WEBINAR ARCHIVES

WEBINAR ARCHIVES

Communications at Risk: The Security Implications of VoIP and SIP
Date: 2017-10-12 13:00:00 EDT

View archived webinar

Today's businesses often rely on Unified Communications (UC) and Real Time Communications (RTC) to run their day-to-day operations, but these applications may fly under the radar when it comes to security protection. Because we live in an IP world, with VoIP and SIP common to all types of networks, reliance on traditional internet and data networking tools for real-time communications exposes UC networks to the same types of cyberattacks that affect all data networks. More importantly, it exposes the network to the inherent vulnerabilities of SIP communications that the traditional tool sets don’t address. This webinar will examine the security implications of using VoIP and SIP, how to best protect real-time communications traffic with tools you already have as well as with new tools, and how to orchestrate protections to prevent UC security from becoming just another isolated security silo.

.

Adopting Cloud the Right Way
Date: 2017-06-14 13:00:00 EDT

View archived webinar

Adopting a cloud mindset isn't about IT relinquishing all control and just approving invoices. It's about changing legacy ways of delivering business services and doing sales, customer service, and end user support in new and more flexible ways. We'll help late cloud bloomers choose pilot projects, select partners, and build in automation and orchestration right from the start.

.

Why is IT Availability so hard?
Date: 2016-12-15 13:00:00 EST

View archived webinar

If your production environment stayed the same, then backup, recovery, and availability would be easier to achieve.  But your production environment isn’t stagnant, so how do one keep solving for a moving target? How can you and your IT team “keep up” with modernizing protection with each modernization of production.  What should you be looking for or considering around data protection in an ever-changing IT landscape?

ESG principal analyst, Jason Buffington, will share the latest research and market trends around 1) understanding the technology and business drivers that are affecting modern SLAs  and 2) considerations for a broader strategy for backup, recovery, and availability outcomes.  Along the way, Veeam’s Vice President, Product Strategy, and Chief Evangelist, Doug Hazelman, will share how Veeam’s technologies and vision address those IT challenges.

.

6 Ways Network Visibility Can Optimize Your Network
Date: 2016-10-26 13:00:00 EDT

View archived webinar

Network visibility is fast becoming a key component of network and security planning. This is partly due to frequent data breaches where attackers have access to their victim’s network and resources long before being discovered. Yet network visibility is more than just network monitoring. It can remove network blind spots, improve network security and reliability, speed up troubleshooting efforts, reduce costs, strengthen regulatory compliance initiatives, and help optimize network performance. Could you use help in any of these 6 areas?

Join us for this webinar on October 26th for an extensive discussion on network visibility and how you can use it to your advantage.  

Attend and you will:

  • Review practical ways you can apply visibility to your network to make it stronger and more resilient
  • Get fast and concise training into what an effective visibility architecture looks like
  • Learn about all possible use cases for network visibility solutions
  • Understand how to make your existing monitoring strategies more efficient
.