Hi [[ session.user.profile.firstName ]]
Sort by:
    • The Wi-Fi Design Workshop
      The Wi-Fi Design Workshop Ashley Nurcombe, CWNE Systems Engineer, UK Aerohive Networks Recorded: May 30 2018 10:00 am UTC 70 mins
    • Join our 45 minute online workshop to receive insights on the most common Wi-Fi pitfalls that result in lower performance, burdensome network management, higher complexity and cost – with best practices to get it right from the outset.

      Our team of CWNE Systems Engineers and local experts will cover critical considerations – answering your questions and sharing ideas to help you create a better experience for yourself and your users:

      Radio frequency considerations including signal to noise ratio
      Best use of channels and spatial streams to avoid interference
      Designing for capacity, not just coverage – including ways to double your capacity
      Achieving best data rates through bandwidth optimization
      Getting the right architecture for your network design

      Read more >
    • How Cloud & SDN will transform your network this year
      How Cloud & SDN will transform your network this year Ashley Nurcombe, CWNE Systems Engineer, UK Aerohive Networks Recorded: Mar 14 2018 11:00 am UTC 45 mins
    • How much time and missed opportunity is yesterday's network design costing today’s organisation? For many, cloud has already disrupted their software, communications and storage to scale and simplify operations – so why not networks?

      Join our CWNEs for this 30 minute workshop o review the benefits of today’s cloud networking offerings – and how to apply principles of software defined networking for radical simplification of the local and wide area network.

      Reviewed:

      •How cloud networking compares to previous fixed network
      approaches
      •How to remove limitations and achieve faster deployment, simpler
      management and instant adaptability
      •Comparing clouds for your network’s future – scalability, security
      and performance
      •How to automate complex operations and dynamically change
      network behaviour based on activity
      •What cloud-powered big data, AI and analytics could do for you

      Read more >
    • Telecoms, Networks and Devices in Europe: What to Expect in 2018 – and Beyond
      Telecoms, Networks and Devices in Europe: What to Expect in 2018 – and Beyond John Delaney, Chris Barnard. Andy Hicks, Chrystelle Labesque, Francisco Jeronimo Recorded: Jan 10 2018 2:00 pm UTC 57 mins
    • The telecoms industry in Europe is undergoing transformation. Telcos are striving to transform themselves into digital service providers, and to transform their networks into flexible, service-oriented platforms. Another wave of change is on the way in 2018, as the first set of standards for 5G networks emerges, and as new types of connected device grow in importance. At the same time, the Enterprise space is undergoing through the most significant change in many years: software-defined networking and SD-WAN reshape the technology and the market; vendors transform in the wake of the move to subscription models; the move from premise to cloud and primacy of customer experience disrupt unified communications; and mobility is ever more important in the 24/7 economy.

      IDC’s European Telecoms & Networking Group is dedicated to the big issues in network technology, device technology, operator strategy and end-user services. In this webcast, IDC’s unrivalled team of analysts presents its expectations for the European telecoms industry in this pivotal year, in areas including:

      •Telco strategy and prospects for growth in service revenues
      •Developments in public network technology, and how they will affect services & strategy
      •Key trends in enterprise networking and related professional services
      •Developments in Unified Communications and Enterprise Mobility
      •Key trends in the connected-device landscape

      Join us on 10 January for IDC’s complimentary webcast, to hear our comprehensive view of the direction of European telecoms between now and the end of the decade.

      Read more >
    • What Security Logs Tell You About Attackers in Your Network
      What Security Logs Tell You About Attackers in Your Network Seth Goldhammer, Dir. Product Management at LogRhythm & Randy Franklin Smith, Windows Security Expert Recorded: Jun 6 2017 9:00 am UTC 36 mins
    • Preventing attackers from gaining control of network endpoints is difficult. Your preventative controls might stop such an event, but defence-in-depth best practices recommend a multi-layered security approach to protect your organisation.

      In this webcast, Seth Goldhammer, Director of Product Management at LogRhythm, joins Randy Franklin Smith, Windows Security subject matter expert, to discuss how to detect attackers in various stages of the Cyber Attack Lifecycle. The duo examines Windows and Windows Firewall events including:

      * 4798—A user's local group membership was enumerated
      * 4799—A security-enabled local group membership was enumerated
      * 4627—Group membership information
      * 6416—A new external device was recognised by the system

      They also show how LogRhythm’s analytics can recognise progression along the Cyber Attack Lifecycle, while increasing risk scoring with each progression, and how LogRhythm can infer additional context about a user during analysis.

      Watch now to learn how to take your security operations to the next level.

      Read more >
    • Singtel & Viptela: Address your hybrid network challenges in APAC with SD-WAN
      Singtel & Viptela: Address your hybrid network challenges in APAC with SD-WAN Hoo Shu Yee, Product Dir, Singtel & Ramesh Prabagaran, VP, Viptela,Inc. Recorded: Jan 19 2017 5:00 pm UTC 49 mins
    • With APAC’s varying stages of infrastructure development, managing an enterprise Wide Area Network (WAN) in the region can be extremely challenging. This is compounded by different networking standards and service level agreements (SLAs) across countries, as well as disparities in race and culture.

      Furthermore, as more applications move onto the cloud and employees become more mobile, enterprises have to deal with growing risk of cyber attacks with increasingly complex WAN environments that combine multiple private networks and public internet services.

      In this webinar, learn more about managing an enterprise network in APAC. We will touch on how:

      - To address potential challenges with WAN architectures evolving to hybrid networks
      - To optimise and accelerate connectivity to the cloud
      - Software-Defined WAN (SD-WAN) works and helps you manage your hybrid network more effectively
      - Enterprises have leveraged SD-WAN to increase efficiency and reduce cost

      Lastly, find out how Singtel ConnectPlus SD-WAN service powered by Viptela, designed with security in mind, can help to simplify and unify your networks, while providing protection against data breaches and attacks.

      Read more >
    • Singtel & Viptela: Address your hybrid network challenges in APAC with SD-WAN
      Singtel & Viptela: Address your hybrid network challenges in APAC with SD-WAN Hoo Shu Yee, Product Dir, Singtel & Ramesh Prabagaran, VP, Viptela,Inc. Recorded: Jan 19 2017 6:00 am UTC 47 mins
    • With APAC’s varying stages of infrastructure development, managing an enterprise Wide Area Network (WAN) in the region can be extremely challenging. This is compounded by different networking standards and service level agreements (SLAs) across countries, as well as disparities in race and culture.

      Furthermore, as more applications move onto the cloud and employees become more mobile, enterprises have to deal with growing risk of cyber attacks with increasingly complex WAN environments that combine multiple private networks and public internet services.

      In this webinar, learn more about managing an enterprise network in APAC. We will touch on how:

      - To address potential challenges with WAN architectures evolving to hybrid networks
      - To optimise and accelerate connectivity to the cloud
      - Software-Defined WAN (SD-WAN) works and helps you manage your hybrid network more effectively
      - Enterprises have leveraged SD-WAN to increase efficiency and reduce cost

      Lastly, find out how Singtel ConnectPlus SD-WAN service powered by Viptela, designed with security in mind, can help to simplify and unify your networks, while providing protection against data breaches and attacks.

      Read more >
    • Virtualized & Accelerated Cloud Infrastructure for Big Data workloads
      Virtualized & Accelerated Cloud Infrastructure for Big Data workloads Taufik Ma, CEO, Co-founder Attala Systems; & Colin Cunningham, Data Scientist, Intel Recorded: Jul 25 2018 3:00 pm UTC 51 mins
    • Whether for private clouds, public clouds or a multi-user environment, IT operators require an infrastructure solution that can instantly spin-up data-intensive workloads and that can scale to support multiple big data workloads or tenants. Attala Systems and Intel have partnered to create a solution that delivers composable storage with local NVMe performance for big data workloads like Apache Hadoop and Spark. The performance available to direct-attached PCIe flash is welcome, but cloud total cost of ownership (TCO) is better when storage is shared to many hosts while offering the elasticity to meet dynamic tenant demands. The maturing of the NVMe over Fabrics (NVMe-oF) specification enables local NVMe performance over a network. With remote direct memory access (RDMA), NVMe actions and data can be transported over a fabric such as Ethernet. This brief illustrates how a complex big data analytics workload is well served by Attala Composable Storage with Intel® 3D NAND SSDs. This workload—which once struggled to scale to support concurrent customers when serviced by an iSCSI appliance or enterprise storage area network (SAN), is shown to match local NVMe performance and scale independently for two customers with no degradation in application runtime when using the NVMe-oF target.

      Read more >
    • Cyber Security: Detecting Attacks and Protecting your Environment
      Cyber Security: Detecting Attacks and Protecting your Environment Scott Villinski, National Director, State and Local Government Enterprise Mobility Sales Recorded: Feb 11 2016 7:00 pm UTC 54 mins
    • The Pentagon reports 10 million cyberattacks daily. Federal, state and local government agencies need to safeguard information and maintain control when addressing internal mandates for cloud migration. Do you know how many attacks you are experiencing on a daily basis? Do you know where those attacks are coming from? How long they have been in your environment?

      While there is no silver bullet to combating either external or internal cyberattacks, there are steps you can take to build a defense strategy to protect your agency. Beyond just detecting attacks, you need to build up your defenses and take the necessary steps to protect your data and applications.

      In this session, we will discuss how you can leverage the Microsoft Enterprise Mobility Suite to help:
      1. Monitor behavior on your internal network and detect abnormal behavior
      2. Identify authentication irregularities from your users
      3. Protect applications using two-factor authentication
      4. Restrict access to confidential data

      Read more >
    • How to Expand the Power of Flash Storage with FC-NVMe
      How to Expand the Power of Flash Storage with FC-NVMe Craig Carlson, Rupin Mohan, Dean Wallace, David J. Rodgers, Marcus Thordal, and Dennis Martin Upcoming: Nov 1 2018 4:00 pm UTC 60 mins
    • Flash is really fast, and performance-hungry applications must be able to access it wherever it is located. Luckily, NVMe can take advantage of flash throughout a computer system.

      However, accessing flash over a network can introduce problems which designers must solve. Accesses can take much longer than local flash, latency can rise significantly, networking issues can raise their ugly heads, and performance can vary greatly depending on network load and competition for resources.

      Ways to solve such problems include sequence-level error recovery, prioritization for virtualized environments, and improved forward error correction. And – surprise! – all these are already part of the Fibre Channel standard or the emerging FC-NVMe transport protocol.

      Moderator: Mark Jones, Director Technical Marketing and Performance, Broadcom
      Panelists: Craig Carlson, Senior Technologist, Cavium, Rupin Mohan, Director, R&D, Head of Development, Chief Technologist (SAN), HPE, Dean Wallace, Cavium, David J. Rodgers, Sr. Product Marketing Manager, Teledyne LeCroy PSG, Marcus Thordal, Principal Solution Architect, Broadcom and Dennis Martin, President, Demartek.

      Read more >
    • Remind me WHAT This GDPR Thing is all About Again?
      Remind me WHAT This GDPR Thing is all About Again? Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Feb 20 2018 11:00 am UTC 49 mins
    • Are you Prepared, Blissfully Unaware or in Full Panic Mode?

      It’s 2018 and May 25th, aka G-Day (GDPR day), is rapidly approaching. Hopefully your organization is well on its way to completing the necessary steps to bring itself into line with the new regulations. However we all know that the best laid plans always have a way of falling behind.

      This session will focus on the data breach prevention aspect of GDPR and will identify the key areas where you should have the right technology in place. Remember, no network can be made 100% hacker proof but with the right preparations, processes and technology in place, you can be well equipped to deal with any intrusion and minimize or even eliminate the possibility of data breach related fine from your local Data Protection authorities.

      Read more >
    • BrightTALK at RSA 2017: JP Bourget on Top Cyber Challenges for 2017
      BrightTALK at RSA 2017: JP Bourget on Top Cyber Challenges for 2017 Josh Downs, Community Manager, BrightTALK & JP Bourget, CSO, Syncurity Recorded: Apr 4 2017 9:50 am UTC 7 mins
    • BrightTALK caught up with JP Bourget, Chief Security Officer of Syncurity, for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

      Topics up for discussion:

      - What's to be learnt from the Yahoo breach revelations
      - Cyber security and how it's moved into the political sphere
      - The supposed Russian Hack of the US Elections and what it means for Cyber Warfare
      - The top challenges for US cyber teams in 2017
      - Trends in the threatscape, threat actors and motives

      About the Speaker:
      JP Bourget, Founder and Chief Security Officer of Syncurity, has over 10 years experience in Cybersecurity. Over the past 5 years JP has focused on Incident Response, SIEM and Network Security Management. JP is was a founding organizer of BSides Rochester, a local, free Information Security Conference. In 2013, JP was a participant and organizer of Cycle Override, a 2700 mile cross country bicycle ride from Virginia to San Francisco, by way of Defcon 21, in order to raise Information Security awareness and raise money for the Electronic Frontier Organization. (@EFF) Prior to forming Syncurity, JP was Network Security Manager for a $200 million global manufacturing company, with presence in USA, Europe and China. JP was an adjunct professor at Rochester Institute of Technology, teaching undergraduate classes in Network Security and Forensics.

      Read more >
    • Building a Passive Optical LAN (POL) for High-Bandwidth Enterprises
      Building a Passive Optical LAN (POL) for High-Bandwidth Enterprises Ryland J. Marek, 3M Communication Markets Division; Francis Audet and Jimmy Gagnon, EXFO Recorded: May 15 2014 6:00 pm UTC 55 mins
    • Following the fiber-to-the-home (FTTH) trend to deliver more bandwidth to consumers, a new technology is emerging that promises to provide more bandwidth, more services and future-proof networks to enterprises. Passive optical LANs are changing the way we think about designing the local area network. This webinar will provide an introduction to POL technology, compare POL and traditional Ethernet switching architectures, and review the Telecommunications Industry Association (TIA) standards applicable to the design and testing of POL solutions in order to address considerations such as splitters, connectors, signals and more.

      Join us for this webinar to learn more about the following:

      - The latest standards and market trends related to POL solutions
      - A detailed overview of POL solutions and their main benefits
      - The differences between traditional structured copper cabling and POL solutions
      - Elements requiring testing and available solutions

      Read more >
    • Why visibility is a crucial part of any security strategy
      Why visibility is a crucial part of any security strategy Peter Smith, Regional Sales Manager - Europe & Russell McDermott, Sales Engineer, Netwrix Recorded: Sep 7 2016 2:00 pm UTC 44 mins
    • With a recent increase in high-profile security breaches and compliance violations, traditional security mechanisms, such as firewalls, IDS, and antivirus are no longer enough to defend against external attackers, and insider threats. By having increased visibility into internal changes, configurations, access events, and permissions across the IT infrastructure, organizations can far more effectively defend against such attacks.

      So, please join our local auditing and compliance team from Netwrix, Pete Smith (Regional Sales Manager Europe) and Russell McDermott (Pre-Sales Engineer) and see how Netwrix Auditor can unlock the door into possible breaches in your IT environment.

      From our brief session you will learn:

      • How deeply security breaches and data leaks are really effecting organizations
      • How to protect your data from the insider threats
      • How to have “peace of mind”, and achieve complete visibility of your IT infrastructure

      Read more >
    • Networking Decision Making for Cloud, Virtual and Legacy Environments
      Networking Decision Making for Cloud, Virtual and Legacy Environments Greg Schulz, Founder & Sr. Advisory Analyst, StorageIO Recorded: Dec 10 2014 7:00 pm UTC 46 mins
    • How will your servers network and communicate with your storage on a local or remote basis including across virtual and cloud? This industry trends and perspective webinar looks at current and emerging issues, trends and tips for making informed decisions to network with your servers and storage. There are many different options for local and remote, not to mention ways of accessing storage from block, file and object. Which is the best for your environment will depend on your needs, requirements, budget and other considerations. In this session we will look at what are your options as well as tips on what to use when, where, why and how for various environments.

      Key themes:
      •Performance and availability metrics and benchmarks
      •Fast servers need fast storage and I/O connectivity
      •SAN, LAN, MAN, WAN options
      •Cloud and converged server and storage options
      •Industry landscape sampling of who is doing what
      •What to look for and various options

      Read more >
    • How the finance function can support STPs
      How the finance function can support STPs Dr Oliver Bernath, Partner, PwC Recorded: Jun 20 2016 1:00 pm UTC 62 mins
    • In conjunction with PwC this webinar will provide an overview of how the finance function can support strategic and transformation plans (STPs).

      Health and care systems are asked to come together to create their own ambitious local blueprints for implementing the Five Year Forward View. 44 footprint areas have been defined that will bring local health and care leaders and organisations and communities together for improved health, care and finances over the next five years. STPs are the single application and approval process for transformation funding for 2017/18 onwards that should be a genuine enabler for whole system transformation.

      This webinar will discuss the practical support that finance professionals can provide to deliver a financially sustainable STP. PwC will present a range of observations and lessons to implement financially successful STPs that has been gained from working with their clients.

      Read more >
    • Discover Patterns of Life and Activity in Hacker Forums
      Discover Patterns of Life and Activity in Hacker Forums Christopher Ahlberg, Chief Executive Officer, Recorded Future Recorded: Mar 22 2016 2:00 pm UTC 46 mins
    • Cyber criminals, hacktivists, and the occasional state actor tend to congregate in underground forums and come in many forms, but often focus geographically and linguistically, as well as stick to certain areas — carding, reverse engineering, hacking, etc.

      In this webinar Recorded Future CEO and Co-Founder Christopher Ahlberg will share an analysis of a very large corpus of forum posts from the surface and deep Web spanning more than three years — including forums originating in the United States, Russia, Palestine/Gaza, Ukraine, Iran, China (in local language), and more.

      Based on this corpus we establish a series of patterns of actor behavior that can be used for targeting illicit behavior and actors, establish research pivot points, and detect actor focus on products, technologies, and vulnerabilities.

      The analysis will lay out techniques for how to analyze forum and actor behavior based on meta data analysis, without detailed human analysis of individual messages/posts.

      Christopher will also demonstrate how we can use natural language processing, temporal pattern analysis, social network analysis, and other techniques to establish patterns both inside and across forums (tracking actor traversals of the Web), and crossing boundaries of the clear/deep/dark Web.

      This exclusive presentation will cover:

      * Description of the large, specially collected corpus.
      * Message analysis techniques.
      * Established patterns of life and patterns of message traffic in forums.
      * Comparing hacker groups by geography and by their interests and behaviors.
      * Visualization techniques for pattern analysis.
      * Techniques for tracking evolutions of vulnerabilities, exploits, and exploit kits across forums.

      A sample pattern (along with many others) that we'll demonstrate is how in a high-value, private hacker forum, the classic Patch Tuesday/Exploit Wednesday pattern is alive and well — with traffic spiking on Wednesdays, post Tuesday patch releases.

      Read more >
    • Finding the L Spot: The Hype and Reality of Local-Mobile Advertising
      Finding the L Spot: The Hype and Reality of Local-Mobile Advertising Monica Ho, xAd, Vice President of Marketing and Greg Sterling, Opus Research's Senior Analyst Recorded: May 23 2012 5:00 pm UTC 49 mins
    • Somewhere between 20% and 30% of traffic to many websites is now coming from mobile devices, depending on the category. In specific local categories the number is as high as 50%.

      Consumers have repeatedly indicated their preference for localized ads and see them as more relevant than “generic” ads. There are also several very bullish forecasts for localized mobile advertising. Yet most “local” mobile ads aren’t more specific than regional or metro-area targeting. And only about 5% of mobile ads carry a precise “lat-long.”

      Why is this the case and what must happen to realize the promise of “LoMo” advertising? Join Monica Ho, xAd Vice President of Marketing and Opus Research's Senior Analyst Greg Sterling for a discussion of the opportunities – and challenges – of locally targeted mobile advertising today.

      Sterling will provide findings on consumer preferences for localized advertising as well as performance data comparing local-mobile ads to national ads. He’ll also present a recent case study comparing ad performance across five mobile ad networks.

      xAd’s Monica Ho will talk about the opportunities and challenges of location targeting .She’ll also present the 5 mobile marketing best practices that every marketer/agency should know in order to drive true performance out of mobile advertising.

      Read more >
    • Stop Hackers by Securing Remote Desktop Protocol (RDP) for IT Support
      Stop Hackers by Securing Remote Desktop Protocol (RDP) for IT Support Bryan Hood, Sr. Solutions Engineer, Bomgar Recorded: Feb 18 2014 5:00 pm UTC 36 mins
    • Many IT departments and IT services vendors rely on Microsoft Remote Desktop Protocol (RDP) to access and work on their own or their clients’ remote computers and systems. Unfortunately, RDP is a common access pathway for hackers, who easily guess default logins and passwords or use brute-force attacks to gain control of RDP connections. Today, there is a thriving interest in RDP hacking, with cybercriminals buying and selling access to point-of-sale terminals and other systems that have RDP enabled on underground forums.

      In fact, the 2013 Trustwave Global Security Report states: “Organizations that use third-party support typically use remote access applications like Terminal Services (termserv) or Remote Desktop Protocol (RDP), pcAnywhere, Virtual Network Client (VNC), LogMeIn or Remote Administrator to access their customers’ systems. If these utilities are left enabled, attackers can access them as though they are legitimate system administrators.”

      Natively, RDP has no centralized management, auditing or reporting, and limited identity management integration. In addition, RDP is designed for remote access on a local area network (LAN), and establishing a connection to a computer on a remote network usually requires a VPN tunnel and firewall configurations that compromise security - such as opening the default listening port, TCP 3389.

      In this webinar, Bryan Hood, Sr. Solutions Engineer at Bomgar, will demonstrate how organizations can eliminate these security gaps, by routing RDP through Bomgar’s secure remote support appliance. With this approach, tech support professionals can still access and fix all of the systems they need to, without opening a door to hackers.

      Read more >