Hi [[ session.user.profile.firstName ]]
Sort by:
    • Technical Introduction to VMware NSX
      Technical Introduction to VMware NSX Sean Howard, Staff Systems Engineer, NSX Recorded: May 12 2016 7:10 pm UTC 34 mins
    • Join this web presentation to learn how VMware NSX can transform your data center operational model and economics. Attend this webcast to discover the technical benefits of network virtualization including:

      - Reduce service provisioning from days to minutes
      - Roll out non-disruptive deployment, completely decoupled from network hardware
      - Automate security for speed and agility in the data center

      Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.

      Don't miss this opportunity to hear about the various use cases and IT outcomes of VMware NSX.

      Read more >
    • 3 Ways to Improve Security Protocols to be Mobile-Cloud Ready
      3 Ways to Improve Security Protocols to be Mobile-Cloud Ready Geoff Huang, Director of Product Marketing at VMware Recorded: Jun 16 2016 3:00 pm UTC 24 mins
    • As mission-critical business workflows become more mobile, yesterday’s security protocols and measures have become inadequate. With increasing security threats, protecting data center resources and limiting user access to internal resources are integral to mobile and data center security.

      Join us to learn how VMware NSX and AirWatch transform modern mobility to intelligent networking through micro-segmentation—from the data center to the end-user device.

      During this session you will learn about 3 ways that VMware can help:
      - Provide granular control for business-critical mobile workflows
      - Simplify and accelerate EMM and BYOD deployments through networking and security policies
      - Automate the enforcement policy of mobile applications access across your data center

      Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.

      Read more >
    • IT Automation Series: An Analysis of Hardware vs. Software-Centric Approaches
      IT Automation Series: An Analysis of Hardware vs. Software-Centric Approaches Matt De Vincentis, Senior Product Line Marketing Manager at VMware Recorded: Jun 2 2016 3:00 pm UTC 18 mins
    • Join us for the first in a three-episode series on network virtualization and how to move from hardware-centric to software-centric networking—without disruption to your existing environment.

      As software-centric networking has emerged as a force in data center networking, we’ve witnessed two principal approaches that are gaining a foothold in enterprise data centers: software-defined networking (SDN) and network virtualization. We’ve also seen these two terms become blurred, and even used interchangeably. The confusion is understandable.

      Join us for this webcast to get clarity on these approaches and why network virtualization is a true software-centric approach to networking. You’ll learn about:

      - The business needs impacting how IT thinks about networking
      - The challenges with traditional hardware-centric networking
      - The differences between SDN and network virtualization

      Enable networking and security at the speed of software while building datacenter agility with network virtualization on industry standard Intel® Xeon® processor based server architecture.

      Read more >
    • IT Automation Series: Achieving Real IT Automation - The NSX Advantage
      IT Automation Series: Achieving Real IT Automation - The NSX Advantage Joshua Soto, Senior Product Marketing Manager, Networking & Security Recorded: Jun 9 2016 3:00 pm UTC 17 mins
    • Join us for the second in a three-episode series on network virtualization and how to move from hardware-centric to software-centric networking—without disruption to your existing environment.

      Network virtualization dramatically accelerates the delivery of IT services without major re-architecting, ripping, and replacing physical networks. Early adopters of network virtualization are achieving impressive results by automating IT processes that were once manual, lengthy, and error-prone. In this webcast we will focus on how VMware NSX enables businesses to move to network virtualization with three specific use cases:

      IT Automating IT – Automate the provisioning, configuration, management, and decommissioning of network virtualization and security

      Developer Cloud – Provide development and test teams with fast access to infrastructure by standardizing the compute, storage, network, and security configurations of full application stacks

      Multi-Tenancy Infrastructure – Use micro-segmentation and isolation capabilities to maintain isolation between tenants in a multi-tenant cloud environment

      Enable networking and security at the speed of software while building datacenter agility with network virtualization on industry standard Intel® Xeon® processor based server architecture.

      Read more >
    • Next-Generation Cloud Security with VMware NSX and Armor
      Next-Generation Cloud Security with VMware NSX and Armor Jason Rieger Recorded: May 18 2016 6:00 pm UTC 28 mins
    • As threat actors display more proficiency, speed and diligence, cloud security is of paramount importance. Choosing a cloud solution has often required businesses to choose between performance, elasticity and security — but not all three.

      In this webcast:

      · Explore how a VMware ecosystem, built on the NSX network virtualization platform, now makes it possible to achieve high performance and elasticity, while maintaining the highest levels of security.

      · Armor will use its Virtual Private Cloud to demonstrate how to architect an environment with fully integrated security that still provides the performance and efficiency customers demand from the cloud.

      · Learn how NSX and the VMware suite form key components of the Armor Virtual Private Cloud, including Server, Network and Security Virtualization.

      Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.

      Read more >
    • When a Castle and Moat Aren't Enough: Combatting Ransomware in Healthcare
      When a Castle and Moat Aren't Enough: Combatting Ransomware in Healthcare Chris Logan, Senior Healthcare Strategist at VMware | Bill Hudson, Chief Healthcare Strategist, VMware Recorded: Jun 24 2016 6:50 pm UTC 49 mins
    • Provider agility demands a high degree of connectivity whether to address episodes of care across the clinical continuum, to facilitate the exchange of claims data, or even to accommodate a rapid acquisition. Meanwhile, the specter of malware has grown to become a significant risk to provider organizations increasing the risk to PHI and business data. As cyber criminals now focus on malware as a means to generate revenue, it will only create an avenue for more attacks in the future.

      Malware/Ransomware has already plagued several healthcare organizations this year this trend will continue. Additional controls and strategies need to be explored to help prevent this widespread issue both right now and in the future. This webcast will allow you to further explore what ransomware is, how it propagates, what can be done to help prevent it and explore some of the solutions VMware ha developed to help minimize the risk related to ransomware.

      Learning Objectives
      - Gain a clearer understanding of the threat to healthcare providers that ransomware presents
      - Learn how ransomware propagates across both corporate and personal assets
      - Identify some strategies to address how your organization can prevent ransomware from taking hold within your organization
      - Develop a better understanding of VMware’s solutions which help address this risk and create a platform for enhanced security

      Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.

      Read more >
    • NSX, Next-Generation Firewall and the Software-Defined Data Center
      NSX, Next-Generation Firewall and the Software-Defined Data Center Mariano Maluf, VMUG | Blake Wofford, Fuel | Kausum Kumar, VMware | Sai Balabhadr, Palo Alto Networks | John Spiegel, Customer Recorded: May 25 2016 5:20 pm UTC 59 mins
    • Many organizations are implementing server virtualization to reap the business benefits of simplifying operations, speeding up provisioning, and adapting to rapidly changing infrastructure needs, but this creates a new set of security challenges as network professionals race to keep up with the changes. To really take advantage of software-defined data architecture requires a partnership between a centralized management platform, easily integrated next-gen firewall solution, and an adaptive, simplified virtual environment. Enter VMware and Palo Alto Networks.

      In this webinar, experts from Palo Alto Networks and VMware, along with members of their user communities Fuel and VMUG will provide an technical overview of the advantages of pairing Palo Alto Networks’ VM-series next-generation firewall and Panorama centralized management tools with VMware’s NSX network virtualization platform. With real-world customer examples and advice on the best way to protect your organization across on-prem and online environments, you’ll leave this webinar with an action plan for realizing the full opportunities of SDDC infrastructure.

      Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.

      Read more >
    • KYC in the online age
      KYC in the online age Panel Discussion featuring: UK Cabinet Office, CurrencyFair, IOX & Mitek Recorded: Feb 16 2017 3:00 pm UTC 47 mins
    • Financial institutions from all over the world are facing increasingly strict regulations regarding the verification and authentication of their customers’ identity. The imminent enforcement of the 4AMLD and the publication of the 5AMLD will nothing but add pressure on the financial services industry.

      To keep a competitive edge and still be compliant with the latest Anti-Money Laundering (AML) and Know Your Customer (KYC) regulations, banks, prepaid card operators, digital currency processors, exchanges, and wallets are being compelled to embrace the digitalisation of traditionally cumbersome processes such as customer due diligence and ongoing authentication.

      Aiming to simplify KYC in this ever-changing regulatory environment, and optimizing the digital channels for further security and convenience, financial institutions need to successfully achieve this change within their policies, procedures, business models, and technology infrastructures.

      During this webinar, our panel of experts will provide answers to the following questions:

      •Are the technologies to underpin digital identity verification reliable and robust enough for financial institutions to rely on them?

      •Are customers prepared to go down the digital route?

      •Can financial institutions strike the right balance between rock-solid compliance, and smooth, easy, digital customer experience?

      •How are financial institutions coping with the challenges posed by the latest regulatory updates?

      Join us for this panel discussion with our expert speakers:

      Don Thibeau, Chairman & President, The Open Identity Exchange (OIX)
      Fintan Byrne, Head of Risk & Chief Compliance Officer, CurrencyFair
      Sarah Clarke, General Manager - Identity, Mitek
      David Rennie, Identity Assurance Programme, UK Cabinet Office

      Read more >
    • Ten Reasons Why You Will Love Windows Server 2016
      Ten Reasons Why You Will Love Windows Server 2016 John Savill, Technical Solutions Professional, Microsoft Corporation Recorded: Nov 9 2016 9:00 pm UTC 39 mins
    • Windows Server 2016 is packed with capabilities, and after a year of discussions with customers at Microsoft Technology Centers across the US, we've got our finger on the pulse of which features resonate best. In this webcast, you'll learn about the top reasons to love Windows Server 2016, including virtualization, storage, networking, management, and more. We'll focus on the unifying theme of security, while highlighting some game-changing capabilities that finally enable the protection of workloads, even from the administrator.

      Join this webcast to learn about:
      Top 10 standout features of Windows Server 2016, according to our customers
      Comparison between Windows Server 2016 Datacenter edition versus Standard edition
      Details on an important licensing update on processor-based to core-based

      Read more >
    • Developing Modern Applications for State and Local Government
      Developing Modern Applications for State and Local Government Will St. Germain, Damon Ronco, Microsoft Recorded: Jan 28 2016 4:35 pm UTC 65 mins
    • In this session we will discuss how state and local government organizations can create modern cloud applications in Microsoft Azure. Learn how you can help modernize your agency and the services you deliver to citizens using:
      •Devices that are sensors, sensor gateways or IoT devices that are publishing events to Event Hub either directly or using Microsoft IoT Hub SDK
      •Gateways - a logical component that groups processing, management of event processors
      •Event processor routes and device actors - Device Actors are chained with various other actor types that are responsible for aggregating, storing, analysis and reporting on device events

      Key takeaways:
      •Initiate a project using Visual Studio Online
      •How an IoT pattern can be used in Azure IoT Hub using a presentation and references to real tenants.

      Read more >
    • How New Devices Can Help You Make the Most of Windows 10
      How New Devices Can Help You Make the Most of Windows 10 David Hollway, Mike Brohoski, & Pang Ngernsupaluck Recorded: May 4 2016 3:00 pm UTC 23 mins
    • Together, Windows 10 and Intel deliver the productivity, security and manageability you need to advance your business.

      Intel and Microsoft have been collaborating for more than 30 years, creating technology that has changed the way we do business.

      With Windows 10, we’ve taken this partnership to a whole new level, with new hardware lighting up key Windows features that help you stay ahead of security threats, while making it easy for you to manage devices across your business.

      The new devices on Windows 10 and the new Intel 6th generation processor (Skylake) deliver:
      •Better Productivity: Do more and be more productive with improved multi-tasking, less waiting, familiar interface and app compatibility
      •Better Security: Helps protect identity, data and devices against modern security threats
      •Better Manageability: Stay current with less effort, manage devices more effectively, remotely provision and deploy applications

      Watch this webcast to:
      •Discover Windows 10 productivity, security and manageability features that new hardware lights up
      •Learn more about the Intel 6th generation processor (Skylake) and how it helps give time and money back to your company
      •Get additional resources to evaluate when it might be time for new devices and what devices are right for you

      Read more >
    • COR IBR900 for Next-Gen In-Vehicle & M2M Networks
      COR IBR900 for Next-Gen In-Vehicle & M2M Networks David Rush, Mike Hagman and Mack Lyons, Cradlepoint Recorded: Jan 30 2017 5:00 pm UTC 44 mins
    • With the introduction of the new COR IBR900 and IBR950 routers that are purpose-built for in-vehicle and M2M/IoT applications, Cradlepoint is extending its leadership in 4G LTE networking.
       
      The COR IBR900 and IBR950 are the first LTE routers in the world to offer the latest generation “Wave 2” gigabit WiFi (802.11ac). At 9 a.m. PT / 12 p.m. ET on Jan. 30, 2017, join Cradlepoint experts to learn about:

      — Quad core processor that can achieve near-gigabit operational speeds on both Ethernet and WiFi, and take advantage of carrier improvements in LTE Advanced networks
      — A range of features to support high-performance, high-capability in-vehicle networks
      — Support for Cradlepoint Platform Extensibility, including elements such as Router SDK, COR Extensibility Dock, and ECM API

      Read more >