Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
White boxes may be general purpose, low-cost and easy to commoditize, but they lack many OAM functions and connectivity options that cannot always be virtualized, yet are still required by operators. In this webinar, we will explain how to bridge these gaps by supplementing universal CPEs (uCPEs) with universal access, enhanced performance monitoring and diagnostics, legacy TDM service support, and 1588 timing synchronization. We will also share typical use cases based on real-live experience of tier 1 operators using white boxes for virtualized business services today.
Eyal Aloni Head of Service Provider Line of Business - RAD
Philip Jerichower, Director of International Training, RAD
For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.
Following the cyber-espionage insights, we'll cover the following topics:
According to ESG, 25 percent of organizations say maintaining strong and consistent security across their own data center and multiple public cloud environments with a centralized command-and-control a top CISO concern. So how do you do it?
Join Alaska Airlines Director of Network and Connectivity Solutions Brian Talbert, former Symantec CEO Enrique Salem and ShieldX VP of Products John Parker for a discussion on best practices for secure cloud migration. This panel will discuss:
- How security can help your company adopt a cloud first strategy
- Key threats security teams should expect.
- Why micro-segmentation becomes a critical control when your perimeter defenses are defeated
- How to gain visibility into your data center and cloud environments
- Overcoming common objections encountered during migration
With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.
By attending, you’ll:
- Understand best practices for working most effectively with third party providers
- Discover what security functions can be handled by third parties and what should be kept in-house
- Recognize how to avoid common pitfalls of working with third parties
- Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it
DeepStorage Labs is known in the storage industry for pushing equipment to its limits, and for reporting what really happens at the edge of a system’s performance. Tegile’s IntelliFlash T4000, unlike a few previous occupants of the DeepStorage Labs ThunderDome, stood up to our testing and delivered high IOPS at a maximum of 1MS latency.
DeepStorage subjected the InteliFlash T4000 workloads from the usual 4KB “hero number” random read to workloads that simulate OLTP and OLAP database servers, a file server and an Exchange server. We determined the systems performance individually and in combination finally determining the system’s ability to support the kind of mixed workload environment
In this webinar we will:
- Introduce the IntelliFlash array
- Describe the testing process
- Present the results
- Review the test environment
- Provide links to the test workload VDbench configurations
FICON (Fibre Channel Connection) is an upper-level protocol supported by mainframe servers and attached enterprise-class storage controllers that utilize Fibre Channel as the underlying transport. Mainframes are built to provide a robust and resilient IT infrastructure, and FICON is a key element of their ability to meet the increasing demands placed on reliable and efficient access to data. What are some of the key objectives and benefits of the FICON protocol? And what are the characteristics that make FICON relevant in today’s data centers for mission-critical workloads?
Join us in this live FCIA webcast where you’ll learn:
• Basic mainframe I/O terminology
• The characteristics of mainframe I/O and FICON architecture
• Key features and benefits of FICON
Complexity of troubleshooting NFV stack is manifold because of multiple layers of telemetry data. With such large data, SME driven exploratory analysis can be time-consuming and is not scalable. Cognitive Troubleshooting Framework augments exploratory analysis, reduces the time taken to find needle out of haystack by applying AI (ML/DL) algorithms based on model arrived at and help understand the behavior of the overall system and identify bottleneck regions that need be optimized.
Businesses across sectors are adopting a host of new technologies – containers, SDN, IoT and many others -- as digital transformation disrupts practically every industry. The result is a significantly more complex IT environment than ever before. These environments present new challenges for professionals tasked with ensuring applications perform perfectly, leading to a re-examination of a once widely accepted monitoring toolset.
Join as we discuss:
•Why monitoring has become a big data problem
•The morphing monitoring tools landscape
•The value network monitoring tools can bring to APM and security
Inline security tools operate by actively preventing threats in your network, but deploying and optimising these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade.
The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges.
Join Gigamon and (ISC)² EMEA in this webinar where we aim to examine how inline bypass can overcome physical deployment obstacles, maximise network availability, increase the scale of inspection and reduce the impact to network performance.
New research from CyberEdge’s 2018 Cyberthreat Defense Report shows that in spite of increasing their security budgets, companies are finding that there is too much data even for new tools to analyze, not enough skilled IT security professionals and little confidence in current investments. Sign up for this webinar to gain key insights into the cyberthreat landscape and how to protect your organization.
Attendees will learn how to:
- Deal with cyberthreat headaches such as increased breaches, vulnerabilities and encrypted traffic.
- Reduce incident response and remediation time with automation.
- Find products that use automation to minimize their dependency on skilled security personnel.
Now in its fifth year, this report provides a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. Register now to learn how your colleagues plan to defend against cyberthreats!
Today’s rapidly evolving world means that traditional security measures like firewalls and antivirus are not sufficient to protect a company from a devastating breach. While it’s usually the big companies that make the headlines, the reality is every organization is a target, regardless of size. In fact, attacks are on the rise for small and midsize businesses because most lack the essential security controls necessary to mitigate risk.
With a major shortage of skilled resources in today’s cybersecurity market, more and more organizations are opting to outsource key security monitoring services to a managed security service providers (MSSPs). Whether for log management, managed detection and response (MDR), SIEM-as-a-service, or compliance management, organizations large and small are turning to MSSPs to deliver these solutions quickly and cost-effectively.
Join us for this one-hour discussion and learn how you can extend your IT team with managed security services:
- Why Managed Security
- Types of Managed Security Services
- Benefits of Outsourcing Security
- How to Select the right MSSP
VP of Global Channels
Mike LaPeters joined AlienVault in 2015 and heads up the global channel initiative. Mike has more than 20 years’ experience building and leading channel organizations in security, infrastructure and storage software products. He has led teams at CA, VERITAS Software (Formerly Symantec) and he represented the sales and channel efforts from inception through acquisition at 4 startups (acquired by Microsoft, Hitachi (WD), SolarWinds, Nimboxx). He is a 3-time recipient of CRN’s Channel Chief award.
Today’s data centers are expected to deploy, manage, and report on different tiers of business applications, databases, virtual workloads, home directories, and file sharing simultaneously.
HPE 3PAR StoreServ is highly efficient, flash-optimized storage engineered for the true convergence of block, file, and object access to help consolidate diverse workloads efficiently.
This session provides an overview HPE 3PAR File Persona and core file data services.
IoT devices are increasingly connected to conventional IT infrastructures, to improve operational efficiencies and ease of remote management. IT leaders are now responsible for connecting doctors, nurses, patients, and medical devices, or enabling financial advisors on the road, to deliver services to their clients. From enabling services via remote mobile devices, to managing IP-connected cameras on-premises at the same time, running this new converged IT ecosystem, that includes Operational Technology (OT), can be a daunting task. Especially when your attack surface has now dramatically expanded.
According to Verizon's 2017 Data Breach Investigations Report, a total of 51% of data breaches affected either financial services businesses (24%), healthcare organizations (15%), or public sector entities (12%). With the rise in data breaches in these industries, and the responsibility to manage this connected ecosystem, how do you protect your business from attacks targeting connected devices? Furthermore, how do you do this without the budget to build and staff a full-fledged Security Operations Center (SOC)?
Join us to discover:
- The top 5 best practices you can adopt to improve your overall security posture
- How you can equip your business with the security capabilities of a large enterprise at a fraction of their costs
Your company is embracing big data, analytics and IoT, and your infrastructure can’t keep up. How can recent breakthroughs in data storage help you gain a competitive advantage?
In this session, you’ll discover a new storage architecture that makes it possible to store more and spend less while accelerating your path to innovation. Learn how this novel approach solves the age-old problems of performance, availability, scalability AND affordability, in a simply better way.
About the speaker:
Brian Carmody is Chief Technology Officer at INFINIDAT, where he leads the research and emerging tech group. Prior to joining INFINIDAT, he worked on the XIV storage system at IBM. A 15-year tech veteran, his experience also includes system engineering roles at MTV Networks and Novus Consulting Group.
Given modern application API services and the dynamic nature of containers, traditional load balancers fail to handle rapid config change. In this webinar we will share real world A10 & Ansible customer use cases in Nutanix Acropolis platform. Come and learn how to deploy A10’s load balancers and deliver advanced app services and lifecycle management—including auto scaling, automation and per-app analytics all through A10’s Harmony Controller within Nutanix Cloud. Simplify complex network and application delivery with A10’s recommended best practices for effective automation.
An organization’s data is constantly under attack. Whether it’s through ransomware attacks, cyber-threats or employee misguidedness, all expose organizational data and put it at risk. Encryption and access control are the keys to securing data and cyber resiliency, but most storage systems throughout the infrastructure (primary, secondary and protection storage) treat security as an afterthought reducing flexibility and increasing complexity. In this live webinar we will discuss the three reasons why storage security is failing.
Threat intelligence offers the ability to improve threat detection and response using information on attack methods previously reported by others, but only if it can be effectively integrated into security controls and processes. So, how do you go from threat data to actionable insights?
Join AlienVault for this webcast to get a look under the hood at how the AlienVault Labs threat research team turns threat data and indicators of compromise (IoC’s) into comprehensive, actionable threat intelligence.
- What threat intelligence is, and how it speeds threat detection and incident response
- Key questions to help you evaluate threat intelligence sources
- How the AlienVault Labs team analyzes threat data, and turns it into actionable information
- How AlienVault USM Anywhere integrates threat intelligence with multiple security capabilities to accelerate threat detection and response
Principal Product Marketing Manager
Sacha has over 15 years of experience in technology and information security across product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he delivered solutions to address the IT security, identity and management space. Before joining AlienVault, he worked in the office of the EVP for Cloud and Enterprise business at Microsoft. Originally from the UK, Sacha is based in Austin TX and holds a Masters in Computer Science from Vanderbilt University.
Threat Engineer, OTX
Chris works on Alienvault OTX as a Threat Engineer. He’s had a long interest in security, but joined the industry after winning the civilian section of the Department of Defense's forensics competition. Chris runs a popular threat intelligence portal (ThreatCrowd.org) in his spare time, and holds a CCHIA (Certified Host Intrusion Analyst) from CREST and a degree in Computer Science from the University of Cambridge.
En este Webinar, Ana Rocha de Oliveira, Cloud Sales & Business Development Manager de Red Hat, abordará los retos de los departamentos de IT en España y la forma en que los solucionaron con tecnología open source y con cultura DevOps. La visión de Red Hat considera que una automatización integral es un componente estratégico y fundamental de la modernización y la transformación digital.
Businesses of all sizes can’t be without their critical data for long. Yet, a large-scale disaster can readily disrupt systems and make doing business impossible. Building out your own data center for disaster recovery can be very costly.
Join StorageCraft for an exclusive webcast and learn how to best protect your on-premises business systems and data in a cloud purpose-built for total business continuity.
Can your backup deliver? Join Storage Switzerland and Aparavi for a live interactive webinar where we will discuss the unstructured data problem, why legacy solutions fall short and the three key capabilities that modern unstructured data protection solutions must deliver so that organizations can extract maximum value from their unstructured data investment.
Network functions virtualization (NFV) has matured to the point where the majority of network functions can be hosted on Intel architecture-based servers.
A single virtualized system hosting an NFV infrastructure (NFVI), network orchestration,and virtual network functions (VNF) can replace the multiple dedicated pieces of customer edge (CE) equipment needed for local and wide area networking.
In this webinar we will demonstrate how to deploy a fully-orchestrated universal CPE architecture, with closed loop automation.
More about our presenters:
Marc Bouteyre, Head of SDN/NFV Solution Management, Kapsch
Sharone Zitzman, VP Marketing, Cloudify
In this webinar, join Storage Switzerland and Panasas to learn:
- Why HPC workloads are on the rise in the enterprise
- Why common enterprise storage can’t keep up with HPC demands
- Why traditional HPC storage is a poor fit for the enterprise
- A three-step process to designing an enterprise-class HPC storage architecture
The highly automated deployments made possible by Kubernetes make it difficult to secure containers in production. Traditional tools are blind to container network traffic and can't see what's happening within a container. With NeuVector and SUSE CaaS, enterprises can deploy Kubernetes applications securely, automatically detecting new pods and network changes as containers scale or update. NeuVector protects containers from violations, threats, and container exploits with a multi-vector container firewall. Containers are also scanned for vulnerabilities and security benchmarks run for compliance and auditing.
Join us for a 30 minute overview and Q&A session with our Teradici Cloud Access Software Product Manager Mirela Cunjalo. We will share the use cases and benefits of delivering desktops and workstations with Cloud Access Software and its latest features, including the new brokering and provisioning service.
The “Great Storage Debates” webcast series continues, this time on FCoE vs. iSCSI vs. iSER. Like past “Great Storage Debates,” the goal of this presentation is not to have a winner emerge, but rather provide vendor-neutral education on the capabilities and use cases of these technologies so that attendees can become more informed and make educated decisions.
One of the features of modern data centers is the ubiquitous use of Ethernet. Although many data centers run multiple separate networks (Ethernet and Fibre Channel (FC)), these parallel infrastructures require separate switches, network adapters, management utilities and staff, which may not be cost effective.
Multiple options for Ethernet-based SANs enable network convergence, including FCoE (Fibre Channel over Ethernet) which allows FC protocols over Ethernet and Internet Small Computer System Interface (iSCSI) for transport of SCSI commands over TCP/IP-Ethernet networks. There are also new Ethernet technologies that reduce the amount of CPU overhead in transferring data from server to client by using Remote Direct Memory Access (RDMA), which is leveraged by iSER (iSCSI Extensions for RDMA) to avoid unnecessary data copying.
That leads to several questions about FCoE, iSCSI and iSER:
•If we can run various network storage protocols over Ethernet, what
•What are the advantages and disadvantages of FCoE, iSCSI and iSER?
•How are they structured?
•What software and hardware do they require?
•How are they implemented, configured and managed?
•Do they perform differently?
•What do you need to do to take advantage of them in the data center?
•What are the best use cases for each?
Join our SNIA experts as they answer all these questions and more on the next Great Storage Debate.
Making sure everything in the data center is properly protected is a common struggle that all data centers face. The cloud, cloud backup, seems like an answer to all those struggles. But, how exactly does IT make the conversion from on-premises backup to cloud backup? Join experts from Storage Switzerland, Veeam and KeepItSafe and learn; a method to determine if cloud backup is right for your organization and if it is, how to create a plan to begin the transfer to cloud based data protection operations.
As eCrime has evolved over the past decade, Nigerian cybercriminals have evolved too. 419 scammers or 'Yahoo Boys' running simple Nigerian prince scams have graduated to criminal confraternities conducting sophisticated business email compromise (BEC).
In 2017 CrowdStrike Services were repeatedly called in to organisations affected by BEC. Although non-technical in nature, the operations yield highly effective results.
In this webinar we'll share CrowdStrike Intelligence outlining:
- The techniques, tactics and procedures of these threat actors
- How BEC affects all geographical regions, involving fraud on multiple continents
- Steps you can take to protect your organisation
Email is the most commonly targeted attack vector. While many solutions have been introduced over the years, the invention of new evasion techniques means companies are still highly exposed. A new approach is urgently needed in order to ensure this channel is fully fortified for today and the future.
Join our CEO and CTO to learn more about:
1. How hackers are now easily bypassing traditional solutions like AVs, sandboxes, and more
2. How moving email to the cloud is an opportunity for much stronger, more efficient security
3. How to finally end the cat-and-mouse game with attackers with future-ready prevention techniques
Visibility, control, security, governance, and compliance are paramount to your IT infrastructure.
Those can be even more challenging in a hybrid infrastructure consisting of physical, virtual,
cloud, and container environments. You can ease these challenges by automating security and
compliance using a combination of Red Hat® CloudForms®, Red Hat Satellite, Red Hat Insights,
Red Hat Ansible® Automation, and OpenSCAP. In this session, learn how to easily provision a
security-compliant host, how to quickly detect and remediate security and compliance issues,
how to ensure governance and control, how to do proactive security and automated risk
management, how to perform audit scans and remediations on your systems, and how to
automate security to ensure compliance against regulatory or custom profiles.
Join us for this webinar as we discuss the visual language necessary to communicate with all the varied stakeholders that are impacted by or part of the vulnerability risk management process: business users, application owners, IT administrators, security professionals, compliance regulators, and others.
We will discuss the data analysis necessary to create and communicate different types of metrics, including :
Business Exposure: What risks are different business entities exposed to due the vulnerabilities?
Vulnerability Impact: How do different technologies and various types of vulnerabilities contribute to risk?
Remediation Performance: How effective and efficient are current remediation efforts?
The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.
Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.
In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:
- Eliminate monitoring blind spots
- Vastly improve the accuracy and precision of data risk detection
- Help organisations meet the GDPR challenge
About the Presenter
Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
A recent survey conducted by Ensono, in partnership with the Cloud Industry Forum, showed that 89% of respondents believed that legacy technology was a barrier to effective digital transformation. Given that many organisations operate a complex technology landscape often with elements in different locations, and with core components that are regarded as ‘legacy but critical’, there needs to be a clear and simple approach to overcoming these obstacles.
Breaking down the barriers requires effective change in people, process and technology to attain a viable level velocity that will enable transformation without being held back by perceptions of legacy issues.
Examining these issues, this webinar will provide insight and thought provoking approaches for organisations seeking to transform their operations against this backdrop.
When SAP performance suffers, business suffers. This industry-first solution offers ABAP code-level visibility and instrumentation, giving you real-time performance monitoring and diagnostics across mission-critical environments.
See how AppDynamics for SAP can unify monitoring and deliver code-level visibility across your SAP environments. In this webinar, you will see a live demo of SAP performance monitoring and learn how AppDynamics:
* Visualizes SAP components and dependencies in real time
* Establishes dynamic baselines for key SAP transactions
* Diagnoses SAP issues down to a single ABAP statement
* Assists with cloud migrations and SAP S/4HANA transitions
Disaster Recovery plans have always been hard to create and maintain in part because it is difficult to meet the service levels that those plans promise. With recent trends like GDPR and ransomware threats, it is even more difficult for DR plans to live up to expectations.
Join Storage Switzerland’s Founder and Lead Analyst, George Crump, and Commvault’s Senior Director of Solutions Marketing, Don Foster and learn:
1. What new trends and threats promise to break your current DR process
2. How to simplify creation and maintenance of your DR plan
3. How to meet the service levels that your DR plan commits you to
Data lakes are centralized data repositories. Data needed by data scientists is physically copied to a data lake which serves as a one storage environment. This way, data scientists can access all the data from only one entry point – a one-stop shop to get the right data. However, such an approach is not always feasible for all the data and limits it’s use to solely data scientists, making it a single-purpose system.
So, what’s the solution?
A multi-purpose data lake allows a broader and deeper use of the data lake without minimizing the potential value for data science and without making it an inflexible environment.
Attend this session to learn:
• Disadvantages and limitations that are weakening or even killing the potential benefits of a data lake.
• Why a multi-purpose data lake is essential in building a universal data delivery system.
• How to build a logical multi-purpose data lake using data virtualization.
Do not miss this opportunity to make your data lake project successful and beneficial.
The adoption of cloud-managed services such as managed databases and machine learning gives developers the freedom to innovate in the application business logic. Coupling microservices with adoption of cloud infrastructure and cloud managed offerings is a recipe for high-velocity application development. But what does this transformation mean for security teams?
Watch this webinar to learn:
-How to secure heterogeneous cloud environments.
-How to follow Zero Trust principles of authentication and authorization for all transactions.
-What are the main components of security in the microservices stack?
How many security alerts can your operations team process daily? Not enough? Many organisations are in the same boat; looking for ways to mature their security operations, and increase the efficiency of skilled security analysts. However, teams that utilise Security Orchestration, Automation & Response (SOAR) platforms are seeing improvements in scale, consistency, and are responding to alerts at machine speed. Join this webinar to learn:
•What the security response process performed by security analysts, looks like when employees report phishing attempts
•What applications and tools a security analyst utilises to respond
•What SOAR is and can help you achieve
•How responses look in comparison when utilising a SOAR solution
•Three top tips on getting started to ensure successful automation and orchestration in your organisation
There is no predefined roadmap for leaders in the cloud and hosting industry. As enterprises look to cloud and hosting providers to help them accelerate their transformation journey, service providers are undergoing their own rapid changes. This 451 Research webinar sponsored by NetApp will share the deep survey-based insights and trends learned from service providers of all shapes and sizes. Cloud and hosting service providers attending this webinar will take away valuable insights that will help them determine the types of customer-facing services and solutions that will help them drive new revenue opportunities now and into the future.
Supporting more business operations at a faster pace with a lower total cost of ownership with higher levels of security is a request that is likely familiar to many IT leaders today. Luckily, these demands are attainable via a hyperconverged infrastructure which allows data-at-rest encryption natively. Fornetix and Nutanix have partnered to create an integration that allows for flexibility without compromising security.
During this webcast, attendees will learn about:
1) Boosting security on your Nutanix-powered infrastructure with Fornetix Key Orchestration
2) Leverage industry standards to enable a trusted and regulated communication channel between technology providers
3) Unifying encryption key management across your organization for heightened governance and control
If you are struggling to keep up with selecting, testing and deploying new security tools, you won’t want to miss this webinar.
You’ll learn how to:
- Address the unique challenges of securing your unique network.
- Implement smart network segmentation and intelligent tool routing.
- Facilitate testing and deploying tools through a security delivery platform.
- Handle the challenges of setting up realistic tests.
Learn how the GigaSECURE security delivery platform strengthens new security tool testing and streamlines deployment.
As organisations struggle to cope with an explosion of data volumes, new data consumers, new types of data and increasing amounts of data in the cloud; they’re increasingly recognising the complexity of the task around governing their data. But help is at hand. During this webinar, Informatica will explain how Data Governance has been reimagined and how the latest technology innovations, namely AI and machine learning, are applied to reduce complexity and the effort required to enable organisations to unlock the value of their most precious asset: their data.
Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
- CPE opportunities, member benefits and getting involved
- Updates on (ISC)² news, developments and changes in your region
- Your membership requirements summarized
- Who are the (ISC)² EMEA team and how we can help you
- Focus discussions
- Q&A session
There are several essential benefits that SD-WAN brings to an enterprise including an increase in service agility and operational efficiency, massive scale, and a dynamic and robust security model.
However, in order to achieve these benefits the SD-WAN provider must demonstrate flexibility to accommodate various network scenarios, include dynamic software defined security to protect inside the perimeter of the network, and re-invent service assurance to support this new network paradigm.
All of this must be done with performance and scale while accommodating various cloud strategies now and into the future.
Join British Telecommunications, Nuage Networks, and Intel to discover how to accomplish this network transformation with their Agile Connect SD-WAN service offering.
Hussein Khazaal – Head of Marketing Nuage Networks
Sab Gosal – Intel – vCPE Market Segment Manager
Adrian Comley GM for network services, BT