Hi [[ session.user.profile.firstName ]]

Virtualization

  • Making the shift to unified endpoint management for workforce agility
    Making the shift to unified endpoint management for workforce agility
    Suzanne Dickson, Senior Director, Product Marketing, Citrix and Frank Srp, Senior Manager, Technical Marketing, Citrix Recorded: May 23 2019 62 mins
    Increasingly, more companies have recognized that unified endpoint management (UEM) is a critical component of their overall digital transformation as UEM allows for greater workforce agility.

    By managing all your users, devices, apps, and data from a single platform, Citrix helps you maximize user and IT productivity while helping to secure your information and reduce costs.

    In this webinar, you will learn how to:
    - Modernize Windows 10 management
    - Manage Windows 7, Windows 10, iOS, Android, ChromeOS, macOS and iOT endpoints from a single platform
    - Simplify and improve users’ onboarding experience
    - Provide users a consistent, secure approach to access all their apps (virtual, mobile, web, SaaS, native Windows) and data regardless of the device, network or location
    Leverage user-centric analytics that correlates device, application, network and data access information to proactively prevent security threats


    Suzanne Dickson, Senior Director, Product Marketing, Citrix
    Frank Srp, Senior Manager, Technical Marketing, Citrix
  • 5 Reasons to Take a Multi-Cloud Approach to File Storage
    5 Reasons to Take a Multi-Cloud Approach to File Storage
    Andy Hardy, VP of EMEA at Nasuni | Anne Blanchard, Sr. Dir of Product Marketing at Nasuni Recorded: May 23 2019 18 mins
    In this video webinar, we take a look at the 5 reasons why large enterprises need a multi-cloud file infrastructure. GDPR, data sovereignty, regional cloud strategies, and the need for global productivity are driving enterprises to think more broadly about where and how they store and share files. With these changing requirements, taking a multi-cloud approach to file storage is becoming an integral part of an organization's cloud-first initiative.

    Tune in and learn:

    - Why file solutions offered by object storage vendors are not meeting the challenge
    - How GDPR is impacting the requirement for multi-cloud
    - How moving to a multi-cloud solution can increase overall productivity
  • Enable the Edge:  Orchestration and Automation for Edge Computing
    Enable the Edge: Orchestration and Automation for Edge Computing
    David Carrera, Scientific Director, NearbyComputing Recorded: May 23 2019 57 mins
    Industry is seeking simple mechanisms to unleash the potential of Internet of Things (IoT) and 5G at the core of their business operations. This necessarily implicates the use of Edge Computing technologies, which are needed in several key industrial use cases. But even though the emergence of the Edge Computing revolution is imminent, the move toward new edge computing solutions is today limited by the following critical problems: 1) key companies of the industry will NOT engage in an entire transformation or evolution of their IT core systems until new advanced mechanisms are developed} to provide them with a tight control of OPEX; and 2) the current business models do not foresee the additional revenue required to cover the vast expense of deploying edge computing solutions at scale, and therefore there is a need for innovative tools and platforms provide transparent management of the increased heterogeneity, and seamless interoperability.
    In this session, we will introduce the NearbyComputing Platform, an orchestration framework, designed to help companies overcome the above-mentioned limitations to adopt the Edge Computing paradigm. Through the unique model-driven approach and seamless interoperability of our solution, companies across diverse sectors (CSPs, Oil & Gas, Industry 4.0, Smart Cities) see their operational costs reduced by simplifying the management of their infrastructure, automating complex processes and introducing new high-value services that could not be deployed before.
  • Intelligent Operations and Automation
    Intelligent Operations and Automation
    KC Phua, Director Technical Experts APAC, Data Management & Protection, Global Field and Industry Solutions, Hitachi Vantara Recorded: May 23 2019 51 mins
    Digital transformation is happening. Data infrastructure is transforming. It is the nerve center of your DATA.

    This DATA infrastructure is becoming more complex and more critical to business, and the load on both that infrastructure and the people running it has never stopped growing.

    Automation is a crucial enabler to this transformation, and will become a major competitive area for infrastructure vendors.

    In this webinar, we will discuss and share -

    • How to approach automation and develop automation strategy.
    • The way it is being affected by artificial intelligence and machine learning.
    • Use cases explaining how automated operations can improve IT efficiency & responsiveness.
  • SD-WAN Service Growth and Automation through Industry Alignment
    SD-WAN Service Growth and Automation through Industry Alignment
    Pascal Menezes, CTO, MEF; Ralph Santitoro, Head of SDN/NFV/SD-WAN Services, Fujitsu; Rami Yaron, Senior Adviser, Infovista Recorded: May 23 2019 59 mins
    SD-WAN is evolving from single-vendor DIY models used by enterprises looking for speed, access and cost benefits to a managed service that complements many service providers’ solution portfolios with a focus on application awareness, provisioning efficiency, and access options. MEF is soon to officially publish the industry’s first SD-WAN services standard (MEF 70) that defines an SD-WAN service and its various attributes. This is your opportunity to get up to date with the standard and its impact to your business and the broader industry ecosystem. Starting with the industry’s business challenges, you will explore SD-WAN’s role in the evolution from on-premise to cloud-based applications, and the value of a standard service in the context of managed services. Covering terminology, use cases, and the framework for automation, you’ll understand the full benefits of the service standard and the developments underway for the next phase of standards work, including application security for SD-WAN. Visibility on future certification and the critical role of a common language and APIs for automation will be presented. Join our CTO and industry subject matter experts in exploring this new service standard.
  • Solving The Problem Of TLS Visibility
    Solving The Problem Of TLS Visibility
    John Wagnon Recorded: May 22 2019 12 mins
    The F5 SSL Orchestrator (SSLO) provides a powerful solution to the problem of TLS encryption visibility. Most of the traffic on the Internet today is encrypted, so organizations have to figure out how to reliably inspect that encrypted traffic. Some solutions require a "daisy-chain" of security devices to inspect the traffic, but the F5 SSLO allows encryption/decryption to happen in one place. The SSLO "orchestrates" the traffic by implementing policies that direct traffic to one or more of the security devices depending on what type of traffic it is. The SSLO also solves the problem of cipher diversity by offering one set of cipher suites to external devices and another set of cipher suites to internal devices. Learn about all this and more as John outlines the details of the SSL Orchestrator!
  • How To Gain Comprehensive Visibility and Security for Your Hybrid Environment
    How To Gain Comprehensive Visibility and Security for Your Hybrid Environment
    Reggie Best, President of Lumeta Solutions, FireMon | Ed Young, Product Manager of Lumeta Solutions, FireMon Recorded: May 22 2019 48 mins
    Maintaining continuous security and compliance requires comprehensive visibility across your hybrid environment. You need to adapt and scale your security measures as your environment grows, as your hybrid environment shifts, or as new threats are detected. But without a true understanding of the scope of your assets and where all of your workloads reside, your efforts will be futile.

    Learn how FireMon’s Lumeta CloudVisibility can extend comprehensive network and endpoint discovery with real-time infrastructure visibility, change monitoring, and leak-path detection for your migration to the hybrid cloud across your on-premises, virtual, software-defined, cloud and hybrid environments.
  • Building RHEL 8 Beta: Upstream and downstream - Better Together
    Building RHEL 8 Beta: Upstream and downstream - Better Together
    Stefanie Chiras, VP & GM, RHEL Business Unit, Red Hat, Denise Dumas, VP Software Engineering, Global, Red Hat Recorded: May 22 2019 38 mins
    Listen in as Stefanie Chiras, vice president and general manager of the RHEL Business Unit, and Denise Dumas, vice president of Software Engineering Global at Red Hat discuss the importance of the open source community and its contribution and impact on the development of Red Hat Enterprise Linux 8 Beta.

    In this webinar, we’ll cover:
    •The upstream and downstream processes
    •How the upstream and downstream processes came together resulting in the world's leading operating system
  • To Outsource, or Not To Outsource: Best Practices for IT Security
    To Outsource, or Not To Outsource: Best Practices for IT Security
    Ryan LaSalle, Global Managing Director, Growth & Strategy - Accenture Security, Narayan Makaram - Arctic Wolf Recorded: May 22 2019 62 mins
    With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

    By attending, you’ll:

    - Understand best practices for working most effectively with third party providers
    - Discover what security functions can be handled by third parties and what should be kept in-house
    - Recognize how to avoid common pitfalls of working with third parties
    - Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it

    Save your seat now to learn more!
  • Secure WiFi Management Revolutionized in the Cloud
    Secure WiFi Management Revolutionized in the Cloud
    Srudi Dineshan, Product Marketing Manager Recorded: May 22 2019 53 mins
    Leverage the ultimate flexibility and reliability of the cloud to simplify WiFi planning, management and network optimization. Join us to understand the capabilities of the all-new SonicWall secure wireless solution, including WiFi Cloud Manager and SonicWave access points. Register today to:

    •Deploy powerful wireless network security — with or without a firewall
    •Learn how to simplify management with single-pane-of-glass visibility
    •Explore the benefits of Zero-Touch Deployment
    •Enhance WiFi user experiences
    •Reduce CapEx with limited-time WiFi promotion
  • SD-WAN Service Growth and Automation through Industry Alignment
    SD-WAN Service Growth and Automation through Industry Alignment
    Pascal Menezes, CTO, MEF; Mark Gibson, Director of Product Management, Amdocs; David Ball, Principal Engineer, Cisco Recorded: May 22 2019 61 mins
    SD-WAN is evolving from single-vendor DIY models used by enterprises looking for speed, access and cost benefits to a managed service that complements many service providers’ solution portfolios with a focus on application awareness, provisioning efficiency, and access options. MEF is soon to officially publish the industry’s first SD-WAN services standard (MEF 70) that defines an SD-WAN service and its various attributes. This is your opportunity to get up to date with the standard and its impact to your business and the broader industry ecosystem. Starting with the industry’s business challenges, you will explore SD-WAN’s role in the evolution from on-premise to cloud-based applications, and the value of a standard service in the context of managed services. Covering terminology, use cases, and the framework for automation, you’ll understand the full benefits of the service standard and the developments underway for the next phase of standards work, including application security for SD-WAN. Visibility on future certification and the critical role of a common language and APIs for automation will be presented. Join our CTO and industry subject matter experts in exploring this new service standard.
  • How ATOS Uses PlateSpin Migrate
    How ATOS Uses PlateSpin Migrate
    Stephan Riebroek, Jo de Baer Recorded: May 22 2019 52 mins
    This webinar is brought to you by the Vivit Automation and Cloud Builders Special Interest Group (SIG).

    In this webinar, you will learn all about Micro Focus PlateSpin; what it is and how can this tool be used to migrate workload from one place to another. The speaker will also explain how the migration to different platforms is setup. After attending this webinar, you will know:

    • The core principles of 'lift-and-shift" server migration
    • How ATOS is using PlateSpin to successfully migrate customer applications to the cloud and other platforms
    • What major features were recently added to PlateSpin and what the future road map looks like
  • New Landscape of Network Speeds
    New Landscape of Network Speeds
    David Chalupsky, Intel; Craig Carlson, Marvell; Peter Onufryck, Microchip; John Kim, Mellanox Recorded: May 21 2019 66 mins
    In the short period from 2014-2018, Ethernet equipment vendors have announced big increases in line speeds, shipping 25, 50, and 100 Gigabits-per -second (Gb/s) speeds and announcing 200/400 Gb/s. At the same time Fibre Channel vendors have launched 32GFC, 64GFC and 128GFC technology while InfiniBand has reached 200Gb/s (called HDR) speeds.

    But who exactly is asking for these faster new networking speeds, and how will they use them? Are there servers, storage, and applications that can make good use of them? How are these new speeds achieved? Are new types of signaling, cables and transceivers required? How will changes in PCIe standards keep up? And do the faster speeds come with different distance limitations?

    Watch this SNIA Networking Storage Forum (NSF) webcast to learn how these new speeds are achieved, where they are likely to be deployed for storage, and what infrastructure changes are needed to support them.
  • Achieving uCPE success with ADVA and Intel
    Achieving uCPE success with ADVA and Intel
    Prayson Pate, CTO, ADVA Edge Cloud & Sab Gosal, Segment Director, Communications Infrastructure Devices, Intel Recorded: May 21 2019 55 mins
    The uCPE market is hot right now because it enables cloud-centric deployment of services like SD-WAN, firewall, IoT, and micro-cloud. But service providers and enterprises are concerned about performance, scalability and complexity. This webinar will talk about the trends and opportunities for uCPE, how ADVA and Intel can address the challenges, and some real-world use cases for uCPE.
  • DNS as a Foundation Security Architecture for Digital Transformation
    DNS as a Foundation Security Architecture for Digital Transformation
    Lee Clark, System Engineer, Infoblox, Brandon Dunlap, Moderator, (ISC)² Recorded: May 21 2019 57 mins
    Today, your users directly access cloud applications from everywhere. Transformative technologies such as SD-WAN, IoT and the cloud are borderless and complicate security. Non-standard IoT devices using non-standard protocols are rapidly proliferating. And yet, securing your digital transformation doesn’t require a new tool.

    Instead, it takes a simple, scalable and integrated security solution that makes your existing security infrastructure smarter and more efficient. DNS is foundational to the Internet and IP-based communication. It is also the perfect foundation for security: simple to deploy, ubiquitous in networks, essential for connectivity and scalable to Internet size.

    Join this webinar to learn how using DNS as a foundational security architecture can:
    • Protect your brand by securing traditional networks and digital transformations
    • Reduce time and cost of defending your enterprise against threats
    • Detect and remediate problems automatically and provide data to the entire ecosystem
  • To Whack or Not to Whack — Incident Response and Breach Mitigation
    To Whack or Not to Whack — Incident Response and Breach Mitigation
    Danny Akacki, Sr. Technical Account Manager, Gigamon Insight and TJ Biehle,Sr. Technical Account Manager, Gigamon Insight Recorded: May 21 2019 44 mins
    To whack, or not to whack, that is the question:
    Whether ‘tis nobler in the mind to torch all
    The compromised boxes on your poor network,
    Or to take arms against a sea of malware
    And by blocking stop them all.

    So, what do you do during an active security incident? When is the proper time to whack-a-mole with your mallet? Is it better to light everything on fire and start over, or should you make observations a key component of your response and mitigation strategy? In this webinar, we'll discuss strategies for when it's time to scorch the earth versus sit back with a cup of tea, gaining intel into what active adversaries are doing in your house.

    We’ll break down some of the most important points to remember during the commotion of an active incident response, including:

    •Context is king. We’ll explain the important questions you need to be ask when scoping an incident to get an improved view of the situation.
    •Thinking fast and slow. It’s understandable to want to nuke everything from orbit just to be thorough, but it’s usually not the smartest play. We’ll outline the potential benefits and risks of hasty containment and remediation efforts versus slow, thoughtful analysis when executing a response game plan.
    •The law of diminishing returns. There can be a tipping point where the cost of your decisions and polices no longer justify the answers you’ll find. We’ll talk you through some tactics to find the sweet spot between effort and return.
  • 15 Minute Webinar: NVMe Readiness Assessment
    15 Minute Webinar: NVMe Readiness Assessment
    Storage Switzerland, Virtual Instruments Recorded: May 17 2019 17 mins
    Most All-Flash Arrays were bought in the last few years and have not come anywhere close to “end of life,” yet most vendors are now shipping NVMe All-Flash Arrays which offer better performance. As enticing as these new systems might be, IT planners need to proceed with caution to make sure that the organization has workloads that can justify the move to NVMe as well as ensuring the rest of the storage and network infrastructure is up to the task.

    In this 15 Minute webinar Storage Switzerland and Virtual Instruments take an objective look at the NVMe and help you map out a strategy for the transition.
  • Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
    Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
    Storage Switzerland, Axellio Inc. Recorded: May 16 2019 57 mins
    Many organizations need to continue to run virtualized applications on-premises but are also looking to replace and consolidate aging server infrastructure. At the same time, these organizations want to leverage cloud services for data protection, high availability and disaster recovery as well as providing a centralized hub to track and manage what is happening across multiple data centers. The challenge is that most infrastructure solutions don’t offer both an efficient approach to demanding scale-up and scale-out applications while effectively integrating cloud services – for on-premises and cloud efficiency. Instead of creating a simple to manage hybrid cloud, the organization is forced to make trade-offs.

    During the webinar, “Simplifying the Large-Scale Hybrid Cloud”, Storage Switzerland and Axellio discuss how Microsoft Azure Stack HCI and Axellio’s FabricXpress Servers can deliver new levels of consolidation in the enterprise. Learn how to intelligently leverage Azure to simplify operations like data protection, business continuity, and data center operations – while deploying less infrastructure and less software for your demanding on-premises workloads.

    Key Takeaways:
    - How to Design Hybrid Cloud for Consolidation of Enterprise Workloads & Infrastructure
    - What Cloud Services Does On-premises HCI Need?
    - What is Microsoft Azure Stack HCI and how does Axellio leverage this for greater simplicity?
  • A Farewell to LUNs - Discover how VVols forever changes storage in vSphere
    A Farewell to LUNs - Discover how VVols forever changes storage in vSphere
    Eric Siebert - WW Product Manager, HPE & Pete Flecha - Sr. Technical Marketing Architect, VMware Recorded: May 16 2019 64 mins
    To borrow a phrase from a popular song from REM, “It’s the end of the LUN as we know it and I feel fine”. VMware VVols changes everything we know about storage for vSphere in a good way, with VVols LUN management is a thing of the past. VMware VVols represents the future of external storage for vSphere and that future is here right now. VVols also represents many years of engineering work by both VMware and its storage partners. The result of that work is a new storage architecture for vSphere that solves many of the hidden complexities inherent in VMFS and levels the playing field between file and block protocols. Learn from experts at HPE & VMware how VVols transforms external storage in vSphere, eliminates complexities and provides very real benefits to customers.
  • Practitioner’s Guide to Continuous Compliance & Audit Readiness
    Practitioner’s Guide to Continuous Compliance & Audit Readiness
    Danielle Russell, Group Product Marketing Manager; Caryn Seippel, Manager of Risk and Compliance Recorded: May 16 2019 58 mins
    Conducting internal audits is a security best practice and a common requirement for most compliance standards. Yet, the internal "audit season" can slow down business productivity to a grinding halt. This is especially a challenge for agile technology organizations that rely on continuous development and release schedules to drive business forward.

    By adopting a continuous compliance program, you can keep your innovation humming while ensuring that you are continually addressing important industry and regulatory demands and, more importantly, maintaining secure systems and processes.

    Join us for a special session with Caryn Seippel, Manager of Risk and Compliance at AT&T Cybersecurity, to learn:

    - What is continuous compliance
    - Practical steps to implement continuous monitoring
    - How AT&T Cybersecurity, a security company, adopted a continuous compliance program
    - How AlienVault USM Anywhere uses automation to help streamline continuous compliance
  • How We Approached Evaluation of ALM Octane and Now Run Agile Testing
    How We Approached Evaluation of ALM Octane and Now Run Agile Testing
    Gerd Fladrich, Risang Sidik Recorded: May 16 2019 60 mins
    This webinar is brought to you by the Vivit Testing Quality ALM Special Interest Group (SIG).

    Join this webinar that will demonstrate how BNP Paribas started and performed evaluation of ALM Octane and is now using the tool to run complete agile testing lifecycles. The testing lifecycle will be presented as a live demo that follows Behavior-Driven Development (BDD) methodology and uses Gherkin notation for defining test suites.

    The testing lifecycle starts with definition of requirements and user stories, heavily builds on test automation and advanced reporting, manages and synchronizes defects across tools, and feeds learnings from testing back into the requirements. It uses an integrated development and testing infrastructure including products like Confluence, Jira, Micro Focus ALM, Micro Focus ALM Octane, Jenkins, GIT, Cucumber, IntelliJ, TestCafe, and others.

    BNP Paribas’s journey with agile test automation using ALM Octane started in 2017. The webinar presents in a nutshell how evaluation of ALM Octane was approached and conducted. It explains how new methods were introduced with the objective to leverage full tool functionality. The initiative has soon helped to increase testing efficiency and created important business value.

    Webinar participants will learn:

    • How BNP Paribas has conducted evaluation of ALM Octane
    • Why ALM Octane is much more than just a successor of ALM/Quality Center
    • How ALM Octane eases flexible management of its entire surrounding tool chain
    • Why methodology like BDD shall precede tools, and not vice versa
    • How Gherkin establishes a common language for the entire agile development lifecycle that helps integrating business, development, and testing
    • How to use ALM Octane for pipeline management, reporting, defect synchronization, import of performance testing and BPT results, integration of in-sprint testing etc.
  • Is your hybrid cloud strategy living up to expectations?
    Is your hybrid cloud strategy living up to expectations?
    Julian Keetch, HPE Software Defined Infrastructure Product Manager & Mike Waldock, Infrastructure and Cloud Expert, CANCOM Recorded: May 16 2019 33 mins
    Many organisations have embraced the public cloud, but it hasn’t always lived up to expectations. Whether that’s because they haven’t realised the cost benefits or are concerned about security, or they’re simply not culturally ready. In fact, according to IDC’s 2018 Cloud and AI Adoption Survey, organisations are moving 50% of their public cloud applications to either a private cloud or non-cloud environment over the next two years.

    So how do you achieve the right cloud strategy? It must be relevant to your workloads, so in reality we’re looking at a future that’s hybrid. It’s all about getting the right mix of public and private cloud. Creating an infrastructure that bridges the gap between traditional IT and cloud native applications. Enabling you to keep the lights on, as well as respond to the need to deliver new products and services faster.

    As an IT Manager or IT Director of an enterprise organisation, how do you manage the needs of your CIO, Developers and Operations team? This webcast explores how to create the right hybrid cloud approach enabled by a software-defined infrastructure. It also gives a brief overview of HPE Synergy, one infrastructure for all applications.

    Learn how to:

    •Achieve the optimum hybrid IT model
    •Solve the conundrum of keeping the lights on whilst innovating faster
    •Effectively manage a complex hybrid IT environment
    •Achieve a single source of truth for your infrastructure
  • The Rise of Targeted Cyberattacks against SMBs and MSPs
    The Rise of Targeted Cyberattacks against SMBs and MSPs
    Kelvin Murray, Sr. Threat Research Analyst, Webroot May 28 2019 10:00 am UTC 60 mins
    Cybercriminals have long targeted MSPs, but in 2019 this trend reached worrying proportions.

    Learn about the key targeted cyberattacks MSPs have been facing this year and how best to protect your business—and your clients—from the damage they can cause.
  • Real Phish Remain the Real Problem
    Real Phish Remain the Real Problem
    Mollie MacDougall, Threat Intelligence Manager, David Mount, Product Marketing, Cofense, Brandon Dunlap, Moderator, (ISC)² May 28 2019 12:00 pm UTC 60 mins
    Despite investment in next-gen technologies and employee awareness training, phishing threats continue to become more sophisticated and more effective. It’s time for organisations to accept that REAL phish are the REAL problem. Join the Cofense Phishing Threat Landscape review to discover the trends defining phishing in 2019 and priorities for defending your organisation going forward.
    Attend this webinar to learn how attackers are:
    •Using major malware types and their innovative tactics, techniques, and procedures
    •Intensifying credential theft as organizations move infrastructure and applications to the cloud
    •Evolving Emotet and the threat actors behind the botnet
    •Increasing proliferation of sextortion phishing emails

    We’ll examine the obvious changes in the phishing threat landscape, plus look ahead at trends shaping 2019.
  • 5G: Dynamically Sliced, Differentially Priced
    5G: Dynamically Sliced, Differentially Priced
    Manish Singh, Sr. VP - Network Services at Tech Mahindra May 28 2019 3:00 pm UTC 60 mins
    Tech Mahindra has geared up to support CSPs in their migration to 5G. As a Global SI (Systems Integrator), we are an Innovation Orchestrator closely collaborating with our ecosystem partners of innovators and disruptors. Network of the Future will be dynamically sliced and differentially priced. Network Slicing will enable CSPs to create different logical networks, on a shared Telco Cloud infrastructure, with varying capabilities that best meet the varying requirements of different applications. Throughput, latency, security, mobility requirements can all vary from application to application. Furthermore, economic models across MBB, MIoT and uRLLC will greatly vary and in turn will put varying demands on the network.
  • 5 imperatives required to get to mission faster
    5 imperatives required to get to mission faster
    Brian Shimkaveg Account Manager in Intelligence Middleware, Red Hat May 28 2019 3:00 pm UTC 22 mins
    A key competitive advantage of the U.S. Intelligence Community (IC) is the use of powerful, innovative mission applications delivered to analysts on reliable and robust technology platforms. Unfortunately, legacy systems and processes may hinder their ability to adapt quickly to new threats and build capabilities to accommodate unknown future threats critical to our nation's security. This webinar will highlight 5 imperatives the IC must adopt including modern application development methodologies that will help transform its IT and compete with its adversaries.

    Red Hat has a unique understanding of the IC given our global customer reach and on-site security-cleared associates. Red Hat® software helps customers create and sustain thousands of enterprise applications critical to businesses, institutions, and governments.

    Join this webinar where we’ll cover:

    - Establishing and enact high standards
    - Rethinking acquisition and operations and maintenance (O&M)
    - Respecting the dev, trusting the ops
    - Getting modern stay modern
    - Owning your outcome
  • What's New with Service Virtualization 10.5?
    What's New with Service Virtualization 10.5?
    Koustubh Warty and Jeffrey Hughes May 28 2019 3:00 pm UTC 60 mins
    Service Virtualization is releasing version 10.5 with exciting new features including a huge focus on Developers - enabling the ease of use with Enhanced APIs, the New Eclipse Plugin, SVAsCode and the Jenkins Plugin. In addition, we have significantly enhanced our docker implementation to support Kubernetes, new database support for PostgreSQL and last but not the least customer driven reporting enhancements. These new features, along with others, will help your testing teams adopt and improve their Continuous Testing journey with the eventual goal of Digital Transformation. Join Jeff Hughes and Koustubh Warty for a complete discussion and demonstration of the latest features of SV 10.5.
  • Enterprise-Grade Security for Containerized Applications with Red Hat & Aporeto
    Enterprise-Grade Security for Containerized Applications with Red Hat & Aporeto
    Jason Dobies & Marcus Hesse May 28 2019 5:00 pm UTC 60 mins
    How to Accelerate Business Agility with Zero Trust Security Posture

    Kubernetes-orchestrated microservices and containers is a boon for business agility. By enabling a more agile and distributed software architecture, Kubernetes allows businesses to release new features and capabilities faster than ever before. Red Hat OpenShift is the enterprise choice for a supported Kubernetes release.

    Distributed software architectures require a new approach to security. Aporeto secures all workloads on any infrastructure with identity-based access control, making it the enterprise choice for visualizing and protecting Kubernetes-orchestrated applications on hybrid infrastructures.

    Together, Red Hat OpenShift and Aporeto Identity-Powered Cloud Security enable organizations to achieve greater agility while implementing a Zero Trust security posture.

    Join this webinar to learn:
    - Security benefits of using Aporeto in Red Hat OpenShift
    - Benefits of adding open ID connect (OIDC) to any web service with Aporeto
    - Understanding the future of Red Hat OpenShift 4

    Speakers:
    Jason Dobies, Red Hat
    Jason has 18+ years of experience as a software engineer,12 of those being his time at Red Hat. He is currently working as a Principal Technical Marketing Manager on the Cloud Platforms team where he provides direction and technical advice for applications integrating with OpenShift. Prior to that, Jason's experience includes being a core contributor on multiple OpenStack projects and leading the Red Hat Satellite content management project.

    Marcus Hesse, Aporeto
    Marcus is an Open Source and Security Enthusiast, and a DevOps Engineer with 15 years of experience. Before joining Aporeto as a Principal Engineer, and driving forward the Kubernetes and Layer 7 development and integration efforts, he worked in FinTech, helping to modernize application deployments. As a previous Aporeto customer, he knows Aporeto can be paramount to achieve security and compliance in Kubernetes environments.
  • Teradici Desktop Access – Updates on our Latest Releases
    Teradici Desktop Access – Updates on our Latest Releases
    Arjen van der Meulen - Director of PM, Edna Menon - Sr. Product Mgr. & Paul Barrett - Systems Specialist, Teradici May 29 2019 5:00 pm UTC 45 mins
    Teradici recently announced General Availability new releases of all our PCoIP products and components, including PCoIP Zero Client firmware, Remote Workstation Card firmware, and Management Console software that are part of our Desktop Access Plan.
    Learn about new capabilities and participate in a live Q&A with Arjen van der Meulen, Director of Product Management; Edna Menon, Senior Product Manager; and receive a live demo from Paul Barrett, Systems Specialist, Global Support Services.
    This webinar will cover everything you need to learn about the new features in:
    •PCoIP Zero Client Firmware 5.5.2
    •PCoIP Zero Client Firmware 6.3.0
    •PCoIP Remote Workstation Card Agent for Windows 19.05
    •PCoIP Management Console Enterprise 19.05
    Bonus: Learn about Tech Previews for 4K UHD resolution support for PCoIP Zero Clients with PCoIP Remote Workstation Cards and Redhat Package Manager (RPM) support with the Management Console, as well as some tips on how to benefit best from our support portal!
  • Gain Control of Complex Applications Central to Your Digital Transformation
    Gain Control of Complex Applications Central to Your Digital Transformation
    John Gudmundson, Sr. Product Marketing Manager Gigamon May 29 2019 5:00 pm UTC 60 mins
    Today’s applications — complex, sprawling, multi-tiered, opaque — determine the success or failure of digital transformations. Isn’t it time you took control?

    Join us to learn about Application Intelligence, a pioneering set of capabilities for getting the visibility and the context needed to discover, manage and secure your sophisticated applications.

    During this live demonstration, you’ll see how Application Intelligence helps you:
    •Identify and extract traffic from over 3,000 applications
    •Detect and manage shadow IT and rogue apps
    •Separate unnecessary application traffic to greatly improve tool efficiency

    We’ll also preview its application metadata capabilities for help in solving a number of critical concerns such as troubleshooting subpar performance.

    Register now to see it in action >
  • Solving The Problem Of TLS Visibility
    Solving The Problem Of TLS Visibility
    John Wagnon May 29 2019 5:00 pm UTC 11 mins
    The F5 SSL Orchestrator (SSLO) provides a powerful solution to the problem of TLS encryption visibility. Most of the traffic on the Internet today is encrypted, so organizations have to figure out how to reliably inspect that encrypted traffic. Some solutions require a "daisy-chain" of security devices to inspect the traffic, but the F5 SSLO allows encryption/decryption to happen in one place. The SSLO "orchestrates" the traffic by implementing policies that direct traffic to one or more of the security devices depending on what type of traffic it is. The SSLO also solves the problem of cipher diversity by offering one set of cipher suites to external devices and another set of cipher suites to internal devices. Learn about all this and more as John outlines the details of the SSL Orchestrator!
  • RSD Improves Veeam Backup Performance by 3X and Makes ERP System Lighting Fast
    RSD Improves Veeam Backup Performance by 3X and Makes ERP System Lighting Fast
    Alan Kerr, Senior Solutions Architect at StablePath & Jim Barnes, Director of IT at RSD May 29 2019 6:00 pm UTC 60 mins
    REGISTER NOW to hear the Storage Success Story of RSD, Refrigeration Supplies Distributor and DataCore partner, StablePath.

    The webinar is on May 29th at 2 pm EST. Learn More.

    Meet Refrigeration Supplies Distributor, the largest independently owned refrigeration parts and HVAC equipment wholesaler in the western United States. RSD recently celebrated 112 years in business.

    Meet DataCore partner, StablePath. This California based DataCore reseller has nearly two decades of experience in the IT industry. They have built their solid reputation leveraging best-of-breed technology and services.

    With the help of StablePath, RSD strives to set the mark for customer service. Having a world-class IT infrastructure is a critical element in achieving 100% customer satisfaction!

    ​​The RSD Challenge. Before implementing DataCore software-defined storage, RSD was running production data, including its business-critical ERP system on EMC storage and Veeam backups on tape. However, having a dual-controller single-disk array configuration would cause IT to run into problems, slowness and experience failures continually. They needed a faster solution.

    The StablePath Solution for RSD. A large part of the RSD infrastructure upgrade involved virtualizing the ERP system among others, and a key consideration was the performance needed to power this business-critical asset. The ERP provider ran initial tests with DataCore software-defined storage for RSD, and the results were shocking—not only did it meet the existing performance needs, but it also sped up the system significantly. Plus, their Veeam backups ran 3X faster than before. As a result, RSD experienced:

    Increased Performance, Zero Downtime
    Faster Backups and Comprehensive Disaster Recovery

    Also, remember, all attendees will have the chance to win a $200 gift card.

    See you on the webinar!
    -DataCore Team

    If you have any questions, reach out to us at Info@DataCore.com or +1.954.377.6000.
  • 15 Minutes: Composing Infrastructure for Elastic, Hadoop, Kafka and Cassandra
    15 Minutes: Composing Infrastructure for Elastic, Hadoop, Kafka and Cassandra
    Storage Switzerland and DriveScale May 29 2019 8:00 pm UTC 30 mins
    Composing Infrastructure for Elastic, Hadoop, Kafka and Cassandra to Drive Down Cloud Data Center Costs

    Hyperscale applications like Elastic, Hadoop, Kafka and Cassandra typically use a shared nothing design where each node in the compute cluster operates on its data. Hyperscale architectures, to maximize storage IO performance, keep data local to the compute node processing the job. The problem is that the organization loses the efficiency of shared storage infrastructure. As the hyperscale architecture scales, overprovisioned and underutilized compute, GPU and storage resources cost the organization money!

    Join Storage Switzerland and DriveScale for our 15 minute webinar to learn how composable infrastructure can provide both high performance and high efficiency.

    In 15 minutes learn:
    - The challenges facing hyperscale architectures
    - The true cost of underutilized compute and storage
    - Why fast Ethernet networks are good for your data
    - How a composable architecture brings scale, performance and cost efficiency to your data center
  • Secure Content Creation in the Cloud
    Secure Content Creation in the Cloud
    Jellyfish Pictures, Microsoft Azure, NVIDIA & Teradici May 30 2019 4:00 pm UTC 60 mins
    Hear from Jeremy Smith, CTO at Jellyfish Pictures of a respected visual effects and animation studio in London, on how content workflows have migrated to the cloud. Teradici Cloud Access Software helps Jellyfish overcome the cloud latency challenge to put remote computing in the hands of creative professionals. Artists connect to remote workstations on Microsoft Azure powered by NVIDIA GPUs and Cloud Access Software to collaborate on projects with remote teams and securely access creative content from anywhere while maintaining high quality user experience. Keep using the tools you know and love while leveraging the power of NVIDIA GPUs and cloud compute, storage, and distribution.
  • How to Optimize Network Performance During Infrastructure Transformation
    How to Optimize Network Performance During Infrastructure Transformation
    Sam Kumarsamy, Senior Product Marketing Manager, Gigamon May 31 2019 5:00 pm UTC 47 mins
    How do you reduce complexity of your transforming infrastructure, gain greater IT tool efficiency and maximize visibility into your network? The right solution should empower you to produce better outcomes with less effort at lower cost. That is where a next-generation packet broker comes into play.

    Join Gigamon to get the latest best practices to:
    • Acquire and aggregate all network traffic for better visibility
    • Stop duplicate packets from overloading your tools
    • Filter traffic to provide the right data to the right tools
    • Optimize compliance and reduce risk across your entire IT environment

    If you need to optimize your tools, improve network performance and availability, get better insights into threats and enable your Network Operations and Security Operations teams to collaborate, you won’t want to miss this technical webinar.
  • 15 Minute Webinar: What Are Composable Infrastructures?
    15 Minute Webinar: What Are Composable Infrastructures?
    Storage Switzerland, Kaminario May 31 2019 5:15 pm UTC 15 mins
    IT professionals are hearing a lot about composable infrastructures and many vendors are claiming to offer a solution, but only a few have truly composable solutions ready for deployment today. The goal of composability is to bring the cloud like infrastructure experience to the on-premises data center so that mission-critical workloads can benefit.Join Storage Switzerland and Kaminario for our next 15 minute webinar. During this webinar listen in as our panel of experts discuss what composable infrastructures are, how they have evolved and most importantly what to look for in a composable solution.

    Register to receive an exclusive copy of Storage Switzerland’s latest eBook “Developing a Cloud-Like Experience for Mission Critical Data.”
  • Livestream Video - Multi-Cloud Security and Compliance
    Livestream Video - Multi-Cloud Security and Compliance
    John Meakin, GSK | Patrick Grillo, Fortinet | Dave Barnett, Forcepoint EMEA | James Hughes, Rubrik Jun 4 2019 10:30 am UTC 45 mins
    The cloud strategy of today's enterprise spans across multiple clouds and hundreds of applications. Point security solutions no longer work, so enterprises are turning toward a more orchestrated approach to achieving security and compliance in the cloud.

    Join cloud and security leaders in an interactive discussion to learn about:
    - Key security and compliance challenges associated with a multi-cloud strategy
    - Recommendations for managing and automating security across multiple clouds and applications
    - The future of cloud
    - Improving enterprise security in an ever-changing threat landscape

    Panellists
    James Hughes, Field CTO, Rubrik
    Dave Barnett, Head of CASB, Forcepoint EMEA
    Patrick Grillo, Senior Director - Security Solutions, Fortinet
    John Meakin, Group Chief Information Security Officer, GlaxoSmithKline (GSK)

    Moderated by Alex Hilton, Chief Executive, Cloud Industry Forum
  • Fight the Good Fight Against the Bad Bots
    Fight the Good Fight Against the Bad Bots
    David Warburton, Senior Threat Research Evangelist, F5 Labs, Brandon Dunlap, Moderator, (ISC)² Jun 4 2019 12:00 pm UTC 60 mins
    Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organisations developing a sustainable security strategy.

    Join us for this webinar to learn:

    • How bots infect, propagate, and attack applications
    • What types of application attacks are commonly performed by bots
    • How you can defend against bad bots without disrupting the good ones
  • IT Industry Outlook 2019
    IT Industry Outlook 2019
    Fiona Challis, Channel Enablement & Sales Expert, Next Gen Jun 4 2019 2:00 pm UTC 60 mins
    CompTIA explores the forces shaping the IT industry, its workforce, and its business models in 2019. Some of the trends we’re monitoring and will discuss include:

    • How the cloud, edge computing, and 5G form modern economic infrastructure
    • How IoT and AI are opening new doors for ambient computing
    • How distributed technology models challenge existing structures
    • How the business of emerging technology prompts sales channels’ reinvention
    • How partnerships are bridging gaps in the new tech ecosystem
    • How persistent tech personnel shortages are fueling new, creative staffing solutions
    • How global tech hubs shine the spotlight on the ingredients for innovation
  • Don’t Let Digital Transformation Wreak Havoc on Your Network!
    Don’t Let Digital Transformation Wreak Havoc on Your Network!
    Sam Kumarsamy, Sr. Product Marketing Manager Gigamon Jun 4 2019 5:00 pm UTC 52 mins
    Yes, digital apps are hyper-agile, but they’re also incredibly complex making it difficult to get visibility into traffic. But without that visibility, how can you truly ensure a great experience?

    Help is at hand. During this webinar, you’ll learn how to build an efficient network architecture to provide an engaging digital experience by:

    •Using tools efficiently by optimizing traffic and preventing packet duplication
    •Enhancing security by collecting and distributing NetFlow metadata to tools
    •Identifying, categorizing and visualizing more than 3,000 applications automatically

    See how pioneering technology Gigamon Application Intelligence helps increase visibility, improve security and, ultimately, exceed user expectations.
  • AI, Automation, & its impact on IT
    AI, Automation, & its impact on IT
    Kevin Surace, CEO & CTO of Appvance.ai Jun 4 2019 6:00 pm UTC 62 mins
    Artificial Intelligence has arrived in the workplace. As an emerging software technology, IT will most likely own the AI and robotic process automation rollouts across their companies. Tune in to hear Kevin Surace, CEO & CTO of Appvance.ai, discuss the very latest insights and gossip around AI and automation including what you need to know to be successful, which fields are showing success with AI and automation, and how you can guarantee a win.

    Presenter Information
    Kevin Surace is a Silicon Valley innovator, serial entrepreneur, and CEO. Kevin has been featured by Businessweek, Time, Fortune, Forbes, CNN, ABC, MSNBC, FOX News, and has keynoted hundreds of events, from INC5000 to TED to the US Congress. He was INC Magazines’ Entrepreneur of the Year, a CNBC top Innovator of the Decade, World Economic Forum Tech Pioneer, Chair of Silicon Valley Forum, Planet Forward Innovator of the Yearnominee, featured for 5 years on TechTV’s Silicon Spin, and inducted into RIT’s Innovation Hall of Fame.

    Mr. Surace led pioneering work on the first cellular data smartphone (AirCommunicator), the first plastic multichip semiconductor packages, the first human-like AI virtual assistant (Portico), soundproof drywall, high R-value windows, AI-driven building management technology, AI-driven QA automation, and the window/energy retrofits of the Empire State Building and NY Stock Exchange. Kevin is CEO of Appvance.ai, sits on 7 boards and has been awarded 28 US patents.
  • Benefits of Building vs Buying Your Security
    Benefits of Building vs Buying Your Security
    Michael Suby, VP, Research - Frost & Sullivan & Louis Evans, Product Marketing Manager - Arctic Wolf Networks Jun 5 2019 5:00 pm UTC 53 mins
    Frost & Sullivan TCO Analysis: Building Your Own SOC vs. Buying SOC-as-a-Service

    For modern businesses, a Security Operations Center (SOC) is no longer an option. It is a necessity. But building and maintaining a fully functional SOC is a daunting proposition. Cost is a top consideration, driven overwhelmingly by a SOC’s need for a high number of in-demand security experts. Hiring, training, and retaining the necessary talent to staff a SOC is flatly impractical for many businesses.

    Fortunately there is a viable alternative to a DIY SOC: SOC-as-a-Service.

    In this webinar, Michael Suby, VP of Research at Frost & Sullivan, will highlight the compelling value proposition of SOC-as-a-Service compared to building and maintaining an in-house SOC. Included in this webinar are:

    - Real-world use cases of businesses subscribing to SOC-as-a-Service
    - Head-to-Head quantitative cost comparisons between SOC-as-a-Service and DIY SOC
    - Attributes to demand in a SOC-as-a-Service offering

    About our key speaker:

    A 17-year veteran at Frost & Sullivan, Michael Suby, VP of Research, has concentrated on the evolving threat landscape, practices, and technologies in cybersecurity. Quick to engage on risk and response, Mr. Suby habitually examines emerging cybersecurity technologies before they reach mainstream. Recent examples include server-less security, deception, dynamic defenses, content disarm & reconstruct, remote browser isolation, and cloud access & security brokers (CASB). In partnership with a team of highly experienced cybersecurity analysts at Frost & Sullivan, Mr. Suby is also intimately involved in researching how traditional cybersecurity solutions and platforms are addressing the diverse challenges and pressures encountered by IT and security practitioners.
  • Data breaches: how to best prevent and manage them
    Data breaches: how to best prevent and manage them
    Cristiano Cafferata (Swascan) & Florian Malecki (StorageCraft) Jun 6 2019 9:00 am UTC 60 mins
    Data breaches, data leaks, data loss, ransomware attacks, data explosion, etc. Not a day goes by that we don’t read about data being compromised or lost in some form or another. And data recovery is not easy and can be very costly…

    Don’t lose money due to a cyber-attack or any kind of disaster! Join this webcast and learn how Swascan and StorageCraft are working together to provide a complete framework for cyber security, prevention and data protection. Tune in and learn about best practices during or just after a security breach!
  • Composable Infrastructure: Networking & Storage for Programmable Performance
    Composable Infrastructure: Networking & Storage for Programmable Performance
    John F. Kim, Director Storage Marketing at Mellanox & Bill Borsari, Head of Systems Engineering at Datera Jun 6 2019 4:00 pm UTC 60 mins
    IT leaders need to deliver agility, velocity and predictability, in addition to high performance, to meet new and changing business demands on-the-fly. Composable infrastructure provides programmable, fluid and automated resources that can be dynamically combined to meet the unique needs of any application, while eliminating the need for workload-specific environments. Disruptive technologies born in the cloud make it possible to provision on-prem infrastructure just as quickly and painlessly as public cloud resources in a similar consumption-based model that reduces complexity and dramatically lowers costs.

    Join Datera and Mellanox as we discuss how combining disruptive technologies in composable infrastructure provides programmable & predictable networking performance with guaranteed QoS, and high-performance application-driven, programmable data orchestration, yielding CapEx and OpEx savings of 70% over legacy infrastructure.

    Meet Datera & Mellanox at HPE Discover, Las Vegas - June 17 - 20
  • The 5 Virtues of Continuous Testing
    The 5 Virtues of Continuous Testing
    Stephen Feloney, VP Product Management Continuous Testing @ Broadcom Jun 6 2019 5:00 pm UTC 60 mins
    Keeping pace with Agile development in the Internet of Things is no small task. Software development is expected to improve quickly, iteratively and continuously. These are significant challenges for both the Testing Center of Excellence and distributed Agile development teams across the business.

    Join Stephen Feloney (VP of Product Management | Continuous Testing), as he shares his thoughts on the 7 Sins of Application Quality, and talks about the 5 Virtues of Continuous Testing, including best practices that pragmatically addresses these pitfalls.


    We'll cover:

    · How to achieve cost optimization from streamlining Agile releases for efficiencies

    · Maintaining quality user experiences when transforming to an application economy

    · Ways to enable rapid time to market by increasing agility of the Testing Center of Excellence


    Note: Presentation is followed by a Q&A session
  • Driving Digital Transformation with Application Intelligence
    Driving Digital Transformation with Application Intelligence
    John LeHane, Product Marketing Gigamon Jun 6 2019 10:00 pm UTC 19 mins
    Accelerate Your Organization’s Digital Transformation

    Is explosive data growth and network complexity hindering your ability to deliver results? You’re not alone: a lack of application visibility makes it difficult to pinpoint and resolve performance issues.

    Join us for our 20 minute interactive webcast to see how application-aware network visibility can accelerate your organization’s digital transformation.

    You will learn:

    • How to simplify network monitoring with granular insight into application traffic
    • How to detect, manage and isolate shadow IT, non-business apps and others
    • Why filtering unnecessary traffic is critical to improving tool efficiency

    Discover how application-aware network visibility can improve the performance of both your network and its tools.
  • SUSE Enterprise Storage: die Mittelstandsalternative zur klassischen SAN-Lösung
    SUSE Enterprise Storage: die Mittelstandsalternative zur klassischen SAN-Lösung
    Wolfgang Eckerlin, Leiter Systeme und Netzwerke, iTEC Services GmbH Michael Jonas, Partner Executive Storage, SUSE Linux GmbH Jun 7 2019 8:00 am UTC 60 mins
    Lernen Sie anhand von praxisnahen Anwendungsbeispielen im gemeinsamen Webinar von Fujitsu, iTEC und SUSE die Vorteile einer software-definierten Speicherumgebung kennen und holen Sie sich Anregungen und Konfigurationsbeispiele für Ihre IT-Umgebung.
    Überzeugen Sie sich, wie einfach, effektiv und kostengünstig Sie SUSE Enterprise Storage auch in Ihrem Unternehmen einsetzen können.

    Die Agenda im Überblick:
    - iTEC: Ihr Lösungspartner für Software-defined Storage – powered by Fujitsu & SUSE
    - SUSE Enterprise Storage für den Mittelstand: Hardware, Software, Individualisierung und Services aus einer Hand
    - Anwendungsszenarien: On-Premises und in der Cloud
    - Konfigurationsbeispiele und Best Practices