Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Trends in Fintech Security - Mobile Payment Apps, Risks & Cybersecurity
    Trends in Fintech Security - Mobile Payment Apps, Risks & Cybersecurity Ted Eull (NowSecure), JP Bourget (Syncurity), RJ Gazarek (Thycotic), Jason Kent (AsTech) May 18 2017 3:00 pm UTC 75 mins
    Fintech may still be in its early stages, but it's seen tremendous growth and is expected to see global investments exceed $150 billion in 2017. With the proliferation of mobile apps, cybersecurity is extremely important. Trust is a key difference maker for customers, so fintech companies need to ensure that their sensitive client information stays secure.

    Join this panel roundtable of cyber security experts as they discuss:
    - The top cyber threats financial institutions are facing
    - Ransomware, data loss & BCDR
    - Mobile banking apps and security vulnerabilities
    - Recommendations on improving security and establishing consumer trust

    Speakers:
    - JP Bourget, CSO of Syncurity
    - Ted Eull, VP Privacy and Risk at NowSecure
    - RJ Gazarek, Product Manager at Thycotic
    - Jason Kent, CTO of AsTech Consulting
  • What's New in OPNFV Danube?
    What's New in OPNFV Danube? Amar Kapadia, NFV Specialist at Mirantis and Serg Melikyan, Technical Customer Success Manager at Mirantis May 18 2017 3:00 pm UTC 60 mins
    In March of this year, the OPNFV community will make generally available its 4th release, OPNFV Danube. As always, this version includes hundreds of new features and fixes, but what does that really mean to you?

    Our fast-paced, in-depth look at what's new in OpenStack Danube focuses on the major highlights of this release, but we'll also give you an idea of what's going on in the rest of the ecosystem -- now roughly 60 different projects -- so you'll know where to turn your attention next.

    In this webinar, you will learn:

    - How the OPNFV ecosystem has changed in the last year
    - What new scenarios are covered by Danube
    - What testing improvements will you find in Danube
    - What new features has Danube influenced in the constituent upstream projects
    - How can you get involved or take advantage of OPNFV Danube
  • Centro de Datos. Agilidad y Control de TI
    Centro de Datos. Agilidad y Control de TI Roger Garcia Villajuana Gerente de Ventas SW Intel LAR Karen Cordóva Comercial Datavision Ricardo Bobadilla Ingeniería May 18 2017 4:00 pm UTC 60 mins
    Una rápida evolución de la tecnología complica cada aspecto de la gestión del centro de datos y los modelos de cómputo basados en el servidor son demasiado complejos para las cargas de trabajo altamente variables de hoy en día.
    ¿Es posible optimizar recursos y operaciones en entornos dinámicos?
    En esta presentación, aprenda cómo reemplazar el aprovisionamiento y la gestión de aplicaciones manuales y definidas por hardware con un modelo de recursos y una capa de orquestación altamente automatizados y definidos por software que permiten flexibilidad, hacer más eficiente el uso de capital en un esquema bajo demanda y un menor TCO. Descubra cómo agrupar de manera más ágil los recursos de centro de datos, y a la vez, aumentar la eficiencia de TI, optimizar los requerimientos de energía, aumentar la flexibilidad del centro de datos y fortalecer los planes de recuperación de desastres.
  • Operational Technology & IoT Help Move Monitoring Closer to Users
    Operational Technology & IoT Help Move Monitoring Closer to Users Ryan D. Schmierer, Principal Consultant , RS Consulting NW May 18 2017 5:00 pm UTC 45 mins
    IT organizations have struggled for years to move beyond monitoring of technology components and measure the performance of business processes, services and end user experiences. Operational Technology (OT) and the Internet of Things (IoT) provide a unique opportunity for service management professionals to embed sensors, collectors and instrumentation capabilities directly into the interactions between users and IT Systems. This webinar will provide an overview of the use of OT and IoT in the IT monitoring context, some management considerations and a look forward at how these capabilities are expected to evolve over the next 2-3 years.
  • A Step-By-Step Approach For Endpoint Detection & Response
    A Step-By-Step Approach For Endpoint Detection & Response Scott Hardie, System Engineer, Symantec May 18 2017 5:00 pm UTC 30 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 5 of 5: A Step-By-Step Approach For Endpoint Detection & Response

    Endpoint Detection and Response (EDR) was developed as a way to address Advanced Persistent Threats (APTs). It is the sneakiness of APTs that make them so dangerous and so difficult to eradicate.

    Although it is generally accepted that EDR technology requires a unique agent, we’d like to ask “should it”?

    Join us to learn how Symantec Endpoint Protection 14 tackles EDR without an extra agent. Discover:

    •How EDR is used to improve security
    •Why integrations are important
    •Why Symantec Endpoint Protection and ATP beat the competition
    •Future plans EDR

    Finally, see a demo that showcases how quick and easy it is to identify and respond to threats with Symantec.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223

    • Symantec Endpoint Protection 14 Webinar Series: Part 3 of 5: Achieving Zero-Day Attacks and What To Do About It http://bit.ly/Part3Webinar0323

    • Symantec Endpoint Protection 14 Webinar Series: Part 4 of 5: Easy Ways To Improve Your Security Posture http://bit.ly/Part4Webinar0420
  • Tendances et chiffres sur les fuites d’information et les attaques Cyber en EMEA
    Tendances et chiffres sur les fuites d’information et les attaques Cyber en EMEA David Grout, Director, Southern Europe Systems Engineering, FireEye May 19 2017 8:30 am UTC 45 mins
    Rejoignez-nous pour un webinaire en live avec David Grout, Directeur Technique Europe du Sud, qui explorera les tendances qui définissent le paysage actuel des menaces en se basant sur les investigations des équipes Mandiant en 2016.
     
    Inscrivez-vous aujourd’hui pour découvrir :
     
    •Les nouvelles tendances d’hameçonnage
    •Les changements en termes de volume et de méthodologie
    •Les apports de la cyber veille et de l’intelligence sur les attaques émergentes
    •Les approches défensives pour mieux se protéger
    •Comment la GDPR impacte les sociétés en EMEA
    •Comment l’Europe se situe par rapport à l’Amérique du Nord et à l’Asie
     
    Inscrivez-vous!
  • WannaCry Aftermath: Lessons Learned and What to Expect Next
    WannaCry Aftermath: Lessons Learned and What to Expect Next Tom Roeh, Systems Engineering Manager, Jeff Costlow, Director of Security, ExtraHop Networks May 19 2017 5:00 pm UTC 45 mins
    What happens when cybercriminals get hold of exploits developed at the NSA? We found out earlier this month with the WannaCry ransomware attack, which quickly spread within organizations around the globe. In this webinar, we will discuss the weaknesses in existing IT defenses that WannaCry exposed, what the attack portends for the rest of 2017, and—most importantly—what IT organizations can do to defend themselves against increasingly potent threats.
  • Extending Real-time Service Assurance with 360o Visibility to Telco Cloud
    Extending Real-time Service Assurance with 360o Visibility to Telco Cloud Anton Basil, Vice President – Technologyand Selvaraj Balasubramanian, Vice President – Products, Veryx Technnologies May 23 2017 3:00 pm UTC 60 mins
    While network service providers are keen to adopt disruptive technologies such as network function virtualization (NFV) and software defined networking (SDN) to facilitate rapid deployment of new services at improved ROI, they know they cannot afford to sacrifice service performance. Concerns arise primarily due usage of commodity hardware which are not designed for supporting real-time applications. Thus, there is the need for tools and mechanisms that can measure network service performance in a calibrated fashion can accurately measure and help correlate the optimal performance of commodity hardware and related IT infrastructure needed to deploy the services. Service Providers armed with such tools can confidently deploy their services on NFV-based environments.

    Join this webinar to learn about:
    - Challenges faced by telecom service providers while deploying NFV-based services.
    - Understanding potential bottlenecks in NFV infrastructure.
    - How to diagnose the bottlenecks and overcome them.
    - How Veryx provides the needed capabilities for monitoring and visibility for delivering services using NFV infrastructure

    Who should attend?
    - Network Architecture teams and teams currently involved in proof-of-concepts of NFV-based architecture from Telecom Service Provider organizations.
    - Network engineering teams exploring service assurance and visibility tools.
    - Service activation teams and network operations teams involved in ensuring SLAs on NFV deployments.
    - Application providers and system integrators designing and deploying NFV ecosystem.
    - Engineering teams of equipment vendors who are developing network platforms supporting virtualization and third party virtual applications.
  • Cut the Work From Your Workflow: An Analytics-First Approach + Machine Learning
    Cut the Work From Your Workflow: An Analytics-First Approach + Machine Learning ExtraHop Team May 23 2017 5:00 pm UTC 60 mins
    The digital business is growing at a rate IT can’t match without over-worked staff and costly data storage. Over the next few years, more reliance on cloud hosting and software-defined networks will send your stress levels up and your IT visibility down… unless you take advantage of a smarter workflow designed to scale IT with real-time insight, on-prem and in the cloud.

    Backed by machine learning for “always-on” anomaly detection, the ExtraHop platform redefines analytics for a more productive—and proactive—you.
  • Trends & Key Considerations of Data Center Convergence with Terri McClure of ESG
    Trends & Key Considerations of Data Center Convergence with Terri McClure of ESG Terri McClure, Senior Analyst; Vaughn Stewart, VP of Product; Joel McKelvey, Infrastructure Solutions May 23 2017 5:00 pm UTC 45 mins
    Convergence is a hot trend in today’s data center – with Converged Infrastructure (CI) and Hyper-Converged Infrastructure (HCI) playing a growing role in how IT departments are architecting for the future.

    In this session Senior Analyst at Enterprise Strategy Group, Terri McClure, will discuss her recent research in to CI and HCI offerings and why companies turn to convergence to improve infrastructure simplicity and reduce management overhead. Terri will be joined by Vaughn Stewart, VP and Enterprise Architect at Pure Storage to discuss how the latest generation of converged architectures are evolving as the underlying technologies become increasingly sophisticated. Terri and Vaughn will detail some key considerations for buyers who are considering CI or HCI solutions for their critical workloads.

    Terri McClure, Senior Analyst, ESG

    Vaughn Stewart, VP of Product, Pure Storage

    Joel McKelvey, Infrastructure Solutions, Pure Storage
  • State of WAN Architecture
    State of WAN Architecture Dr. Jim Metzler, Principal Analyst, Mike Wood, VP of Marketing May 23 2017 5:00 pm UTC 60 mins
    Dr. Jim Metzler, principal analyst at Ashton, Metzler & Associates, presents a detailed analysis of network organizations’ level of satisfaction with current WAN architecture. Jim discusses the issues experienced with existing WAN transmission services, the general interest in adopting an SD-WAN, as well as various related topics such as the differences between a DIY vs. a Managed Services approach.

    Join this webinar to learn more about:
    · Key customer use cases
    · Critical operational issues faced by enterprises
    · Setting up a project team to evaluate SD-WAN options
    · Managing existing WAN contracts
    · Building a business case for adopting a new WAN solution
  • Fortune 500 Best Practices for Cloud Migration, Secure Connectivity and DevOps
    Fortune 500 Best Practices for Cloud Migration, Secure Connectivity and DevOps Chris McDaniel, Senior Vice President and Chief Infrastructure Architect and Ajay Dankar, VP of Products May 23 2017 6:00 pm UTC 75 mins
    Cloud migrations are happening everywhere but are ripe with project delays, complex and time-consuming hardware-based networking and a lack of cloud skills to make them really successful. Not to mention extending your cloud is just as challenging. What if you could set up and manage clouds in a few minutes and accelerate your cloud projects?

    Join the discussion where you will hear from one of the most foremost authorities on cloud, Chris McDaniel, SVP & Chief Infrastructure Architect at Integnology, who helps enterprises with their cloud strategy and migration path.

    In this webinar you will learn:

    - Best practices of Fortune 500 companies for cloud migration, operations and DevOps in the cloud

    - How to avoid the 3 most common pitfalls with cloud set up and ongoing cloud management

    - Why enterprises are choosing Aviatrix to connect their cloud in minutes, accelerating their migration, reducing costs and making everything dramatically more simple and secure
  • Tech Talk: Security and SD-WAN
    Tech Talk: Security and SD-WAN Derek Granath and Anusha Vaidyanathan May 23 2017 6:00 pm UTC 60 mins
    The Internet is notoriously insecure – we hear about security breaches nearly every day. Discover the multiple security features of a Silver Peak SD-WAN, architected to ensure that all traffic moving across broadband Internet is highly protected. Got compliance requirements? Learn how micro-segmentation using business intent overlays helps organizations meet compliance mandates.
  • Spot & Patch Web App Bugs in One Click
    Spot & Patch Web App Bugs in One Click Vikas Phonsa, Product Management, Qualys WAF and Frank Catucci, Product Management, Qualys WAS May 23 2017 6:00 pm UTC 60 mins
    Web application security is becoming increasingly complex due to the continuously evolving threat landscape, the diverse nature of web applications, and the broad range of systems needed to manage security.

    Qualys simplifies web app security with an end-to-end solution.

    During this webcast, presenters Vikas Phonsa and Frank Catucci will show you how you can:

    * Scan your apps using Qualys Web Application Scanning (WAS)
    * Deploy one-click virtual patches for detected vulnerabilities in Qualys Web Application Firewall (WAF)
    * Manage it all from a centralized, cloud-based portal

    This webcast will include a live Q&A session.
  • The PowerShell Risk: Understanding and Avoiding PowerShell Attacks
    The PowerShell Risk: Understanding and Avoiding PowerShell Attacks Lee Lawson, Special Operation Resercher, SecureWorks Counter Threat Unit May 23 2017 6:00 pm UTC 60 mins
    In a recent SecureWorks engagement, 98.5% of the 3,477 commands executed by threat actors were native to the Windows operating system.

    PowerShell is a popular tool that Microsoft has been including with the Windows OS since 2009, but malicious PowerShell use is rivaling ransomware in popularity with threat actors. Security products focused on preventing endpoint threats are often not enough to differentiate legitimate from malicious PowerShell use. Join us for a discussion of why PowerShell is so risky, how SecureWorks researchers identify PowerShell threats, and how you can defend your organization.

    SecureWorks Counter Threat Unit - Special Operations Researcher, Lee Lawson, will discuss how security leaders and practitioners can leverage his experience to reduce the risk and understand how to defend against PowerShell threats in your organizations.

    You Will Learn:
    • What PowerShell is and how it is used in “living off the land” attacks
    • Why built-in tools like PowerShell are so attractive to threat actors
    • Examples of malicious PowerShell use
    • How to defend your organization against common methods to evade prevention and detection
  • State of the Internet/ Security Report–Latest DDoS and Web App Attack Trends
    State of the Internet/ Security Report–Latest DDoS and Web App Attack Trends Nick Rieniets, Senior Security Specialist, Akamai Technologies May 24 2017 5:00 am UTC 60 mins
    As an organization that delivers and protects 15-30% of the world’s web traffic on a daily basis, Akamai is uniquely positioned to observe a large amount of attacks ranging from 20 malicious HTTP requests containing SQL injection to DDoS attacks up to 650 Gbps. Our security experts analyze this information and share trends, observations, and findings in our quarterly State of the Internet / Security Report. We will present this information and associated insights in this webinar series.

    In this webinar, you will learn:

    • A summary of global findings from the State of the Internet Report
    • Attack statistics for APJ
    • How IoT botnets have changed the attack topology in APJ
    • The responsibilities for security of IoT

    Join Akamai and (ISC)² on May 24 (Wed) at 13:00 (Singapore time) for an overview and analysis of traffic and trends from Distributed Denial of Service (DDoS) and web application attacks.
  • Countdown to GDPR - Reduce your Risk
    Countdown to GDPR - Reduce your Risk Darron Gibbard, Managing Director, EMEA North at Qualys & Jonathan Armstrong, Partner at Cordery May 24 2017 9:00 am UTC 60 mins
    This is a must-attend webcast for anyone working for an organisation within Europe and responsible for the security of personal data.

    You are probably already thinking about the EU General Data Protection Regulation (GDPR) and the huge potential fines of €20m or 4% of annual worldwide turnover.

    For organisations headquartered across EMEA, GDPR is a key focus for the next 12 months as the 25 May 2018 deadline approaches. Qualys solutions can help your organisation prepare and comply with GDPR.

    During this webcast, Jonathan Armstrong, Compliance and Technology Lawyer, Partner at Cordery, will answer any compliance questions and highlight the key areas to consider. Darron Gibbard, Managing Director, EMEA North at Qualys, will show you how to know and control your data, assets and suppliers.

    You will get practical advice on:

    - What you need to focus on: data, assets, suppliers
    - Who you should involve: key stakeholders and departments
    - How you can automate processes with Qualys Security Assessment Questionnaire

    This webcast will include a live Q&A session.
  • Building Next-Generation WANs to Support People, Places & Things
    Building Next-Generation WANs to Support People, Places & Things Lee Doyle of Doyle Research and Todd Krautkremer of Cradlepoint May 24 2017 4:00 pm UTC 60 mins
    Digital transformation is driving the increased deployment of cloud-based applications, a mobile workforce, and IoT. A new WAN architecture is required to support this digital transformation and deliver reliable, secure connectivity to people, places, and things.

    In a live webinar on May 24, 2017, Lee Doyle of Doyle Research and Todd Krautkremer of Cradlepoint will discuss the technologies enabling the next-generation WAN, including SD-WAN, Software-Defined Perimeter (SD-P), and LTE.
  • Connected Healthcare: How to Prepare for Future Bandwidth Demand
    Connected Healthcare: How to Prepare for Future Bandwidth Demand Susan Larson, Marketing Communications Manager May 24 2017 5:00 pm UTC 30 mins
    The healthcare sector is experiencing explosive growth in bandwidth demand. From transmitting MRI images to wearable devices to video consultations, networks must work at higher-than-ever speeds to deliver services that ensure patient safety. It’s clear that this demand will continue to grow exponentially, putting more and more strain on your network infrastructure. Topics to be covered include:

    - How IP convergence is driving explosive growth in bandwidth demand, particularly in the healthcare sector
    - Healthcare requirements and trends that are contributing to ever-increasing need for more bandwidth
    - Cabling best practices that will help you avoid costly mitigation and/or reinstalls in the future
  • How to Develop a Container Migration Strategy for your Organization
    How to Develop a Container Migration Strategy for your Organization Eric Sauer, Red Hat Consultant, Architect, PaaS & DevOps May 24 2017 7:00 pm UTC 45 mins
    In the next 2 years, over 90% of organizations will make net new investments in technologies, like containers, that facilitate DevOps. But as more organizations consider container adoption, a sound approach to workload migration is necessary to ensure the successful introduction of a container-based Platform-as-a-Service (PaaS).

    In this webinar, you'll learn the essentials for building a successful container migration strategy, including how to:

    -Evaluate and understand the value and impact of PaaS in your organization
    -Devise a migration vetting process
    -Create a migration plan to optimize business value
    -Use lessons learned from other organizations
  • Cut the Work From Your Workflow: An Analytics-First Approach
    Cut the Work From Your Workflow: An Analytics-First Approach ExtraHop Team May 25 2017 10:00 am UTC 60 mins
    The digital business is growing at a rate IT can’t match without over-worked staff and costly data storage. Over the next few years, more reliance on cloud hosting and SDN will send your stress levels up and your IT visibility down… unless you take advantage of a smarter workflow designed to scale IT with real-time insight on-prem and in the cloud. Backed by machine learning for “always-on” anomaly detection, the ExtraHop platform redefines analytics for a more productive—and proactive—you.
  • Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance
    Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance Erik Luysterborg, EMEA Privacy Leader, Deloitte; Jesse McKenna, Director of Product, vArmour; David Melnick, CEO, Weblife May 25 2017 2:00 pm UTC 60 mins
    With GDPR enforcement beginning May 2018 and fines of 4% of global revenue, it’s time for organizations inside and outside of the EU to build plans for compliance. How will GDPR's broad scope of requirements affect the personal information processed in your data center, and how can you simplify your path to compliance?

    In this webinar, we’ll give you the strategy you need to understand how personal data is flowing across your data center, and how you can implement segmentation to narrow your project scope and get you GDPR compliant faster.

    Join Erik Luysterborg, EMEA Privacy Leader for Deloitte, along with WebLife and vArmour to learn:

    • An Overview Understanding GDPR
    • The key requirements and how they impact security teams at organizations both in and outside the EU
    • Why environmental segmentation is a critical aspect of regulatory compliance and should be part of your GDPR strategy
    • Ways organizations can use segmentation to simplify and accelerate GDPR compliance
  • Cloud Security Strategies for SMBs: Top Trends and Tips
    Cloud Security Strategies for SMBs: Top Trends and Tips Stephen Helm, Product Marketing Manager, and Jason Vendramin, Senior Product Manager May 25 2017 4:00 pm UTC 60 mins
    Small and mid-sized businesses are a driving force behind cloud adoption, and it’s no wonder: cloud benefits are BIG, with substantial cost savings around hardware, software, paper, storage, and automations.
    But for all the convenience that moving to the cloud provides, where does security come into play? What steps should SMBs take to ensure their move is a safe one? Join Stephen Helm, product marketing manager, and Jason Vendramin, senior product manager, as they explore top cloud challenges, trends, and tips in this informative webinar.
  • Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance
    Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance Erik Luysterborg, EMEA Privacy Leader, Deloitte; Jesse McKenna, Director of Product, vArmour; David Melnick, CEO, Weblife May 25 2017 5:00 pm UTC 60 mins
    With GDPR enforcement beginning May 2018 and fines of 4% of global revenue, it’s time for organizations inside and outside of the EU to build plans for compliance. How will GDPR's broad scope of requirements affect the personal information processed in your data center, and how can you simplify your path to compliance?

    In this webinar, we’ll give you the strategy you need to understand how personal data is flowing across your data center, and how you can implement segmentation to narrow your project scope and get you GDPR compliant faster.

    Join Erik Luysterborg, EMEA Privacy Leader for Deloitte, along with WebLife and vArmour to learn:

    • An Overview Understanding GDPR
    • The key requirements and how they impact security teams at organizations both in and outside the EU
    • Why environmental segmentation is a critical aspect of regulatory compliance and should be part of your GDPR strategy
    • Ways organizations can use segmentation to simplify and accelerate GDPR compliance