Hi [[ session.user.profile.firstName ]]

Virtualization

  • Taking Security From Mediocre to Mighty With The MITRE ATT&CK Framework
    Taking Security From Mediocre to Mighty With The MITRE ATT&CK Framework
    Matthias Maier, EMEA Director of Product Marketing, Splunk, Brandon Dunlap, Moderator, (ISC)² Recorded: Jun 25 2019 58 mins
    What is the MITRE ATT&CK framework? Where did it come from? Why and how should you use it? Get the answers to all of these questions, as security experts from Splunk take a practical look at how your SOC and SIEM can apply the MITRE ATT&CK framework. Ensure the coverage of known TTP’s of threats your business is exposed to, to improving threat hunting and detection of Adversary’s. Join this webinar to discover:

    • What the MITRE ATT&CK framework is, and why it should be used
    • How to align your use cases to the MITRE ATT&CK framework
    • How to navigate an ATT&CK Threat group TTP's
    • How to track and monitor your detection capabilities to ensure wide coverage
  • MeetTheCEO: HotLink’s Lynn LeBlanc
    MeetTheCEO: HotLink’s Lynn LeBlanc
    Storage Switzerland, HotLink Recorded: Jun 20 2019 27 mins
    Backups cannot be assumed to be safe today, against an emergence of more sophisticated malware. These new variants were designed to be discrete, often sitting idle and being copied across the backup repository to then attack slowly – all with the ultimate goal of attacking as many systems as possible while at the same time avoiding detection for as long as possible. To avoid restoring trigger files, IT must be able to proactively verify and monitor the quality and viability of backups. The problem is that legacy verification methods cannot keep up with the growing volume of backup data that must be verified or the frequency with which verification must occur.

    Lynn LeBlanc, CEO of HotLink, will join Storage Switzerland to share her perspective on how IT professionals may restructure their approach to backup verification so that all recovery points may be vetted, and malware attacks contained. Don’t miss this opportunity to hear her perspective on the new pain points related to backup verification that are emerging with modern ransomware, and how IT professionals may apply analytics and artificial intelligence for more efficient and thorough verification.
  • Want Better Network Visibility with Less Complexity? Here's How!
    Want Better Network Visibility with Less Complexity? Here's How!
    Bob Laliberte, Senior Analyst, ESG and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Recorded: Jun 20 2019 53 mins
    Enable IT Collaboration with a Common Distributed Data Services Layer.

    The IT environment is rapidly changing, becoming more distributed and complex as organizations transform themselves to provide better digital experiences. Because these improved experiences will be more dependent on the network, it’s imperative for organizations to properly plan and prepare now to eliminate security blind spots. The bottom line is that companies need complete visibility into their physical, virtual and cloud infrastructure to detect and contain data breaches and mitigate risk.

    To accomplish this, successful organizations resist the legacy mentality that relies on more people and more tools at every location. Instead, they are turning to a new architectural approach that disaggregates the speed of the network from the speed of the tools inspecting traffic on that network. This innovative approach allows enterprises to absorb change in network speed and technology without compromising security.

    ESG believes the foundational step in this approach is to ensure comprehensive infrastructure visibility across data centers and distributed edge and cloud environments. To do this, organizations must have a common distributed data services layer that can collect, process and distribute the right information to the right tools at the right time.

    Join us to learn how a consolidated network architecture that includes security delivers better visibility, reduces complexity and increases tool efficiency.
  • Introduction to Red Hat OpenShift Container Platform
    Introduction to Red Hat OpenShift Container Platform
    Grant Shipley, Director, OpenShift Container Platform, Red Hat Recorded: Jun 20 2019 43 mins
    Everyone's heard about containers, and how they're going to solve all of our problems - or not.


    Watch this session from Red Hat Summit, Grant Shipley, Red Hat, walks you through using containers and:

    •Discuss why using a scheduler and orchestration system like Kubernetes is important.
    •Dive into Red Hat OpenShift Container Platform to show how it makes both containers and Kubernetes accessible to everyone.
    •After deploying several containers, we'll turn up the heat by showcasing scaling and moving on to deployment strategies including blue/green and rollbacks.

    We'll keep the slides to a minimum and instead focus on live demo, coding, and deployments. It'll be 95% hands-on demo using the latest version of OpenShift Container Platform and will be a great introduction to the platform if you haven't used it before or if you just want to understand what OpenShift is.
  • Turning the 5G Network into an Agile Monetization Platform
    Turning the 5G Network into an Agile Monetization Platform
    Alla Goldner & Ofer Farkash - Amdocs Recorded: Jun 20 2019 59 mins
    5G promises a world of unprecedented speed and differentiated quality of service that has the potential to unleash a wide array of new services and business models.
    But, in order to maximize 5G monetization, service providers need to be fast to deploy, open to drive innovation, smart to efficiently orchestrate a dynamic network, and quick to capture every revenue opportunity. In this presentation we will explore how service providers will utilize NFV and SDN technologies and principles to achieve dynamic programmability, agility and control for 5G use-cases monetization and what is done in ONAP for managing the lifecycle of 5G network services.
  • Unlocking the Hidden Business Benefits of Your Data with Data Virtualization
    Unlocking the Hidden Business Benefits of Your Data with Data Virtualization
    Rick van der Lans, Independent Analyst, R20/Consultancy & Paul Moxon, VP Data Architectures & Chief Evangelist, Denodo Recorded: Jun 20 2019 57 mins
    Digital transformation, the data economy, and becoming more data-driven are the current themes of boardroom discussions. Data is very valuable to organizations and their business users as long as it’s accessible, timely, consistent, trusted, adaptable and actionable, among a list of other things.

    However, most organizations are dealing with data silos. Data is hidden inside databases, data warehouses, excel spreadsheets, and files; and, it’s stored on‐premises and in private and public clouds, often times across the globe. Therefore, it is not only time-consuming but also very costly to locate the required data, extract it from the system, integrate it, and turn it into meaningful, consistent and trusted information.

    -How can you improve data delivery and extract value from your data?
    -How can you make your data available and actionable in real-time?
    -How are other organizations dealing with this data challenge?

    In this webinar, we will explore data virtualization as the solution that fulfills all modern requirements for data delivery by looking at various customer case studies. Our speakers will discuss the challenges that hold organizations back from accessing their data and becoming data-driven. By taking you through real use cases, they will demonstrate how data virtualization has helped multiple organizations address their data challenges and create significant business benefits.
  • Micro Focus ALM/QC Integration w/ Automated Testing for Reporting Analysis EMEA
    Micro Focus ALM/QC Integration w/ Automated Testing for Reporting Analysis EMEA
    Tina Dankwart Recorded: Jun 20 2019 27 mins
    Over the last few years, a major shift has occurred in the Quality Assurance (QA) and Software Testing Management space. Organizations are adopting smart test automation, but continue to find the need for traditional PMO-level reporting offered by tools like Micro Focus ALM and Quality Center. Often, this results in a tool mismatch that negatively impacts the ability to report in real-time across all phases of manual and automated testing.

    Smart test automation is no longer a “nice to have” but rather a foundational aspect of the testing process, and this is impacting the toolchain. Organizations are adding new test management tools like Selenium, Tricentis Tosca and others to their suite to better align with their Agile and test automation efforts. Global QA Directors are recognizing a multi-vendor and multi-tool approach to software quality assurance with commercial and open-source tools yields the best results.

    With test planning, design, execution, and reporting now split across multiple tools, organizations have lost their visibility into key QA metrics for measuring manual vs. automated test execution effectiveness, test automation progress, automated testing execution progress, and defect remediation for all phases of the software testing lifecycle.

    Join Senior Value Stream Architect, Tina Dankwart, to learn how Tasktop can help you:

    •Modernize test management by adding new, specialized tools for test automation
    •Improve collaboration between QA teams working in their preferred tools of choice
    •Eliminate the laborious effort of manual synchronization and report generation
    •Centralize test data from automated and manual tests spanning multiple tools and instances for real-time reporting
  • Visibilité dans le cloud Public
    Visibilité dans le cloud Public
    Mathieu Pierard, Solutions Architect Recorded: Jun 20 2019 21 mins
    De nombreuses organisations se tournent vers le cloud public pour étendre - et dans certains cas, remplacer - leur infrastructure existante. Bien que l’utilisation du cloud public offre une flexibilité sans précédent en termes de déploiement et d’approvisionnement, les organisations ont toutefois du mal à sécuriser et à surveiller ces environnements, en particulier lorsque le trafic est-ouest est pris en compte. L'accès à ce trafic est la première étape pour sécuriser ces environnements et pour garantir que les ressources sont utilisées de manière efficace pour optimiser leurs performances.

    Inscrivez-vous à notre webinar pour :
    • Découvrir les défis auxquels les organisations sont confrontées lors de l’adoption du cloud public.
    • Comprendre comment les outils peuvent accéder à ce trafic en utilisant les solutions Gigamon, améliorant ainsi la sécurité et les performances.
    • Comprendre comment Gigamon a virtualisé le collecteur de paquets réseau dans ces environnements et l’a lié avec GigaVUE-FM.
  • Visibility in the Public Cloud
    Visibility in the Public Cloud
    Ollie Sheridan, Principal Security Solutions Engineer, CISSP Recorded: Jun 20 2019 7 mins
    Many organisations are looking to the Public Cloud as a means to extend – and in some cases replace – their existing infrastructure. Whilst the use of the Public Cloud offers formerly unheard-of flexibility in terms of deployment and provisioning, it does present organisations with a challenge as to how to Secure and Monitor these environments, particularly when considering east-west traffic. Getting access to this traffic is the first step in securing these environments as well as ensuring that the resources are used in an efficient manner to optimise their performance.

    Join us for this 25min webinar to find out how you can:

    • Learn about the challenges to organisations when adopting the Public Cloud
    • Understand the ways in which tools can access this traffic using Gigamon’s solutions, thereby improving security and performance
    • See how Gigamon has Virtualised the Network Packet Broker into these environments and tied it all together with GigaVUE-FM
  • Frictionless Inter-provider Operations with MEF 3.0 & LSO Sonata
    Frictionless Inter-provider Operations with MEF 3.0 & LSO Sonata
    Kevin Vachon, COO, MEF; Bob Mandeville, President, Iometrix; Greg Spear, Solution Manager, Accedian Recorded: Jun 20 2019 50 mins
    MEF's Carrier Ethernet generated an 80+ Billion USD market. Growth continues with the latest MEF 3.0 Carrier Ethernet standards, secured with the integrity of MEF services & technology certification. The next frontier is frictionless inter-provider service automation focusing on business applications with the first phase. Imagine automating your serviceability queries, quoting, ordering and inventory for the latest Carrier Ethernet E-access services. Given service providers' top deployment challenge of multi-provider network orchestration, this business-to-business automation could not come at a better time. This is your opportunity to get the latest on MEF 3.0 Carrier Ethernet wholesale services, its automation capabilities, LSO Sonata & APIs, plus how to fast-track your API development while getting first-to-market with MEF's LSO Sonata certification.

    Whether a buyer or seller of Carrier Ethernet services, learn how to best guide your wholesale Carrier Ethernet business with LSO Sonata and MEF 3.0 certifications. Join MEF's COO, MEF's Certification Committee Co-Chair and President of Iometrix, MEF's certification partner, to explore MEF 3.0 Carrier Ethernet, amplified by LSO Sonata.

    What you will learn:

    • Highlights of MEF 3.0 Carrier Ethernet
    • MEF 3.0 Carrier Ethernet E-Access business value
    • New certification process and how to achieve MEF 3.0 Carrier Ethernet certification
    • Inter-provider automation enabled by LSO Sonata
    • LSO Sonata certification program
  • Building a Layered Security Solution
    Building a Layered Security Solution
    Rob Krug, Solution Architect, SonicWall Recorded: Jun 19 2019 61 mins
    Are persistent cyberattacks already lurking in your network?

    To prevent these modern, never-stopping attacks, organizations require a layered security solution that systematically leverage overlapping layers of protection, detection and inspection.
    SonicWall solution architect Rob Krug explains how this end-to-end approach can protect your organization.

    Register now to learn how to:

    •Stop everything from ransomware to encrypted attacks
    •Add overlapping layers to your security strategy
    •Bolster security across your networks and endpoints
    •Protect your business, and your budget
  • How to Gain Control of Complex Apps Central to Your Digital Transformation
    How to Gain Control of Complex Apps Central to Your Digital Transformation
    John Gudmundson, Sr. Product Marketing Manager Gigamon Recorded: Jun 19 2019 53 mins
    Today’s applications — complex, sprawling, multi-tiered, opaque — determine the success or failure of digital transformations. Isn’t it time you took control?

    Join us to learn about Application Intelligence, a pioneering set of capabilities for getting the visibility and the context needed to discover, manage and secure your sophisticated applications.

    During this live demonstration, you’ll see how Application Intelligence helps you:
    •Identify and extract traffic from over 3,000 applications
    •Detect and manage shadow IT and rogue apps
    •Separate unnecessary application traffic to greatly improve tool efficiency

    We’ll also preview its application metadata capabilities for help in solving a number of critical concerns such as troubleshooting subpar performance.

    Register now to see it in action >
  • The Future: Enterprise Virtualization to Container-Native Virtualization
    The Future: Enterprise Virtualization to Container-Native Virtualization
    Andrew Sullivan, Principal Technical Marketing Manager, Red Hat & Doron Fediuck, Director, Software Engineering, Red Hat Recorded: Jun 19 2019 47 mins
    Virtualization has been a staple of datacenter technology for a decade and continues to provide robust capabilities for all types of applications. Today’s Red Hat Virtualization product might not be what you remember. It now provides a fully featured, enterprise-ready hypervisor capable of hosting any workload in the on-premise datacenter. However, datacenter virtualization is evolving, and gaining the ability to integrate and interoperate with cloud-native applications and containers in new ways.

    In this presentation from Red Hat Summit, Andrew Sullivan and Doron Fediuck discuss where Red Hat Virtualization for the enterprise and container-native virtualization fit into Red Hat’s portfolio and strategy. They also provide an overview of the capabilities that you can expect currently and in new functionality coming.

    If you want to simplify your datacenter virtualization and help make digital transformation a reality, Red Hat's virtualization portfolio should be at the top of your list.
  • Proving the value of DevOps using metrics
    Proving the value of DevOps using metrics
    Jeremy Brown, Director, Red Hat Open Innovation Labs, EMEA Recorded: Jun 19 2019 39 mins
    Are you moving from project-based to product-centric teams? How about using agile delivery methods, or, applying DevOps culture with heavy automation? Are you an advocate of these practices, but struggle to articulate the benefits to your wider organization?

    In this session, Jeremy Brown, Red Hat Open Innovation Labs, will introduce a powerful metrics-based process mapping tool that can be used to help teams articulate the benefits, return, and value of DevOps adoption to the wider organization. Jeremy will demonstrate how this metrics-based process mapping tool was used with a European automotive company to reveal a 30x improvement in their key metrics. You will leave with the ability to implement this very simple yet effective tool in your own organizations to begin or accelerate DevOps adoption.
  • Frictionless Inter-provider Operations with MEF 3.0 & LSO Sonata
    Frictionless Inter-provider Operations with MEF 3.0 & LSO Sonata
    Kevin Vachon, COO, MEF; Bob Mandeville, President, Iometrix; Greg Spear, Solution Manager, Accedian Recorded: Jun 19 2019 56 mins
    MEF's Carrier Ethernet generated an 80+ Billion USD market. Growth continues with the latest MEF 3.0 Carrier Ethernet standards, secured with the integrity of MEF services & technology certification. The next frontier is frictionless inter-provider service automation focusing on business applications with the first phase. Imagine automating your serviceability queries, quoting, ordering and inventory for the latest Carrier Ethernet E-access services. Given service providers' top deployment challenge of multi-provider network orchestration, this business-to-business automation could not come at a better time. This is your opportunity to get the latest on MEF 3.0 Carrier Ethernet wholesale services, its automation capabilities, LSO Sonata & APIs, plus how to fast-track your API development while getting first-to-market with MEF's LSO Sonata certification.

    Whether a buyer or seller of Carrier Ethernet services, learn how to best guide your wholesale Carrier Ethernet business with LSO Sonata and MEF 3.0 certifications. Join MEF's COO, MEF's Certification Committee Co-Chair and President of Iometrix, MEF's certification partner, to explore MEF 3.0 Carrier Ethernet, amplified by LSO Sonata.

    What you will learn:

    • Highlights of MEF 3.0 Carrier Ethernet
    • MEF 3.0 Carrier Ethernet E-Access business value
    • New certification process and how to achieve MEF 3.0 Carrier Ethernet certification
    • Inter-provider automation enabled by LSO Sonata
    • LSO Sonata certification program
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Joshua Costa, Manager, PS Advisory Services Recorded: Jun 19 2019 82 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss threat hunting and incident detection leveraging EDR and the current cybersecurity threat landscape.

    We'll cover:
    •Incident investigation considerations - old versus new
    •Threat remediation and recovery
    •Third-party and threat intelligence integration

    Our Verizon Threat Research Advisory Center presenters will be:
    •Hayden Williams, Sr. Manager, PS Advisory Services
    •Joshua Costa, Manager, PS Advisory Services
    - David Kennedy, Managing Principal, Open Source Intelligence

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com


    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Visibility in Public Cloud Umgebungen
    Visibility in Public Cloud Umgebungen
    Daniela Fusaro, Senior Solutions Architect Recorded: Jun 19 2019 14 mins
    Viele Unternehemen ziehen es in Betracht Ihre existierende Infrastruktur in der Public Cloud zu erweitern oder sogar in einigen Fällen zu ersetzen. Während der Einsatz der Public Cloud unerhörte Flexibilität bietet, was das Ausrollen und die Bereitstellung angeht, stellt es Organisationen vor der Herausforderung, wie sie dieses Umfeld am besten sichern und überwachen können, vor allem wenn es sich um den East-West Traffic im Netzwerk handelt.
    Einsicht im Netzwerkverkehr zu gewinnen ist der erste Schritt, diese Umgebungen zu sichern und dafür zu sorgen, daß alle Resourcen effizient genutzt und ihre Performanz optimiert wird.


    Finden Sie heraus in unserem 15minutigen Webinar wie Sie:

    - Mehr erfahren über die Herausforderungen von Unternehmen bei der Einführung von der Public Cloud
    - Einsicht gewinnen wie Tools mit Hilfe der Gigamon Lösung, Zugriff auf diesem Netzwerkverkehr gewinnen und dabei Sicherheit und Leistung verbessert werden
    - Herausfinden wie Gigamon Netzwerk Packet Broker innnerhalb dieser Umgebungen virtualisiert hat und wie alles mit GigaVUE-FM zusammenhängt
  • Unleash the Power of Identity-based Cloud Security with Aporeto
    Unleash the Power of Identity-based Cloud Security with Aporeto
    Anand Ghody, Sr. Marketing Technical Engineer Recorded: Jun 18 2019 56 mins
    As more organizations migrate to the cloud, many are confronted with the challenge of securing workload environments both on-prem and in the cloud. The increasing use of cloud-native technologies like containers, Kubernetes, service mesh and serverless add more complexity to effectively providing security for these very different environments. These shortcomings are emphasized with a traditional network security model that relies on IP addresses and lacks scalability and protection against advanced threats. What is needed is a new, identity-based approach to cloud security.

    The Aporeto platform abstracts security away from the IP infrastructure to address application segmentation requirements and improves application risk posture. Aporeto’s identity-based segmentation approach transcends the security constraints of on-prem infrastructure while securing all cloud services, by effectively implementing a Zero Trust security posture across any infrastructure at any scale. Aporeto provides the ultimate segmentation for modern applications based on cryptographic workload identity rather than IP addresses. Security policies remain persistent no matter where the application resides in your cloud or hybrid environment.

    In this webinar we will demo Aporeto’s cloud security services:

    Distributed Firewall: Protect any application across all hybrid and cloud environments

    Cloud PAM: Turn-key privileged access management to your cloud infrastructure

    Identity-Aware Proxy: Enable secure, VPN-less access to any web application
  • Will Your Backup Architecture Meet Tomorrow’s SLAs? 3 Steps to Make Sure!
    Will Your Backup Architecture Meet Tomorrow’s SLAs? 3 Steps to Make Sure!
    Storage Switzerland, Veeam and NetApp Recorded: Jun 18 2019 61 mins
    Organizations, application owner and users all have much higher expectations of IT than ever before. They expect IT to recover real-time data instantaneously and recall aged data very quickly. These expectations mean that backup architectures are getting stretched at both ends; rapid primary storage recovery and fast access to data residing on long-term storage repositories.

    Join Storage Switzerland, Veeam and NetApp for our webinar as we discuss the new service level objectives IT needs to prepare for and how the backup software and hardware architecture needs to change to meet these new demands.

    Join our panel of data protection experts as we discuss:
    - The new service level objectives
    - Why current data protection infrastructures fall short
    - The three steps you need to take to modernize your data protection architecture
  • Introduction to Incast, Head of Line Blocking, and Congestion Management
    Introduction to Incast, Head of Line Blocking, and Congestion Management
    Sathish Gnanasekaran, Broadcom; John Kim, Mellanox; J Metz, Cisco; Tim Lustig, Mellanox Recorded: Jun 18 2019 61 mins
    For a long time, the architecture and best practices of storage networks have been relatively well-understood. Recently, however, advanced capabilities have been added to storage that could have broader impacts on networks than we think.

    The three main storage network transports - Fibre Channel, Ethernet, and InfiniBand – all have mechanisms to handle increased traffic, but they are not all affected or implemented the same way. For instance, placing a protocol such as NVMe over Fabrics can mean very different things when looking at one networking method in comparison to another.

    Unfortunately, many network administrators may not understand how different storage solutions place burdens upon their networks. As more storage traffic traverses the network, customers face the risk of congestion leading to higher-than-expected latencies and lower-than expected throughput. Watch this webinar to learn:

    •Typical storage traffic patterns
    •What is Incast, what is head of line blocking, what is congestion, what is a slow drain, and when do these become problems on a network?
    •How Ethernet, Fibre Channel, InfiniBand handle these effects
    •The proper role of buffers in handling storage network traffic
    •Potential new ways to handle increasing storage traffic loads on the network
  • Cloud Security Best Practices for Defending Against Targeted Attacks
    Cloud Security Best Practices for Defending Against Targeted Attacks
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Recorded: Jun 18 2019 44 mins
    Recent years has seen a move towards more targeted attacks, especially in the realm of ransomware. Attackers are no longer trying to infect the globe, choosing instead to carefully select targets to increase their chances of success and maximise payouts.

    SMBs find themselves in the crosshairs of these attacks. Their defense and contingency plans often leave them vulnerable to ransomware, information theft, and other attacks.

    Is your organisation a soft target? Automated processes can often determine this in a matter of minutes, and cybercriminals are aware.

    Learn how to lift your organisation from easy target to robustly defended with learnings from this webinar.
  • Best Practices for Healthcare Digital Transformation
    Best Practices for Healthcare Digital Transformation
    John Lehane, Product Marketing &Danny Akacki, Technical Account Manager, Gigamon; Lyle Kelly, Sr. Systems Engineer, Forescout Recorded: Jun 18 2019 43 mins
    Are you ready for digital transformation? Transformation begins with visibility – looking inside the network “black box” and understanding exactly what’s running. But we know that can be easier said than done, especially in the healthcare industry where privacy, security and compliance are paramount.

    Join our webinar to hear experts from Gigamon and Forescout delve into the network and security challenges they’ve observed in healthcare. Participants will learn how to surmount the challenges in:

    •Achieving visibility of digital app usage across distributed, dynamic environments
    •Ensuring the most relevant application traffic is delivered to the right security tool
    •Pinpointing lateral movement of malware and shadow IT for faster time to detection and remediation
    •Monitoring, tracking and securing Internet of Medical Things (IoMT) devices
    •Integrating new sites and locations into your network
  • Containerized OpenStack, a SUSE tech preview
    Containerized OpenStack, a SUSE tech preview
    Matthew Johns, T.R. Bosworth & Vincent Moutoussamy, SUSE Recorded: Jun 18 2019 40 mins
    SUSE is releasing a tech preview of a containerized version of OpenStack, using Airship for cloud lifecycle management.
    We believe that this will offer many benefits to customers, making it faster to deploy, to scale, easier to upgrade and simpler to build in high availability.
    As the open, open source company we are keen to release it to the community and get your feedback. Please join us as we share more details about this exciting opportunity to help shape a future SUSE release.
  • Introducing Application Metadata Intelligence
    Introducing Application Metadata Intelligence
    Ollie Sheridan, Principal Engineer Security, Gigamon, Chris Green, Head of PR and Comms EMEA, (ISC)² Recorded: Jun 18 2019 60 mins
    For many years the choice for monitoring networks has been focussed on the collection and Analysis of raw packets. With the increasing need for multiple tools and SIEM's to get access to this data, along with requirements from Forensic Response teams, a more streamlined method of understanding the behaviour of traffic and user behaviour is required. Whilst NetFlow version 5 and 9 do provide some visibility, there are challenges such as sample rates and lack of Application Layer inspection that need to be addressed.

    Join us for this webinar to learn more about how you can:

    -Produce rich Metadata from network traffic and dive into the Application Layer
    -Use this rich Metadata for Security, Forensics and Business Intelligence purposes
    -Generate Metadata based on the application rather than the IP & Port
    -Ensure that the Application traffic, regardless of port spoofing, produces the correct Metadata
  • HCL BluGenie Solution Overview
    HCL BluGenie Solution Overview
    Ramesh Sriraman, Head – Telecom Center of Excellence, HCL Technologies Ltd. Jun 25 2019 3:00 pm UTC 60 mins
    Engineering the Intelligent Connected Ecosystem
  • Leading Research Across the AI Spectrum
    Leading Research Across the AI Spectrum
    Qualcomm Jun 25 2019 4:00 pm UTC 60 mins
    Artificial Intelligence (AI) is revolutionizing industries, products, and core capabilities by delivering dramatically enhanced experiences. However, the deep neural networks of today are growing quickly in size and use too much memory, compute, and energy. Plus, to make AI truly ubiquitous, it needs to run on the end device within a tight power and thermal budget.

    Fundamental research, in AI as well as applying that research, is required to advance AI further and speed up adoption. In this webinar, we’ll discuss:

    * Several research topics across the entire spectrum of AI, such as generalized CNNs and deep generative models
    * AI model optimization research for power efficiency, including compression, quantization, and compilation
    * Advances in AI research to make AI ubiquitous

    Speakers:

    * Jilei Hou, Sr. Director, Engineering, Qualcomm Technologies, Inc.
    * Jack Gold, Principal Analyst, J.Gold Associates, LLC.
  • Leveraging Virtualization for Improved Availability and Disaster Recovery
    Leveraging Virtualization for Improved Availability and Disaster Recovery
    Kevin Brosnan - Solutions Architect, Teradici Jun 25 2019 5:00 pm UTC 30 mins
    Today, many production workloads are run on virtualized infrastructure and this enables greater flexibility, efficiency, and availability. But even with virtualization, backup is still the core of all disaster recovery (DR) plans. Today, with the use of virtualization for DR and solutions like Teradici Cloud Access Software, you can significantly reduce the time to recover a critical workload as well as the requirements for redundant hardware. Join us on this webinar to learn how.
  • How to Make the Case to Management: Paying for Open Source
    How to Make the Case to Management: Paying for Open Source
    Dan Pacek, Competitive Intelligence/Market Analyst, Red Hat and Lauren Stranch, Product Marketing Manager, Red Hat Jun 25 2019 6:00 pm UTC 35 mins
    A Red Hat subscription gives you access to enterprise-ready open source innovations to help you along your digital transformation. However, your management might ask, "Why are we paying for open source?"

    Watch this session from Red Hat Summit, Daniel Pacek and Lauren Stranch, Red Hat, discuss how to effectively make the case for your Red Hat subscription so your management and procurement teams understand the value of their investment - including access to the latest technologies, expert knowledge, continuous security, and participation in the open source community.
  • MeetTheCEO: Cloud Daddy’s Spencer Kupferman
    MeetTheCEO: Cloud Daddy’s Spencer Kupferman
    Storage Switzerland, Cloud Daddy Jun 25 2019 7:15 pm UTC 30 mins
    As businesses migrate more of their data and applications to the cloud, a more comprehensive and mature disaster recovery implementation is required. Cloud service providers have built a base layer of data protection capabilities that focus primarily on enabling recovery from hardware failure, but the reality is that most recovery requests today stem from a cyberattack or from human error. As a result, cloud services need some help in the form of intelligent and granular search and tagging, as well as management capabilities such as the ability to schedule snapshots and apply retention policies.

    Cloud Daddy’s CEO, Spencer Kupferman, will join Storage Switzerland for a live webinar discussion regarding how the trifecta of increasing and more sophisticated malware attacks, regulatory oversight of data, and the shift to cloud are changing the face of the disaster recovery market. Register now to be sure you hear his perspective on why capabilities like simplified and centralized oversight of backup and replication jobs and cross-region backup and restore matter in today’s data protection paradigm.
  • SUSE Enterprise Storage: die Mittelstandsalternative zur klassischen SAN-Lösung
    SUSE Enterprise Storage: die Mittelstandsalternative zur klassischen SAN-Lösung
    Thomas Husemann, Fujitsu, Wolfgang Eckerlin, iTEC Services und Michael Jonas, SUSE Jun 26 2019 8:00 am UTC 60 mins
    Lernen Sie anhand von praxisnahen Anwendungsbeispielen im gemeinsamen Webinar von Fujitsu, iTEC und SUSE die Vorteile einer software-definierten Speicherumgebung kennen und holen Sie sich Anregungen und Konfigurationsbeispiele für Ihre IT-Umgebung.
    Überzeugen Sie sich, wie einfach, effektiv und kostengünstig Sie SUSE Enterprise Storage auch in Ihrem Unternehmen einsetzen können.

    Die Agenda im Überblick:
    - iTEC: Ihr Lösungspartner für Software-defined Storage – powered by Fujitsu & SUSE
    - SUSE Enterprise Storage für den Mittelstand: Hardware, Software, Individualisierung und Services aus einer Hand
    - Anwendungsszenarien: On-Premises und in der Cloud
    - Konfigurationsbeispiele und Best Practices
  • The Top Four Challenges of Data Analytics and How to Solve Them
    The Top Four Challenges of Data Analytics and How to Solve Them
    Storage Switzerland, Promethium Jun 26 2019 5:00 pm UTC 60 mins
    Data analytics and business intelligence (BI) initiatives have become mission-critical, but today, it is simply taking too long to arrive at insights. 90% of the time that it takes to generate insights lies in human labor, and that labor is significantly tied to data preparation. Join subject matter experts from Storage Switzerland and Promethium for an in-depth look at what’s wrong with data analytics today, and how a self-service data analytics and governance strategy can empower organizations to avoid spending months searching for, collecting and preparing data.
  • Hybrid Cloud Management strategies and best practices
    Hybrid Cloud Management strategies and best practices
    Pete Cruz, Manager, Product Marketing Red Hat , Xavier Lecauchois, Senior Director, Product Marketing, Red Hat Jun 26 2019 6:00 pm UTC 47 mins
    The majority of enterprise organizations recognize the business value of hybrid cloud strategies spanning bare metal, virtual machines, and containers deployed across on-premise and public cloud infrastructure. Their goal is to provide end users and developers with cost-effective, on-demand IT resources that are optimized for applications, regulatory requirements, and performance priorities.

    In this presentation, Pete Cruz and Xavier Lecauchois, Red Hat, discuss the most critical management requirements needed to optimize large-scale hybrid cloud operations and application performance. We'll share how Red Hat’s hybrid cloud management strategy is evolving to address customer needs by unifying the operator, developer, and end user experience across a range of public and private cloud platforms.

    Hear how traditional management products, such as Red Hat Satellite and Red Hat CloudForms are being connected with Red Hat Ansible Tower and Red Hat’s recently introduced hybrid cloud cost management and self-service SaaS solutions to provide customers with comprehensive, flexible, and forward-looking hybrid cloud management environments.
  • Don't Let Digital Transformation Wreak Havoc on Your Network!
    Don't Let Digital Transformation Wreak Havoc on Your Network!
    Sam Kumarsamy, Sr. Product Marketing Manager Gigamon Jun 27 2019 3:00 am UTC 52 mins
    Organizations adopting digital apps must deliver an engaging user experiences at the enterprise level to be successful. Unfortunately, the road to great digital experiences is paved with speed bumps: they can cause networks to become even more complex as they groan under the weight of accommodating more users, increased data volume and higher speeds.

    Yes, digital apps are hyper-agile, but they are also very complex: components are often outsourced, apps are usually mega-tiered and are deployed across physical, virtual and cloud networks, making it difficult to get visibility into traffic. And without that visibility, how can you truly ensure a great experience?

    Help is at hand. During this webinar, you will learn how to build an efficient network architecture to provide an engaging digital experience.

    Attendees will learn how to:
    • Utilize tools efficiently by preventing packet duplication and optimizing traffic
    • Enhance security by collecting and distributing NetFlow metadata to tools more effectively
    • Identify, categorize and visualize more than 3,000 applications automatically

    See how a next-generation network packet broker increases visibility, improves security and enables companies to maximize their investment in tools to exceed user expectations.
  • Webinar SUSE und Datastore: SUSE Enterprise Storage und Containertechnologie
    Webinar SUSE und Datastore: SUSE Enterprise Storage und Containertechnologie
    Thomas Grätz, Christian Pfenninger, SE, SUSE Linux GmbH & SUSE Schweiz, Marc Schmitt Solution Area Manager DC Datastore AG Jun 27 2019 8:00 am UTC 60 mins
    Der Storage-Markt ist in Bewegung. Moderne, softwaredefinierte Lösungen bieten mehr Flexibilität als Legacy Speichersysteme -- zu einem Bruchteil der Kosten. Zu viel Routine und "Business as usual" im Storage-Betrieb bedeuten deshalb allzu oft verpasste Chancen und erhebliche Mehrausgaben.
    Lernen Sie im gemeinsamen Webinar von Datastore und SUSE die Vorteile einer software-definierten Speicherumgebung kennen und holen Sie sich Anregungen und Konfigurationsbeispiele für Ihre IT-Umgebung.
    Überzeugen Sie sich, wie einfach, effektiv und kostengünstig Sie SUSE Enterprise Storage auch in Ihrem Unternehmen einsetzen können.
    Im ersten Teil wird auf die SUSE Enterprise Storage und die Neuerungen des Releases 6 eingegangen. Im zweiten Teil des Webcasts wollen wir Ihnen zeigen, wie die softwaredefinierte Storage-Lösung von SUSE sinnvoll in Container-Umgebungen eingesetzt werden kann. Das Webinar richtet sich an Partner und Kunden.

    Agenda:
    -SUSE Enterprise Storage für kleine und mittlere Unternehmen: Hardware, Software, Individualisierung und Services aus einer Hand
    -SUSE Enterprise Storage 6.0 – What´s new?
    -SUSE Enterprise Storage in containerisierten Umgebungen – Anwendungsbeispiele und Best Practice
    -Datastore AG und SUSE – wie Sie von dieser Partnerschaft profitieren können
  • The Secret to Fast Carrier Ethernet Service Roll Outs in Underserved Areas
    The Secret to Fast Carrier Ethernet Service Roll Outs in Underserved Areas
    Ami Sofer, Product line Manager, RAD Jun 27 2019 2:00 pm UTC 60 mins
    Join us for a webinar in which we examine how CSPs can eliminate the 30-60 day customer set up period, even where fiber is unavailable.
  • Introduction to SNIA Swordfish™ Features and Profiles
    Introduction to SNIA Swordfish™ Features and Profiles
    Richelle Ahlvers, Broadcom Jun 27 2019 4:00 pm UTC 60 mins
    Swordfish School: Introduction to SNIA Swordfish™ Features and Profiles
    Ready to ride the wave to what’s next in storage management? As a part of an ongoing series of educational materials to help speed your SNIA Swordfish™ implementation in this Swordfish School webcast, Storage standards expert Richelle Ahlvers (Broadcom Inc.) will provide an introduction to the Features and Profiles concepts, describe how they work together, and talk about how to use both Features and Profiles when implementing Swordfish.
    Features are used by implementations to advertise to clients what functionality they are able to support. Profiles are detailed descriptions that describe down to the individual property level what functionality is required for implementations to advertise Features. The Profiles are used for in-depth analysis during development, making it easy for clients to determine which Features to require for different configurations. They are also used to determine certification / conformance requirements.

    About SNIA Swordfish™
    Designed with IT administrators and DevOps engineers in mind to provide simplified and scalable storage management for data center environments, SNIA Swordfish™ is a standard that defines the management of data storage and services as an extension to the Distributed Management Task Force’s (DMTF) Redfish application programming interface specification. Unlike proprietary interfaces, Swordfish is open and easy-to-adopt with broad industry support.
    Your one stop shop for everything SNIA Swordfish is https://www.snia.org/swordfish.
  • The Intelligent Edge: The Next Frontier of IoT Innovation
    The Intelligent Edge: The Next Frontier of IoT Innovation
    Ed Maguire, Momenta Partners Jun 27 2019 4:00 pm UTC 57 mins
    Edge, mobile edge, and fog computing have emerged, offering a panacea to the pain points of IoT data. Companies such as Intel, SAP, Ericsson and Dell Technologies are creating their own solutions. Edge computing has the potential to impact the data infrastructure of the IoT, but what are the benefits and risks of moving away from the cloud? Edge computing comes with a suite of considerations that need to be carefully considered prior to adoption that we'll explore in turn.

    This webinar will cover:

    - The current state of fog and intelligent edge computing
    - What are the benefits/risks of moving away from the cloud?
    - What does this mean for cloud computing, data infrastructure and data analytics?
    - What are the best use cases of edge computing and what are its limitations?
    - Forecasts on future applications
  • Fibre Channel Zoning Basics
    Fibre Channel Zoning Basics
    Ed Mazurek, Cisco; J Metz, Cisco Jun 27 2019 5:00 pm UTC 75 mins
    In this back-to-basics Fibre Channel webinar, we’re going to be talking about one of the most fundamental functions of the protocol and what makes it so reliable, predictable and secure: Zoning. The ability to ensure that end devices are able to communicate only with the set of devices explicitly permitted is part of what makes Fibre Channel so powerful. This ability to secure those connections in zones adds built-in security to these connections.

    In this webinar, you’ll learn:
    What is Zoning
    Why you’d want to Zone
    The Different Types of Zoning
    Zoning Configuration Flow
    Consequences of Zoning
    Zoneset Activation Flow
    Zoning best practices for different types of applications
    Advances in Zoning
  • Ransomware, Rapid Restoration and Disasters - Recovering from Backup’s Big Three
    Ransomware, Rapid Restoration and Disasters - Recovering from Backup’s Big Three
    Storage Switzerland, StorageCraft Jun 27 2019 5:00 pm UTC 60 mins
    Organizations need to make sure their backup infrastructure can meet the recovery objectives of today’s biggest challenges: ransomware, rapid restoration and disasters. Businesses expect their IT teams to recover faster than ever and they need business performance to be the same during the recovery effort as it is during normal production. Meeting these new challenges and expectations requires IT to rethink the backup process.

    Ransomware requires rapid, frequent backups of all types of data and that the backup software also protects itself. Rapid recovery is more than just instantiating a VM from backup storage. It requires understanding the impact on performance, as well as planning a path for migration back to production storage. Finally, there is the never-ending threat of site-wide disasters. Thanks to cyber-attacks, geographically safe areas don’t exist. All data centers must prepare for a site failure and for a rapid disaster recovery without impacting application performance.

    In our live webinar Storage Switzerland and StorageCraft will discuss why these are the top challenges facing the data protection architecture, why current data protection infrastructure won’t meet these challenges, and how to overcome them.
  • Red Hat Security Roadmap : It's a Lifestyle, Not a Product
    Red Hat Security Roadmap : It's a Lifestyle, Not a Product
    Mark Thacker, Product Manager, Red Hat Jun 27 2019 6:00 pm UTC 11 mins
    Security has never been a more important topic. From DevSecOps, to optimizing existing IT resources, security technologies are everywhere. But where is Red Hat heading? What are we doing now and in the future to help you address security concerns?

    Watch this session from Red Hat Summit. Mark Thacker, Red Hat, discuss the future of Red Hat security, including how new technologies can help you respond to security requirements in DevSecOps, compliance, virtualization, hybrid cloud deployments, privacy, containers, and management.

    We'll also discuss the hardware at the root of trust technologies, the latest security vulnerability responses, and the changing security compliance landscape. By the end of the session, you’ll understand Red Hat’s future security plans, how they may affect you, and how you can help us shape the future of security.
  • SUSE und Thomas Krenn – eine erfolgreiche Partnerschaft im Storage Bereich
    SUSE und Thomas Krenn – eine erfolgreiche Partnerschaft im Storage Bereich
    SUSE Linux GmbH, Thomas-Krenn.AG Jun 28 2019 8:00 am UTC 60 mins
    Im Zeitalter der Digitalisierung und Vernetzung nimmt auch das Thema Speicherung von Daten einen immensen Stellenwert ein. Immer größere Datenmengen wollen erfasst, verarbeitet und gespeichert werden. Doch wie schafft man es, den expandierten Anforderungen an seine IT-Infrastruktur gerecht zu werden? Im Webinar stellen wir Ihnen gemeinsam agile IT Konzepte vor, die sich auf software-definierte Konzepte stützen.
    Die Thomas Krenn AG hat sich seit fast zwei Jahrzehnten auf die Fahne geschrieben, Server „Made in Germany“ zu bauen. Hohe Qualität und ein außerordentlicher, lokaler Service zeichnen die Serversysteme aus, die bestens geeignet sind, die Basis für hochskalierbare, software-definierte Speicher-Cluster zu bilden. SUSE mit seinem, CEPH-basierten SUSE Enterprise Storage, war dazu die logische Ergänzung. So entstand 2015 aus Thomas-Krenn Servern und SUSE Linux Enterprise Storage die erste Storage Appliance „Made in Germany“. Melden Sie sich jetzt an!

    Agenda:
    -Thomas Krenn – was Sie von uns erwarten können
    -SUSE Enterprise Storage: ein kurzer Überblick – Funktionalitäten, Anforderungen
    -Wie Sie aus der Partnerschaft von SUSE Linux und Thomas Krenn profitieren
    -Unsere Appliance und mögliche Konfigurationsbeispiele
  • Red Hat Ansible Network Automation: Past, present, future
    Red Hat Ansible Network Automation: Past, present, future
    Andrius Benokraitis, Principal Product Manager, Red Hat and Sean Cavanaugh, Technical Marketing, Red Hat Jun 28 2019 6:00 pm UTC 42 mins
    Red Hat Ansible Network Automation started with just a few networking platforms and has expanded to over 50 platforms and 700 modules. Customers are not only automating their routers and switches from a variety of vendors like Cisco, Arista, and Juniper, but they're also automating firewalls, wireless controllers, and load balancers.

    In this session, we'll provide a roadmap that includes new Ansible roles in Red Hat Ansible Network Automation that solve common operational tasks for network administrators.

    These network roles provide a curated and agnostic approach to automating a variety of networking vendors. We'll also highlight the seamless integration with Red Hat Ansible Tower and how easy it is to get started with networking content.
  • Speed & Precision: The Keys to Stopping Modern Adversary
    Speed & Precision: The Keys to Stopping Modern Adversary
    Zeki Turedi, Technology Strategist EMEA, CrowdStrike, Brandon Dunlap, Moderator, (ISC)² Jul 2 2019 12:00 pm UTC 60 mins
    Defending against modern adversaries requires the ability to detect and to understand threats quickly, and to respond decisively. CrowdStrike’s experts fight and win these battles every day, and have one of the industry’s most comprehensive pictures of today’s top cyber threats. Join CrowdStrike for a deep dive into global observations and trends, and real-world intrusion case studies, delivering deep insights on modern adversaries, and their tactics, techniques, and procedures (TTPs).

    Learning Outcomes:
    -Why “speed” is the new critical metric in cybersecurity.
    -How organisations are using the MITRE ATT&CK framework to shorten the time to investigate and understand threats.
    -Trends in adversary tradecraft, as seen across 1000s of real-world intrusion attempts.
    -Action plans that you can use to ensure your organisation is ready to anticipate and defend against the most dangerous threats of tomorrow.
  • From SAP Notes to SAP Nodes, with SUSE Manager 4 and Salt
    From SAP Notes to SAP Nodes, with SUSE Manager 4 and Salt
    Joachim Werner, Senior Product Manager of Infrastructure Management, SUSE Jul 2 2019 2:00 pm UTC 60 mins
    SUSE Manager 4, the latest version of SUSE's best-in-class open source infrastructure management solution, comes with new features that help you lower cost, simplify management, reduce complexity, and regain control of your IT.
    In this webcast, we focus on how the new Salt formulas for installing SLES for SAP and HA clusters, together with the vastly improved software patch staging UI, make deploying and maintaining your SAP infrastructure on SUSE Linux Enterprise a breeze. Join us!
  • Red Hat Automation and Management Portfolio Integrations and Roadmap
    Red Hat Automation and Management Portfolio Integrations and Roadmap
    William Nix, Manager Technical Marketing, Red Hat and Darren Orzechowski, Senior Director, Product Marketing Red Hat Jul 2 2019 6:00 pm UTC 37 mins
    Learn about Red Hat products for automation, management, and integration: Red Hat Ansible Automation products, which include Red Hat Ansible Tower, Red Hat Ansible Engine, and Red Hat Ansible Network Automation; Red Hat Satellite; Red Hat CloudForms; and Red Hat Insights.

    William Nix and Darren Orzechowski, Red Hat, also talk about new offerings for multicloud-OS and hybrid-cloud management that help you more efficiently integrate and manage your hybrid cloud and local infrastructure.
  • Is your hybrid cloud strategy living up to expectations?
    Is your hybrid cloud strategy living up to expectations?
    Julian Keetch, HPE Software Defined Infrastructure Product Manager & Mike Waldock, Infrastructure and Cloud Expert, CANCOM Jul 3 2019 7:30 am UTC 33 mins
    Many organisations have embraced the public cloud, but it hasn’t always lived up to expectations. Whether that’s because they haven’t realised the cost benefits or are concerned about security, or they’re simply not culturally ready. In fact, according to IDC’s 2018 Cloud and AI Adoption Survey, organisations are moving 50% of their public cloud applications to either a private cloud or non-cloud environment over the next two years.

    So how do you achieve the right cloud strategy? It must be relevant to your workloads, so in reality we’re looking at a future that’s hybrid. It’s all about getting the right mix of public and private cloud. Creating an infrastructure that bridges the gap between traditional IT and cloud native applications. Enabling you to keep the lights on, as well as respond to the need to deliver new products and services faster.

    As an IT Manager or IT Director of an enterprise organisation, how do you manage the needs of your CIO, Developers and Operations team? This webcast explores how to create the right hybrid cloud approach enabled by a software-defined infrastructure. It also gives a brief overview of HPE Synergy, one infrastructure for all applications.

    Learn how to:

    •Achieve the optimum hybrid IT model
    •Solve the conundrum of keeping the lights on whilst innovating faster
    •Effectively manage a complex hybrid IT environment
    •Achieve a single source of truth for your infrastructure
  • Wacom Tablets with Virtual Workstations​
    Wacom Tablets with Virtual Workstations​
    Joseph Sliger, Jarrod Dunnihoo, Wacom & Mirela Cunjalo, Teradici Jul 3 2019 5:00 pm UTC 30 mins
    Presented by Wacom and Teradici, we're excited to talk about the power of Wacom tablets combined with a virtual workstation. Creative professionals worldwide depend on PCoIP remote workstations for uncompromised user experience and ultra-secure access to graphics-intensive 3D applications while media assets remain protected. With Teradici Cloud Access Software, work with your Wacom tablet from anywhere, whether your assets are secured in your own data center or in a pubic cloud.
  • Don't Let Digital Transformation Wreak Havoc on Your Network!
    Don't Let Digital Transformation Wreak Havoc on Your Network!
    Sam Kumarsamy, Sr. Product Marketing Manager Gigamon Jul 4 2019 10:00 am UTC 52 mins
    Organizations adopting digital apps must deliver an engaging user experiences at the enterprise level to be successful. Unfortunately, the road to great digital experiences is paved with speed bumps: they can cause networks to become even more complex as they groan under the weight of accommodating more users, increased data volume and higher speeds.

    Yes, digital apps are hyper-agile, but they are also very complex: components are often outsourced, apps are usually mega-tiered and are deployed across physical, virtual and cloud networks, making it difficult to get visibility into traffic. And without that visibility, how can you truly ensure a great experience?

    Help is at hand. During this webinar, you will learn how to build an efficient network architecture to provide an engaging digital experience.

    Attendees will learn how to:
    • Utilize tools efficiently by preventing packet duplication and optimizing traffic
    • Enhance security by collecting and distributing NetFlow metadata to tools more effectively
    • Identify, categorize and visualize more than 3,000 applications automatically

    See how a next-generation network packet broker increases visibility, improves security and enables companies to maximize their investment in tools to exceed user expectations.