack Knox Anderson Jun 26 2018 5:00 pm UTC 30 mins
    Join us for an online demo of blocking an application attack in your Kubernetes cluster.
  • Architecture Matters: 7 Questions to Ask when Evaluating SD-WAN Solutions
    Architecture Matters: 7 Questions to Ask when Evaluating SD-WAN Solutions Jim Metzler, Analyst, Researcher and Founder at Ashton, Metzler & Associates Jun 26 2018 5:00 pm UTC 60 mins
    The SD-WAN market has been flooded with a range of vendors offering varying types of SD-WAN solutions. While having differing types of solutions provided by numerous suppliers is potentially beneficial, it also creates confusion that complicates the task of evaluating alternative SD-WAN solutions.

    Join us as Jim Metzler, analyst, researcher and founder at Ashton, Metzler & Associates, cuts through the confusion in the market by identifying seven key questions that network organizations should ask themselves as part of evaluating SD-WAN solutions.
  • Session 1: Automating security and compliance for hybrid environments
    Session 1: Automating security and compliance for hybrid environments Lucy Kerner, Global security technical strategist, evangelist, Red Hat Jun 26 2018 5:00 pm UTC 25 mins
    Visibility, control, security, governance, and compliance are paramount to your IT infrastructure.
    Those can be even more challenging in a hybrid infrastructure consisting of physical, virtual,
    cloud, and container environments. You can ease these challenges by automating security and
    compliance using a combination of Red Hat® CloudForms®, Red Hat Satellite, Red Hat Insights,
    Red Hat Ansible® Automation, and OpenSCAP. In this session, learn how to easily provision a
    security-compliant host, how to quickly detect and remediate security and compliance issues,
    how to ensure governance and control, how to do proactive security and automated risk
    management, how to perform audit scans and remediations on your systems, and how to
    automate security to ensure compliance against regulatory or custom profiles.
  • The Four Keys to Unlocking Application Identity for Security
    The Four Keys to Unlocking Application Identity for Security John O'Neil, Pete Nahas, Adam Sell Jun 26 2018 5:30 pm UTC 60 mins
    Join Edgewise Chief Data Scientist John O’Neil, Agent Developer Pete Nahas, and Director of Marketing Operations Adam Sell for a conversation on how to enable a zero trust project by establishing secure identities for applications in your cloud or data center.
  • Going the Distance: Innovative Ways to Extend Your Network
    Going the Distance: Innovative Ways to Extend Your Network Teresa Hoffman, Fiber Product Business Manager Jun 26 2018 6:00 pm UTC 30 mins
    According to the Cisco VNI forecast, global IP traffic is expected to nearly triple between the years 2015 and 2020. Advancements in wireless and A/V technologies are also driving up the demand for bandwidth. As buildings become more connected and more intelligent, the amount of data flowing through your network will continue to increase exponentially. Installing Cat 6A solves the bandwidth challenge in the horizontal. But what about the fiber backbone that needs to support all of those additional 10Gbps drops? And how about wireless access points or security cameras that you need to connect and power out in the parking garage that far exceed the 100 meter distance limitation? This 30-minute webinar will present several solutions for maintaining the reach you need for maximum performance while supporting an ever-increasing amount of bandwidth over your network.

    Attend this webinar if you want to learn about:
    - The evolution of the fiber backbone
    - Wireless requirements for up to 40G in new construction
    - The distances you can reach with different multimode fibers
    - A unique Berk-Tek solution for indoor/outdoor applications
  • Achieve Your Security Goals with Inline Prevention Tools
    Achieve Your Security Goals with Inline Prevention Tools Ian Farquhar, Distinguished Engineer, Security, Gigamon Jun 27 2018 4:00 am UTC 60 mins
    Inline security tools operate by actively preventing threats in your network, but deploying and optimizing these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade. The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges. Join Gigamon and (ISC)² on Jun 27, 2018 (Wed) at 12:00 noon (Singapore Time) to examine how inline bypass can overcome physical deployment obstacles, maximize network availability, increase the scale of inspection and reduce the impact to network performance.
  • Why Visibility is Key to GDPR
    Why Visibility is Key to GDPR Adrian Rowley, EMEA Technical Director at Gigamon Jun 27 2018 8:00 am UTC 45 mins
    The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.

    Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.

    In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:

    - Eliminate monitoring blind spots
    - Vastly improve the accuracy and precision of data risk detection
    - Help organisations meet the GDPR challenge

    About the Presenter

    Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
  • Legacy Modernisation: Overcoming the Transformation Barriers
    Legacy Modernisation: Overcoming the Transformation Barriers Simon Ratcliffe, Principal Consultant, Ensono, Kevin Stoodley, CTO, IBM Z Series, & Alex Hilton, CEO, CIF Jun 27 2018 12:00 pm UTC 60 mins
    A recent survey conducted by Ensono, in partnership with the Cloud Industry Forum, showed that 89% of respondents believed that legacy technology was a barrier to effective digital transformation. Given that many organisations operate a complex technology landscape often with elements in different locations, and with core components that are regarded as ‘legacy but critical’, there needs to be a clear and simple approach to overcoming these obstacles.

    Breaking down the barriers requires effective change in people, process and technology to attain a viable level velocity that will enable transformation without being held back by perceptions of legacy issues.

    Examining these issues, this webinar will provide insight and thought provoking approaches for organisations seeking to transform their operations against this backdrop.
  • [PORTUGUESE WEBINAR] Application Delivery Controllers em ambientes Multi-Cloud
    [PORTUGUESE WEBINAR] Application Delivery Controllers em ambientes Multi-Cloud Thiago de Lima, System Engineer Brazil at A10 Jun 27 2018 1:00 pm UTC 60 mins
    A grande maioria das empresas está acelerando sua migração para plataformas de software e virtualização. Globalmente, mais de 70% das empresas já estão usando ambientes híbridos para a distribuição de seu conteúdo e espera-se que mais da metade dos aplicativos sejam totalmente virtualizados até 2020. Essas mudanças impõem uma série de desafios para as empresas, sobre como gerenciar seu conteúdo em ambientes com várias nuvens e como otimizar a experiência de seus usuários e clientes.

    Neste webinar, a A10 Networks apresentará informações sobre o estado atual do setor de distribuição de aplicativos e conteúdo, bem como nossa visão sobre como implementar uma solução altamente eficiente e eficaz para o mercado empresarial.

    Agenda:
    * Situação do mercado de virtualização y multi-cloud para empresas
    * Desafios de migrar e operar um ambiente multi-cloud
    * Soluções A10 para automatizar a migração e operação de ambientes multi-cloud
  • [SPANISH WEBINAR] Application Delivery Controllers en ambientes Multi-Cloud
    [SPANISH WEBINAR] Application Delivery Controllers en ambientes Multi-Cloud Jose de Abreu, Manager, Systems Engineering at A10 Jun 27 2018 3:00 pm UTC 60 mins
    La gran mayoría de las empresas están acelerando su migración a plataformas de software y virtualización. A nivel global más del 70% de las empresas ya están usando ambientes híbridos para la distribución de su contenido y se espera que más de la mitad de aplicaciones sean completamente virtualizadas en 2020. Estos cambios imponen una serie de retos a las empresas, sobre cómo administrar su contenido en ambientes multi-cloud, y como optimizar la experiencia de sus usuarios y clientes.

    En este webinar A10 Networks presentara información sobre el estado actual de la industria de distribución de aplicaciones y contenido, así como también nuestra visión sobre cómo implementar una solución altamente eficiente y eficaz para el mercado empresarial.

    Agenda:
    * Estado del mercado de virtualización y multi-cloud para empresas
    * Retos de migrar y operar un ambiente multi-cloud
    * Soluciones de A10 para automatizar la migración y operación de ambientes multi-cloud
  • 5 Clear Signs You Need to Automate Network Security Operations
    5 Clear Signs You Need to Automate Network Security Operations Hadas Lahav, Senior Product Manager,Automation, Tufin and Karen Crowley, Sr. Product Marketing Manager, Tufin Jun 27 2018 3:00 pm UTC 60 mins
    Why automate? Why now? Automation is critical to digital transformation, essential for reducing the attack surface and mandatory to ensuring continuous compliance.

    Join this webinar “5 Clear Signs You Need to Automate Network Security Operations” on June 27 to learn:

    * How to securely speed up the network change process
    * Best practices to getting started with automation
    * Guidelines to meet the goal of Zero-Touch Automation

    We will review the use cases to begin automating network security operations and explain why it’s mandatory to focus on policy-based change automation.
    Register now!
  • The Benefit of Securing Industrial IoT Endpoints
    The Benefit of Securing Industrial IoT Endpoints Steve Hanna, Senior Principal, Infineon & Dean Weber, CTO, Mocana Jun 27 2018 4:00 pm UTC 60 mins
    The beginning of a security strategy starts at the end – securing your IoT endpoints. Endpoints are everywhere in the Industrial Internet of Things (IIoT) landscape. Without proper endpoint security, IIoT systems may put your organization or the greater public at increased risk. Plus, the viability of the IIoT depends on proper implementation of an endpoint security strategy to counter the growing and ever-changing threats.

    During this webinar, the editors of the Endpoint Security Best Practices Whitepaper will discuss this important document, customer use-cases, and the core components of a comprehensive, IIoT solution.
  • How to Drive Better SAP Performance with ABAP Visibility
    How to Drive Better SAP Performance with ABAP Visibility Jonah Kowall, VP Market Development and Insights, AppDynamics and Paul Urfi, Sr Sales Enablement, AppDynamics Jun 27 2018 4:00 pm UTC 45 mins
    When SAP performance suffers, business suffers. This industry-first solution offers ABAP code-level visibility and instrumentation, giving you real-time performance monitoring and diagnostics across mission-critical environments.

    See how AppDynamics for SAP can unify monitoring and deliver code-level visibility across your SAP environments. In this webinar, you will see a live demo of SAP performance monitoring and learn how AppDynamics:

    * Visualizes SAP components and dependencies in real time
    * Establishes dynamic baselines for key SAP transactions
    * Diagnoses SAP issues down to a single ABAP statement
    * Assists with cloud migrations and SAP S/4HANA transitions
  • Four Ways Network Traffic Analytics Can Supercharge Your SOC
    Four Ways Network Traffic Analytics Can Supercharge Your SOC Eric Ogren, Senior Analyst at 451 Research; Barbara Kay Sr. Director of Security Product Marketing at ExtraHop Jun 27 2018 5:00 pm UTC 60 mins
    The network doesn’t lie. That’s one reason companies are increasingly turning to their network to simplify and speed up common SOC workflows. Network Traffic Analytics (NTA) complements log data and endpoint instrumentation with an objective view of threat behavior on the network, and dramatically reduces the time to detect and respond to threats.

    In this webinar, you will learn how your peers are using NTA technology based on a new market research from 451 Research, as well as ExtraHop’s approach to NTA that goes beyond just detecting threats to also include automated investigation and robust forensics capabilities.
  • Boost your enterprises agility with a NGFW that offers flexibility and control
    Boost your enterprises agility with a NGFW that offers flexibility and control Simon Jones, Solution Director, Orange Cyberdefense & Ronen Shpirer, Security Solutions Architect, Fortinet Jun 28 2018 7:00 am UTC 30 mins
    Many organizations are surrounding themselves with many products in the security space and don’t know which way to turn - on top of the inordinate amount of time being eaten up in monitoring these products on a daily basis.

    Join this webinar and discover how you can:

    • Cope with today’s dynamic threat landscape and stop missing vulnerabilities
    • Avoid timely change request processes that slow up business agility
    • Maximize your budget by creating a level of service 100% tailored to the specific needs of you enterprise
    • Easily reduce the number of physical devices without compromising on user experience
    • Accelerate your journey towards GDPR compliance
  • Overcoming the Challenges of Architecting for the Cloud
    Overcoming the Challenges of Architecting for the Cloud Neels Scheepers - Sales Engineer Zscaler Jun 28 2018 10:00 am UTC 60 mins
    5 key requirements for securely routing branch traffic direct to the cloud

    The concept of backhauling traffic to a centralized datacenter worked when both users and applications resided there. But, the migration of applications from the data center to the cloud requires organizations to rethink their branch and network architectures. What is the best approach to manage costs, reduce risk, and deliver the best user experience for all your users?

    Join this webcast with Zscaler Sales Engineer, Neels Scheepers to uncover the five key requirements to overcome these challenges and securely route your branch traffic direct to the cloud.

    You will explore:

    - How cloud applications are driving branch and network transformation
    - Challenges of local breakouts and the hybrid branch
    - 5 key requirements for securely moving your branch workloads to the cloud
  • Four Dimensions of Performance Management Excellence for the Digital Era
    Four Dimensions of Performance Management Excellence for the Digital Era Edwin Yuen, ESG; Rich Hillebrecht, Riverbed CIO; Mason Coffman, Solutions Marketing Manager Jun 28 2018 1:00 pm UTC 60 mins
    Modern businesses are powered by an increasingly complex and distributed assortment of apps, networks, systems, and services. As a result, IT organizations need performance management expertise to maximize business performance and enable successful cloud-first and digital transformation strategies.


    What do you need to become a performance management expert?


    Find out by joining Riverbed and analyst firm Enterprise Strategy Group as we unveil some exciting new research, including a performance management maturity model that shows what behaviors contribute most to your success.

    Explore the four dimensions of performance management maturity.
    Hear from industry experts on best practices to advance your organization.
    Gain CIO-level insights on Riverbed's own cultural transformation.
    Learn how to assess your practices and receive actionable recommendations for improvement.
  • Boost your enterprises agility with a NGFW that offers flexibility and control
    Boost your enterprises agility with a NGFW that offers flexibility and control Simon Jones, Solution Director, Orange Cyberdefense & Ronen Shpirer, Security Solutions Architect, Fortinet Jun 28 2018 1:00 pm UTC 30 mins
    Many organizations are surrounding themselves with many products in the security space and don’t know which way to turn - on top of the inordinate amount of time being eaten up in monitoring these products on a daily basis.

    Join this webinar and discover how you can:

    • Cope with today’s dynamic threat landscape and stop missing vulnerabilities
    • Avoid timely change request processes that slow up business agility
    • Maximize your budget by creating a level of service 100% tailored to the specific needs of you enterprise
    • Easily reduce the number of physical devices without compromising on user experience
    • Accelerate your journey towards GDPR compliance