The Current State of Ransomware and Proactive Ways to Combat It

Presented by Xiologix

In this presentation, we will do a quick review of the current state of ransomware and then jump right into proactive approaches utilizing the latest tools to prevent and combat this growing threat. We will include a discussion of identifying attack vectors, network defenses, storage defenses, asset management, SOC, incident response, and the benefits of each.

Transforming IT Ops and Network Experiences with A.I.

Presented by Juniper & Structured

Today’s networks and IT teams are challenged by the soaring numbers of mobile and IoT devices and apps. Learn how data science, AI and a modern microservices cloud architecture can deliver the agility, scale and reliability that businesses need to succeed. We are transforming user and IT experiences with an AI-Driven Enterprise through proactive automation and relevant insights while ultimately evolving towards a self-driving network. In this session, you’ll learn why three of the Fortune 10 companies, along with thousands of other organizations, are AI-driven wired and wireless networking customers, to deliver new services, assure network performance, and streamline help-desk operations.

Achieving a Successful Security Segmentation

Presented by Illumio

You rely on the network to deliver applications. But as IT scales in size, connectivity, and environments outside the network to public cloud, we cannot rely solely on the network to secure applications. The answer is to decouple security segmentation from the network. This allows us to protect applications wherever they run –because they do not live exclusively on our networks anymore, and enforcement must go wherever they do.

During this informative session, we’ll discuss:

  • What is security segmentation?
  • Challenges of traditional network segmentation
  • Decoupling segmentation from network architecture
  • Principles of successful security segmentation
  • 5 steps to implement a strategy

Architecting the New SD-WAN Edge for the Cloud-First Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

Mitigating Cybercrime Through Automated Response and Integration

  Presented by Fortinet

Come join our talk on mitigating cybercrime and learn about best practices to help your company maintain a strong security posture through the digital transformation and beyond. The bad guys are using automated tactics to try to find a foothold in your network. Isn’t it time to leverage an integrated security approach to automate your response?

Managing the Impact of Collaboration Technologies on Your Network

  Presented by Cerium Networks

Today’s collaboration technologies come with many exciting features and benefits–all of which impact the network in various ways. This session will help the audience understand those impacts and how to manage them. This session covers everything from inter-branch communications, survivability, collaboration beyond your walls, and ensuring your collaboration environment is secure.

Topics include:

  • Inter-Branch Communications
    • SD-WAN
  • QOS, Path Diversity, Low Latency
    • Network requirements based on whether on-prem, cloud, or hybrid
    • Cloud Transport Leg/Poke –3rd Party Connections
  • Survivability
    • WAN/LAN resiliency
    • Local Call Processing / Failover Call Processing
  • Collaboration Beyond your Walls
    • Remote Workers
    • BYOD
    • Video Conferencing
    • Teams-based collaboration tools that combine meetings, calls, and IM into one platform
  • Ensuring your Environment is Secure
  • SIP
  • Toll Fraud
  • TLS Encryption
  • Encrypting the media
  • Certificates
  • Trunk Protection TDM/SIP
  • BYOD Policy Enforcement/MDM

The Proliferation of Video in Enterprise Design, and How It will Impact You

  Presented by Star Leaf & Netrix

The presentation will go over the complexities of a successful video/collaboration environment from a technical and physical perspective. We will discuss the technology, psychology of, and successful adoption of Video Conferencing in the workplace. One size does not fit all and equipment must be scaled appropriately. We will also go over the recommended beta/installation program and what that looks like.

Architecting the New SD-WAN Edge for the Cloud-first Enterprise

  Presented by Silver Peak

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.