WEBINAR ARCHIVES

WEBINAR ARCHIVES

Why is IT Availability so hard?
Date: 2016-12-15 13:00:00 EST

View archived webinar

If your production environment stayed the same, then backup, recovery, and availability would be easier to achieve.  But your production environment isn’t stagnant, so how do one keep solving for a moving target? How can you and your IT team “keep up” with modernizing protection with each modernization of production.  What should you be looking for or considering around data protection in an ever-changing IT landscape?

ESG principal analyst, Jason Buffington, will share the latest research and market trends around 1) understanding the technology and business drivers that are affecting modern SLAs  and 2) considerations for a broader strategy for backup, recovery, and availability outcomes.  Along the way, Veeam’s Vice President, Product Strategy, and Chief Evangelist, Doug Hazelman, will share how Veeam’s technologies and vision address those IT challenges.

.

6 Ways Network Visibility Can Optimize Your Network
Date: 2016-10-26 13:00:00 EDT

View archived webinar

Network visibility is fast becoming a key component of network and security planning. This is partly due to frequent data breaches where attackers have access to their victim’s network and resources long before being discovered. Yet network visibility is more than just network monitoring. It can remove network blind spots, improve network security and reliability, speed up troubleshooting efforts, reduce costs, strengthen regulatory compliance initiatives, and help optimize network performance. Could you use help in any of these 6 areas?

Join us for this webinar on October 26th for an extensive discussion on network visibility and how you can use it to your advantage.  

Attend and you will:

  • Review practical ways you can apply visibility to your network to make it stronger and more resilient
  • Get fast and concise training into what an effective visibility architecture looks like
  • Learn about all possible use cases for network visibility solutions
  • Understand how to make your existing monitoring strategies more efficient
.

Build Resilient Security Right into Your Network
Date: 2016-09-29 13:00:00 EDT

View archived webinar

You cannot protect your organization from the constant threat of cyberattacks with best-efforts security monitoring. You need 100% data access and visibility, and the intelligence to evaluate vast volumes of network traffic, without slowing or disrupting your network. A resilient security fabric does all this, and helps scale your security infrastructure as needs change.

Join us for this webinar on September 29th to learn more about the advantages of deploying a resilient security fabric.

Attend and you will walk away with:

  • Components of an inline security fabric
  • Six criteria for evaluating fabric components
  • Key product specifications and features
  • Tips for making the most of your security budget
 
If you provide your (ISC)2 ID certificate number when you register for the webinar, your CPE credit will automatically be added to your (ISC)2 account within 4-6 weeks.


.

In the Applications Economy, the Best Time for Downtime is … Never
Date: 2016-09-13 14:00:00 EDT

View archived webinar

(This webinar is the first webinar in a two-part series that will provide you with thought leadership, best practices, and ROI strategies to help improve your data protection and ensure uptime in the demanding application economy.)

Remember “five 9’s” and the effort to reduce the amount of downtime your customers had to endure? Well, today, people accessing your applications won’t tolerate any downtime. These days, it’s not about how much downtime you can get away with -- any amount of downtime can lead to a loss of productivity, revenue, and customer confidence.

How can IT leaders be rock stars and not one-hit wonders?

When you attend this webinar, part 1 of a 2-part series, you will: 

  • Get insight and research on the expectations, challenges, and opportunities for IT when it comes to data protection and, ultimately, business performance
  • Learn about the most important considerations when improving or revamping an always-on strategy
.

SD-WAN Security Architectures
Date: 2016-08-11 13:00:00 EDT

View archived webinar

Wide Area Network (WAN) design has always included security as an integral part of every architecture.  As enterprises and service providers work to implement Software-Defined WAN (SD-WAN) for its many benefits, security continues to be a critical part of these WAN designs.

SD-WAN architectures incorporate a variety of approaches to enable and deliver the integration of security, including methodologies from distributed on premises security to the insertion of public cloud and private cloud security. 

In this webinar, leading industry analyst Zeus Kerravala discusses the pros and cons of various SD-WAN security architectural approaches, and considerations for choosing the best approach for your implementation.

Join us and you will: 

  • Get a review of approaches to securing your WAN environments
  • Learn how to build a secure WAN infrastructure with SD-WAN
  • Get an opportunity to have your questions answered by Zeus Kerravala
.

5 SD-WAN Integration Challenges SOLVED
Date: 2016-07-13 13:00:00 EDT

View archived webinar

The corporate wide area network (WAN) is a major source of frustration and budget drain for IT organizations, but it doesn't have to be that way. New technology is emerging to apply the concepts of software-defined networking to the traditional WAN to allow traffic to run over a mix of public broadband, private MPLS and other types of links and to increase flexibility and control.

SD-WAN can dramatically reduce cost and increases the ability to rapidly bring new services online, connecting users to all types of applications, and speeding up time to market. But the idea of re-architecting the WAN can be daunting and the decision to adopt an SD-WAN solution can be a difficult one.

Join renowned network expert Ethan Banks, Co-Founder of Packet Pushers, and Rolf Muralt, VP Products Management SD-WAN at Silver Peak, in a webinar that discusses the SD-WAN market, lessons learned, and what features to be on the lookout for as you make your decision. They will discuss issues around technology selection and deployment, including:

  • How a zero-touch, hybrid or SD-WAN can leverage multiple connectivity forms
  • Ways to prioritize and route traffic across different connections
  • Quality of Service (QoS), and how to maintain 100% uptime
  • Best practices for transitioning with minimal impact on budget and resources
  • Real customer examples that demonstrate different deployment stage and benefits

 

.