Hi [[ session.user.profile.firstName ]]

Application Awareness with the Power to Take Action

Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.

What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.

Join Gigamon and ActualTech Media in this webinar and learn how to:

•Discover applications that you didn’t even know were running on your network
•Increase overall performance of your network and shared components
•Spot potential security vulnerabilities before they become a problem

Attendees will also view a live demonstration of how Gigamon can end headaches in security and network performance.
Recorded Jun 4 2019 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bassam Khan VP, Product & Technical Marketing Engineering Gigamon & David Davis Partner & Vexpert ActualTech Media
Presentation preview: Application Awareness with the Power to Take Action

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Should You Care About TLS Decryption? Recorded: Sep 24 2019 59 mins
    Ollie Sheridan, Principal Engineer Security, Gigamon, Brandon Dunlap, Moderator, (ISC)²
    With the second anniversary of the Equifax breach not so long ago and the fact that we now know much more about what happened due to the August 2018 release of the GAO Report. There was a lot of new information that came out of that report that was not well-understood at the time of the breach…. Did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realise what had happened.

    On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever as today the Ponemon Institute reports that 50% of all malware attacks utilise encryption.

    During this webinar, Ollie Sheridan will talk about:
    - How TLS encryption has become a threat vector
    - Why decryption is essential to security and how to effectively perform detection
    - How to make sure your detection tools are working at their greatest capacity without the latency introduced by decryption
  • Applicaton-Aware Visibility Recorded: Sep 18 2019 8 mins
    Daniela Fusaro, Senior Solutions Architect
    Beschleunigen Sie die digitale Transformation Ihres Unternehmens

    Application-Aware Visibility
    Besuchen Sie unser Webinar, um zu sehen, wie Application-Aware Network Visibility die digitale Transformation Ihres Unternehmens beschleunigen kann.

    Hält Sie das explosive Wachstum und die steigende Komplexität Ihres Netzwerks davon ab, schnelle Resultate liefern zu können? Sie sind damit nicht alleine: Ein Mangel an Sichtbarkeit macht es schwierig, Performance-Probleme einzugrenzen und zu lösen.

    Sie werden sehen:
    • Wie Sie Network Monitoring durch granularen Einblick in Applikationen vereinfachen
    • Wie Sie Schatten-IT entdecken, managen und isolieren
    • Warum das Wegfiltern von unnötigem Traffic Ihre Security Tools effizienter macht

    Entdecken sie, wie Application-Aware Network Visibility die Performance Ihres Netzwerks und Ihrer Tools erhöht.
  • Accelerate Your Organisation’s Digital Transformation Recorded: Sep 18 2019 18 mins
    Ollie Sheridan, Principal Security Solutions Engineer, CISSP
    Application-Aware Visibility
    Join us for our interactive webinar to see how application-aware network visibility can accelerate your organization’s digital transformation.

    Is explosive data growth and network complexity hindering your ability to deliver results? You’re not alone: a lack of application visibility makes it difficult to pinpoint and resolve performance issues.

    You will learn:

    • How to simplify network monitoring with granular insight into application traffic
    • How to detect, manage and isolate shadow IT, non-business apps and others
    • Why filtering unnecessary traffic is critical to improving tool efficiency

    Discover how application-aware network visibility can improve the performance of both your network and IT tools.
  • Accélérez la transformation digitale de votre organisation Recorded: Sep 10 2019 10 mins
    Mathieu Pierard, Solutions Architect
    Visibilité centrée sur l'application

    Inscrivez-vous à notre webinar interactif pour comprendre comment la visibilité de votre réseau centrée sur les applications peut accélérer la transformation numérique de votre entreprise.

    La croissance explosive des données et la complexité du réseau vous empêchent-ils d’atteindre vos objectifs ? Vous n'êtes pas seul : le manque de visibilité des applications rend difficile l'identification et la résolution des problèmes de performance.

    Vous comprendrez :

    - Comment simplifier la surveillance du réseau avec une vision granulaire du trafic applicatif
    - Comment détecter, gérer et isoler le shadow IT, les applications non métiers et autres
    - Pourquoi le filtrage du trafic inutile est essentiel pour améliorer l'efficacité de l'outil

    Découvrez comment une visibilité réseau centrée sur les applications peut améliorer les performances de votre réseau et de ses outils.
  • Don't Let Digital Transformation Wreak Havoc on Your Network! Recorded: Jul 4 2019 52 mins
    Sam Kumarsamy, Sr. Product Marketing Manager Gigamon
    Organizations adopting digital apps must deliver an engaging user experiences at the enterprise level to be successful. Unfortunately, the road to great digital experiences is paved with speed bumps: they can cause networks to become even more complex as they groan under the weight of accommodating more users, increased data volume and higher speeds.

    Yes, digital apps are hyper-agile, but they are also very complex: components are often outsourced, apps are usually mega-tiered and are deployed across physical, virtual and cloud networks, making it difficult to get visibility into traffic. And without that visibility, how can you truly ensure a great experience?

    Help is at hand. During this webinar, you will learn how to build an efficient network architecture to provide an engaging digital experience.

    Attendees will learn how to:
    • Utilize tools efficiently by preventing packet duplication and optimizing traffic
    • Enhance security by collecting and distributing NetFlow metadata to tools more effectively
    • Identify, categorize and visualize more than 3,000 applications automatically

    See how a next-generation network packet broker increases visibility, improves security and enables companies to maximize their investment in tools to exceed user expectations.
  • How to Optimize Network Performance During Infrastructure Transformation Recorded: Jun 25 2019 47 mins
    Sam Kumarsamy, Senior Product Marketing Manager, Gigamon
    How do you reduce complexity of your transforming infrastructure, gain greater IT tool efficiency and maximize visibility into your network? The right solution should empower you to produce better outcomes with less effort at lower cost. That is where a next-generation packet broker comes into play.

    Join Gigamon to get the latest best practices to:
    • Acquire and aggregate all network traffic for better visibility
    • Stop duplicate packets from overloading your tools
    • Filter traffic to provide the right data to the right tools
    • Optimize compliance and reduce risk across your entire IT environment

    If you need to optimize your tools, improve network performance and availability, get better insights into threats and enable your Network Operations and Security Operations teams to collaborate, you won’t want to miss this technical webinar.
  • Visibilité dans le cloud Public Recorded: Jun 20 2019 21 mins
    Mathieu Pierard, Solutions Architect
    De nombreuses organisations se tournent vers le cloud public pour étendre - et dans certains cas, remplacer - leur infrastructure existante. Bien que l’utilisation du cloud public offre une flexibilité sans précédent en termes de déploiement et d’approvisionnement, les organisations ont toutefois du mal à sécuriser et à surveiller ces environnements, en particulier lorsque le trafic est-ouest est pris en compte. L'accès à ce trafic est la première étape pour sécuriser ces environnements et pour garantir que les ressources sont utilisées de manière efficace pour optimiser leurs performances.

    Inscrivez-vous à notre webinar pour :
    • Découvrir les défis auxquels les organisations sont confrontées lors de l’adoption du cloud public.
    • Comprendre comment les outils peuvent accéder à ce trafic en utilisant les solutions Gigamon, améliorant ainsi la sécurité et les performances.
    • Comprendre comment Gigamon a virtualisé le collecteur de paquets réseau dans ces environnements et l’a lié avec GigaVUE-FM.
  • Visibility in Public Cloud Umgebungen Recorded: Jun 19 2019 14 mins
    Daniela Fusaro, Senior Solutions Architect
    Viele Unternehemen ziehen es in Betracht Ihre existierende Infrastruktur in der Public Cloud zu erweitern oder sogar in einigen Fällen zu ersetzen. Während der Einsatz der Public Cloud unerhörte Flexibilität bietet, was das Ausrollen und die Bereitstellung angeht, stellt es Organisationen vor der Herausforderung, wie sie dieses Umfeld am besten sichern und überwachen können, vor allem wenn es sich um den East-West Traffic im Netzwerk handelt.
    Einsicht im Netzwerkverkehr zu gewinnen ist der erste Schritt, diese Umgebungen zu sichern und dafür zu sorgen, daß alle Resourcen effizient genutzt und ihre Performanz optimiert wird.

    Finden Sie heraus in unserem 15minutigen Webinar wie Sie:

    - Mehr erfahren über die Herausforderungen von Unternehmen bei der Einführung von der Public Cloud
    - Einsicht gewinnen wie Tools mit Hilfe der Gigamon Lösung, Zugriff auf diesem Netzwerkverkehr gewinnen und dabei Sicherheit und Leistung verbessert werden
    - Herausfinden wie Gigamon Netzwerk Packet Broker innnerhalb dieser Umgebungen virtualisiert hat und wie alles mit GigaVUE-FM zusammenhängt
  • Introducing Application Metadata Intelligence Recorded: Jun 18 2019 60 mins
    Ollie Sheridan, Principal Engineer Security, Gigamon, Chris Green, Head of PR and Comms EMEA, (ISC)²
    For many years the choice for monitoring networks has been focussed on the collection and Analysis of raw packets. With the increasing need for multiple tools and SIEM's to get access to this data, along with requirements from Forensic Response teams, a more streamlined method of understanding the behaviour of traffic and user behaviour is required. Whilst NetFlow version 5 and 9 do provide some visibility, there are challenges such as sample rates and lack of Application Layer inspection that need to be addressed.

    Join us for this webinar to learn more about how you can:

    -Produce rich Metadata from network traffic and dive into the Application Layer
    -Use this rich Metadata for Security, Forensics and Business Intelligence purposes
    -Generate Metadata based on the application rather than the IP & Port
    -Ensure that the Application traffic, regardless of port spoofing, produces the correct Metadata
  • 2019 Cyberthreat Defense Report Key Findings Recorded: Jun 18 2019 58 mins
    Mark Bouchard, Co-Founder and COO, CyberEdge Group Ian Farquhar, Distinguished Consultant Sales Engineer, Worldwide Security
    New research from CyberEdge’s 2019 Cyberthreat Defense Report shows that in spite of increasing cybersecurity budgets, organizations are dealing with ongoing cyberattacks, challenges finding and properly utilizing both human and financial resources, and obstacles to threat hunting within their environments. Sign up for this webinar to learn how to:

    •Gain pervasive visibility into your network for better threat hunting
    •Deal with inevitable cyberattacks, including malware, phishing and ransomware, including those that enter the organization via the supply channel
    •Become more effective by delivering optimized traffic to tools
    •Overcome skills shortages and retain key staff through efficiency, automation and orchestration
    •Accelerate deployment and integration of new security tools

    Learn how IT security pros plan to protect themselves against cyberthreats in 2019.
    Register now!
  • Visibility in the Public Cloud Recorded: Jun 12 2019 23 mins
    Ollie Sheridan, Principal Security Solutions Engineer, CISSP
    Many organisations are looking to the Public Cloud as a means to extend – and in some cases replace – their existing infrastructure. Whilst the use of the Public Cloud offers formerly unheard-of flexibility in terms of deployment and provisioning, it does present organisations with a challenge as to how to Secure and Monitor these environments, particularly when considering east-west traffic. Getting access to this traffic is the first step in securing these environments as well as ensuring that the resources are used in an efficient manner to optimise their performance.

    Join us for this 25min webinar to find out how you can:

    • Learn about the challenges to organisations when adopting the Public Cloud
    • Understand the ways in which tools can access this traffic using Gigamon’s solutions, thereby improving security and performance
    • See how Gigamon has Virtualised the Network Packet Broker into these environments and tied it all together with GigaVUE-FM
  • Application Awareness with the Power to Take Action Recorded: Jun 4 2019 54 mins
    Bassam Khan VP, Product & Technical Marketing Engineering Gigamon & David Davis Partner & Vexpert ActualTech Media
    Managing and securing a network can feel like a lot like navigating a ship in a turbulent storm at night. You might hear thunder and see lightning, but you never really know when or from where the next threat is coming.

    What if you could permanently illuminate the best path forward? Better visibility will help you uncover hidden threats in your network traffic and prevent waves of duplicate or irrelevant data from overwhelming your analytics and security tools.

    Join Gigamon and ActualTech Media in this webinar and learn how to:

    •Discover applications that you didn’t even know were running on your network
    •Increase overall performance of your network and shared components
    •Spot potential security vulnerabilities before they become a problem

    Attendees will also view a live demonstration of how Gigamon can end headaches in security and network performance.
  • To Whack or Not to Whack — Incident Response and Breach Mitigation Recorded: May 21 2019 44 mins
    Danny Akacki, Sr. Technical Account Manager, Gigamon Insight and TJ Biehle,Sr. Technical Account Manager, Gigamon Insight
    To whack, or not to whack, that is the question:
    Whether ‘tis nobler in the mind to torch all
    The compromised boxes on your poor network,
    Or to take arms against a sea of malware
    And by blocking stop them all.

    So, what do you do during an active security incident? When is the proper time to whack-a-mole with your mallet? Is it better to light everything on fire and start over, or should you make observations a key component of your response and mitigation strategy? In this webinar, we'll discuss strategies for when it's time to scorch the earth versus sit back with a cup of tea, gaining intel into what active adversaries are doing in your house.

    We’ll break down some of the most important points to remember during the commotion of an active incident response, including:

    •Context is king. We’ll explain the important questions you need to be ask when scoping an incident to get an improved view of the situation.
    •Thinking fast and slow. It’s understandable to want to nuke everything from orbit just to be thorough, but it’s usually not the smartest play. We’ll outline the potential benefits and risks of hasty containment and remediation efforts versus slow, thoughtful analysis when executing a response game plan.
    •The law of diminishing returns. There can be a tipping point where the cost of your decisions and polices no longer justify the answers you’ll find. We’ll talk you through some tactics to find the sweet spot between effort and return.
  • Network Architecture With Security in Mind Recorded: May 13 2019 60 mins
    Matt Bromiley, Instructor and Security Expert, SANS and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon
    It’s time to face a hard truth: modern enterprise networks can be extremely – sometimes painfully – complex to manage and defend. Increased network speeds to 100Gb, unfettered access to cloud applications and end-to-end encryption are just some of the requirements of today’s employees. When you add in mobile and IoT devices, the complexity grows exponentially, especially when it comes to the security of the networks to which they connect.

    And when we couple expanding networks with security needs, many organizations struggle to protect their users. This leads to conflicts between NetOps and SecOps goals. The networking team is concerned about availability and performance to ensure the business is being conducted whereas the security team needs to ensure the data and the users are safe from bad actors.

    We need a new approach that provides pervasive visibility to data flowing across the physical, virtual and cloud infrastructure to ensure that the right traffic is sent to the right security tools. This approach should also enable SecOps and NetOps to collaborate and improve the security posture of an organization

    Watch this SANS webinar to learn:
    •The common security pain points as networks expand and grow with increasing speeds
    •How today’s users are forcing organizations to consider/include security in their network architecture
    •How a lack of security can impact network availability and performance
    •How to bridge the NetOps and SecOps divide

    We will discuss how pervasive network visibility improves security tool utilization and can shorten detection and response times. We hope this webcast will inspire you to reassess the current state of your network and security infrastructure to enable collaboration between the two teams and improve your security posture. Watch now!
  • Want Better Network Visibility with Less Complexity? Here's How! Recorded: Apr 29 2019 53 mins
    Bob Laliberte, Senior Analyst, ESG and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon
    Enable IT Collaboration with a Common Distributed Data Services Layer.

    The IT environment is rapidly changing, becoming more distributed and complex as organizations transform themselves to provide better digital experiences. Because these improved experiences will be more dependent on the network, it’s imperative for organizations to properly plan and prepare now to eliminate security blind spots. The bottom line is that companies need complete visibility into their physical, virtual and cloud infrastructure to detect and contain data breaches and mitigate risk.

    To accomplish this, successful organizations resist the legacy mentality that relies on more people and more tools at every location. Instead, they are turning to a new architectural approach that disaggregates the speed of the network from the speed of the tools inspecting traffic on that network. This innovative approach allows enterprises to absorb change in network speed and technology without compromising security.

    ESG believes the foundational step in this approach is to ensure comprehensive infrastructure visibility across data centers and distributed edge and cloud environments. To do this, organizations must have a common distributed data services layer that can collect, process and distribute the right information to the right tools at the right time.

    Join us to learn how a consolidated network architecture that includes security delivers better visibility, reduces complexity and increases tool efficiency.
  • Network Upgrades Giving You Security Headaches? Recorded: Apr 11 2019 57 mins
    Mike Rothman, President, Securosis and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon
    Despite the insatiable demand for bandwidth, organizations still need to inspect and enforce network security policies at wire speed. And that is particularly challenging when you are upgrading networks from 10GB to 40GB or from 40GB to 100GB.

    Join Mike Rothman, President of Securosis, and Sam Kumarsamy, Senior Product Marketing Manager at Gigamon, as they discuss how to solve the security headaches that go with these network upgrades and architectures that strengthen your security posture, simplify IT and reduce costs. You’ll learn how to:

    - Increase Your Security ROI: Filter and deliver just the right data to the right tools from network traffic anywhere in the physical, virtual and cloud infrastructure
    - Reduce Your Security Risk: Rethink your network security architecture by decrypting once and enabling inspection by multiple security tools
    - Improve Threat Response: Separate signal from noise to identify patterns and threat vectors more quickly across heterogeneous networks

    Find out how both network and security teams can collaborate faster and safer during network upgrades to solve security headaches – register today!
  • The Advantages of Filtering Applications Recorded: Mar 19 2019 55 mins
    Ollie Sheridan, Principal Engineer Security, Gigamon, Brandon Dunlap, Moderator, (ISC)²
    Traditional methods of filtering traffic have relied upon a knowledge of the network and transport behaviours of the applications running across the network. Whilst most applications being run across the network use standard ports, many threat actors will use methods to obfuscate their communications by abusing these standards, with port spoofing being one such example. This represents a challenge when gathering traffic to ensure that this simple evasion method does not create a blind spot to your security countermeasures.

    Join us for this webinar to learn more about how you can:

    •Ensure that the Application traffic regardless of port spoofing gets to the right tool
    •Improve tool efficiency by discarding irrelevant Application traffic
    •Filter the traffic based on the application rather than the IP & Port
  • Erhalten Sie verlässlichen Datenzugriff für Ihre Security-Tools Recorded: Feb 8 2019 20 mins
    Daniela Fusaro, Senior Solutions Architect
    Die meisten Security Unternehmen haben viele Applikationen in ihrem Netzwerk laufen. Viele Firmen wissen jedoch nicht, welche Applikationen die meisten Ressourcen benötigen, da ihnen die volle Visibilität in ihre Netzwerkdaten fehlt.

    Security Budgets werden oft gekürzt, so dass viele Unternehmen eine Herausforderung damit haben, den erhöhten Bedarf diesbezüglich zu decken.

    Diese Ineffizienz resultiert oft darin, dass der gesamte Netzwerkverkehr von allen Netzwerk- Security-Tools analysiert wird, auch wenn das gar nicht notwendig wäre.

    Während viele Firmen den Fokus auf ihre Security Tools legen, wird häufig aus den Augen verloren, ob alle relevanten Daten oder zuviele Daten dort ankommen, die diese Tools vielleicht gar nicht analysieren können oder müssen.

    Die Security Operation Center sind jedoch abhängig davon, Netzwerk-Events zu sammeln, zu korrelieren und auswerten zu können, so dass sie potentielle Security Bedrohungen schnell identifizieren und beantworten können.

    An die richtigen Daten aus dem gesamten Netzwerk heranzukommen, und gleichzeitig die Systeme nicht zu überlasten, kann eine große Herausforderung sein.

    Application Intelligence bietet Ihnen spezifische Informationen über alle Applikationen, die durch Ihr Netzwerk fließen. Im Security Kontext ist dies besonders nützlich, weil die Security Appliances sprichwörtlich nach der Nadel im Heuhaufen suchen, um in den steigenden Datenmassen von Netzwerkflows Bedrohungsmuster zu finden.

    Sehen Sie sich unser Webinar an, um zu verstehen, wie Sie Ihre Netzwerk- und Security-Tools effizienter nutzen können, um Ihre Netzwerk Infrastruktur zu schützen.
  • Premier pas avec la visibilité : fournir des données fiables aux outils Recorded: Feb 7 2019 31 mins
    Pascal Beurel, Solutions Architect
    La plupart des équipes opérationnelles de sécurité ont une compréhension globale de ce qui transite sur les réseaux. Cependant, la majorité n’ont pas une visibilité précise des applications qui consomme les ressources. Alors que les budgets de sécurité sont réduits au maximum, les entreprises doivent lutter pour supporter une demande accrue. Les inefficiences font souvent que tout le trafic est analysé et inspecté par tous les outils de sécurité du réseau, que le traffic soit pertinent ou non.

    Tandis que de nombreux administrateurs concentrent leurs efforts sur les outils de sécurité et leurs outils SIEM, l’acquisition du trafic pertinent est souvent négligée. Aujourd'hui, le centre d'opérations de sécurité (SOC) dépend énormément de sa capacité à collecter, corréler et analyser les événements réseau afin d'identifier et de réagir rapidement aux menaces à la sécurité. Mais l'accès aux trafic approprié et pertinent sur l'ensemble du réseau et sans surcharger les outils peut s'avérer être un réel défi.

    L’approche Gigamon avec la fonctionnalité « Application Intelligence » permet de découvrir l’ensemble des applications transportées dans un réseau et de sélectionner uniquement les applications sensibles et utiles pour les outils de sécurité. Dans un contexte critique de sécurité, cela est particulièrement efficace car les dispositifs de sécurité recherchent souvent « l'aiguille dans la botte de foin»; c’est-à-dire : identifier la séquence unique de paquets ou de flux provenant de l’ensemble tu trafic et qui contient les menaces

    Rejoignez-nous pour comprendre comment tirer meilleur parti de votre réseau pour améliorer votre efficacité de vos outils de sécurité.
  • First step to visibility: Get reliable data access for tools Recorded: Feb 6 2019 32 mins
    Ollie Sheridan, Principal Security Solutions Engineer, CISSP
    Whilst many users will focus their efforts on the Tools and their SIEM tools, the acquisition of this traffic is often neglected. Today’s Security Operations Centre (SOC) depends heavily on the ability to collect, correlate and analyse network events to quickly identify and respond to security threats – but getting access to the right traffic data from across the network, and without overloading the system, can be a challenge.

    Most Security Operations organizations have a broad understanding of what applications are running on their network. However, many have no visibility into which specific applications are consuming resources. While Security budgets are stretched thin, organizations have to struggle to support increased demand. Inefficiencies often result in all traffic being analysed by all network security tools, whether it is relevant or not.

    Application Intelligence provides specific information about all the applications streaming through a network. In a security context, this is especially useful because security appliances are looking for the “needle in the haystack”; that is, to identify the one single sequence of threat packets or flows from the entire mass of network flows.

    Join us to understand how you can better utilise your network and security tools to protect your network infrastructure and ensure your end-users receive the best service.
Visibility into physical, virtual, and cloud environments
Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Application Awareness with the Power to Take Action
  • Live at: Jun 4 2019 10:00 am
  • Presented by: Bassam Khan VP, Product & Technical Marketing Engineering Gigamon & David Davis Partner & Vexpert ActualTech Media
  • From:
Your email has been sent.
or close