Hi [[ session.user.profile.firstName ]]


  • The Time for vCPE is NOW!
    The Time for vCPE is NOW! Eyal Aloni & Philip Jerichower, RAD Live 60 mins
    White boxes may be general purpose, low-cost and easy to commoditize, but they lack many OAM functions and connectivity options that cannot always be virtualized, yet are still required by operators. In this webinar, we will explain how to bridge these gaps by supplementing universal CPEs (uCPEs) with universal access, enhanced performance monitoring and diagnostics, legacy TDM service support, and 1588 timing synchronization. We will also share typical use cases based on real-live experience of tier 1 operators using white boxes for virtualized business services today.

    Eyal Aloni Head of Service Provider Line of Business - RAD
    Philip Jerichower, Director of International Training, RAD
  • Capacitación Tecnica - SUSE Linux Enterprise Server for SAP Aplicaciones
    Capacitación Tecnica - SUSE Linux Enterprise Server for SAP Aplicaciones Cesar Lorca, Presales Engineer y Anders Olesen, Partner Executive Live 135 mins
    El miércoles 20 de Junio - Capacitación Técnica
    10.00hrs - 12.00hrs - SUSE FOR SAP Modulo 2
    •Instalación del Sistema Operativo
    •Configuración de Linux Enterprise Server para Aplicaciones SAP
  • Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting
    Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Jun 20 2018 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Cyber-Espionage and Threat Hunting

    Our Verizon Threat Research Advisory Center presenters will be:
    •Chris Novak, Director, Investigative Response
    •Jihana Clemetson, Senior Analyst, Threat Intelligence
    •Marcus Cymerman, Senior Analyst, Network Forensics
    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas

    For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.

    Following the cyber-espionage insights, we'll cover the following topics:

    •Current Intelligence
    •Attacks & Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Cloud Security: Lessons from the Trenches
    Cloud Security: Lessons from the Trenches Brian Talbert, Alaska AIrlines; Enrique Salem, Bain Capital; Ami Hofman, Dimension Data; John Parker, ShieldX Recorded: Jun 19 2018 46 mins
    According to ESG, 25 percent of organizations say maintaining strong and consistent security across their own data center and multiple public cloud environments with a centralized command-and-control a top CISO concern. So how do you do it?

    Join Alaska Airlines Director of Network and Connectivity Solutions Brian Talbert, former Symantec CEO Enrique Salem and ShieldX VP of Products John Parker for a discussion on best practices for secure cloud migration. This panel will discuss:
    - How security can help your company adopt a cloud first strategy
    - Key threats security teams should expect.
    - Why micro-segmentation becomes a critical control when your perimeter defenses are defeated
    - How to gain visibility into your data center and cloud environments
    - Overcoming common objections encountered during migration
  • Best Practices for Outsourcing Your IT Security
    Best Practices for Outsourcing Your IT Security Ryan LaSalle, Global Managing Director, Growth & Strategy - Accenture Security, Narayan Makaram - Arctic Wolf Recorded: Jun 19 2018 62 mins
    With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

    By attending, you’ll:

    - Understand best practices for working most effectively with third party providers
    - Discover what security functions can be handled by third parties and what should be kept in-house
    - Recognize how to avoid common pitfalls of working with third parties
    - Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it

    Save your seat now to learn more!
  • DeepStorage Test Drive: Tegile IntelliFlash T4000AFA
    DeepStorage Test Drive: Tegile IntelliFlash T4000AFA Howard Marks Founder and Chief Scientist Deepstorage; Gokul Sathiacama, Director, Product Marketing, Data Center Systems Recorded: Jun 19 2018 46 mins
    DeepStorage Labs is known in the storage industry for pushing equipment to its limits, and for reporting what really happens at the edge of a system’s performance. Tegile’s IntelliFlash T4000, unlike a few previous occupants of the DeepStorage Labs ThunderDome, stood up to our testing and delivered high IOPS at a maximum of 1MS latency.

    DeepStorage subjected the InteliFlash T4000 workloads from the usual 4KB “hero number” random read to workloads that simulate OLTP and OLAP database servers, a file server and an Exchange server. We determined the systems performance individually and in combination finally determining the system’s ability to support the kind of mixed workload environment

    In this webinar we will:
    - Introduce the IntelliFlash array
    - Describe the testing process
    - Present the results
    - Review the test environment
    - Provide links to the test workload VDbench configurations
  • FICON 101
    FICON 101 Patty Driever, IBM; Howard Johnson, Broadcom; J Metz, Cisco Recorded: Jun 19 2018 62 mins
    FICON (Fibre Channel Connection) is an upper-level protocol supported by mainframe servers and attached enterprise-class storage controllers that utilize Fibre Channel as the underlying transport. Mainframes are built to provide a robust and resilient IT infrastructure, and FICON is a key element of their ability to meet the increasing demands placed on reliable and efficient access to data. What are some of the key objectives and benefits of the FICON protocol? And what are the characteristics that make FICON relevant in today’s data centers for mission-critical workloads?

    Join us in this live FCIA webcast where you’ll learn:

    • Basic mainframe I/O terminology
    • The characteristics of mainframe I/O and FICON architecture
    • Key features and benefits of FICON
  • How to manage a Datastore
    How to manage a Datastore Reduxio Systems Recorded: Jun 19 2018 2 mins
    A short guide on how to manage a datastore using the Reduxio StorApp for VMWare vSphere V2.0.
  • HCL NFV Cognitive troubleshooting framework
    HCL NFV Cognitive troubleshooting framework Ramesh Sriraman, GM, HCLTech Recorded: Jun 19 2018 54 mins
    Complexity of troubleshooting NFV stack is manifold because of multiple layers of telemetry data. With such large data, SME driven exploratory analysis can be time-consuming and is not scalable. Cognitive Troubleshooting Framework augments exploratory analysis, reduces the time taken to find needle out of haystack by applying AI (ML/DL) algorithms based on model arrived at and help understand the behavior of the overall system and identify bottleneck regions that need be optimized.
  • IT Complexity and the New Monitoring Landscape
    IT Complexity and the New Monitoring Landscape Nancy Gohring of 451 Research and cPacket Recorded: Jun 19 2018 46 mins
    Businesses across sectors are adopting a host of new technologies – containers, SDN, IoT and many others -- as digital transformation disrupts practically every industry. The result is a significantly more complex IT environment than ever before. These environments present new challenges for professionals tasked with ensuring applications perform perfectly, leading to a re-examination of a once widely accepted monitoring toolset.

    Join as we discuss:
    •Why monitoring has become a big data problem
    •The morphing monitoring tools landscape
    •The value network monitoring tools can bring to APM and security
  • Asociese al socio estrategio de SAP. Capacitación - suse linux enterprise server
    Asociese al socio estrategio de SAP. Capacitación - suse linux enterprise server Cesar Lorca, Presales Engineer y Anders Olesen, Partner Executive Recorded: Jun 19 2018 93 mins
    Dia 1 - Capacitación Comercial

    10.00 hrs - 11.00hrs - Modelo de Canales

    •¿Que es el SUSE Partner Program?
    •Requisitos de Inscripción y Beneficios de Asociarse a SUSE
    •Certificaciones en SUSE y Administración de Ventas

    11.00hrs - 12.00hrs - SUSE FOR SAP Modulo 1
    •Conoce la cooperación entre SUSE y SAP
    •Que es SUSE Linux Enterprise Server for SAP Applications?
  • Using Inline Security Tools to Achieve Your Security Goals
    Using Inline Security Tools to Achieve Your Security Goals Adrian Rowley, Technical Director EMEA, Gigamon, Lindsay Drabwell, Head of Membership Services EMEA, (ISC)² Recorded: Jun 19 2018 58 mins
    Inline security tools operate by actively preventing threats in your network, but deploying and optimising these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade.
    The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges.
    Join Gigamon and (ISC)² EMEA in this webinar where we aim to examine how inline bypass can overcome physical deployment obstacles, maximise network availability, increase the scale of inspection and reduce the impact to network performance.
  • 2018 Cyberthreat Defense Report
    2018 Cyberthreat Defense Report Mark Bouchard, Co-Founder and COO, CyberEdge Group and Graham Melville, Sr. Director Security Solutions Marketing, Gigamon Recorded: Jun 19 2018 60 mins
    New research from CyberEdge’s 2018 Cyberthreat Defense Report shows that in spite of increasing their security budgets, companies are finding that there is too much data even for new tools to analyze, not enough skilled IT security professionals and little confidence in current investments. Sign up for this webinar to gain key insights into the cyberthreat landscape and how to protect your organization.

    Attendees will learn how to:

    - Deal with cyberthreat headaches such as increased breaches, vulnerabilities and encrypted traffic.
    - Reduce incident response and remediation time with automation.
    - Find products that use automation to minimize their dependency on skilled security personnel.

    Now in its fifth year, this report provides a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. Register now to learn how your colleagues plan to defend against cyberthreats!
  • How to Outsource your Security Monitoring 101
    How to Outsource your Security Monitoring 101 Mike LaPeters, VP of Global Channels, AlienVault Recorded: Jun 18 2018 43 mins
    Today’s rapidly evolving world means that traditional security measures like firewalls and antivirus are not sufficient to protect a company from a devastating breach. While it’s usually the big companies that make the headlines, the reality is every organization is a target, regardless of size. In fact, attacks are on the rise for small and midsize businesses because most lack the essential security controls necessary to mitigate risk.

    With a major shortage of skilled resources in today’s cybersecurity market, more and more organizations are opting to outsource key security monitoring services to a managed security service providers (MSSPs). Whether for log management, managed detection and response (MDR), SIEM-as-a-service, or compliance management, organizations large and small are turning to MSSPs to deliver these solutions quickly and cost-effectively.

    Join us for this one-hour discussion and learn how you can extend your IT team with managed security services:

    Topics Include:

    - Why Managed Security
    - Types of Managed Security Services
    - Benefits of Outsourcing Security
    - How to Select the right MSSP

    Hosted By
    Mike LaPeters
    VP of Global Channels
    Mike LaPeters joined AlienVault in 2015 and heads up the global channel initiative. Mike has more than 20 years’ experience building and leading channel organizations in security, infrastructure and storage software products. He has led teams at CA, VERITAS Software (Formerly Symantec) and he represented the sales and channel efforts from inception through acquisition at 4 startups (acquired by Microsoft, Hitachi (WD), SolarWinds, Nimboxx). He is a 3-time recipient of CRN’s Channel Chief award.
  • HPE 3PAR for unified storage with 3PAR File Persona
    HPE 3PAR for unified storage with 3PAR File Persona Vivek Anand Pamadi - HPE Product Management Recorded: Jun 18 2018 43 mins
    Today’s data centers are expected to deploy, manage, and report on different tiers of business applications, databases, virtual workloads, home directories, and file sharing simultaneously.
    HPE 3PAR StoreServ is highly efficient, flash-optimized storage engineered for the true convergence of block, file, and object access to help consolidate diverse workloads efficiently.
    This session provides an overview HPE 3PAR File Persona and core file data services.
  • Protect & Improve Your Business: Top 5 Best Practices for Connected Devices
    Protect & Improve Your Business: Top 5 Best Practices for Connected Devices Sonu Shankar, Senior Product Marketing Manager, Arctic Wolf Networks Recorded: Jun 14 2018 30 mins
    IoT devices are increasingly connected to conventional IT infrastructures, to improve operational efficiencies and ease of remote management. IT leaders are now responsible for connecting doctors, nurses, patients, and medical devices, or enabling financial advisors on the road, to deliver services to their clients. From enabling services via remote mobile devices, to managing IP-connected cameras on-premises at the same time, running this new converged IT ecosystem, that includes Operational Technology (OT), can be a daunting task. Especially when your attack surface has now dramatically expanded.

    According to Verizon's 2017 Data Breach Investigations Report, a total of 51% of data breaches affected either financial services businesses (24%), healthcare organizations (15%), or public sector entities (12%). With the rise in data breaches in these industries, and the responsibility to manage this connected ecosystem, how do you protect your business from attacks targeting connected devices? Furthermore, how do you do this without the budget to build and staff a full-fledged Security Operations Center (SOC)?

    Join us to discover:

    - The top 5 best practices you can adopt to improve your overall security posture
    - How you can equip your business with the security capabilities of a large enterprise at a fraction of their costs
  • Store More, Spend Less, and Grow Your Business Faster
    Store More, Spend Less, and Grow Your Business Faster Brian Carmody, CTO, INFINIDAT Recorded: Jun 14 2018 36 mins
    Your company is embracing big data, analytics and IoT, and your infrastructure can’t keep up. How can recent breakthroughs in data storage help you gain a competitive advantage?  

    In this session, you’ll discover a new storage architecture that makes it possible to store more and spend less while accelerating your path to innovation. Learn how this novel approach solves the age-old problems of performance, availability, scalability AND affordability, in a simply better way.

    About the speaker:

    Brian Carmody is Chief Technology Officer at INFINIDAT, where he leads the research and emerging tech group. Prior to joining INFINIDAT, he worked on the XIV storage system at IBM. A 15-year tech veteran, his experience also includes system engineering roles at MTV Networks and Novus Consulting Group.
  • Automating Load Balancing in App Defined Multi-Cloud
    Automating Load Balancing in App Defined Multi-Cloud Jeevan Sharma - Sr Solution Architect at A10 , Maryam Sanglaji - Principal Product Marketing Manager at Nutanix Recorded: Jun 14 2018 57 mins
    Given modern application API services and the dynamic nature of containers, traditional load balancers fail to handle rapid config change. In this webinar we will share real world A10 & Ansible customer use cases in Nutanix Acropolis platform. Come and learn how to deploy A10’s load balancers and deliver advanced app services and lifecycle management—including auto scaling, automation and per-app analytics all through A10’s Harmony Controller within Nutanix Cloud. Simplify complex network and application delivery with A10’s recommended best practices for effective automation.
  • Three Reasons Storage Security is Failing and How to Fix It
    Three Reasons Storage Security is Failing and How to Fix It Storage Switzerland, RackTop Systems Recorded: Jun 14 2018 60 mins
    An organization’s data is constantly under attack. Whether it’s through ransomware attacks, cyber-threats or employee misguidedness, all expose organizational data and put it at risk. Encryption and access control are the keys to securing data and cyber resiliency, but most storage systems throughout the infrastructure (primary, secondary and protection storage) treat security as an afterthought reducing flexibility and increasing complexity. In this live webinar we will discuss the three reasons why storage security is failing.
  • Under the Hood with AlienVault Labs: Leveraging Threat Intelligence
    Under the Hood with AlienVault Labs: Leveraging Threat Intelligence Sacha Dawes, Principal Product Marketing Manager, AlienVault & Chris Doman, Threat Engineer, OTX, AlienVault Recorded: Jun 14 2018 56 mins
    Threat intelligence offers the ability to improve threat detection and response using information on attack methods previously reported by others, but only if it can be effectively integrated into security controls and processes. So, how do you go from threat data to actionable insights?

    Join AlienVault for this webcast to get a look under the hood at how the AlienVault Labs threat research team turns threat data and indicators of compromise (IoC’s) into comprehensive, actionable threat intelligence.

    We'll cover:

    - What threat intelligence is, and how it speeds threat detection and incident response
    - Key questions to help you evaluate threat intelligence sources
    - How the AlienVault Labs team analyzes threat data, and turns it into actionable information
    - How AlienVault USM Anywhere integrates threat intelligence with multiple security capabilities to accelerate threat detection and response

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager
    Sacha has over 15 years of experience in technology and information security across product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he delivered solutions to address the IT security, identity and management space. Before joining AlienVault, he worked in the office of the EVP for Cloud and Enterprise business at Microsoft. Originally from the UK, Sacha is based in Austin TX and holds a Masters in Computer Science from Vanderbilt University.

    Chris Doman
    Threat Engineer, OTX
    Chris works on Alienvault OTX as a Threat Engineer. He’s had a long interest in security, but joined the industry after winning the civilian section of the Department of Defense's forensics competition. Chris runs a popular threat intelligence portal (ThreatCrowd.org) in his spare time, and holds a CCHIA (Certified Host Intrusion Analyst) from CREST and a degree in Computer Science from the University of Cambridge.
  • Predicciones Red Hat 2018: Cómo la tecnología opensource acelera la innovación
    Predicciones Red Hat 2018: Cómo la tecnología opensource acelera la innovación Ana Rocha de Oliveira Recorded: Jun 14 2018 39 mins
    En este Webinar, Ana Rocha de Oliveira, Cloud Sales & Business Development Manager de Red Hat, abordará los retos de los departamentos de IT en España y la forma en que los solucionaron con tecnología open source y con cultura DevOps. La visión de Red Hat considera que una automatización integral es un componente estratégico y fundamental de la modernización y la transformación digital.
  • Cloud-based disaster recovery: discover StorageCraft Cloud Services’ benefits
    Cloud-based disaster recovery: discover StorageCraft Cloud Services’ benefits Jaap Van Kleef, EMEA Technical Manager & Florian Malecki, International Product Marketing Director Recorded: Jun 14 2018 49 mins
    Businesses of all sizes can’t be without their critical data for long. Yet, a large-scale disaster can readily disrupt systems and make doing business impossible. Building out your own data center for disaster recovery can be very costly.

    Join StorageCraft for an exclusive webcast and learn how to best protect your on-premises business systems and data in a cloud purpose-built for total business continuity.
  • The Three New Requirements of Unstructured Data Protection
    The Three New Requirements of Unstructured Data Protection Storage Switzerland, Aparavi Recorded: Jun 13 2018 61 mins
    Can your backup deliver? Join Storage Switzerland and Aparavi for a live interactive webinar where we will discuss the unstructured data problem, why legacy solutions fall short and the three key capabilities that modern unstructured data protection solutions must deliver so that organizations can extract maximum value from their unstructured data investment.
  • Universal CPE Management & Orchestration Made Easy
    Universal CPE Management & Orchestration Made Easy Marc Bouteyre [Kapsch], Sharone Zitzman, [Cloudify] Recorded: Jun 13 2018 46 mins
    Network functions virtualization (NFV) has matured to the point where the majority of network functions can be hosted on Intel architecture-based servers.

    A single virtualized system hosting an NFV infrastructure (NFVI), network orchestration,and virtual network functions (VNF) can replace the multiple dedicated pieces of customer edge (CE) equipment needed for local and wide area networking.

    In this webinar we will demonstrate how to deploy a fully-orchestrated universal CPE architecture, with closed loop automation. 

    More about our presenters:

    Marc Bouteyre, Head of SDN/NFV Solution Management, Kapsch
    Sharone Zitzman, VP Marketing, Cloudify