Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
The rapid adoption of enterprise cloud-based solutions brings data integration as one of the greatest challenges. The challenge grows on increasingly numerous SaaS applications with lack of suitable connectors that fit your business needs. Join this webinar led by Primitive Logic team to see how data integration can be simplified for your cloud. This talk introduces the generic declarative zero-coding approach using Informatica Cloud Rest Connector as an example and illustrates its practical features, as well as best practices and hidden gems.
Moderator: Jill Reber, CEO, Primitive Logic
Panelists: JayJay Zheng, Technical Director & Eric Greenfeder, Chief Architect, Primitive Logic
Are your users tired of having to login to the corporate network via VPN? Do you wish you could manage at-home devices remotely? In our latest release of PCoIP Management Console, we’ve added the ability to manage both office-based and at-home PCoIP Zero Clients.
During this 30-minute webinar you’ll learn the best ways how to set up PCoIP Zero Clients so your employees or external consultants can be productive from wherever they happen to be.
The demonstration will cover how to:
•Configure PCoIP Zero Clients for off-site employees or contractors
•Determine the best WAN settings to recognize out-of-office devices
Upgrading your IT operations -- even with the industry's leading virtualization platform -- is an unpredictable process. During this webcast, our technical experts will share common do's and don'ts for an easier virtualization upgrade execution for your DevOps and IT teams.
The cloud provides organizations with elasticity and speed and by 2018 60% of an enterprises’ workloads will run in the cloud says 451 Research. The amount of business operations running in the cloud means organizations have more cloud computing service providers, with a typical enterprise having roughly six. This requires companies to develop and implement a multi-cloud strategy, especially when it comes to security. But each CSP has its own security offerings and integrations sometimes making the process confusing and complex. Even prior to the cloud, encryption and key management have presented challenges for many organizations, but with encryption becoming ubiquitous – a strong key management strategy is key. This is especially important with industry mandates and government regulations like European General Data Protection Regulation (GDPR) and U.S state data breach disclosure laws.
In this joint webinar with 451 Research, we will cover topics including:
-Building a multi-cloud security strategy for encryption and key management
-Best practices, benefits and pitfalls of managing your own security
-Impact of regulations on data protection in the next few years
-Understanding the different CSP requirements for key management:
oCustomer-Supplied Encryption Key (CSEK)
oBring Your Own Key (BYOK)
oHold Your own Key (HYOK)
oGeneral cloud service provider key management services overview
The February 2018 deadline for complying with PCI DSS 3.2 is fast looming. Most of the new requirements in the latest PCI DSS guidelines are focused on the need to extend multi-factor authentication (MFA) to additional use cases and user groups within organisations who handle Credit Card Data. From February 2018 onwards, all individuals who access systems such as databases, network modules and email servers which hold credit card data will be required to authenticate themselves with MFA.
Join (ISC)² EMEA and Gemalto to learn:
- What’s new in PCI DSS 3.2
- How to effectively map PCI DSS MFA requirements to business use cases and user groups in your organisations
- Best practices for organisations that need to extend their MFA footprints to additional use cases, and for those that are starting to think about how to comply with PCI DSS’s authentication requirements.
Contracting is becoming more and more popular among professionals. In this episode Travis O’Rourke, Head of Hays Talent Solutions in Canada, discusses how you can determine if contracting is the right career path for you.
For more contracting tips and careers advice, visit our blog Viewpoint: www.haysplc.com/viewpoint
How can enterprise IT operate more like AWS? That is the defining technology question of the decade. Hyperscale computing models pioneered by AWS catapulted “cloud” to the top of the IT agenda. This model fuels digital business, creates tectonic shifts in IT spending, and upends legacy IT infrastructure vendors. But should today’s CIOs build or buy their own cloud? The simple answer: both. We live in a multi-cloud world. A hyperscale strategy balances digital services across private and public clouds.
In this session we'll provide:
-Lessons learned from building two of the world’s largest distributed systems: Amazon Dynamo and Facebook's Cassandra.
-How to develop a multi-cloud strategy for modern data centers that accommodates both virtualized and containerized applications.
-Where software-defined storage fits into this strategy to help data span cloud boundaries and avoid cloud lock-in.
The main benefits of containers vary from speed of development and deployment to scalability, flexibility, and cost-effectiveness – which is what made containers so popular today. But the ability to move containerized applications among different environments, from a public to private cloud for example, is one of the most important benefits of containers, making them enterprise favorites for cloud migration and hybrid cloud architectures.
In this webinar, we will talk about how to use containers in a hybrid cloud, specifically:
1.How containers make it easy to migrate and move applications between clouds
2.What architectural considerations and tooling you need to achieve portability
3.How to ensure consistency of control, security, and compliance across container cloud deployments
Learn how to determine your anticipated costs and benefits to make an informed decision on how to securely and cost-effectively migrate your workloads to the Google Cloud Platform without disrupting your operations.
Join us for a fast-paced and informative 60-minute roundtable as we discuss the latest—and potentially most game-changing—technology disruptors to traditional storage architectures since flash: NVMe over fabric and Storage Class Memory.
It was just five years ago that Flash technology transformed the traditional storage market forever. Modern flash-first arrays are now the new normal for traditional storage. Will a new shared storage access protocol called NVM express over Fabric (NVMe-oF) combined with the advent of storage class memory (SCM) be equally disruptive to traditional storage over the next five years as NAND flash technology was in the past?
Vendors are now announcing new products and future architectures to enable them to support these new technologies. With the help of a lively panel of experts from HPE, Pivot3, and Mellanox, we will unpack this topic and explore how their innovative approaches to leveraging Storage Class Memory and NVMe-oF can radically improve storage products and solutions.
CFOs rejoice! CEOs take to the streets in celebration! Ok, maybe it’s not quite that exciting, but did you know that you can get the best of both worlds in storage? One of the biggest challenges in storage has been paying for it. Thanks to trying to plan for exactly how much storage you need right now versus how much you need in the future, people often just overbuy with the expensive hopes that they’ll grow into it.
You actually have a whole lot of financing options at your disposal to pay for storage, from buying to leasing to simply paying for what you use, just like the cloud. Why pay for storage that you’re never going to actually use?
And, what happens when your storage gets too old? You buy new. What if you didn’t have to? What if you could pay a bit more in maintenance on your current system in exchange for an upgrade when the time comes?
Join Rob Commins, Sr. Director of Product Marketing for Tegile Systems, as he takes a deep dive into:
- Best practices for storing your data in the cloud
- How to keep cloud storage costs to a minimum
- How to scale data growth and storage capacity
Rob Commins has been instrumental in the success of some of the storage industry's most interesting companies over the past twenty years including HP/3PAR, Pillar Data Systems, and StorageWay. At Western Digital, he leads the Data Center System's business unit's product marketing team.
As much as the term Cloud Computing gets tossed around these days you would think everyone’s using it. But do cloud predictions really match real world use? If you aren’t “in the cloud” are you already behind the competition?
During this presentation, we will discuss the pros and cons of moving applications to the cloud, with a particular focus on business critical applications. We will share our experiences working with clients to determine if their applications are “cloud ready” through a review of availability, costs, and operational impacts. Examples of successful use cases in the public cloud will be explored including emerging technologies, DRaaS, new applications, older applications running on older hardware, and startups.
You’ll leave with a better understanding of the types of applications that are best suited for the cloud, a list of questions you should be asking when considering moving to the cloud, and a checklist you can use to evaluate your application’s cloud readiness.
SIEM solutions have been widely adopted to help IT teams collect and correlate data from a variety of security point products. However, traditional SIEM deployments require a great deal of time, money & expertise to properly normalize data feeds, create correlation rules to detect threats & continuously tune those rules to limit false positives. And, after all that work is done, it has to be continuously re-done as the network & threat landscape changes.
AlienVault takes a different approach to SIEM. Join this webcast to learn how AlienVault Unified Security Management (USM) overcomes the most common SIEM challenges with:
Built-in capabilities like asset discovery, vulnerability assessment, intrusion detection, orchestrated incident response, and log management
Continuously updated correlation directives, vulnerability signatures, incident response guidance, and more
Fully integrated, real-time threat intelligence from the AlienVault Labs Security Research Team and the AlienVault Open Threat Exchange (OTX)
The ability to monitor on-premises and cloud environments including AWS and Azure, as well as cloud applications like Office 365
Ten years ago, the SNIA 100-Year Archive Task Force developed a survey with the goal to determine the requirements for long-term digital information retention in the data center - requirements needed to frame the definition of best practices and solutions to the retention and preservation problems unique to large,scalable data centers.
Now in 2017, SNIA presents a new survey developed to assess the following details:
1. Who needs to retain long term information
2. What information needs to be retained and for how long
3. If organizations are able to meet their retention needs
4. How long term information is stored, secured and preserved
Join us as we see where we were and where we need to be in the preservation and retention of data.
By 2020, five billion people will be online, with 25 billion devices and machines using the Internet. Many devices will share data and services, and the way we engage with them will fundamentally change. In a connected world, consumer expectations of executing transactions on a phone, tablet, VR device – or even a refrigerator – will be higher than ever.
As time goes on, devices will become smarter and make more and more decisions for us. We’ll be able to create rules as users to tell our devices what we’re comfortable with them paying for automatically. The use cases for rule-based payment are endless!
As such, the onus of creating frictionless download and shopping experiences while overcoming barriers between devices lies with each business. When it comes to recurring and subscription payments, the technology underpinning these user experiences across devices is critical. Seamless, simple, and secure are the watchwords of an IoT world.
Don’t wait until 2020 to address consumer pain points and overcome technological barriers to IoT adoption. Tune in to the latest VB Live event and hone in on the fastest, best ways to prepare for the IoT world. After all, it’s already here. Attend this webinar and find out:
•How companies are already dealing with device connectivity
•How the challenges posed by IoT are being solved for today
•Global consumer attitudes around payments made by devices
•How payments will become ‘invisible’ or ‘translucent’ for users
•Payment technology that will enable devices to make decisions
* Kevin Gordon, Lead Innovation Architect, Worldpay
* Stewart Rogers, Analyst-at-Large, VentureBeat
* Rachael Brownell, Moderator, VentureBeat
The shift to cloud is on. The challenge is to adopt the right mix of cloud models for your organization. Public cloud is setting the pace with agility and scale ... and that has inspired a few myths (that we'll de-bunk). Can private cloud and the IT department keep pace? We'll make the case for a building block architecture - introducing public cloud-like web services in your data center. We will share the stories of organizations that have deployed this type of enterprise cloud to guarantee performance, enable self-service, quiet shadow IT and manage a massive footprint with a fraction of the effort.
Greater visibility and control for individual VMs, along with enhanced storage efficiency and QoS controls, allow customers to streamline management and ensure optimal performance for their virtualized infrastructure. This session will review the NetApp virtualization solutions portfolio before focusing on current ONTAP and NetApp tool capabilities for vSphere.
This presentation details how and where you should deploy an open hardware agnostic Software Defined Storage as part your move to a more agile software defined data center. And Open Software Defined storage solution is the perfect bridge for the traditional data center to move to a DevOps centric data center.
In this webinar we will talk about SUSE’s latest release that’s built on Ceph Luminous and will discuss a number of commonly deployed use cases, such as; disk to disk backup, compliant archives, bulk storage repositories, data lakes, and cloud storage, etc.. We also look at how SUSE can help you maximize the return of your storage investments without comprise or limitations.
A how-to guide to container and DevOps deployment can help you with the necessary architecture to move faster and be more agile. Red Hat and Intel can help you put DevOps, containers, and application platforms to work for your business.
Enjoy this unique conversation with DevOps enthusiast, Gene Kim, author of The Phoenix Project and The DevOps Handbook, and Brian Gracely, Red Hat director of Product Strategy. Learn from Gene Kim's 18+ years of experience studying high-performing IT organizations.
Join us for a discussion on culture, containers, and accelerating DevOps. Topics will include:
- The trends.
- The journey
- The challenges.
- The path to success
DRaaS is entering its second phase. No longer is it good enough to simply be able to recover applications in the cloud. Next generation DRaaS has to be able to backup faster, recover faster, include ransomware protection and be able to offer on-premises DRaaS, all while being very secure.
In this live webinar we will introduce you to “DRaaS - The Next Generation,” and show you the key elements a DRaaS solution must deliver in order to meet this challenge.
Join leading independent product assessment group, Miercom and technical experts from Silver Peak as they discuss the performance expectations of today’s networks and how the right SD-WAN solution can improve application availability across the WAN using any type of transport. They will disclose how Silver Peak’s SD-WAN solution, Unity EdgeConnect fared in their aggressive stress test environment and provide a live demo on its performance capabilities.
Like everyone else undergoing digital transformation, large, established organizations know cloud and DevOps adoption are critical to delivering the immediate, personalized, data-driven user experience customers demand. But often these companies have existing investments that limit their ability to monitor a DevOps toolset without fracturing their ability to see critical performance and availability metrics across their entire organization.
In addition, containers provide some unique monitoring challenges. Containers come and go so frequently, and change so rapidly, that they can be an order of magnitude more difficult to monitor and understand than physical or virtual hosts.
In this webinar you’ll learn:
•How traditional IT operations teams are adapting to monitor the DevOps toolset
•Ways to fill the container monitoring gap between hosts and applications
This presentation details how to leverage technologies such as Hadoop, MapReduce, Pig and Sqoop to massively scale cloud integrations to services such as Salesforce.com. Attendees will learn how to overcome API limitations, throughput latency and infrastructure scaling challenges to significantly increase integration performance.
Most businesses are rapidly moving to the cloud to be fast and nimble, reduce their cost structure, and reach more customers anywhere, anytime. These new architectures have powerful new capabilities—but also expose businesses to a new universe of risk.
When dealing with outsourced infrastructure like AWS, or a SaaS solution like Office365, it is easy for IT managers to assume that security is out of their hands, for better or worse. But, this assumption may not always be true. Businesses must develop an active cloud security strategy as they pursue their migrations, and become a proactive security partner with their cloud providers—or they will find themselves vulnerable to attack.
In this upcoming webinar, hear from security experts at Arctic Wolf Network (AWN), on:
- The top cybersecurity risks and best practices for securing cloud deployments
- How AWN security monitoring compliments the native security features in AWS and Office365
- The role of AWN cloud security in integrating observations from cloud and on-premise systems
To see how AWN CyberSOC™ can secure your cloud, register now.
About our speakers:
Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with in-depthexpertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.
Louis Evans is a new member of the Arctic Wolf team. He’s passionate about cybersecurity, defeating the next generation of threats, and Alan Turing.
Leírás: A konténerek hasznos eszközöknek bizonyulnak az alkalmazásfejlesztő és az üzemeltető csapatok számára egyaránt, és kulcsszerepet játszanak a korszakalkotó átalakulásban: megváltoztatnak mindent, az alkalmazásarchitektúrától és az infrastruktúrától kezdve az üzleti folyamatokig és az üzemeltetési modellekig. Tartson velünk, és fedezzük fel együtt a konténerek népszerű alkalmazási területeit, és vizsgáljuk meg a konténeralapú szolgáltatások létrehozását, szolgáltatását és felügyeletét támogató SUSE CaaS platformot.
Next Generation applications like IoT, MBB, AR, VR, V2X, etc. generates wide variety of traffic and with different QoS needs. Today's network is not designed to handled the ever growing varied traffic which chokes the network. Since each of these traffic may have a different QoS needs, one size fit all solution will not work in long run.
Network slicing is one of the key capabilities than enables flexibility which allows service providers to deploy multiple logical netwok on shared physical infrastructure. It also extensively uses the concept of Network function virtualization (NFV) and Software Defined Network (SDN) to bundle the virtualized network functions into tailored made logical network to handle varied requirement like low latency network, high bandwidth network, reliability, etc. This optimization helps to monetize the investment better and also opens up new revenue streams.
This session talks about
- What is network Slicing?
- How it is related to 5g?
- What will it do?
- Who is driving it?
- TCS Experimentation
Enterprises that use Kubernetes to orchestrate their container-based applications can benefit from a rich ecosystem of complementary technologies. Project Helm is one to watch - it helps you find, share, and use software built for Kubernetes. Join us as we explore the challenges of Kubernetes package management, and see how Helm helps you define, install, and upgrade even the most complex container-based applications.
SUSE delivers Kubernetes and Helm together in SUSE CaaS Platform 2, the latest release of SUSE’s enterprise class container management solution. In addition to Helm, the new release also incorporates updated versions of Kubernetes and MircoOS, streamlines public cloud accessibility, and more. If you haven’t taken a look at SUSE CaaS Platform lately, this is the perfect opportunity to get on board!
Whether using an on-premises or cloud based UC solution, reliable and SLA driven connectivity is critical to ensure that your enterprise business productivity and presence is not impacted.
Join Versa Networks and S-NET Communications as we provide insights into how a software-defined WAN (SD-WAN) delivers the improved and reliable secure connectivity for your enterprise voice and video services. S-NET Communications is an industry expert in cloud communications solutions, removing complexity from IT and enabling enterprises and SMBs to collaborate and connect from any location and any device.
Learn from their experience in integrating SD-WAN into their portfolio to deliver more secure and reliable services so their customers can attain faster data transfers and a more positive user experience for their business voice services.
What does modernizing the infrastructure for public cloud really mean? And what does your on-premises infrastructure have to do with an off-premises public cloud? Join us for this webcast and learn why modernizing your infrastructure is part of the journey for successful adoption of cloud computing. We’ll cover how you are well positioned for success with a VMware vSphere® foundation, and can continue the journey to a software-defined approach by virtualizing across the data center from compute to storage to networking, and adding unified management for intelligent operations. Specifically you’ll learn about:
· Components of a modernized infrastructure
· How to evolve to a software-defined environment
· Use cases of modernizing the infrastructure
How to get the most out of vSAN – VMware’s Hyper-Converged Infrastructure (HCI) software. In this webinar you will learn testing and tuning insights and lessons learned from Western Digital’s ongoing vSAN performance test bed. Learn the test bed design and why it’s done the way it is. You’ll find the answers to questions such as: What performance tools are used in the industry and why? How do vSAN features such as Erasure Coding, Deduplication and Compression, and Object Checksum impact performance? What design principles should be used when configuring your vSAN and implementing your VMs? What does “Working Set” mean, and how does it impact performance? What other knobs can be turned (e.g., Disk Stripes per Object, Cache Line Settings, etc.), and what can you expect from them?
A year ago, we predicted 2017 would bring difficult, messy hybrid cloud transformation, that “hybrid cloud” would become synonymous with “multi-cloud,” and that IoT and machine data would raise new questions related to security and data access.
Our crystal ball was crystal clear last year, and we’re breaking it out again to look forward to 2018.
In this webcast, we’ll cover the data storage trends most likely to make news in the New Year, including cloud vendors with on-prem-like strategies, security and the ransomware challenge, consolidation of secondary storage players and the comeback of captive cloud.
When considering a transition to SD-WAN, there are several important capabilities needed to suit an enterprise-grade network infrastructure. This webinar will cover critical SD-WAN features and how they translate to common deployment scenarios in different industries.
These features include:
- Overlay capability over MPLS, Broadband and LTE
- Unified and centralized management of the infrastructure
- Network segmentation with per-segment topologies
- Predictable Application SLA with centralized policies and real-time traffic steering
- Mature routing capabilities with BGP, OSPF, VRRP, and IGMP
- Robust zero-trust WAN security
If you needed to provide reports to management or an auditor to prove that your IT security controls are in place and working, how long would it take you to do that? And, how many different tools would you need to consult? The AlienVault Unified Security Management (USM) platform integrates many of the core security capabilities you need along with built-in reports to help you implement IT security best practice frameworks like the NIST Cybersecurity Framework (CSF), as well as demonstrate compliance with PCI DSS, HIPAA and other regulations.
Join this webcast to see how the USM platform makes it easy to:
Automate log collection, analysis and event correlation in a single console
Continuously scan for new assets and vulnerabilities
Get alerted of suspicious behavior like privilege escalations, account changes, malware and ransomware threats, and more
Simplify compliance with pre-built and customizable reports mapped to numerous regulatory requirements
It’s time to stop the madness! Join Storage Switzerland, Cloudian and Rubrik as we explain the three causes of data protection sprawl and more importantly – how to stop it.
Learn how to solve the 3 data protection sprawl challenges:
- Reduce the number of components in the process
- Manage storage data growth without impacting user experience
- Recover rapidly from any failure of any type
DXi® appliances now integrate Veeam Data Mover Service (VDMS) and support Veeam’s advanced features (IMVR, Synthetic full-backup…) directly from an inline global deduplication appliance. Why choose between performance and retention when you can get both?
Quantum converged tape storage solution supports a Veeam proxy server and you can now protect your data against ransomware without requiring a separate physical tape server. Join us and learn more on how to improve your 3-2-1 data protection strategy with Veeam and Quantum.
We’re all accustomed to transferring money from one bank account to another; a credit to the payer becomes a debit to the payee. But that model uses a specific set of sophisticated techniques to accomplish what appears to be a simple transaction. We’re also aware of how today we can order goods online, or reserve an airline seat over the Internet. Or even simpler, we can update a photograph on Facebook. Can these applications use the same models, or are new techniques required?
One of the more important concepts in storage is the notion of transactions, which are used in databases, financials, and other mission critical workloads. However, in the age of cloud and distributed systems, we need to update our thinking about what constitutes a transaction. We need to understand how new theories and techniques allow us to undertake transactional work in the face of unreliable and physically dispersed systems. It’s a topic full of interesting concepts (and lots of acronyms!). In this webcast, we’ll provide a brief tour of traditional transactional systems and their use of storage, we’ll explain new application techniques and transaction models, and we’ll discuss what storage systems need to look like to support these new advances.
And yes, we’ll explain all the acronyms and nomenclature too.
You will learn:
•A brief history of transactional systems from banking to Facebook
•How the Internet and distributed systems have changed and how we view transactions
•An explanation of the terminology, from ACID to CAP and beyond
•How applications, networks & particularly storage have changed to meet these demands
In today’s business environment, it’s imperative for organizations of all sizes to have a dynamic online presence. However, with always being connected, there comes real risk to your business. Ransomware attacks, like Petya and WannaCry, have demonstrated how businesses can be brought to a halt by locking access to business-critical data. So, how do you protect yourself? What should you be looking for?
In this fire-side chat with Sam McLane, Head of Security Operations at Arctic Wolf Networks (AWN), hear some of the most interesting attacks that AWN security engineers have successfully hunted down in 2017. You will also get an inside look at:
- The detection and response process
- The communication and teamwork that takes place between a robust Security Operations Center (SOC)-as-a-service and a customer
- The impact of human augmented machine learning
When it comes to security, you must take a proactive approach in assessing the risks and vulnerabilities. Register now to learn how!
About our speaker:
Sam McLane leads Security Engineering at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University. Sam holds a master of science in mathematics from Temple University and a bachelor of science in mathematics from Washington and Lee University.
Clearly, the onslaught of data, particularly big data, continues to cause many organizations to look for new ways in which to store, analyze, and manage that data. Cloud computing from public cloud vendors is often one place in which enterprises turn. Traditionally deployed and managed on-premises, databases are the lifeline of many enterprises. And while the cloud is appealing for a number of reasons, there are still questions on the minds of many organizations in choosing the right cloud partner to manage their database in the cloud.
Level 5 autonomy for automotive and the broader intelligent transportation industry will require hyper broadband connectivity. Smart communities and corporations developing products and services for ubiquitous connectivity understand that it requires a holistic vision of a fully 5G-connected environment.
This webcast will discuss the work cities, and automotive suppliers and OEMs are doing to build infrastructure and transportation vehicles that will move from human driven, through connected to autonomous capabilities.
>> Jill North, Innovation Program Manager, Department of Transportation, City of San Jose
>> Robert Grant, Senior Director of Public Policy, Lyft
>> Jeff Stewart, Assistant Vice President, Global Public Policy, AT&T
>> Tim Weisenberger, Project Manager, Technical Programs, Ground Vehicle Standards, SAE International
In this joint webinar, Versa Networks and VergX will discuss the benefits of a Network-as-a-Service approach to SD-WAN and SD-Security.
SD-WAN and SD-Security are hitting the mainstream market – and with Garter predicting that “by 2020, more than 50% of WAN edge infrastructure refreshes will be based on SD-WAN” and IDC forecasting SD-WAN to be a “$6 billion market,” by 2020, every service provider and enterprise should have WAN transformation on their radar.
With many services now being offered in a as-a-Service (XaaS) format, service providers need to take a deep look at how their customers are managing and refreshing their WAN technologies – the Versa NaaS format for providing SD-WAN and SD-Security is both a digestible and managed approach, and offers unique advantages for UCaaS companies looking to expand and improve the experience their services provide.
Learn how SD-WAN and SD-Security can seamlessly fit into an existing product and services portfolio without the infrastructure investment and lost time to market.
In the latest IT episode of “Everything Old is New Again,” captive cloud is making a comeback – at least in market conversations. As enterprises navigate the pros and cons of public versus private versus hybrid clouds, “captive” is back in the mix. What does this mean for data centers trying to balance the elasticity of the public cloud with the realities of its actual operational costs for some workloads? In this webcast, we’ll dive into what’s behind the latest rise in captive cloud interest.
Digital businesses of all sizes are facing a myriad of new and complex threats. Passing regulatory compliance checks and adhering to security standards is a good first step, but that's not enough to protect your IT infrastructure from being compromised or suffering a data breach.
CIOs/CISOs should stop focusing on check-box compliance just to meet regulatory requirements that apply to their industry (e.g. SOX, PCI, HIPAA/HITECH), and shift to a risk-based mindset. What does this mean to those in the small and medium business market segment?
In this webinar, we will address the following 3 key principles for implementing a risk-based security mindset.
- Determine how information flows, rather than controlling flow of information
- Stop trying to perfectly protect your organization, and invest in detection and response
- Accept the limitations of technology and become people-centric
About our speaker:
Dave Martin brings to Arctic Wolf more than 20 years of experience with IT security and networking technologies in a variety of engineering, product marketing, product management and business development roles. He currently serves as the Head of Product Management responsible for market positioning, product strategy and feature definition for our market leading CyberSOC services. Prior to joining Arctic Wolf, Mr. Martin has held executive and technical positions at companies including NSFOCUS, Edgewater Networks, Nokia, Ipsilon Networks and Newbridge Networks. Mr. Martin is a US Patent holder, a recognized security and networking expert and regular speaker at trade shows, partner conferences, insight panels, webinars and other industry events.