Hi [[ session.user.profile.firstName ]]
Sort by:
    • Own the Link: Simplify Your Layer 1 Specification Own the Link: Simplify Your Layer 1 Specification Mike Connaughton Recorded: Mar 17 2016 3:00 pm UTC 56 mins
    • Data communication speeds are constantly increasing to keep up with the growing demand for bandwidth. Ethernet speeds of 100 Gb/s are being deployed, and 400 Gb/s or more are being considered. As speeds increase, the reach of multimode fiber gets shorter. One way to mitigate the shrinking distance is to the use the highest bandwidth fiber. But what if we told you there’s a more complete way to specify the performance of the link – a way that will allow you to take control of Layer 1 performance?

      From this presentation, you will learn how:
      • Improved link performance allows simpler upgrades
      • Better operational management of critical components leads to more efficient deployments

      * Attend this webinar live for a chance to win an Apple Watch! *

      Read more >
    • Humans - the weakest link or your greatest asset? Humans - the weakest link or your greatest asset? Jeffrey Rogers, VP, Customer Success, PhishMe Recorded: Oct 27 2015 1:00 pm UTC 45 mins
    • 91% of breaches can be traced back to a phishing message that deceives a user into unleashing the attacker’s payload. Having infiltrated the network, it then takes an average 205 days for the threat group’s presence to be detected. For organisations to stand a chance of protecting their data assets, they need to get better at preventing threat actors from accessing their infrastructure and reduce the time it takes to identify their presence. But how?

      The reason phishing has such a high success rate is that it targets people. Can you turn than your weakest link into a human force field that protects the network and provides actionable intelligence?

      During this webinar, Jeffrey Rogers, VP of Customer Success at PhishMe, will reveal statistics about the phishing threat, detail how phishing has evolved, and explore how to engage users to develop better security habits and become human sensors.

      Read more >
    • SDN and NFV enter the Data Center Center: Link between Virtualisation and Assets SDN and NFV enter the Data Center Center: Link between Virtualisation and Assets Oliver Lindner, Ulrich Schälling Recorded: Jan 15 2015 3:00 pm UTC 40 mins
    • SDN and NFV enter the Data Center Center: Make the Connection between Virtualisation and Your Physical Assets
      The agility of a programmable network brings new speed to the data center world. Can your infrastructure management keep up with this pace? FNT’s unique data model links virtual layers and your physical assets. The impact of extremely dynamic capacity usage on infrastructure elements due to features such as autoscaling will lose its awfulness as you have everything under control instantly. Managing your data center with FNT Command’s integrated workflows establishes fast, efficient, and reliable processes, provides root and impact analysis across all layers, and enables holistic capacity planning. Rev your management methods and see how your operations benefit from integrated data center and network infrastructure management.

      Read more >
    • Multi-Link: Altijd 24/7 connected tegen lagere kosten Multi-Link: Altijd 24/7 connected tegen lagere kosten Mischa Deden Recorded: Sep 3 2014 9:00 am UTC 30 mins
    • In de huidige 24/7 wereld zijn bedrijven afhankelijk van altijd beschikbare netwerk-verbindingen. De kosten voor uitval in het datacenter zijn zeer hoog. Daarom hebben bedrijven flink geïnvesteerd in gecompliceerde en/of dure oplossingen en protocollen voor redundantie.

      Hier is nu een andere techniek voor beschikbaar, Multi-Link, die alle verschillende verbindingen kan integreren (MPLS, kabel, satelliet, mobiel breedband, DLS, WAN, etc) tegen veel lagere kosten. Mischa Deden vertelt u in maximaal 30 minuten hoe eenvoudig Multi-Link werkt.

      Read more >
    • Multi-Link : une connectivité toujours disponible, à un coût raisonnable Multi-Link : une connectivité toujours disponible, à un coût raisonnable Nicolas Monier Recorded: Sep 18 2014 9:00 am UTC 31 mins
    • Le monde des affaires ne dort jamais. Raison pour laquelle les entreprises doivent impérativement disposer d'une connexion réseau continue. Un défaut d'accès au centre de données peut engendrer des couts exorbitants. Voilà pourquoi les entreprises ont investi massivement dans des solutions onéreuses et/ou des protocoles complexes leur assurant une connectivité redondante.

      Une nouvelle technologie est désormais disponible : Multi-Link. Cette solution permet d'intégrer toute une série de connexions distinctes (MPLS, câble, satellite, large bande mobile, DLS, WAN, etc.) tout en réduisant sensiblement les coûts d'acquisition et de maintenance.

      Nicolas Monier vous présentera les avantages de Multi-Link au cours d'un webcast aussi bref qu'efficace.

      Read more >
    • Can Public Clouds be suitable for traditional / legacy workloads? Can Public Clouds be suitable for traditional / legacy workloads? Jay Hibbin, Evangelist & Sales Director, Century Link Upcoming: Jun 30 2016 1:00 pm UTC 75 mins
    • Identifying workloads to move to the cloud can be tricky. You have dozens or hundreds of apps running in your organisation, and now that you’ve seen the operational efficiencies and agility available to you in the cloud, you’re tempted to move as many of them to the cloud as quickly as possible. As you’ll see in the examples below, cloud computing is indeed a good fit for many common workloads.This webcast will explore more about what you should consider before earmarking a workload for the cloud.

      During this webcast you will learn:
      - How to deal with unpredictable loads and gain the potential for explosive growth
      - How to deal with traffic fluctuation, whether its planning for cycles of playing or shopping, or with occasional, compute-intensive batch processing
      - How to manage public cloud, private cloud, hybrid, and your internal data centre managing all of them through one interface with a single set of tools and best practices

      Read more >
    • Addressing the weakest link: The importance of user education Addressing the weakest link: The importance of user education Chris Yule, Senior Security Consultant Recorded: Aug 5 2014 11:00 am UTC 47 mins
    • In this webcast we look at one of the most crucial elements of security leadership: building security awareness throughout an organisation. End users will often be the weakest link in the security stack; building an understanding amongst your users of why security is important and what their responsibilities are is a crucial component of protecting your organisation’s information and ensuring you stay out of the headlines.

      Chris Yule, Senior Security Consultant at Dell SecureWorks, will discuss the need to educate employees on proper safeguards in today's climate of social engineering malware scams and targeted attacks.

      Key webcast topics covered:

      •How to approach an awareness campaign, target training at those who need it most and measure effectiveness.

      •The different of domains of training which are appropriate and necessary for different user groups.

      •How to target education at all levels of the organisation, from informing end users about password security and phishing risks, to educating board members on the threats and risks faced by the business and the typical approach taken by your industry peers.

      Read more >
    • Your 2016 Goal: Link ITSM to Human Outcomes Your 2016 Goal: Link ITSM to Human Outcomes Elinor Klavens, Researcher, Service Delivery, Infrastructure & Operations Recorded: Mar 30 2016 4:00 pm UTC 46 mins
    • Today’s workforce is highly technologically literate, mobile and expects great experiences in each aspect of their working life. Your company's best employees must be able to get their work done anywhere and without interruption. They need more flexibility in how they consume and leverage technology. Your ITSM initiative is not cutting it. ITIL has burdened the support organization with up to 26 different process masters, when what is really needed in your ITSM program are processes which are built for the workforce and enabling their productivity. I&O organizations must look beyond ITSM as we know it today and provide workers with pain-free, productive, personalized, and predictive service.

      During the session you will learn about:
      • The current state of ITSM initiatives
      • Why you should pivot your ITSM agenda towards workforce productivity
      • Frameworks that ensure your actions are linked with valuable employee outcomes

      In accordance with its Privacy Policy, CA Technologies may disclose your registration information to its partner(s) who assist with this presentation. For more information about CA’s practices, please visit the CA Privacy Notice: http://www.ca.com/us/privacy.aspx

      Read more >
    • You’re the Weakest Link, Goodbye! You’re the Weakest Link, Goodbye! Darren Argyle, Global Chief Information Security Officer (CISO) for Markit Recorded: Nov 24 2015 2:00 pm UTC 41 mins
    • The use of third parties is unavoidable in today’s global economy. The growing use of third party suppliers and business partners, whilst bringing significant business advantages, also exposes organisations to substantial risk, such as financial loss, reputational damage, regulatory prosecution and fines from major breaches of security. In the last few years we’ve witnessed many of these risks being realised; examples have included major breaches of security and costs to recover escalating into millions of dollars, as a result of the third party supplier being comprised. Changes in regulation, the evolving threat landscape and policy changes globally further complicate matters, generating further risk and expense for business.

      Despite considerable efforts from many industries to address these issues, it remains difficult to manage. As well as the risks described, companies perceived as the ‘weakest link’ in the supply chain could end up not having third party contracts renewed. These challenges are discussed in more detail, and some suggestions put forward to help tackle the increasing burden on teams and risk mitigation strategies.

      Read more >