Hi [[ session.user.profile.firstName ]]

Virtualization

  • Three Reasons Why NAS is No Good for AI and Machine Learning
    Three Reasons Why NAS is No Good for AI and Machine Learning Storage Switzerland, WekaIO Recorded: Jul 19 2018 61 mins
    Artificial Intelligence (AI) and Machine Learning (ML) are becoming mainstream initiatives at many organizations. Data is at the heart of AI and ML. Immediate access to large data sets is pivotal to successful ML outcomes. Without data, there is no learning. The goal of AI and ML is to try to simulate human thinking and understanding. AI and ML initiatives cannot however be realized unless the data processing layer has immediate access to, and a constant supply of, data.
  • The Practitioner’s Guide to Security Monitoring in the Cloud
    The Practitioner’s Guide to Security Monitoring in the Cloud Danielle Russell, Group Product Marketing Manager & Brian Bledsoe, Sr. Technical Manager, Sales Enablement for NA, AlienVault Recorded: Jul 19 2018 61 mins
    Cloud computing continues to transform the way organizations use, store, and share data, applications, and workloads, but has also introduced a host of new security threats and challenges. With so much data going into the cloud—and into public cloud services in particular—these resources become natural targets for bad actors. And, contrary to what you may think, the primary responsibility for protecting corporate data in the cloud lies with the cloud customer, not with the service provider.

    AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. Whether you are looking to secure your AWS & Azure cloud environments, cloud applications like Office 365 and G Suite or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.

    Join this webcast to learn more about cloud security challenges and how to address them with USM Anywhere. You'll learn:

    - What the shared responsibility model means for the security of your cloud assets
    - Challenges with trying to use traditional on-prem security monitoring tools in your cloud environments
    - How USM Anywhere gives you visibility into all assets across your cloud and on-premises environments
    - Benefits of an all-in-one security solution for threat detection, incident response and compliance management

    Hosted By
    Danielle Russell
    Group Product Marketing Manager
    Danielle is a Group Product Marketing Manager at AlienVault, responsible for product messaging and positioning, go-to-market strategy, and sales enablement.

    Brian Bledsoe
    Sr. Technical Manager, Sales Enablement for North America
    Brian is a member of AlienVault's Sales Enablement team. He was previously a Sales Engineer, and then Sales Engineering manager at AlienVault.
  • HPE and Scality: Business Value of Scalable Object Storage, an IDC White Paper
    HPE and Scality: Business Value of Scalable Object Storage, an IDC White Paper Paul Speciale, CPO, Scality; Stephen Bacon, Director Scale-Out Storage, HPE; Special Guest: Amita Potnis, IDC Recorded: Jul 19 2018 48 mins
    Enterprises worldwide are contending with an accelerated pace of digital transformation where reliable and flexible information technology infrastructure can have a significant impact on revenue and profitability. As data volumes grow, so does the complexity and cost of storing and managing the data, with added complications for data governance and compliance. As businesses move toward petabyte-scale data storage, object storage solutions are emerging as superior alternatives for balancing scale, complexity, and costs. IDC interviewed organizations that have moved key workloads to Hewlett Packard Enterprise Scalable Object Storage with Scality RING to understand the impact of the solution on storage costs and business operations. Senior IT leaders and line-of-business executives will come away with perspectives from these companies that have successfully managed the digital transformation challenges.
  • Cryptojacking: Who/What/Why/When & How to Prevent Computer Power Being Stolen
    Cryptojacking: Who/What/Why/When & How to Prevent Computer Power Being Stolen Jay Kelley, Senior Product Marketing Manager, Menlo, Lindsay Drabwell, Head of Member Services EMEA, (ISC)² Recorded: Jul 19 2018 58 mins
    As users become savvier and increasingly use ad blockers, advertising revenue is declining. Crypto coin mining is emerging as a new way for websites to monetise visitor traffic. But, there is a “dark side” to cryptomining: Cryptojacking, which includes, among other misdeeds, cryptomining without a website visitor’s permission or knowledge. While cryptojacking may seem like a victimless crime, since all that is being “stolen” is visitors’ computing and graphics processing power, it is anything but, and can lead to serious consequences. This session will focus on the differences between safe, legal cryptomining and dangerous cryptojacking, what it is, who is using it, why it is being used, when, how it is being abused, and how web browser isolation eliminates 100% of the cryptojacking risk.

    • How crypto coin mining is being used today
    • Why websites are moving away from advertising to crypto coin mining
    • How and why web browsers are being used to steal users’ compute power away without consent in most cases
    • How businesses can stop wide scale use of cryptojacking across all browsers and devices in their network through isolation
  • Rethinking Security
    Rethinking Security Adrian Rowley, Technical Director EMEA Recorded: Jul 19 2018 38 mins
    This webinar looks at how to eliminate complexity, increase efficiency of security tools, and improve confidence in the overall security posture of your organisation.
    Adrian Rowley, Gigamon’s Technical Director for EMEA, will discuss todays challenges in network security and how these can be resolved.
    Attendees will learn how you can:
    •Maximise network availability and operational simplicity of security tool upgrades with its integrated inline bypass technology
    •Deliver unmatched depth and breadth of traffic intelligence that is essential to increasing efficiency of overburdened security and networking tools, while decreasing complexity
    •Minimise Total Cost of Ownership and increase ROI by an average of 153%
    Join Adrian Rowley to see why only Gigamon provides a full solution for networking tools and inline and out-of-band security tools across on-premises, remote, virtual and cloud environments.
  • Faster, Smarter, Simpler - The New Requirements in Storage Networking
    Faster, Smarter, Simpler - The New Requirements in Storage Networking Storage Switzerland, Cisco Recorded: Jul 18 2018 62 mins
    IT professionals need a faster, smarter and simpler storage architecture. Organizations drive this need by deploying more diverse and demanding applications and services. Data is the very lifeblood of an increasing number of organizations. The consumers of this data need rapid and consistent access to it. The storage network is the circulatory system that drives that data throughout the organization. Like the human circulatory system, the storage network is the key to the organization realizing the full benefits of the data-driven era.

    Join George Crump, Founder and Lead Analyst of Storage Switzerland and Paresh Gupta, Technical Marketing Engineer at Cisco as they discuss the new requirements for storage networking so it can deliver a faster, smarter and more straightforward experience for IT.
  • Three reasons to choose Citrix Workspace over VMware Workspace ONE
    Three reasons to choose Citrix Workspace over VMware Workspace ONE Amandeep Nagra, Sr. Product Marketing Manager, Workspace services, Citrix Recorded: Jul 18 2018 57 mins
    Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.

    With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.

    Some of Citrix Workspace key advantages include:
    • Higher user productivity and a better experience
    • Stronger security which extends to the cloud
    • joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario

    Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
  • Verizon Threat Research Advisory Center - Insider and Privilege Misuse
    Verizon Threat Research Advisory Center - Insider and Privilege Misuse David Kennedy and John Rudolph, Verizon Global Security Recorded: Jul 18 2018 79 mins
    Leverage Threat Intelligence where it matters most.

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Insider and Privilege Misuse

    Our Verizon Threat Research Advisory Center presenters will be:

    • John Rudolph, Principal Consultant, Identity and Access Management
    • Steve Atnip, Senior Analyst, Threat Intelligence
    • David Kennedy, Managing Principal, Open Source Intelligence
    • Laurance Dine, Managing Principal, Investigative Response – EMEA

    For this month's theme of 'Insider and Privilege Misuse' we'll feature John Rudolph, Principal Consultant, Identity and Access Management who'll discuss insider threat motivations, common denominators, and countermeasures, to include the Zero Trust approach. We'll then touch base on the IR Pulse and trends in our caseload, followed by:

    • Current Intelligence
    • Attacks & Threat Indicators
    • Latest Malware Trends
    • Significant Vulnerabilities
  • Kubernetes for the Platform Operator: What Every IT Ops Team Needs to Know
    Kubernetes for the Platform Operator: What Every IT Ops Team Needs to Know Rob de Canha-Knight, EMEA Technical Director, SUSE & Andreas Jaeger, Senior Product Manager, SUSE Recorded: Jul 18 2018 50 mins
    IT Operations teams in enterprises everywhere are being asked to provide Kubernetes infrastructure to help drive delivery of today’s modern, container-based applications. But where to begin? Much of the information about Kubernetes today has to do with how to use the platform; very little addresses the concerns of those of us who need to stand up and manage a Kubernetes environment itself. At SUSE, we’ve noticed. And we’re more than ready to help.

    SUSE invites you to explore Kubernetes from the operator’s point of view in this webinar. We’ll discuss platform installation and configuration issues, platform security, and platform maintenance concerns. Learn about monitoring and scaling Kubernetes, and managing its availability. How is Kubernetes changing and maturing, from an operational perspective?

    Join SUSE and discover what every IT Operations team needs to know going into the world of Kubernetes.
  • Simplify Hybrid Cloud VDI with Nutanix Enterprise Cloud Platform & Citrix Cloud
    Simplify Hybrid Cloud VDI with Nutanix Enterprise Cloud Platform & Citrix Cloud Paul Murray,Sr.Systems Engineer/Nutanix & James Hsu, Senior Technology Architec/Citrix Recorded: Jul 18 2018 60 mins
    It’s Time to Embrace Hybrid Cloud VDI with Nutanix InstantON for Citrix Cloud

    Nutanix and Citrix have partnered to create a tightly integrated hybrid cloud solution that simplifies and accelerates VDI deployments for companies of any size. With Nutanix InstantON for Citrix Cloud, the entire Citrix software stack is delivered as a 1-click service from the Citrix Cloud, attaching with zero effort to the on-prem Nutanix clusters powered by Citrix XenServer or AHV, the Nutanix native hypervisor. This hybrid mode tackles all the drawbacks of an exclusively on-prem or an exclusively cloud-based desktop delivery mechanism.

    In this webinar, you will learn how Nutanix and Citrix allow you to:
    · Take advantage of enterprise-class VDI benefits without any complexity
    · Simplify desktop management and operations while increasing security and compliance
    · Bring IT's focus back to the end-user with the help of Citrix XenApp and XenDesktop running on the Nutanix Enterprise Cloud
    · Safely transition to hybrid cloud using our tightly integrated VDI solution called Nutanix InstantON for Citrix Cloud
  • AI Ready Infrastructure For Deep Learning Deployment at Scale
    AI Ready Infrastructure For Deep Learning Deployment at Scale Michael Lang Senior Solutions Architect, NVIDIA ANZ and Michael Boots, Head of FlashBlade Sales ANZ, Pure Storage ANZ Recorded: Jul 18 2018 52 mins
    The era of Artificial Intelligence is here. Enterprises face an extraordinary opportunity to innovate and lead. However, real-world AI initiatives are often stalled by scale-out storage infrastructure complexities.

    In this webinar we’ll explore new approaches to enable AI-at-scale for enterprises, delivering time-to-insight in hours rather than weeks. We will also cover details and customer successes with AIRI™, the industry’s first complete AI-ready storage infrastructure, architected by Pure Storage® and NVIDIA® to extend the power of NVIDIA DGX™ systems.
  • Modernizing Healthcare IT with Software-Defined Storage
    Modernizing Healthcare IT with Software-Defined Storage Scott Lowe, CEO at ActualTech Media & Dave Brown, Sr. Solutions Architect at DataCore Software Recorded: Jul 17 2018 25 mins
    Join us in this presentation as we discuss how today’s leading healthcare organizations are using software-defined storage to tackle the top challenges in Healthcare IT by delivering uninterrupted data access, massive architectural scale-out, and game-changing application performance.
  • Three Steps to Multi-Vendor Storage Excellence
    Three Steps to Multi-Vendor Storage Excellence Storage Switzerland, SolarWinds Recorded: Jul 17 2018 61 mins
    Join this webinar with experts from SolarWinds and Storage Switzerland as they discuss how IT can have the best of both worlds: a mixed storage system environment that targets the specific requirements of their various workloads, while also expertly managing that environment using its resources efficiently and optimally.

    Key Webinar Takeaways:

    * The Pros and Cons of a Mixed Storage Vendor Data Center
    * The Value of a Global Storage Dashboard (detect performance and capacity problems across storage systems, deliver and end-to-end / application to storage view, free up wasted disk capacity, reduce time to resolution with visibility to the IT issue source and what it impacts, and adequately place workloads for their required performance)
    * The Requirements of a Global Storage Dashboard (works across multiple storage vendors, provides end-to-end views, does not replace but compliments vendor tools)
  • A pragmatic approach to service assurance in 5G network slicing
    A pragmatic approach to service assurance in 5G network slicing Anton Basil, Vice President – Technology, Veryx Technologies Recorded: Jul 17 2018 42 mins
    Many leading network operators as well as network equipment manufacturers have already recognized network slicing as an ideal network architecture for 5G deployment. It provides the flexibility for network operators to slice one physical network into dedicated virtual networks, logically separated from one another and dedicated for different types of services, with different characteristics and requirements.
  • Open, vendor-neutral, infrastructure management with SUSE - SUSE Manager 3.2
    Open, vendor-neutral, infrastructure management with SUSE - SUSE Manager 3.2 Jason Phippen, Product & Solution Marketing & Joe Werner, Senior Product Manager, SUSE Recorded: Jul 17 2018 32 mins
    In this SUSE Webinar you will learn about Open, vendor neutral, infrastructure management with SUSE.

    You will hear how to….

    Lower costs and simplify deployment while easily scaling larger environments for Public Cloud and Kubernetes infrastructures.

    Reduce bandwidth costs, minimize resource needs, and ease deployment with the new container-based Proxy deployment option, allowing you to more easily scale larger environments for Public Cloud and Kubernetes infrastructures.

    Improve DevOps efficiency and meet compliance requirements with a single tool to manage and maintain everything from your edge devices to your Kubernetes environments.

    1.Improve efficiency by managing and maintaining your Raspberry Pi based IoT devices and CaaS Platform environment, using the same tool you use to manage and maintain your bare metal and virtualized Linux environments.

    2.Improve operational efficiencies by providing easy automation of repetitive tasks without the need for advanced scripting skills via re-usable action chains.

    3.Ensure you are meeting your business’ compliance requirements, by monitoring and patching your Raspberry Pi based IoT devices and container-based workloads to the latest security and patch levels.
  • Stop Cyber Threats With Adaptive Micro-Segmentation
    Stop Cyber Threats With Adaptive Micro-Segmentation Lindsay Drabwell, Head of Membership Services EMEA, (ISC)², Vijay Chauhan, Senior Director of Product Marketing, Illumio Recorded: Jul 17 2018 59 mins
    Virtualization, the cloud, and the promise of containers have evolved the data center, bringing better application delivery and cost reduction. With these benefits come new risks that include increased East/West traffic and the potential for new cyber threats. Adaptive micro-segmentation is transforming and improving security inside data centers and clouds while speeding up application delivery.

    In this session you’ll learn:
    - How adaptive micro-segmentation enables security anywhere (on premises, AWS, Azure, etc.) on anything (bare metal, VMs, containers).
    - How you can eliminate app delivery delays caused by traditional security approaches.
    - How customers are using adaptive micro-segmentation to instantly protect high-value apps, separate dev and prod with one rule, take existing security policies to the cloud, and more.
  • Impact of a Law Firm Data Breach
    Impact of a Law Firm Data Breach Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Recorded: Jul 17 2018 3 mins
    Check out this webinar clip from our insightful talk on "Overcoming The Cybersecurity Skills Shortage in Law Firms" to understand which areas of a law firm can be affected by a data breach.

    To see the full webinar, click here: https://arcticwolf.com/resources/webinars/?utm_source=Arctic+Wolf+Networks&utm_medium=brighttalk&commid= 330632
  • Bringing Web-Scale Simplicity to Secondary Apps & Data
    Bringing Web-Scale Simplicity to Secondary Apps & Data Peter Linkin, Sr. Director of Enterprise Marketing, Cohesity Recorded: Jul 16 2018 32 mins
    Secondary data operations such as backup, file & object storage, copy management and DR have become cumbersome, expensive and ultimately risky due to complex infrastructure that hasn't seen true innovation in decades.

    Watch this on-demand webinar to see how Cohesity is bringing Google-like design principles such as web-scale, hyperconvergence and native cloud integration to a new platform that's been specifically designed to address the needs of secondary data and apps.
  • Chairman & CEO Violin Systems Interview with Scott Lowe Actualtechmedia
    Chairman & CEO Violin Systems Interview with Scott Lowe Actualtechmedia Mark Lewis, Scott Lowe Recorded: Jul 12 2018 6 mins
    Interview on 'Why Violin' and new momentum in Extreme Performance Storage for mission-critical applications
  • Automating Security Compliance with Ease
    Automating Security Compliance with Ease Lucy Kerner, principal technical product marketing manager, Security, Red Hat Jennifer LuPiba, product mkt manager, Red Hat Recorded: Jul 12 2018 53 mins
    As hybrid IT environments continue to expand and evolve, security must be automated to scale and mitigate risks to achieve compliance and meet the needs of the business.

    In this webinar, we’ll cover how to:
    - Rapidly and consistently deploy security and compliance configurations automatically in both virtualized and container environments.
    - Easily apply NIST-validated national checklist content such as DISA STIG, PCI-DSS, and more to a single image or across your virtual and container environment.
    This discussion will be in the context of integrating OpenSCAP in Red Hat® Enterprise Linux® with Red Hat Ansible® Automation.
  • vProtect - Enterprise-Grade Backup And Recovery For Nutanix AHV
    vProtect - Enterprise-Grade Backup And Recovery For Nutanix AHV Marcin Kubacki-Chief Software Architect,Peter Eicher-Director of Marketing,Krish Badrinarayanan-Director of Product Marketing Recorded: Jul 12 2018 46 mins
    Storware’s vProtect is a cutting-edge data protection solution for virtual machines running on Nutanix’s virtualization solution AHV.

    vProtect can work as a standalone solution, or it can integrate with your existing enterprise backup software:

    • Independent backup server: supports local filesystem, NFS, cloud AWS S3, OpenStack SWIFT.
    • Proxy server (media agent) for enterprise backup: supports IBM Spectrum Protect (TSM), Veritas NetBackup and Dell EMC NetWorker.

    In the webinar, you will learn how Storware and Nutanix can deliver end-to-end solutions that provide:


    -A complete infrastructure and virtualization solution ready for enterprise applications (Nutanix Enterprise Cloud OS with AHV)

    -Efficient, incremental backup of AHV VMs with CBT/CRT (Changed-Region Tracking)

    -Data consistency for your applications running on AHV VMs

    -File level restore from your backups

    -A scalable, multi-node backup architecture

    -Orchestration via Open API
  • It takes Deep Learning to Harness the Internet!
    It takes Deep Learning to Harness the Internet! Wes Jensen, CEO & Co-Founder (Netrolix) Recorded: Jul 12 2018 49 mins
    Netrolix leverages artificial intelligence to analyze network data to improve throughput by making more intelligent routing decisions. AI-WAN combines Netrolix Software Defined Gateways (SDG) with the company’s Machine Learning controller technology that provides deep analysis of network routes to identify the least congested and fastest data path through the network.

    The Software Defined Gateway (SDG) is a multifunction network appliance that can be deployed as a router, switch, firewall, or SD-WAN appliance.

    This provides full SD-WAN capabilities with intelligent switching of data across IP, multiprotocol label switching (MPLS), virtual private LAN service (VPLS), and virtual private network (VPN) connections, or it can be deployed as a termination point for carrier services.

    The Machine Learning controller platform analyzes real-time and historical information on network performance including data center locations, service provider tendencies, current congestion issues, time of day, and historical traffic patterns.

    Lastly, the Security Shield enhances these capabilities through the creation of unique security profiles for each device, location, and network in an enterprise. The Machine Learning technology analyzes data from these devices to spot traffic anomalies that are consistent with malware or network attacks.
  • Integrate your Micro Focus IT Operations into a Single Pane of Glass 4D Solution
    Integrate your Micro Focus IT Operations into a Single Pane of Glass 4D Solution Ed Willhide Recorded: Jul 12 2018 59 mins
    edgeSuite is a fully secure, system control plane that integrates your applications and data into SPoG (Single Pane of Glass) in a 4D solution. edgeSuite is unique in the marketplace because it incorporates the data within your environment, and the methods used to manage your business to create a single tool for both back-end and front-end solutions. When you are dealing with multiple data sets and multiple data sources, you are faced with the problem of complex navigation of different software solutions, and the inability to access them simultaneously in an efficient and effective way. Come to our webinar and learn how you can optimize your current Micro Focus investments. Seeing is believing!

    What you will learn:

    •How our ETV technology collects data for visualization and actionable response
    •How our Click-to-Write-Back and Click-to-Navigate technologies streamline operations over your digital transformation suite
    •How to create Role-Based views
    •How a Single Pane of Glass solution is built
  • DeepSea: Deploying and Managing Ceph with Salt
    DeepSea: Deploying and Managing Ceph with Salt Tim Serong, SUSE Recorded: Jul 12 2018 27 mins
    DeepSea - built on top of the Salt configuration management system - is a tool for deploying and managing Ceph storage clusters at scale. This 30 minute technical webinar provides a brief overview of Salt and Ceph, then goes into detail on how to use DeepSea itself to get a Ceph cluster up and running.
  • Hybrid Defense: How the City of Sparks Defends Against Cyberthreats
    Hybrid Defense: How the City of Sparks Defends Against Cyberthreats Steve Davidek, IT Manager, City of Sparks; Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Jul 11 2018 37 mins
    Businesses of every size and stripe risk becoming targets of cyberattacks. From governments to hospitals, these businesses are increasingly victimized by ransomware attacks and data breaches. So, how do you defend yourself? What do you do when your IT staff lacks the expertise to investigate growing security threats and respond to them in a timely manner? How do you get help from security experts to prevent suffering a future breach?

    Join Arctic Wolf Network’s customer, the City of Sparks (NV), in our upcoming webinar to discover the security challenges faced by most governments and business organizations. Learn how our industry-leading security operations center (SOC)-as-a-service – the AWN CyberSOC – helped the City of Sparks vastly improve its threat detection and response.

    This webinar will explore:

    - Key security challenges that plagued the City of Sparks
    - Reasons why Sparks’ IT team chose our SOC-as-a-service solution instead of building one in-house
    - How AWN CyberSOC™ with Hybrid AI improved Sparks’ threat detection and response by 10X

    Don’t let your organization become a prime target. Register today!
  • Top Five Benefits of Versa SD WAN
    Top Five Benefits of Versa SD WAN Danny Johnson, Dir-Verizon, Helen Wong, Verizon, Rob McBride, Dir-Versa Jul 24 2018 3:30 am UTC 60 mins
    Join us and our strategic partner, Versa Networks, for a discussion on Managed SD WAN Security Branch solutions. Through real use cases in deployments at scale, we will discuss how Managed SD WAN can help increase bandwidth, agility and reliability - while maintaining security.
  • Repenser la sécurité
    Repenser la sécurité Yann Samama, Consutlant Solutions de Sécurité Jul 24 2018 8:30 am UTC 45 mins
    Les évolutions technologiques, les nouvelles normes, l’augmentation constante du trafic, la complexité des infrastructures réseau au sein desquelles l’information est de moins en moins visible, ainsi que les cyber-menaces de plus en plus sophistiquées ont un impact majeur sur les entreprise et les obligent à repenser l’architecture de sécurité.

    Yann Samama discutera des défis actuels en matière de sécurité et comment ils peuvent être surmontés en abordant les sujets majeurs tels que :

    * Augmenter la disponibilité du réseau tout en simplifiant la  connectivité des outils grâce à une solution de module bypass
    * Disposer d’une visibilité en tout point réseau afin d’améliorer de l’efficacité de l’ensemble des outils connectés  tout en réduisant la complexité de leur exploitation
    * Diminuer les coûts OPEX et CAPEX via un  ROI très court-termisme

    Découvrez les raisons pour lesquelles Gigamon propose la solution la plus complète et efficace pour la connectivité des outils en mode « inline et Out of band » au sein des environnements physiques, virtuels et de cloud public.
  • Building a Collaborative Phishing Defense
    Building a Collaborative Phishing Defense Lindsay Drabwell, Head of Membership Services EMEA, (ISC)², Darrel Rendell, Mollie Holleman, Jul 24 2018 11:00 am UTC 60 mins
    What’s keeping you up at night? Ransomware? Phishing? Spyware? Malware? Data Breaches? A malicious email typically opens the door to those threats. Organizations spend great energy (and budget) preventing users from falling prey, but threat actors continue to find ways to get past automated controls, staying one step ahead of artificial intelligence tools. Cofense believes solving the phishing problem is more than just awareness: it’s about empowering humans to become instinctual nodes on the cyber defense network and feeding their real-time intelligence to security teams for immediate action.
    Speakers:
    Darrel Rendell, Principal Intelligence Analyst, Cofense
    Mollie Holleman, Senior Intelligence Specialist, Cofense
  • The Three Reasons Cloud Backup is Broken and How to Fix It
    The Three Reasons Cloud Backup is Broken and How to Fix It Storage Switzerland, Microsoft Azure Jul 24 2018 1:00 pm UTC 60 mins
    The cloud was supposed to be the answer to IT’s backup dilemma; instead, it in some ways has made the situation worse.

    Join Storage Switzerland’s Founder and Lead Analyst, George Crump and Microsoft Azure's Principal Group Program Manager of Azure Backup for a roundtable discussion on what’s gone wrong with cloud backup and how to fix it. In this webinar we’ll cover the three problems with cloud backup.
  • What's new in ONAP Beijing Release?
    What's new in ONAP Beijing Release? Amar Kapadia, Co-founder Aarna Networks, Inc. Jul 24 2018 4:00 pm UTC 45 mins
    Are you worried about orchestrating your NFV/SDN network services and edge computing applications? The Linux Foundation Open Network Automation Platform (ONAP) promised to be a key component of next generation networks to orchestrate, configure, monitor and automatically manage complex services and applications. With the recent Beijing release, the ONAP community has fortified software stability, harmonized northbound APIs with standard bodies, improved ONAP deployment using Kubernetes, added important functional features and created two new projects. If you have not followed the release too closely, join us for this webinar and learn all about it. In this webinar, you will learn:
    •What is ONAP?
    •How can ONAP help you?
    •What is new in the Beijing release?
    •How can you get involved?
  • Windows 10 & Office 365 Migration and Optimization Strategies
    Windows 10 & Office 365 Migration and Optimization Strategies Matt Crawford, Citrix Dir. Solutions Marketing and Matt Brooks, Citrix Sr. Technical Product Marketing Mgr. Jul 24 2018 6:30 pm UTC 60 mins
    Learn how to manage the top migration challenges and improve user productivity, security and IT management flexibility.

    With the shift to the Cloud, more companies are moving to Office 365 and Windows 10. Before you make your move, you’ll want to attend this webinar to learn how to manage the top migration challenges with Citrix Workspace and improve user productivity, security and IT management flexibility.

    For a sneak preview, here are few of the top challenges that you’ll learn how to solve by attending the webinar:

    •Managing a mixed environment of Windows 10 and Windows 7 devices with legacy PC management tools
    •Windows 10 application incompatibilities
    •Mobile security risks with running Exchange on-prem
    •Network latency from running O365 in the cloud
    •Managing multiple file hosting services including OneDrive
  • Technical Briefing - Kubernetes for the Platform Operator
    Technical Briefing - Kubernetes for the Platform Operator Rob de Canha-Knight, EMEA Platform and Management Technical Strategist, SUSE Jul 25 2018 2:00 pm UTC 30 mins
    Join our SUSE StandUp webinar! In this 30 minute session, our subject-matter experts will give you a technical deep-dive/live demo on our SUSE solutions.
  • Managing Hybrid Clouds like a Pro
    Managing Hybrid Clouds like a Pro Dan Waymire, Senior Manager of Unified Cloud at Hosting Jul 25 2018 5:00 pm UTC 60 mins
    Join Hosting’s Dan Waymire, SR. Manager of Unified Cloud, to see first-hand how Hosting can help your organization monitor assets in any environment, all within a single pane of glass.

    Enterprises today are aware of the risks of taking an exclusively public cloud approach. Companies need a holistic cloud strategy spanning deployments in:

    • Private Cloud
    • On-premise
    • Public Cloud

    As IT professionals distribute workloads across various clouds, it is more critical now than ever to manage the performance, availability, and cost of your IT assets.

    In this webinar, you will learn how you can effectively manage all of your environments, as Dan demonstrates the true value of adopting a single-platform monitoring tool.
  • Sicherheit neu überdenken
    Sicherheit neu überdenken Daniela Fusaro, Senior Solutions Architect Jul 26 2018 8:00 am UTC 45 mins
    Dieses Webinar befasst sich mit der Beseitigung von Komplexität, der Steigerung der Effizienz von Sicherheitstools und der Verbesserung des Vertrauens in die allgemeine Sicherheitslage Ihres Unternehmens.

    Daniela Fusaro, Senior Solutions Architect, diskutiert die heutigen Herausforderungen im Bereich der Netzwerksicherheit und wie diese gelöst werden können.

    Die Teilnehmer lernen, wie man:
    * Netzwerkverfügbarkeit und einfache Handhabung der Upgrades von Sicherheitstools durch integrierte Inline-Bypass-Technologie maximiert
    * Unerreichte Tiefe und Breite der Traffic-Intelligenz bereitstellt, die für die Steigerung der Effizienz überlasteter Sicherheits- und Netzwerktools unerlässlich ist, während gleichzeitig die Komplexität verringert wird
    * Gesamtbetriebskosten verringert und den ROI um durchschnittlich 153 % steigert

    Melden Sie sich bei Daniela Fusaro an, um zu erfahren, warum nur Gigamon eine Komplettlösung für Netzwerktools sowie Inline- und Out-of-Band-Sicherheitstools in lokalen, Remote-, virtuellen und Cloud-Umgebungen bietet.
  • Letnia Akademia SUSE - premierowy pokaz SUSE Enterprise Linux 15
    Letnia Akademia SUSE - premierowy pokaz SUSE Enterprise Linux 15 Adam Sokołowski, Rafał Kruschewski Jul 26 2018 8:00 am UTC 90 mins
    W ramach Letniej Akademii SUSE 2018 organizowanej on-line poznasz najnowsze rozwiązania open source. Przedstawiamy krok po kroku najbardziej interesujące funkcje rozwiązań SUSE oraz pokazujemy, jak zacząć z nich korzystać.

    W ramach tych zajęć Akademii prezentujemy najnowszą wersję SUSE Linux Enterprise 15 – multimodalnego systemu operacyjnego, który łączy tradycyjne technologie dla centrów danych z infrastrukturą zdefiniowaną przez oprogramowanie (SDI).
  • Technical Briefing - Open, vendor neutral, infrastructure management with SUSE
    Technical Briefing - Open, vendor neutral, infrastructure management with SUSE Don Vosburg, Technology Specialist, SUSE Jul 26 2018 2:00 pm UTC 30 mins
    Join our SUSE StandUp webinar! In this 30 minute session, our subject-matter experts will give you a technical deep-dive/live demo on our SUSE solutions.
  • 30 minutes to a more secure, predictable, and stable infrastructure
    30 minutes to a more secure, predictable, and stable infrastructure Amaya Gil Pippino, senior technical marketing manager, Red Hat Jul 26 2018 3:00 pm UTC 30 mins
    To keep pace with digital transformation and the rapid changes it brings, modern IT infrastructures have become increasingly complex. However, this complexity often equals added risk. To succeed, businesses must reduce downtime—and ultimately help their stakeholders succeed.
    If you are using the management and provisioning capabilities of Red Hat® Satellite, you may find additional benefit from adding Red Hat Insights to monitor your IT environment. Insights helps to reduce complexity by proactively identifying and remediating issues before business operations are affected.

    In this short webinar, you'll learn:

    > Why Red Hat Insights might be of interest to your team.
    > How to quickly and easily get your team started with Red Hat Insights.
    > How to use Red Hat Ansible® Automation to streamline large and small deployments.
    > The answers to your question from Red Hat experts.
    > Get proactive infrastructure management by viewing your entire Red Hat ecosystem from one Satellite dashboard—to quickly view risks to stability, security, availability, and performance and get clear, prioritized, and actionable remediation instructions.
  • Industrial IoT: What is Missing and What is Next?
    Industrial IoT: What is Missing and What is Next? Ian Hughes, Senior Analyst IoT, and Emily Wentworth, Research Associate Jul 26 2018 3:00 pm UTC 60 mins
    451 Research has covered the adoption of Industrial IoT for several years, and it is a significant area to consider both for existing IT providers and for those industries looking to automate further. IIoT has significant long-term equipment installations, brownfield sites, as well as major new installations adopting all of the latest technology, under its umbrella. This area also has the ongoing organizational struggles between Operational Technology (OT) and IT, making projects more complicated to build and deploy. There are also some noticeable gaps in the approaches to IIoT and its related technologies that may not have been dealing with adequately.

    During this webinar, Ian Hughes, Senior Analyst for IoT, VR and AR, and Emily Wentworth, Research Associate, at 451 Research will describe the current state of play of IIoT and then introduce some key challenges and opportunities in the future. Ian will touch on the challenge of defining architectures in IIoT, and testing and implementing solutions. He will further highlight the importance of uniting OT and IT and the role of people in what is often portrayed as a pure automation play, as well as cover how front-line workers will need to engage with IIoT on the shop floor, using tools such as Augmented Reality (AR) to get the full benefit of this digital transformation wave. Emily will cover her work on Cobots in this presentation.

    The webinar will be of use to those in the IT industry who will benefit from the OT perspective and vice versa.
  • How to Design a Compliant and GDPR Ready Collaboration System
    How to Design a Compliant and GDPR Ready Collaboration System Storage Switzerland, Cloudian, SME Jul 26 2018 3:30 pm UTC 60 mins
    IT needs to regain control over shared data, but not at the expense of the user’s ability to collaborate both internally and externally. Cloud-based file-sync and share solutions can now be replaced with internal solutions that are more secure, provide greater insight, and are less expensive.

    Join Storage Switzerland, Cloudian and Storage Made Easy (SME) for our live roundtable discussion to learn:

    - The risks associated with cloud-based file sync and share
    - Why GDPR and data compliance has forever changed file collaboration
    - The advantages of on-premises file collaboration
    - The challenges of on-premises file collaboration
    - How to get it all: Cost-effective, compliant, easy to use file collaboration
  • How to Outsource your Security Monitoring 101
    How to Outsource your Security Monitoring 101 Mike LaPeters, VP of Global Channels, AlienVault Jul 26 2018 4:00 pm UTC 45 mins
    Today’s rapidly evolving world means that traditional security measures like firewalls and antivirus are not sufficient to protect a company from a devastating breach. While it’s usually the big companies that make the headlines, the reality is every organization is a target, regardless of size. In fact, attacks are on the rise for small and midsize businesses because most lack the essential security controls necessary to mitigate risk.

    With a major shortage of skilled resources in today’s cybersecurity market, more and more organizations are opting to outsource key security monitoring services to a managed security service providers (MSSPs). Whether for log management, managed detection and response (MDR), SIEM-as-a-service, or compliance management, organizations large and small are turning to MSSPs to deliver these solutions quickly and cost-effectively.

    Join us for this one-hour discussion and learn how you can extend your IT team with managed security services:

    Topics Include:

    - Why Managed Security
    - Types of Managed Security Services
    - Benefits of Outsourcing Security
    - How to Select the right MSSP

    Hosted By
    Mike LaPeters
    VP of Global Channels
    Mike LaPeters joined AlienVault in 2015 and heads up the global channel initiative. Mike has more than 20 years’ experience building and leading channel organizations in security, infrastructure and storage software products. He has led teams at CA, VERITAS Software (Formerly Symantec) and he represented the sales and channel efforts from inception through acquisition at 4 startups (acquired by Microsoft, Hitachi (WD), SolarWinds, Nimboxx). He is a 3-time recipient of CRN’s Channel Chief award.
  • The All-Flash Fix - How to Create a Hybrid Storage Architecture
    The All-Flash Fix - How to Create a Hybrid Storage Architecture Storage Switzerland, Western Digital Jul 26 2018 5:00 pm UTC 60 mins
    Join experts from Storage Switzerland and Western Digital as we discuss the All-Flash Fix, How to Create a Hybrid Storage Architecture.

    In this webinar, you'll learn how to create an architecture that meets the need to deliver high performance, protect the organization from disaster and meet the organization's long-term data retention and privacy needs.
  • Microsegmentation Made Easy
    Microsegmentation Made Easy Jason Burns,Technical Marketing; Abhisheck Tiwari, Product Management; Ravi Samprathi, Engineering, Nutanix Jul 26 2018 5:00 pm UTC 45 mins
    As security threats become more sophisticated, infrastructure design and policy need to be able to respond.

    Learn the common use cases for securing applications and users via VM microsegmentation. Nutanix engineers will walk through design considerations for creating microsegmentation policy, and demonstrate how Nutanix Flow provides the application visibility and policy controls to quickly and easily deploy microsegmentation in your environment.
  • Beyond the GUI: Leveraging Nutanix APIs
    Beyond the GUI: Leveraging Nutanix APIs Tarek Parekh, Zankhana Pathak & Mukesh Baphna, Nutanix; David Hess, Principal Infrastructure Architect Cyxtera Jul 26 2018 5:00 pm UTC 45 mins
    Automation is turning manual or repetitive IT tasks into a thing of the past—including in the data center. Nutanix not only provides a world-class user interface, but also a comprehensive set of APIs to allow the automation of provisioning, data collection, and other tasks. In this session, you’ll explore Nutanix APIs—from provisioning to other Day 0, Day 1 operations.

    Join this webinar to learn how you can easily leverage Nutanix APIs for orchestration and automation of infrastructure, VMs, networking, and even backup/DR. We’ll review available APIs and conduct live demonstrations of integrations and the automating common IT tasks.

    Tarek Parekh - Principal Product Manager, Nutanix
    Zankhana Pathak - Member of Technical Staff, Nutanix
    Mukesh Baphna - Director, Engineering, Nutanix
    David Hess, Principal Infrastructure Architect Cyxtera
  • Enterprise Cloud 101: Introduction to Nutanix Enterprise Cloud OS
    Enterprise Cloud 101: Introduction to Nutanix Enterprise Cloud OS Marjon Otero, Systems Engineer, Matt Slotten, Snr. Mgr, Consulting Services; Rachel Luke, Systems Eng. II, Laser Spine Inst. Jul 26 2018 5:00 pm UTC 45 mins
    Welcome to Enterprise Cloud 101! This session will provide an introduction to Nutanix software, architecture, and complete feature set. Nutanix experts will show how Nutanix combines HCI storage, virtualization, software defined networking and compute services into the Enterprise Cloud OS that can run on off-the-shelf x86 servers. See how the Enterprise Cloud OS goes beyond legacy datacenter architectures and prepares your business for the hybrid cloud future.
  • Secure Enterprise File Services | Remote & Branch IT Modernization
    Secure Enterprise File Services | Remote & Branch IT Modernization Oded Nagel - Chief Strategy Officer at CTERA, Rohit Goyal - Senior Product Marketing Manager at Nutanix Jul 26 2018 5:00 pm UTC 60 mins
    The modernization of corporate file services at remote offices and branch offices (ROBO) is a priority for enterprises as they embark on digital transformation initiatives. Often these organizations' needs cannot be met by public cloud services due to numerous limitations, including data security and governance concerns, performance/latency issues, and bandwidth constraints.

    Join us to learn how Nutanix and CTERA partner to deliver secure cloud file storage and collaboration services to the edge of the network, powering greater levels of office productivity and TCO reduction. The hyperconverged solution enables organizations to enjoy dramatic infrastructure consolidation while offering great security and performance.
  • Operational Insights: How a Security Expert Defends Your Network's Blind Spots
    Operational Insights: How a Security Expert Defends Your Network's Blind Spots Sam McLane, Head of Security Engineering, Arctic Wolf Networks; Narayan Makaram, Sr. Director of Product Marketing Jul 26 2018 5:30 pm UTC 45 mins
    With an ever-changing threat landscape, the need for skilled security experts who can address your real business risks is at an all-time high. IT organizations who do not have the budget to hire security experts, are looking for help to hunt and triage advanced attacks, weed out false-positives, and address cyber threats that truly matter to their business.

    In this upcoming webinar, get key insights from Sam McLane, CTSO, at Arctic Wolf Networks (AWN), on the importance of having a Concierge Security Engineer(CSE) on your side, who can act as your trusted advisor for your IT team.

    By attending, you will:

    - Discover the role of a CSE in AWN's SOC-as-a-service offering
    - Understand how a CSE-based service is different from other managed-SIEM/SOC services
    - Explore real life examples of how a CSE tackles security issues proactively for our customers

    About our speaker:

    Sam McLane leads CTSO at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University. Sam holds a master of science in mathematics from Temple University and a bachelor of science in mathematics from Washington and Lee University.
  • Introducing Beam: Cost Optimizaton in a Multi-Cloud World
    Introducing Beam: Cost Optimizaton in a Multi-Cloud World Anand Jayaraman, Sr. Manager, & Aroosh Sohi, Director, Engineering, Nutanix Jonathan Mosco, Sr. Automation Architect, Corp. Jul 26 2018 6:00 pm UTC 45 mins
    Businesses today are seeking to adopt hybrid cloud architecture and boost cloud flexibility to improve their responsiveness, and enable more rapid innovation. However, lack of public cloud consumption visibility and security concerns lead to uncontrolled spend and security vulnerabilities.

    Learn about Nutanix cloud management capabilities that enable organizations to provision and maintain applications across multi-cloud environments, optimize cloud consumption and centralize governance and security compliance. We will discuss some of the most pressing customer challenges such as public cloud cost visibility, compliance, and application vulnerability management.
  • Architect Your Citrix Environment at any Scale
    Architect Your Citrix Environment at any Scale Kees Baggerman, & Prashant Batra, Nutanix; Dan Feliz & Armando Muniz, JetBlue Airways Jul 26 2018 6:00 pm UTC 45 mins
    Infrastructure can make or break an end user computing project. Successful Citrix XenDesktop and XenApp deployments require efficient, high performance and scalable IT infrastructure to deliver a great user experience. Join this solutions-oriented session and learn everything you need to build your Citrix VDI environment on Nutanix, including weighing the PVS vs. MCS decision, how to leverage GPU and understanding different node options in your plans. Plus you will hear from a customer leveraging Nutanix AHV to make Citrix deployments simpler, a lot more scalable, and cloud-ready.

    Kees Baggerman, Technical Director, Nutanix
    Prashant Batra, Principal PM, Nutanix;
    Dan Feliz, GM IT Infrastructure, JetBlue Airways
    Armando Muniz, IT Systems Engineering Manager, JetBlue Airways
  • Automation and Multi-Cloud Management with Nutanix Calm
    Automation and Multi-Cloud Management with Nutanix Calm Jasnoor Gil, Director of Product Management & Gil Haberman, Director of Product Marketing, Nutanix Jul 26 2018 6:00 pm UTC 45 mins
    Driving automation and self-service across private and public clouds is the strategic goal for many CIOs. While many of the fundamental building blocks have long been available, they have been missing a unified, full-stack, orchestration layer that works across multiple cloud environments.

    In this session, we’ll explain and demonstrate Nutanix Calm, which provides cloud operators with a one-click self-service capability to automate application provisioning and lifecycle management across multiple environments, making the entire IT infrastructure more agile and application-centric.