Hi [[ session.user.profile.firstName ]]
Sort by:
    • The Tethered State of IT: Decoupling the Application From the Infrastructure
      The Tethered State of IT: Decoupling the Application From the Infrastructure Joshua Soto, Senior Product Marketing Manager, Networking & Security Recorded: Jul 11 2016 3:00 pm UTC 21 mins
    • Improve your degree of effectiveness and efficiency with VMware NSX as it transforms your data center operational model. We will discuss NSX capabilities to simplify infrastructure, reduce risks, automate and accelerate business efforts, and ensure continual operations. By decoupling applications from infrastructure, IT can use network virtualization to deliver better business outcomes, a critical step toward the software-defined data center.

      Topics include:
      - Architecting security as an inherent part of the data center infrastructure
      - Automating IT processes to deliver IT at the speed of business
      - Enabling applications and date to reside and be accessible anywhere

      Don't miss this opportunity to hear what VMware NSX can do to improve business outcomes as you move toward a fully software-defined data center.

      Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.

      Read more >
    • IT Automation Series: Why Data Center Networking is Ready for Change
      IT Automation Series: Why Data Center Networking is Ready for Change Dylan Wallace, Product Marketing Manager at VMware Recorded: Jun 23 2016 5:00 pm UTC 15 mins
    • Join us for the third and final webcast in our series on network virtualization and how to move from hardware-centric to software-centric networking—without disruption to your existing environment.

      A key advantage of network virtualization is to create, provision, and manage virtualized networks entirely in software, making networks more agile and secure, without disrupting your existing environment. In this webcast, you will learn how VMware NSX transforms your existing infrastructure without ripping and replacing your existing environment. In this webcast, you will learn about:

      - Why the traditional approach to networking is not enough in today’s Software-Defined Data Center
      - How network virtualization provides a non-disruptive approach
      - How VMware NSX works and the top use cases

      Enable networking and security at the speed of software while building datacenter agility with network virtualization on industry standard Intel® Xeon® processor based server architecture.

      Read more >
    • Business Case Introduction to VMware NSX
      Business Case Introduction to VMware NSX Garrett Graston, NSX Sales Manager Recorded: May 12 2016 6:55 pm UTC 25 mins
    • Join this web presentation to learn how VMware NSX can transform your data center operational model and economics. Attend this webcast to discover the business benefits of network virtualization including:

      - Enabling security in the software-defined data center
      - Increasing speed and agility of service delivery
      - Dramatically reduce opex & capex

      Don't miss this opportunity to hear about the various use cases and IT outcomes of VMware NSX.

      Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.

      Read more >
    • Micro-Segmentation Series: What it Is and What it Isn’t
      Micro-Segmentation Series: What it Is and What it Isn’t Matt De Vincentis, Senior Product Line Marketing Manager at VMware Recorded: Aug 3 2016 3:00 pm UTC 22 mins
    • What Don’t You Know About Micro-Segmentation?

      Join us for the first in a three-episode series on micro-segmentation, how it protects networks, and how it works with perimeter firewalls. We’ll also discuss its advantages beyond protection in automating security workflows and more.

      IT managers are challenged with a new breed of data center threats, ones that move within the data center, not just through the perimeter. Firewalls are not enough to contain attacks that move laterally between servers. Micro-segmentation of the network restricts this unauthorized east-west movement, but it can’t be implemented with firewalls. Join us and come away with a better understanding of micro-segmentation and how it works. You’ll learn about:

      • How micro-segmentation secures your data center cost-effectively
      • Three essential elements of micro-segmentation
      • Why micro-segmentation can’t be achieved with legacy technology

      Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.

      Read more >
    • Automating the Delivery of Production Ready Infrastructure With VMware vRealize
      Automating the Delivery of Production Ready Infrastructure With VMware vRealize David Jasso, Dir. of Product Marketing | Jeffrey Stephens, Sr. Manager Infra Engineering | Thomas Jackson, Infra Architect Recorded: Aug 17 2016 3:00 pm UTC 28 mins
    • You’ve already virtualized much of your physical infrastructure – making these resources available, dynamic, and low-cost. But how do you manage hundreds and thousands of virtual devices to turn your Software-defined Data Center (SDDC) into a true hybrid cloud, and deliver both infrastructure and applications as services to your business?

      Provisioning apps and underlying infrastructure on day 1 with agility, security, scalability and consistency requires enterprise-class automation. After the delivery, managing the infrastructure on day 2 with deep operational visibility, proactive resource and capacity management, and transparent cost control, requires intelligent management tools. This is what the Cloud Management Platform (CMP) does.

      During this webcast, you will learn how Rent-A-Center, a rapidly growing retail company, used VMware’s enterprise-class CMP to:

      Automate IT and Infrastructure as a Service (ITaaS) allowing IT teams to fully automate their delivery and ongoing management of shared service infrastructure.

      Ease performance, and capacity management of IT services, and turn a heterogeneous environment into a hybrid cloud.

      Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.

      Read more >
    • Technical Introduction to VMware NSX
      Technical Introduction to VMware NSX Sean Howard, Staff Systems Engineer, NSX Recorded: May 12 2016 7:10 pm UTC 34 mins
    • Join this web presentation to learn how VMware NSX can transform your data center operational model and economics. Attend this webcast to discover the technical benefits of network virtualization including:

      - Reduce service provisioning from days to minutes
      - Roll out non-disruptive deployment, completely decoupled from network hardware
      - Automate security for speed and agility in the data center

      Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.

      Don't miss this opportunity to hear about the various use cases and IT outcomes of VMware NSX.

      Read more >
    • 3 Ways to Improve Security Protocols to be Mobile-Cloud Ready
      3 Ways to Improve Security Protocols to be Mobile-Cloud Ready Geoff Huang, Director of Product Marketing at VMware Recorded: Jun 16 2016 3:00 pm UTC 24 mins
    • As mission-critical business workflows become more mobile, yesterday’s security protocols and measures have become inadequate. With increasing security threats, protecting data center resources and limiting user access to internal resources are integral to mobile and data center security.

      Join us to learn how VMware NSX and AirWatch transform modern mobility to intelligent networking through micro-segmentation—from the data center to the end-user device.

      During this session you will learn about 3 ways that VMware can help:
      - Provide granular control for business-critical mobile workflows
      - Simplify and accelerate EMM and BYOD deployments through networking and security policies
      - Automate the enforcement policy of mobile applications access across your data center

      Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.

      Read more >
    • Next-Generation Cloud Security with VMware NSX and Armor
      Next-Generation Cloud Security with VMware NSX and Armor Jason Rieger Recorded: May 18 2016 6:00 pm UTC 28 mins
    • As threat actors display more proficiency, speed and diligence, cloud security is of paramount importance. Choosing a cloud solution has often required businesses to choose between performance, elasticity and security — but not all three.

      In this webcast:

      · Explore how a VMware ecosystem, built on the NSX network virtualization platform, now makes it possible to achieve high performance and elasticity, while maintaining the highest levels of security.

      · Armor will use its Virtual Private Cloud to demonstrate how to architect an environment with fully integrated security that still provides the performance and efficiency customers demand from the cloud.

      · Learn how NSX and the VMware suite form key components of the Armor Virtual Private Cloud, including Server, Network and Security Virtualization.

      Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.

      Read more >
    • IT Automation Series: An Analysis of Hardware vs. Software-Centric Approaches
      IT Automation Series: An Analysis of Hardware vs. Software-Centric Approaches Matt De Vincentis, Senior Product Line Marketing Manager at VMware Recorded: Jun 2 2016 3:00 pm UTC 18 mins
    • Join us for the first in a three-episode series on network virtualization and how to move from hardware-centric to software-centric networking—without disruption to your existing environment.

      As software-centric networking has emerged as a force in data center networking, we’ve witnessed two principal approaches that are gaining a foothold in enterprise data centers: software-defined networking (SDN) and network virtualization. We’ve also seen these two terms become blurred, and even used interchangeably. The confusion is understandable.

      Join us for this webcast to get clarity on these approaches and why network virtualization is a true software-centric approach to networking. You’ll learn about:

      - The business needs impacting how IT thinks about networking
      - The challenges with traditional hardware-centric networking
      - The differences between SDN and network virtualization

      Enable networking and security at the speed of software while building datacenter agility with network virtualization on industry standard Intel® Xeon® processor based server architecture.

      Read more >
    • IT Automation Series: Achieving Real IT Automation - The NSX Advantage
      IT Automation Series: Achieving Real IT Automation - The NSX Advantage Joshua Soto, Senior Product Marketing Manager, Networking & Security Recorded: Jun 9 2016 3:00 pm UTC 17 mins
    • Join us for the second in a three-episode series on network virtualization and how to move from hardware-centric to software-centric networking—without disruption to your existing environment.

      Network virtualization dramatically accelerates the delivery of IT services without major re-architecting, ripping, and replacing physical networks. Early adopters of network virtualization are achieving impressive results by automating IT processes that were once manual, lengthy, and error-prone. In this webcast we will focus on how VMware NSX enables businesses to move to network virtualization with three specific use cases:

      IT Automating IT – Automate the provisioning, configuration, management, and decommissioning of network virtualization and security

      Developer Cloud – Provide development and test teams with fast access to infrastructure by standardizing the compute, storage, network, and security configurations of full application stacks

      Multi-Tenancy Infrastructure – Use micro-segmentation and isolation capabilities to maintain isolation between tenants in a multi-tenant cloud environment

      Enable networking and security at the speed of software while building datacenter agility with network virtualization on industry standard Intel® Xeon® processor based server architecture.

      Read more >
    • Innovation and the Future of Payment Technology Panel
      Innovation and the Future of Payment Technology Panel Steve Kirsch, Token; Omri Dahan, Marqeta; Giles Sutherland, Carta Worldwide; David Edwards, BrightTALK Recorded: Mar 15 2017 9:00 pm UTC 63 mins
    • From paying your rent, to that cup of coffee - every payment in the world goes through a mind-bending number of channels, companies, networks, technologies and sets of eyes. Until recently. New technology in the payments sector, from encryption & authentication to digital currencies and open APIs have opened up new avenues for moving money, and new challenges too.

      So join this panel of industry heavyweights as they discuss the world that holds, up the world of money, what challenges lie ahead, and what our world of payments may look like in the future. Featuring:
      - Steve Kirsch, CEO & Founder, Token - A revolutionary open Banking platform
      - Omri Dahan, Chief Revenue Officer, Marqeta - The innovative payment platform
      - Giles Sutherland, VP Product & Strategic Development, Carta Worldwide - A leading digital payment processor & enabler
      - David Edwards, Senior Community Manager, BrightTALK (Moderator)

      Read more >
    • Hitachi Cloud Service Provider Partners with CGI
      Hitachi Cloud Service Provider Partners with CGI Brian Caan – VP Global Marketing, CGI Recorded: Mar 27 2017 4:10 pm UTC 4 mins
    • CGI is the fifth largest independent IT and business processors provider delivering high-end business consulting, IT outsourcing plus system integration and consulting. When providing cloud services their clients are looking to turn it on and reap the benefits immediately. In order to do this they had change the way they organized their services to align with their customer needs. In order to provide the immediate cloud services their clients expected, CGI had to transform their offerings to align with their customer needs.

      Together with Hitachi Cloud Services, CGI can provide new ways to deliver services and adapt to improved business models for their customers.

      Read more >
    • When a Castle and Moat Aren't Enough: Combatting Ransomware in Healthcare
      When a Castle and Moat Aren't Enough: Combatting Ransomware in Healthcare Chris Logan, Senior Healthcare Strategist at VMware | Bill Hudson, Chief Healthcare Strategist, VMware Recorded: Jun 24 2016 6:50 pm UTC 49 mins
    • Provider agility demands a high degree of connectivity whether to address episodes of care across the clinical continuum, to facilitate the exchange of claims data, or even to accommodate a rapid acquisition. Meanwhile, the specter of malware has grown to become a significant risk to provider organizations increasing the risk to PHI and business data. As cyber criminals now focus on malware as a means to generate revenue, it will only create an avenue for more attacks in the future.

      Malware/Ransomware has already plagued several healthcare organizations this year this trend will continue. Additional controls and strategies need to be explored to help prevent this widespread issue both right now and in the future. This webcast will allow you to further explore what ransomware is, how it propagates, what can be done to help prevent it and explore some of the solutions VMware ha developed to help minimize the risk related to ransomware.

      Learning Objectives
      - Gain a clearer understanding of the threat to healthcare providers that ransomware presents
      - Learn how ransomware propagates across both corporate and personal assets
      - Identify some strategies to address how your organization can prevent ransomware from taking hold within your organization
      - Develop a better understanding of VMware’s solutions which help address this risk and create a platform for enhanced security

      Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.

      Read more >
    • Final PSD2 RTS on SCA and Secure Communication: What you need to know
      Final PSD2 RTS on SCA and Secure Communication: What you need to know Tom Hay - Head of Payments, Icon Solutions and Chris Kong - Senior Consultant, Icon Solutions Recorded: Mar 7 2017 12:00 pm UTC 57 mins
    • If you are looking for the key insights from the latest PSD2 RTS then this webinar is for you.

      The European Banking Authority (EBA) recently published the long-awaited (and much debated) draft Regulatory Technical Standards (RTS) covering Strong Customer Authentication (SCA) and secure communication.

      These Standards are the result of the difficult trade-offs between the various drivers behind PSD2, including: enhancing security, enabling greater customer convenience, and encouraging both innovation and competition.

      In this special, exclusive webinar, Icon Solutions’ PSD2 experts, Tom Hay (Head of Payments) and Chris Kong (Senior Consultant and Co-chair of the ECB/ERPB PSD2 Identity subgroup) will share their interpretation of the standards and the key things you need to know to meet your PSD2 obligations and beyond.

      Join this webinar to learn what impact RTS will have on:

      • Interface requirements and applicable standards
      • Strong Customer Authentication and generation of Authentication Codes
      • Exemptions from SCA and Transaction Risk Analysis
      • Certificates, identification and validation of Third Party Processors

      Read more >
    • NSX, Next-Generation Firewall and the Software-Defined Data Center
      NSX, Next-Generation Firewall and the Software-Defined Data Center Mariano Maluf, VMUG | Blake Wofford, Fuel | Kausum Kumar, VMware | Sai Balabhadr, Palo Alto Networks | John Spiegel, Customer Recorded: May 25 2016 5:20 pm UTC 59 mins
    • Many organizations are implementing server virtualization to reap the business benefits of simplifying operations, speeding up provisioning, and adapting to rapidly changing infrastructure needs, but this creates a new set of security challenges as network professionals race to keep up with the changes. To really take advantage of software-defined data architecture requires a partnership between a centralized management platform, easily integrated next-gen firewall solution, and an adaptive, simplified virtual environment. Enter VMware and Palo Alto Networks.

      In this webinar, experts from Palo Alto Networks and VMware, along with members of their user communities Fuel and VMUG will provide an technical overview of the advantages of pairing Palo Alto Networks’ VM-series next-generation firewall and Panorama centralized management tools with VMware’s NSX network virtualization platform. With real-world customer examples and advice on the best way to protect your organization across on-prem and online environments, you’ll leave this webinar with an action plan for realizing the full opportunities of SDDC infrastructure.

      Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.

      Read more >
    • KYC in the online age
      KYC in the online age Panel Discussion featuring: UK Cabinet Office, CurrencyFair, IOX & Mitek Recorded: Feb 16 2017 3:00 pm UTC 47 mins
    • Financial institutions from all over the world are facing increasingly strict regulations regarding the verification and authentication of their customers’ identity. The imminent enforcement of the 4AMLD and the publication of the 5AMLD will nothing but add pressure on the financial services industry.

      To keep a competitive edge and still be compliant with the latest Anti-Money Laundering (AML) and Know Your Customer (KYC) regulations, banks, prepaid card operators, digital currency processors, exchanges, and wallets are being compelled to embrace the digitalisation of traditionally cumbersome processes such as customer due diligence and ongoing authentication.

      Aiming to simplify KYC in this ever-changing regulatory environment, and optimizing the digital channels for further security and convenience, financial institutions need to successfully achieve this change within their policies, procedures, business models, and technology infrastructures.

      During this webinar, our panel of experts will provide answers to the following questions:

      •Are the technologies to underpin digital identity verification reliable and robust enough for financial institutions to rely on them?

      •Are customers prepared to go down the digital route?

      •Can financial institutions strike the right balance between rock-solid compliance, and smooth, easy, digital customer experience?

      •How are financial institutions coping with the challenges posed by the latest regulatory updates?

      Join us for this panel discussion with our expert speakers:

      Don Thibeau, Chairman & President, The Open Identity Exchange (OIX)
      Fintan Byrne, Head of Risk & Chief Compliance Officer, CurrencyFair
      Sarah Clarke, General Manager - Identity, Mitek
      David Rennie, Identity Assurance Programme, UK Cabinet Office

      Read more >