Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Year in Review: Financial Sector Threat Activity
    Year in Review: Financial Sector Threat Activity Candid Wueest, Threat Researcher, Symantec Security Response & Vikram Thakur, Researcher Security Response, Symantec Recorded: Jun 28 2017 61 mins
    Financial institutions are increasingly facing attacks on multiple fronts. Cyber criminals continue to target online banking using malware to hijack customer transactions and banking sessions.

    While there has been an overall drop in infections related to these consumer threats, financial institutions are now facing a new type of attack in the form of large-scale financial heists. Attack groups such as Fin7 and Lazarus are deliberately targeting financial institutions in audacious attacks that are reaping large rewards.

    In its annual review of the financial threat landscape Symantec takes a look at the most prevalent and significant financial threats.

    In the webcast we will review:

    -The top threats facing financial institutions

    -Explore the most common techniques employed in financial attacks

    -Provide case studies of the most high-profile financial attacks of the past 12 months

    Register today
  • SHA-1 Deprecation SHA-2 Deprecation
    SHA-1 Deprecation SHA-2 Deprecation Mark Giannotti Recorded: Jun 28 2017 59 mins
    Starting January 1, 2017, Chrome stopped supporting SHA-1 certificates. Now sites that have a SHA-1-based signature as part of the certificate chain (not including the self-signature on the root certificate) will trigger a fatal network error.

    Join us for a complimentary webinar to discuss how the deprecation of SHA-1 will affect your SSL enabled web sites.

    - Discuss the timing of the forthcoming updates to Google Chrome and the impact on certificates signed with SHA-1.
    - Discover which tools are available to identify certificates that are currently issued using SHA-1.
    - Learn how Certificate Authorities are helping SSL subscribers make the transition to SHA-2 signed certificates.
  • Advanced Threats - Why you still need to worry about email security
    Advanced Threats - Why you still need to worry about email security Ganesh Umapathy, Product Marketing Manager SonicWall Recorded: Jun 28 2017 42 mins
    Email-based communications are a fundamental cornerstone for effective business. That’s why email is a popular vector for sabotage across your network and a launch pad for malware – including ransomware and zero-day threats.

    This webcast discusses the current threat landscape and customer pain points, and examines how SonicWall Email Security – now integrated with Capture Advanced Threat Protection – delivers cloud-based, multi-engine sandbox protection for your email.
  • How a Reliable CA Can Help with the Certificate Lifecycle
    How a Reliable CA Can Help with the Certificate Lifecycle Mark Giannotti Recorded: Jun 28 2017 58 mins
    Managing your SSL certificates doesn’t have to be difficult. Join us for a complimentary webinar that covers, in-depth, how a reliable CA helps with the certificate lifecycle.

    - Learn the importance of selecting a reliable Certificate Authority for all your digital certificate needs.
    - Discuss what to look for when choosing your certificate provider.
    - Explore the components of a good certificate management solution and how it implements a Secure Service Lifecycle.
  • Digitalisierung voranbringen - Webinar 4: IT Monitoring, Analytics & Event Mgmt
    Digitalisierung voranbringen - Webinar 4: IT Monitoring, Analytics & Event Mgmt Klaus Holthaus, Technical Consultant, HPE Software Recorded: Jun 28 2017 56 mins
    Laut einer aktuellen Umfrage von Gartner haben 42% der CEOs mit der digitalen Transformation ihres Unternehmens begonnen *. Nach dem Thema Wachstum folgen IT-Themen auf Platz 2 der meist genannten Prioritäten. Damit ist klar, welchen Stellenwert die IT einnimmt, noch vor klassischen Themen wie Produktverbesserung oder Kundenservice. Für diese Transformation benötigen Unternehmen gut funktionierende IT-Organisationen und leistungsfähige IT-Infrastrukturen. Dafür bedarf es eines modernen IT Operations Management, das einfach, schnell und transformativ ist.

    In dieser kostenfreien Webinar-Reihe erörtern unsere Experten gemeinsam mit Ihnen, wie ein erfolgreiches IT Operations Management heute möglich ist und stellen Ihnen Lösungen von Hewlett Packard Enterprise (HPE) Software vor, mit denen Sie den Übergang gestalten können.

    Webinar 4: IT Monitoring, Analytics & Event Management
    Um die digitale Transformation zu gestalten und gleichzeitig die Kontinuität des laufenden IT-Betriebs sicherzustellen, ist ein konsolidiertes IT-Monitoring unabdingbar, welches sowohl die gegenwärtige IT als auch neue Technologien erfasst. Nur so kann der IT-Betrieb gewährleisten, dass die Transformation auch wirklich einen Mehrwert für das Unternehmen bringt.

    Erfahren Sie in diesem Webinar, wie Sie durch den zentralen Einsatz der HPE Operations Bridge den Zustand Ihrer gesamten IT-Umgebung serviceorientiert erfassen, korrelieren und analysieren können; unabhängig davon, ob Ihre IT-Services aus physischen oder virtuellen Plattformen bereitgestellt werden, aus der Cloud oder über Container. Damit können Sie sich auf die wirklich für Ihr Business relevanten Ereignisse in Ihrer IT konzentrieren. Mit der HPE Operations Bridge erzielen Sie automatisiert die Servicequalität, die das digitalisierte Business von Ihnen erwartet.
  • The Evolving Threat Landscape versus Advanced Threat Protection
    The Evolving Threat Landscape versus Advanced Threat Protection Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Jun 28 2017 40 mins
    As the most recent outbreak of ransomware has proven once again, a debilitating attack can come from anywhere, with any sort of malware, and have a global impact. While headlines and marketing statements constantly shout “Zero Day”, even old malware can be used effectively to wreak havoc in a network if it’s not properly configured and up to date.

    The threat landscape never stops evolving and neither should an enterprise’s cyber security strategy. New products, new features and efficient source of threat intelligence are just some of the tools that an enterprise should look for from their security vendors.

    This session will look at the evolution of Advanced Threat Protection and how continuous development across the full range of technologies is crucial to maintaining security efficacy.
  • The Dangers Within: 6 Hidden Signs of Cybersecurity Insider Threats
    The Dangers Within: 6 Hidden Signs of Cybersecurity Insider Threats Jon Piercey, SVP Security & Intelligence APAC, Nuix Recorded: Jun 28 2017 61 mins
    Threats from within the enterprise can pose the biggest cybersecurity risk to the organisation. Whether intentionally or accidentally, users with legitimate credentials can go about the network without triggering suspicion or alert, making their unauthorised activity difficult to detect. Insider threat activity can sometimes hide in plain sight, but what happens when people deliberately cover their tracks?

    In this webinar, you will learn:

    - Where to look for suspicious activity
    - How to set up traps that will catch malicious insiders
    - What finding paths across seemingly disparate data can reveal.

    According to a 2016 industry report, employees cause 77 percent of internal security breaches. Find out who is causing yours.

    Join Nuix’s and (ISC)² on Jun 28 (Wed) at 13:00 (Singapore time) and uncover the six hidden signs that help you detect the presence of insider threat activity.

    Presenter: Jon Piercey, SVP Security & Intelligence APAC, Nuix
    Moderator: Ir. Tejinder Singh, Senior Development Expert,T-Systems Malaysia SGA Security Engineering
  • How to Plan SD-WAN Migration
    How to Plan SD-WAN Migration Kangwarn Chinthammit, Director of Deployment Recorded: Jun 27 2017 40 mins
    SD-WAN brings a new set of WAN capabilities to the enterprise from the ability to leverage any type of transport to centralized policy control to the cloud-enabled architecture. SD-WAN has become a no-brainer for greenfield deployments. However,, most enterprise roll-outs are brownfield: companies do not want to rip and replace their existing network, instead they prefer to incrementally migrate their WAN to SD-WAN architecture. Hence, successful migration to SD-WAN requires thorough planning. In this webinar, you will learn:

    - Key considerations for developing a migration plan to SD-WAN (on-premise vs hosted controller, site survey, WAN transport, network services)

    - How to implement SD-WAN routing strategy

    - How to run acceptance test and plan for site cut-over
  • NSX Master Class: Networking from Physical to Virtual and Back Again!
    NSX Master Class: Networking from Physical to Virtual and Back Again! Neil Moore & Ron Fuller Recorded: Jun 27 2017 55 mins
    In this session, we will bring an NSX infrastructure online in a running physical environment – a powerful example of migrating to a virtual infrastructure with no downtime. We will discuss the linking of physical devices to the edge services gateway and configuring routing protocols on network devices and in the NSX environment. We will also explain why a clear knowledge of your ecosystem, from the physical switch on up, will help you better understand how the overlay and the underlay come together. This master class picks up after the software has been installed, at the point when you need to start securing and passing packets in your environment.

    This session will include:
    - A deep dive into setting up the physical and virtual network infrastructure.
    - Demos you can follow to get NSX quickly running in your environment.
  • Winning Strategies for Preparing MEF 2017 Award Submissions
    Winning Strategies for Preparing MEF 2017 Award Submissions Stan Hubbard, MEF17 Program Director, and Rosemary Cochran, Principal & Co-founder, Vertical Systems Group Recorded: Jun 27 2017 28 mins
    MEF's prestigious annual Awards Program, now in its 12th year, is the world's largest, longest-running awards program. It focuses on leadership in emerging Third Network services powered by LSO (Lifecycle Service Orchestration), NFV, SDN, and CE 2.0 networking technologies. The MEF 2017 Awards program recognizes service, application, technology, and professional excellence in the vibrant global Third Network community committed to delivering innovative solutions that are optimized for the digital economy and the hyper-connected world. The most advanced services typically provide an on-demand experience with user-directed control over service capabilities and are delivered over more automated, virtualized, and interconnected networks.

    This webinar that will help you identify the award categories in which your company excels. Attend and learn how to prepare an excellent award submission. We will cover:
    -MEF award categories and important dates
    -How to use the award submissions portal
    -Tips for writing concise, compelling submissions

    The deadline for submissions is September 13, 2017. Awards finalists will be announced on October 17, 2017.

    This is an excellent opportunity to have all of your questions answered and will help you to get one step closer to being an award winner.
  • 3 Reasons Network Security Policy Management is a Big Deal
    3 Reasons Network Security Policy Management is a Big Deal Ron Kehoe CISSP, CISA, CISM, GCIH Senior Solutions Engineer Recorded: Jun 27 2017 46 mins
    Network Security Policy Management (NSPM) provides high benefit for users according to the latest Gartner Hype Cycle for Infrastructure Protection.

    Join this webinar to see what all the hype is about and how NSPM can help your organization:

    - Resolve the complexity of firewall management
    - Gain visibility and control across the heterogeneous network
    - Achieve continuous compliance with security standards and regulations

    Ron Kehoe has over 30 years of experience in security solutions architecture and consulting, and was a network security manager at First Republic Bank prior to joining Tufin as a senior solutions engineer.
  • How to Deliver Optimized WAN Segmentation
    How to Deliver Optimized WAN Segmentation Ray Wong, Sr. Solutions Engineer, EMEA Recorded: Jun 27 2017 28 mins
    Network segmentation is essential when traffic from different customers and/or business entities must be isolated from each other. Full support for segmentation includes the isolation of management, control and data plane traffic.

    This webinar discusses:
    - Why Enterprise and Service Provider networks require segmentation
    - What is SD-WAN segmentation
    - How VeloCloud segmentation is implemented and optimized
  • Delivering Premium Monitoring Services for Modern IT Infrastructures
    Delivering Premium Monitoring Services for Modern IT Infrastructures Al Sadowski, Research VP, 451 Research; Ken Vanderweel, Service Provider Marketing, Umair Khan, Product Marketing, CA Tech Recorded: Jun 26 2017 64 mins
    Digital transformation requires innovation across the spectrum of how digital services are developed, supported and delivered. So, businesses are now adopting a wide range of new technologies including cloud, containers, analytics and hyper converged infrastructure. These create unique challenges for enterprises and offer growth opportunities for managed service providers.

    View this webcast to learn:
    * What Infrastructure technologies and trends are creating unique challenges for customers
    * How premium monitoring services can solve these challenges of managing modern IT infrastructure
    * The key ingredients of premium monitoring services
    * How to differentiate your services and boost profitability
  • Digitalisierung voranbringen - Webinar 3: Network Operations Management
    Digitalisierung voranbringen - Webinar 3: Network Operations Management Tobias Balfanz, Presales Consultant, HPE Software Recorded: Jun 26 2017 52 mins
    Laut einer aktuellen Umfrage von Gartner haben 42% der CEOs mit der digitalen Transformation ihres Unternehmens begonnen *. Nach dem Thema Wachstum folgen IT-Themen auf Platz 2 der meist genannten Prioritäten. Damit ist klar, welchen Stellenwert die IT einnimmt, noch vor klassischen Themen wie Produktverbesserung oder Kundenservice. Für diese Transformation benötigen Unternehmen gut funktionierende IT-Organisationen und leistungsfähige IT-Infrastrukturen. Dafür bedarf es eines modernen IT Operations Management, das einfach, schnell und transformativ ist.

    In dieser kostenfreien Webinar-Reihe erörtern unsere Experten gemeinsam mit Ihnen, wie ein erfolgreiches IT Operations Management heute möglich ist und stellen Ihnen Lösungen von Hewlett Packard Enterprise (HPE) Software vor, mit denen Sie den Übergang gestalten können.

    Webinar 3: Network Operations Management
    Auch an die Sicherheit und Leistungsfähigkeit von Netzwerken stellt die Digitalisierung hohe Anforderungen. Hierbei stehen neben dem Fehler- und Verfügbarkeitsmanagement ein kontinuierlicher Blick auf die richtige Konfiguration des Netzes im Fokus sowie die Einhaltung von fremden und eigenen Compliance-Richtlinien.

    Oft sind viele unterschiedliche Werkzeuge im Einsatz, die typischerweise nicht oder nur mangelhaft integriert sind. Die reibungslose Netzwerküberwachung im laufenden Betrieb scheitert, da die Pflege der isolierten bzw. nicht integrierten Systeme zu arbeitsintensiv ist. Informieren Sie sich in diesem Webinar über unsere integrative Netzwerkmanagement-Lösung, die die heutigen Netzwerkmanagement-Anforderungen abdeckt und die Arbeitsaufwände reduziert.
  • Lessons Learned using Ceph for Cloud Infrastructure
    Lessons Learned using Ceph for Cloud Infrastructure Daniel Messer, Storage Business & Philip Williams, Principal Architect, Rackspace Recorded: Jun 22 2017 67 mins
    No matter what level of modernization you are evaluating, any effort should start with a solid foundation. A standardized environment based on enterprise-ready, open-source operating system—Red Hat® Enterprise Linux®—and a hardware platform based on Intel ® is key to the modern data center.

    Learn how organizations like yours approached server consolidation projects and migrations from proprietary systems to Linux® to improve efficiency, and create a consistent foundation across current and cloud-future IT environments.
  • Mega Breaches: How To Mitigate Your Risks Using Data-Centric Security
    Mega Breaches: How To Mitigate Your Risks Using Data-Centric Security Heidi Shey - Senior Analyst at Forrester and Nico Popp - SVP Engineering, Information Protection at Symantec Recorded: Jun 22 2017 57 mins
    Keeping data safe pays dividends for protecting your reputation and retaining trust. No-one wants to suffer a breach, let alone a mega breach, but how should you invest time and resources to prevent this?

    In this webinar, guest speaker Heidi Shey (Senior Analyst at Forrester) will join Nico Popp (SVP Engineering, Information Protection at Symantec) as they guide you through the evolving world of data protection and explain how a holistic approach to data security and identity puts you back in control.

    Such a data centric approach combines data discovery, protection and identity and delivers two key benefits:

    •Ensures data is only available to the right users, irrespective of location (including cloud), organization or device

    •Provides protection throughout the data lifecycle

    The webcast will include a review of best practices to help you understand how a proactive, data-centric approach makes best use of your resources, and safeguards your – and your customers’ – critical data.
  • Automating Your Corporate Mobility Management
    Automating Your Corporate Mobility Management Michele Pelino, Principal Analyst at Forrester & Pallavi Vanacharla, Head of Prod. Mktg Mobility at Cisco Jasper Recorded: Jun 22 2017 55 mins
    The increasing mobile workforce is impacting corporate mobility management needs and costs.

    Speaker Michele Pelino, Principal Analyst at Forrester, will share Forrester’s research on how enterprises are addressing this challenge.

    Joining her will be Pallavi Vanacharla, product marketing at Cisco Jasper, will share how their new platform – Control Center for Mobile Enterprise - puts the control back in the hands of enterprise.

    What you’ll learn:
    *Real examples of mobility challenges faced by enterprise IT teams
    *Forrester data on the top mobility management tools and services in use today
    *How Cisco Jasper automates mobility management

    Presented by
    Michele Pelino, Principal Analyst at Forrester & Pallavi Vanacharla, Head of Prod. Mktg Mobility at Cisco Jasper
  • 10-Minutes to Cloud: How to Quickly Shift Big Data Processing
    10-Minutes to Cloud: How to Quickly Shift Big Data Processing Storage Switzerland, Avere Systems Recorded: Jun 22 2017 61 mins
    Enterprises aren't the only organizations that can benefit from big data. Medium and large businesses can too. The challenge is, can these businesses build the same big data infrastructure enterprises do? The short answer is, they can't. But the secret is, they don’t have to.

    In this webinar, join Storage Switzerland and Avere Systems as they show you how to shift large workload compute processing into the cloud in just 10 minutes. This quick onramp to unlimited cores can level the playing field and improve your ability to compete with the global giants.
  • LTE, SD-WAN & Network Trends
    LTE, SD-WAN & Network Trends Ian Pennell, Chief Marketing Officer, Cradlepoint Recorded: Jun 22 2017 32 mins
    Today, businesses and organizations of all sizes — and from all industries — are challenged to extend their networks to more people, places, and things than ever. It’s also clear that legacy WANs — predominately based on wired, hardware-defined, and resource-intensive infrastructures — can’t keep pace with the rapidly changing needs of today’s lean and agile connected enterprise.

    Join Cradlepoint’s Ian Pennell on June 22 for a live webinar about trends in enterprise WAN architectures. Learn what Cradlepoint’s recent State of the Network 2017 report revealed about LTE adoption, software-defined WAN, and more.
  • Clearing the Fog Around IoT Analytics
    Clearing the Fog Around IoT Analytics Jason Stamper, Data Platforms and Analytics Analyst, 451 Research Recorded: Jun 22 2017 38 mins
    In this webinar, Jason Stamper, analyst for Data Platforms and Analytics at 451 Research, will look at some of the latest trends that are being seen in IoT and specifically analytics at the edge of the network — in other words close to where the data is generated.

    He will also identify a number of data platform and analytics themes that are becoming more critical in the IoT era: security and data governance; infrastructure including edge analytics and server less computing; data processing; data integration and messaging.
  • 6 Hidden Security Risks for Industrial Environments
    6 Hidden Security Risks for Industrial Environments Rob Caldwell, ICS Manager, FireEye Recorded: Jun 22 2017 35 mins
    Industrial enterprises – like electric utilities, petroleum companies, and manufacturing organisations – invest heavily in industrial control systems (ICS) to operate industrial processes efficiently, reliably, and safely. Without technology operating the plant floor, business halts or worse.

    Join our webcast to discuss six key plant floor weaknesses that adversaries exploit to undermine plant operations. Subversive and difficult to detect, explore the implications and a step-by-step checklist for mitigating these risks firsthand with our experts.
  • Digitalisierung voranbringen - Webinar 2: Data Center Automation
    Digitalisierung voranbringen - Webinar 2: Data Center Automation Markus Knöfel, Presales Consultant, HPE Software Recorded: Jun 22 2017 39 mins
    Laut einer aktuellen Umfrage von Gartner haben 42% der CEOs mit der digitalen Transformation ihres Unternehmens begonnen *. Nach dem Thema Wachstum folgen IT-Themen auf Platz 2 der meist genannten Prioritäten. Damit ist klar, welchen Stellenwert die IT einnimmt, noch vor klassischen Themen wie Produktverbesserung oder Kundenservice. Für diese Transformation benötigen Unternehmen gut funktionierende IT-Organisationen und leistungsfähige IT-Infrastrukturen. Dafür bedarf es eines modernen IT Operations Management, das einfach, schnell und transformativ ist.

    In dieser kostenfreien Webinar-Reihe erörtern unsere Experten gemeinsam mit Ihnen, wie ein erfolgreiches IT Operations Management heute möglich ist und stellen Ihnen Lösungen von Hewlett Packard Enterprise (HPE) Software vor, mit denen Sie den Übergang gestalten können.

    Webinar 2: Data Center Automation
    Digitalisierung fordert Höchstleistung von den Rechenzentren. Dafür sind die Automatisierung und Orchestrierung das A und O. In diesem Webinar stellen wir Ihnen die Data Center Automation (DCA) Suite vor, HPEs Infrastrukturmanagement-Lösung, um Aufgaben zu automatisieren, IT-Prozesse zu orchestrieren, Compliance durchzusetzen und die Infrastruktur über virtuelle und physische Server-, Datenbank- und Middleware-Anwendungen zu optimieren.

    Dabei greifen wir u.a. folgende Themen auf: Trends, die das Infrastrukturmanagement prägen; Neuheiten wie Docker Engine Automation, Analytics und Container Delivery; Vorteile und Ausbaustufen der DCA Suite.
  • Enterprise Agile mit ALM Octane
    Enterprise Agile mit ALM Octane Andreas Widmann, Technical Consultant, HPE Software Recorded: Jun 22 2017 48 mins
    Unternehmen stehen heute vor der Herausforderung, dass Anwendungen nicht nur zuverlässig, performant und sicher sein, sondern sich auch schnell an veränderte Anforderungen des Marktes und des Business anpassen müssen. Nur so kann ein Unternehmen wettbewerbsfähig bleiben und ein stets positives Benutzerlebnis aufrecht erhalten. Für die IT heißt das: kurze Releasezyklen und ein schnelles Go-to-Market-Model.

    Um diesen Anforderungen gerecht zu werden, ist eine agile Software-Entwicklung für Unternehmen heute unumgänglich. Mit ALM Octane hat HPE gerade hierfür eine Lösung auf den Markt gebracht, die Continuous Integration, Continuous Testing, Continuous Delivery & DevOps-Szenarien unterstützt. ALM Octane integriert Projektmanagement-Funktionalitäten (SCRUM, Kanban), gängige Open Source- und wichtige Testmanagementwerkzeuge in einer einzigen Plattform. Damit steigt die Transparenz, die Durchgängigkeit wird erheblich verbessert und der Verwaltungsaufwand wird deutlich reduziert.

    Erleben Sie in diesem Webinar ALM Octane live!
    Am Beispiel eines fehlgeschlagenen Regressionstests zeigen wir Ihnen einen kompletten Prozess End-to-End. Erfahren Sie, wie man mit ALM Octane Fehler schnell eingrenzen, analysieren und beheben kann und sehen Sie, wie über Schnittstellen hinweg notwendige Informationen automatisch transportiert werden.
  • Is Hybrid AI SOC in Your Future?
    Is Hybrid AI SOC in Your Future? Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine Recorded: Jun 21 2017 31 mins
    Watch this webcast for an in-depth conversation about Hybrid AI and get clarification on the following:

    - Artificial Intelligence versus Hybrid AI
    - Hybrid AI when applied to a SOC
    - Incident response (human versus machine-driven)

    There will also be discussions around the following questions:

    - Can machines make decisions?
    - Can Hybrid AI systems operate autonomously?
    - What is missing in a SOC? How can Hybrid AI be added to a SOC?
    - Can Hybrid AI help alleviate staffing shortage?
  • Data Center Network Operations: Extensible Telemetry
    Data Center Network Operations: Extensible Telemetry Derick Winkworth Recorded: Jun 21 2017 58 mins
    Apstra Operating System (AOS) 1.2 marks a significant milestone for network operations. New operational tooling -- out-of-the-box as well as user-created in Python -- means network engineers will get more done while making fewer mistakes.

    Join us for this AOS demonstration.
  • Location Analytics: Use Cases for Improving Visualizations & Reports
    Location Analytics: Use Cases for Improving Visualizations & Reports Rick Styll, Product Management, SAS; AJ Rice, Alliance Manager, Esri Jun 29 2017 3:00 pm UTC 60 mins
    Nearly 70 percent of business data contains some level of location information. But business analysts rarely use this data within their BI and analytics workflows.

    Location analytics is more than just putting points on a map. It’s part of a much larger picture of using location to provide context in visualizations, reports and analytics. Utilizing geographic data in descriptive and predictive analytics helps companies discover new patterns, identify location-specific opportunities, and get a complete picture before making business decisions.

    In this webinar, Esri and SAS discuss the role that location analytics can play in determining practical next steps for your organization. A product demonstration will be shown as well.

    We’ll answer:
    • How does location analytics add value to BI and analytics initiatives?
    • What are the right uses for location analytics?
    • What pitfalls should organizations consider as they implement processes and technology for analyzing geographic data?
    • Are special skill sets required to use location information?
    • How can organizations best develop a strategy for using geographic data?
  • EIP: Construyendo el Camino a los Servicios de la Tercera Red
    EIP: Construyendo el Camino a los Servicios de la Tercera Red Emerson Moura - Distinguished Systems Engineer, Cisco & MEF CALA Marketing Co-chair Jun 29 2017 3:00 pm UTC 75 mins
    Carrier Ethernet es el combustible para la economía digital global y la base sobre la cual se construye nuevos servicios dinámicos, seguros y orquestados para el mundo hiper_conectado. Pero la falta de estandarización para interconectar proveedores y operadores de servicios Ethernet es un obstáculo para el crecimiento y la eficiencia del mercado. Actualmente, la mayoría de las interconexiones Ethernet son interconexiones de red a red (NNI) no estándar y personalizadas, lo que impide escalar el mercado. Más de una docena de proveedores de servicios y proveedores de tecnología miembros del MEF han participado en el proyecto MEF para crear Puntos de Interconexión Ethernet (Ethernet Interconnect Points o EIP) aprovechando los estándares existentes para interconexión CE. La primera fase del proyecto EIP involucró la creación de una Directriz de Implementación de Punto de Interconexión Ethernet que recomienda cómo usar las Interfaces Estándar de Red a Red (ENNIs) de forma eficaz. Esta guía inicial se enfoca en la configuración de servicios de acceso Ethernet (E-Access) de una manera simple, y las nuevas directrices avanzarán en complejidad con en el tiempo. Las directrices ayudarán a la industria a escalar rápidamente y reducir complejidad.

    Este webinar explorará dónde se dirige el mercado, las expectativas técnicas, los obstáculos operacionales que pueden surgir y la necesidad de que los operadores gestionen eficazmente la transición a medida que el mercado avanza hacia la estandarización. Este seminario apunta a aquellos proveedores de servicios que compran servicios de Ethernet mayoristas de operadorese interconectan sus redes para crear servicios CE minoristas de extremo a extremo pasando por múltiples redes. También se compartirá informaciones que pueden ser importantes para la toma de decisiones mientras desarrolla su estrategia de cómo sacar total provecho de interconexiones Ethernet estandarizadas.
  • IoT Tests and Trends: Key Findings from the Threat Lab
    IoT Tests and Trends: Key Findings from the Threat Lab Marc Laliberte, Information Security Threat Analyst, and Ben Brobak, Technical Product Manager Jun 29 2017 4:00 pm UTC 60 mins
    With everything from children’s toys to thermostats connecting to the Internet, it should come as no surprise that the average home has no less than seven IoT devices in use every day. But as pressure grows to release new products faster and faster, we’re all left to wonder: is security really a priority? Needing an answer, WatchGuard’s Threat Lab launched an ongoing project to test some of these connected devices and determine for ourselves how secure they really are.

    Join Marc Laliberte, information security threat analyst, and Ben Brobak, technical product manager, on June 29 as they analyze the surprising results of this project and share their best tips for defense.
  • Power your Oracle Database and Business Applications Without Licensing Issues
    Power your Oracle Database and Business Applications Without Licensing Issues Alex Infanzon, Application Solution Manager, Pure Storage Dean Bolton, President at VLSS LLC Jun 29 2017 5:00 pm UTC 60 mins
    How can a better storage infrastructure accelerate time to discovery for genomics research?

    Join IDC research directors Dr. Alan Louie and Eric Burgener for an informative session as they discuss the life sciences research landscape and its key processes and requirements. They will share information about how today's data-intensive genomics workflows require high throughput and bandwidth to handle massive data sets in near real time. Brian Schwarz from Pure Storage will also share details about how a purpose-built "big data flash" scale-out NAS platform like FlashBlade can help research teams accelerate time to discovery.

    Tune into the conversation to learn:

    - Why the convergence of data storage and life sciences research go hand-in-hand
    - Technologies and best practice methodologies for genomic analysis, including containers and workflows
    - How to handle massive big data sets in real time
  • Part 2: Future of SIEM—Sniff Out Malware & Spear-Phishing w/Behavioral Analytics
    Part 2: Future of SIEM—Sniff Out Malware & Spear-Phishing w/Behavioral Analytics Orion Cassetto, Sr. Product Marketing Manager, Exabeam. Anne Saita (Moderator) Jun 29 2017 5:00 pm UTC 75 mins
    Malware and spear-phishing continue to cause the most headaches for IT security teams. Over the years, attackers have become more sophisticated and SIEM systems have failed to keep up. Key indicators of emerging threats include lateral movement, where the attacker silently attempts to access multiple servers on the network, and account management, where the attacker escalates privilege or creates new privileged accounts. Detection of advanced threats like these require real time analytics and the ability to find signals within the very noisy security environment. Join Exabeam and (ISC)² on June 29, 2017 at 1:00PM Eastern to learn how user behavior analytics automatically analyzes and scores activity for escalated risk allowing for quick attack detection.
  • Advanced Threat Protection for Messaging Gateway
    Advanced Threat Protection for Messaging Gateway Zachary Sivertson, Director Content & Malware Analysis, Symantec & Tobias Pischl, Product Manager, Email Security, Symantec Jun 29 2017 5:00 pm UTC 60 mins
    Symantec has just released new advanced threat protection capabilities for Messaging Gateway 10.6 based on integration with Symantec’s Content & Malware Analysis platform. This new advanced threat defense option for Messaging Gateway provides offloading of messages to Content & Malware Analysis for further inspection and comprehensive malware detonation.

    Join Symantec product managers from Messaging Gateway and Content & Malware Analysis to see demos of this integration in action, and learn more about how this solution addresses today’s latest advanced threats through:

    •Advanced scanning and sandboxing to detect and block malicious files and URLs
    •In-depth threat analysis and summary dashboard-level visibility
    •Threat correlation analysis across Symantec Endpoint Protection, Proxy SG and Messaging Gateway

    Don't miss this great opportunity to speak with the product experts of this combined solution and get your questions answered!
  • Success Factors in Threat Intelligence: Part 2 - Starting a Program
    Success Factors in Threat Intelligence: Part 2 - Starting a Program Allan Thomson, Chief Technical Officer Jun 29 2017 6:00 pm UTC 45 mins
    This series describes a comprehensive “business technical approach” to the justification, definition, design and execution of Threat Intelligence Programs.

    What do we mean by “business technical approach’ to Threat Intelligence?

    Much in the industry is focused solely on one technical aspect or another of threat intelligence data that indicates information about a specific malware family, a set of indicators that can be used to block malicious sites, campaign information that highlights a threat actors profile, their tactic, techniques and procedures. But much of the technically focused content do not discuss how organizations can gather or construct that information themselves, and even more so, how an organization would organize themselves to respond to such data. Much of the output of the industry is providing the fish to organizations rather than teaching the organizations how to fish themselves.

    A ‘business technical approach’ is one where we define an approach focused on the business needs, the organization personnel, organizational roles & responsibilities, team structure and those elements’ interaction with technology to address the challenge of successful threat intelligence operations. Our goal is to help organizations build effective Threat Intelligence programs.

    In Part 1 of the CSO Series we introduced the key business and technical requirements of TI programs. In Part 2 webinar we will examine some important definitions to consider in TI and how to start building the program based on the requirements identified in Part 1 of the series. We will introduce to the audience the overall vision of the TI program execution, doing gap analysis on existing security programs and identifying where the TI program can complement and enhance existing investments.
  • Red Hat and Microsoft: Partnering to bring Enterprise Customers to the Cloud
    Red Hat and Microsoft: Partnering to bring Enterprise Customers to the Cloud Carl Lehmann - 451 Research Principal Analyst, Margaret Dawson - Red Hat, Jose Miguel Parrella - Microsoft Jun 29 2017 6:00 pm UTC 60 mins
    Join our webinar on the capabilities enabled between Microsoft and Red Hat, and how their IT ecosystems support and complement each other.

    For years Windows and Linux have been rival development and runtime environments used by two distinct development communities – .Net vs. J2EE. At least that’s what we thought. In fact, they are not rivals at all, really. Rather, they are both commonly used by nearly all enterprises to develop and execute the applications they need to run their businesses.

    Today, those applications are being modernized, containerized and redeployed across multiple clouds. Business and IT planners alike are rethinking how to develop new cloud-native applications and the infrastructure needed to deploy them to their best execution venue whether on-premises, in or across private, public or hybrid clouds. They expect the IT vendors and service providers they use to do more than just coexist. They expect partnerships dedicated to customer success – and none more so than among the two leading vendors in each community, Microsoft and Red Hat.

    In this webinar 451 Research Principal Analyst Carl Lehmann, Margaret Dawson, Global Product Marketing Manager at Red Hat
    and Jose Miguel Parrella,Sr Product Marketing Manager for Open Source at Microsoft will address:
    •How to overcome common challenges of application modernization, infrastructure management, and cloud deployment.
    •The partnership, and capabilities enabled therein, between Microsoft and Red Hat.
    •How Microsoft Azure and Red Hat ecosystems support and complement each other.

    Participants will learn how Microsoft and Red Hat build upon each other’s strengths in container-based, cloud-native application development, infrastructure deployment and operations to better serve their mutual customers through joint business practices, technology support, and ecosystem.
  • “NotPetya” Ransomware Webcast – from SecureWorks® Threat Intelligence
    “NotPetya” Ransomware Webcast – from SecureWorks® Threat Intelligence Aaron Shelmire and Mike McLellan, Security Researchers, Counter Threat Unit Jun 30 2017 6:00 pm UTC 60 mins
    SecureWorks Counter Threat Unit™ (CTU) researchers will discuss details of the “NotPetya” Ransomware attack. Our experts will discuss this and similar attacks, help organizations explain the importance of avoiding malicious attempts and discuss the value of recommended mitigation tactics.

    In this webcast we will discuss:
    • History and timeline of this attack and how it began
    • What is this ransomware, how is it different from others and how it operates
    • Why this is not Petya or Goldeneye
    • How to be vigilant of misinformation
    • SecureWorks recommended actions to protect yourself
    • Interactive Q&A session
  • Digitalisierung voranbringen - Webinar 5: IT Service Management Automation
    Digitalisierung voranbringen - Webinar 5: IT Service Management Automation Robert Kreher, Business Development Manager, HPE Software Jul 3 2017 12:00 pm UTC 60 mins
    Laut einer aktuellen Umfrage von Gartner haben 42% der CEOs mit der digitalen Transformation ihres Unternehmens begonnen *. Nach dem Thema Wachstum folgen IT-Themen auf Platz 2 der meist genannten Prioritäten. Damit ist klar, welchen Stellenwert die IT einnimmt, noch vor klassischen Themen wie Produktverbesserung oder Kundenservice. Für diese Transformation benötigen Unternehmen gut funktionierende IT-Organisationen und leistungsfähige IT-Infrastrukturen. Dafür bedarf es eines modernen IT Operations Management, das einfach, schnell und transformativ ist.

    In dieser kostenfreien Webinar-Reihe erörtern unsere Experten gemeinsam mit Ihnen, wie ein erfolgreiches IT Operations Management heute möglich ist und stellen Ihnen Lösungen von Hewlett Packard Enterprise (HPE) Software vor, mit denen Sie den Übergang gestalten können.

    Webinar 5: IT Service Management Automation
    Auch vor dem Service Management macht die Digitalisierung nicht Halt. Die Interaktion zwischen dem Endanwender und dem Help Desk soll möglichst modern, interaktiv, transparent und mobil sein. Statt vieler unterschiedlicher Systeme und Kataloge wünschen sich die Anwender ein zentrales, interaktives Portal, über das man alle Anfragen einsteuern kann.

    Informieren Sie sich in diesem Webinar über die IT Service Management Automation Suite, die ein zeitgemäßes Service Lifecycle Management auf der Basis von ITIL Best Practices bietet. Ein besonderer Fokus wird auf der intuitiven Benutzerführung über das Service Portal liegen. Darüber hinaus werden wir zeigen, wie durch die intelligente Nutzung von Big Data Prozessabläufe verschlankt und beschleunigt werden können. Schließlich werden wir ein Augenmerk auf die chatbasierte Interaktion der Service Desk-Mitarbeiter mit der dahinterliegenden IT-Infrastruktur (ChatOps) richten.
  • Building a simpler, more intelligent WAN for the Hybrid Cloud era
    Building a simpler, more intelligent WAN for the Hybrid Cloud era Marc Jones & Jonny Malcolm of WhiteSpider Jul 4 2017 12:00 pm UTC 45 mins
    Enterprises can simplify the move to a Hybrid Cloud infrastructure with SD-WAN, building a secure, unified connectivity over any transport with simplified operations, centralised management, policy control and application visibility across the enterprise.
  • Think small with Optimised Internet
    Think small with Optimised Internet Hoo Shu Yee, Singtel Sr. Product Director and Nick Hawkins, Akamai Sr. Director Product Management Jul 5 2017 6:00 am UTC 60 mins
    Internet is a convenient, cost-efficient means to connect your branch offices and to access public cloud applications. It is also an integral part of any enterprise’s hybrid WAN architecture. However, its unreliable and unpredictable performance may hamper employee productivity.

    Join us in this webinar to learn about:
    • Some of the challenges enterprises face with Internet connectivity
    • How Internet connectivity can be optimised to improve branch offices’ connectivity and to access cloud applications

    So, think small, because a branch office could bring you closer to market domination when it is well connected to the rest of the world by reliable, business-grade Internet.
  • Digitalisierung voranbringen - Webinar 6: Hybrid Cloud Management
    Digitalisierung voranbringen - Webinar 6: Hybrid Cloud Management Markus Knöfel, Presales Consultant, HPE Software Jul 5 2017 12:00 pm UTC 60 mins
    Laut einer aktuellen Umfrage von Gartner haben 42% der CEOs mit der digitalen Transformation ihres Unternehmens begonnen *. Nach dem Thema Wachstum folgen IT-Themen auf Platz 2 der meist genannten Prioritäten. Damit ist klar, welchen Stellenwert die IT einnimmt, noch vor klassischen Themen wie Produktverbesserung oder Kundenservice. Für diese Transformation benötigen Unternehmen gut funktionierende IT-Organisationen und leistungsfähige IT-Infrastrukturen. Dafür bedarf es eines modernen IT Operations Management, das einfach, schnell und transformativ ist.

    In dieser kostenfreien Webinar-Reihe erörtern unsere Experten gemeinsam mit Ihnen, wie ein erfolgreiches IT Operations Management heute möglich ist und stellen Ihnen Lösungen von Hewlett Packard Enterprise (HPE) Software vor, mit denen Sie den Übergang gestalten können.

    Webinar 6: Hybrid Cloud Management
    Eine zentrale Rolle bei der Digitalisierung spielt natürlich das Thema Cloud. Es gibt eine Vielzahl von Management-Plattformen, die vorgeben, die damit einhergehende Komplexität zu beherrschen und die Transparenz zu erhöhen. Sie tun dies aber immer nur für die Cloud-Umgebung.

    In diesem Webinar stellen wir Ihnen die Hybrid Cloud Management-Lösung von HPE Software vor – unsere Cloud-Management-Plattform, über die traditionelle, Hybrid Cloud-, Open Source- und Cloud-native Liefermodelle in einer Vielzahl von Infrastrukturumgebungen bereitgestellt und verwaltet werden können. Wir greifen u.a. folgende Themen auf: welche Cloud für welche Anforderungen; Cloud-agnostische Service Designs; nativer Container Support; Kontrolle und Orchestrierung; Vorteile und Ausbaustufen der Lösung.
  • Transitioning Load Balancing to the Cloud
    Transitioning Load Balancing to the Cloud Ethan Banks, Co-Founder, Packet Pushers, Chiradeep Vittal, Distinguished Engineer, Citrix & Derek Yee, Sr. Product Mgr,Citrix Jul 5 2017 3:00 pm UTC 75 mins
    ADCs have largely become commoditized, and the services they provide are fairly indistinguishable from the sea of competitors on the market today. With many data center architects faced with modernizing their infrastructure, what are the considerations when transitioning applications to new automation frameworks and topologies in the cloud?
    This webinar will focus on key challenges faced by the enterprise when transitioning their load balancers to the cloud.

    What you will learn:

    •The shift to cloud native, software and service-based offerings
    •Support for new application architectures
    •Operational complexities and scale at production
    •Flexibility and support for hybrid topologies in transition
  • How To Document IT Infrastructure
    How To Document IT Infrastructure David Cuthbertson Jul 6 2017 12:00 pm UTC 45 mins
    Many organisations would like more complete and accurate IT systems documentation, but cannot find a way around their current methods such as multiple isolated spreadsheets and diagrams. Our webinar will cover techniques to reduce workload and improve consistency for IT infrastructure technologies such as networks, servers, applications, data centres, cabling, etc. The larger the infrastructure the greater the benefits of our
  • The Top Six Things You Might Not Know About SD-WANs
    The Top Six Things You Might Not Know About SD-WANs Shoaib Yusuf, Technical Marketing Engineer, NetScaler SD-WAN & Donna Johnson, Director of Product Marketing, Citrix Jul 6 2017 1:00 pm UTC 60 mins
    Are your bandwidth demands growing faster than your telecom budget? Are you one of the 51% of enterprises looking at Hybrid WAN technology to reduce network costs? Is your communication increasingly digital as your business grows more distributed? Is the use of cloud and SaaS application changing your usual network traffic and putting more importance on last mile connectivity?

    If so, you are probably considering SD-WAN, a new network technology that is changing how companies approach wide area networks and cloud access networks. In fact, Gartner expects 30% of all enterprises to deploy SD-WAN by 2019 as it can help your network cope with many of the stresses that are common today, from increased security concerns to the demands of mobile workers to the spike in bandwidth demand from video.

    But as you look at SD-WAN, there might be more to the technology than is first apparent. It¹s no longer just about making Hybrid WANs enterprise class and lowering telecom spend. The SD-WAN technology has evolved and you might be surprised at how it can help your network.

    Join Citrix as we present some interesting use cases of SD-WAN and explore how some of our customers have used Citrix NetScaler SD-WAN to solve their network challenges. After attending this webinar, you¹ll understand how SD-WAN can:

    • Simplify your network and help reduce appliance bloat
    • Improve your security profile and help with risk and compliance
    • Extend visibility to the cloud while improving the user experience with SaaS application
  • Embracing Enterprise Digital Transformation
    Embracing Enterprise Digital Transformation Derek Yee Sr. Product Marketing Manager, Citrix & Dave Potter, Principal Technical Marketing Engineer, Citrix Jul 6 2017 4:00 pm UTC 60 mins
    Digital transformation in the enterprise began with the rise of BYOD, mobility and work shifting. In recent years, a new focus on building direct to consumer apps to increase revenue has placed greater pressure on traditional IT operations to support aggressive release cycles. Developers are emerging as IT’s most demanding internal customers, and IT needs to adapt to be in alignment with the business’ objectives. 

    Join this webinar to understand how you can leverage your existing knowledge, infrastructure and skill sets to enable IT transformation in the digital enterprise.

    • Key tenants of agile development practices and objectives
    • Leveraging services delivered by Citrix NetScaler for developers
    • Self-service administration for configuring NetScaler policies with NetScaler MAS
    • How NetScaler services can be integrated with common automation and orchestration frameworks like Mesos and Marathon
  • Everything You Wanted To Know About Storage: Programming & Networking Had a Baby
    Everything You Wanted To Know About Storage: Programming & Networking Had a Baby Rob Peglar, Symbolic IO, J Metz, Cisco, Alex McDonald, NetApp, Dror Goldenberg, Mellanox Jul 6 2017 5:00 pm UTC 75 mins
    In this, the sixth entry in the “Everything You Wanted To Know About Storage But Were Too Proud To Ask,” popular webcast series we look into some of the nitties and the gritties of storage details that are often assumed.

    When looking at data from the lens of an application, host, or operating system, it’s easy to forget that there are several layers of abstraction underneath before the actual placement of data occurs. In this webcast we are going to scratch beyond the first layer to understand some of the basic taxonomies of these layers.

    In this webcast we will show you more about the following:

    •Storage APIs and POSIX
    •Block, File, and Object storage
    •Byte Addressable and Logical Block Addressing
    •Log Structures and Journaling Systems

    It’s an ambitious project, but these terms and concepts are at the heart of where compute, networking and storage intersect. Having a good grasp of these concepts ties in with which type of storage networking to use, and how data is actually stored behind the scenes.

    Join us on July 6th for this session. We look forward to seeing you there!
  • Results are in: How to Handle Massive Big Data Sets in Real-Time
    Results are in: How to Handle Massive Big Data Sets in Real-Time Alan S. Louie, Research Dir., Eric Burgener, Research Dir., DC Health Insights, Brian Schwarz, VP of Product, Pure Storage Jul 6 2017 5:00 pm UTC 60 mins
    Join IDC Research Directors Dr. Alan Louie and Eric Burgener for an informative session as they discuss the life sciences research landscape and its key processes and requirements.
    They will share information about how today's data-intensive genomics workflows require high throughput and bandwidth to handle massive data sets in near real-time. Joined by Brian Schwarz from Pure Storage, he will take a technical deep dive into how a purpose-built "big data flash" scale-out NAS (network attached storage) platform like FlashBlade can help research teams accelerate time to discovery.

    Join us for this informative session where health IT, life sciences research, biotech, data and storage interest at the IT crossroad.
  • Research Findings: Quantifying ROI for Application Security
    Research Findings: Quantifying ROI for Application Security Shelly Yao, Security Architect – South East Asia, Hewlett-Packard Enterprise Jul 12 2017 5:00 am UTC 45 mins
    Continuous delivery of application is the new norm. Businesses recognize that applications are a competitive differentiator so they are creating and pushing them out at a lightning pace, thus putting a lot of pressure on development and security teams. HPE Enterprise Security, together with Mainstay Partners, studied data collected from a broad set of Fortify customers to quantify the business value they are experiencing by building security into each phase of development.

    Join HPE and (ISC)² on July 12 (Wed) at 13:00 (Singapore time) to learn about the key findings from the research. Discover the ROI of application security practices for your organization to scale confidently for business growth.
  • The Network: Sherpa for the Growing IT Enterprise
    The Network: Sherpa for the Growing IT Enterprise ExtraHop Jul 12 2017 5:00 pm UTC 60 mins
    IT environments are becoming larger and more complex through organic growth as well as acquisition. Accompanying initiatives—like datacenter migrations, for example—are expensive. Done well, these moves cost $1,200 to $6,000 per server. But when things go wrong? A poorly optimized load balancer could mean downtime for critical application servers – a price that could skyrocket to more than $25,000 per server.

    What if IT teams could be guided through the process? What if they had a way to map the plan and troubleshoot issues before they became outages?

    In this webinar, we'll share a story from an ExtraHop customer who underwent a large datacenter migration after it acquired a new business. Not only did their IT team undergo a successful migration, they also decreased troubleshooting time and cost to the company by 85 percent – freeing them to move beyond reactive firefighting to proactive solution building for the business.

    Join us to learn how they did it.
  • Success Factors in Threat Intelligence: Part 3 - Key Elements
    Success Factors in Threat Intelligence: Part 3 - Key Elements Allan Thomson, Chief Technical Officer Jul 12 2017 6:00 pm UTC 45 mins
    This series describes a comprehensive “business technical approach” to the justification, definition, design and execution of Threat Intelligence Programs.

    What do we mean by “business technical approach’ to Threat Intelligence?

    Much in the industry is focused solely on one technical aspect or another of threat intelligence data that indicates information about a specific malware family, a set of indicators that can be used to block malicious sites, campaign information that highlights a threat actors profile, their tactic, techniques and procedures. But much of the technically focused content do not discuss how organizations can gather or construct that information themselves, and even more so, how an organization would organize themselves to respond to such data. Much of the output of the industry is providing the fish to organizations rather than teaching the organizations how to fish themselves.

    A ‘business technical approach’ is one where we define an approach focused on the business needs, the organization personnel, organizational roles & responsibilities, team structure and those elements’ interaction with technology to address the challenge of successful threat intelligence operations. Our goal is to help organizations build effective Threat Intelligence programs.

    With Part 2, we introduced the overall vision of a successful TI Program. In this webinar, we dig into the key elements of the TI program with concrete examples, and key components of the program that must exist including the right team, process, tools, metrics and connections.
  • NSX Master Class: Load Balancing and NFV for your Software-Defined Data Center
    NSX Master Class: Load Balancing and NFV for your Software-Defined Data Center Geoff Shukin & Ron Fuller Jul 13 2017 3:00 pm UTC 60 mins
    You are probably using NSX for its micro-segmentation and network virtualization features, but did you know that NSX also includes an extremely robust and flexible load balancer that’s perfect for use in your software-defined data center (SDDC)? In this master class, we will review load balancing and provide demonstrations and ideas to help you get started with the NSX Load Balancer.

    We will cover:
    - Use cases for load balancing
    - Layer 4 and Layer 7
    - Encryption
    - Management and operations of the NSX Load Balancer
    - How NSX Load Balancer fits into the larger ecosystem of partners

    Demonstrations include:
    - Setting up Layer 4 or network load balancing
    - Setting up Layer 7 or application load balancing
    - Dealing with encryption
  • Distributed NFV – Moving from the PoC into the Real Environment for Deployment
    Distributed NFV – Moving from the PoC into the Real Environment for Deployment Sven Freudenfeld, Director Business Development Telecom Application Business Unit Jul 13 2017 3:00 pm UTC 60 mins
    Deploying vNF’s in a controlled environment can be simple and without downtime. Moving it towards a Distributed NFV environment in a real deployment scenario can be potentially a challenge on how to manage the actual rollout for vCPE’s and SD-WAN solution. We will look on how this can be addressed.