Sign up for our weekly newsletter!
REGISTER NOW
SD-WAN: Best Practices for Application Delivery & Multi-Cloud Security

Date: Wednesday, June 20, 2018
Time: 1:00 p.m. EDT / 10:00 a.m. PDT
 
sponsored by
Speakers
Glenn Hensley, IT Infrastructure Manager, Makino

Andy Leong, Senior Director, Product Marketing, Aryaka

Mouli Radhakrishnan, Vice President of Product Management, Aryaka

Scott Ferguson, Editor, Security Now

As enterprises embrace digital transformation, their vulnerability to security breaches increases as their attack surface expands. With cloud platforms, SaaS applications and more connections across diverse locations, global enterprises are finding that they require a defense in depth security strategy to protect both mission-critical applications and data.

So what SD-WAN strategies can be applied to maintain best-in class security across a global network?

This webinar explores SD-WAN architectures in depth and the best practices and essentials for delivering multi-layered, defense in depth security through your global enterprise WAN, while also enhancing application performance required to improve productivity at the speed of today’s business environment.

In this webinar, you will learn about:

  • How a global manufacturing leader applied layered security to their network
  • Challenges in protecting mission-critical applications for global enterprises
  • The importance of deploying multiple layers of security to protect business-critical data
  • Integration best practices that provide global enterprises with enhanced security infrastructure and faster application performance



 

Glenn Hensley, IT Infrastructure Manager, Makino
Glenn Hensley is the IT Infrastructure Manager for Makino, a global leader in Manufacturing technology development, and oversees North America operations for network security and data delivery over the enterprise WAN. Glenn has over 15 years experience developing network configurations for companies such as Hewlett Packard, Proctor & Gamble, Time Warner Cable, and General Electric.

close this window

Andy Leong, Senior Director, Product Marketing, Aryaka
Andy is the Senior Director of Product Marketing at Aryaka, the market leader in global SD-WAN solutions. He is responsible for the company's go-to-market strategy and outbound marketing, bringing over 20 years of leadership experience across the networking and applications space. Communications.

close this window

Mouli Radhakrishnan, Vice President of Product Management, Aryaka
Mouli is the Vice President of Product Management at Aryaka and leads the technology development for Aryaka’s solutions, along with the strategic business development partnerships to help expand global enterprise services. He has over 20 years of experience in developing network technology advancements in security and application delivery.

close this window

Scott Ferguson, Editor, Security Now
Prior to joining Enterprise Cloud News, he was director of audience development for InformationWeek, where he oversaw the publications' newsletters, editorial content, email and content marketing initiatives. Before that, he served as editor-in-chief of eWEEK, overseeing both the website and the print edition of the magazine. For more than a decade, Scott has covered the IT enterprise industry with a focus on cloud computing, datacenter technologies, virtualization, IoT and microprocessors, as well as PCs and mobile. Before covering tech, he was a staff writer at the Asbury Park Press and the Herald News, both located in New Jersey. Scott has degrees in journalism and history from William Paterson University, and is based in Greater New York.

close this window


Webinar Archive Registration

To register for this webinar, please complete the form below. Take care to provide all required information (indicated in red). Press Register to complete your registration. If you have already registered for our site or for one of our webinars, you may login to register without re-entering your information.
Email Address *
Username *
Create a Password
Re-enter Password
First Name *
Last Name *
Job Title *
Company *
Address *
City *
State / Province *
ZIP / Postal Code *
Country *
Phone Number *
What is your area of business? *
If you selected "Other" above, please clarify your answer.
What is your job function? *
If you selected "Other" above, please clarify your answer.
Company Annual Revenues *
Employees in entire organization *
Please indicate your agreement to the Terms of Use for this web site. *
I agree to abide by the Terms of Use.
By registering for our site, your email will be added to our promotions list. We will send you information about upcoming webinars and events. You may unsubscribe at any time. If you unsubscribe, you will continue to receive any newsletters to which you subscribed. *
I agree
Occasionally our sponsors may want to send you information about exciting new products and services. If you would like to receive these solicitations, please check this box.
Please indicate your agreement to Light Reading's Webinar Agreement for this webinar. *
I agree to abide by the Light Reading Webinar Agreement (printed in the box below).
Latest Articles
Uptake of the newer DNSSEC protocol has been slow, but a new tool from Cloudflare looks to make it easier to ensure secure websites and more control over DNS.
The Xbash malware includes ransomware and cryptomining functions as well as botnet and self-propagation capabilities and will delete Linux databases.
Recent malware campaigns have used names such as Barak Obama, Angela Merkel and Donald Trump to entice unsuspecting users to download the ransomware, McAfee researchers have found.
A recent study by CompariTech finds that data breaches can have some long-term effects when it comes to a company's stock price, but most of the financial damage diminishes over time.
A California bill specific to IoT cybersecurity measures sits on Gov. Jerry Brown's desk, ready for him to sign it into law. The wording and limits of the law, however, leaves questions as to just how big an effect it will have.
Flash Poll
Video
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2018 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with