SD-WAN Adoption Drives Greater Demand for Integrated Branch Security
Thursday, November 8, 2018
12:00 p.m New York / 5:00 p.m London
With the rise of SD-WAN there is now an increased urgency for service providers and customers to implement SD-WAN with integrated security.
In response to this market demand, many service providers have implemented a managed SD-WAN model that simplifies security for their enterprise customers. Not surprisingly, managed SD-WAN- services have been widely adopted, utilizing either an outsourced or SaaS-based service.
This webinar will discuss:
- The rise of SD-WAN as an alternative to traditional enterprise WAN; what is driving its growth
- The security challenges inherent in SD-WAN vis-ŕ-vis traditional WAN
- The options for meeting this challenge (built-in, a second box or cloud-delivered security)
Rik Turner, Principal Analyst, Infrastructure Solutions, Ovum
close this window
Rik is a principal analyst in Ovum's IT Security and Technology team, specializing in cybersecurity technology trends, IT security, compliance, and call recording.
Rik provides analysis and insight on market evolution and helps end users determine what type of technology and which vendor they should be pursuing.
Rik has also worked in Ovum's Financial Services Technology team, with a specialization in capital markets technology. Prior to joining Ovum, he worked as an IT journalist, specializing in networking and security, and as a foreign correspondent in Brazil, where he worked, among others, for the Financial Times and The Economist.
Atchison Frazer, WW Head of Marketing, Versa Networks
close this window
Atchison Frazer brings over 20 years of strategic IT marketing expertise and leadership to Versa Networks, helping to influence growth markets from SD-WAN to High Performance Computing, Infrastructure Performance Management and UTM security.
Prior to Versa Networks, he was global marketing leader for SD-WAN pioneer Talari Networks, and before that CMO at Xangati (acquired by Virtual Instruments). Previously, Atchison served as CMO for ADC-vendor KEMP Technologies and also was CMO of HPC and HFT switch-fabric innovator Gnodal Ltd (acquired by Cray).
Earlier in his career, Atchison was responsible for services strategy, global marketing and sales enablement for Cisco’s global enterprise theatre and enterprise transformation market segments, including acquisition integration, enterprise security software and network optimization services. Atchison also has held senior marketing and communications management roles with Servgate, Fortinet and HP Enterprise.
Atchison earned a B.A. in Political Science from the University of Louisville.
Webinar Archive Registration
To register for this webinar, please complete the form below. Take care to provide all required information (indicated in red
). Press Register
to complete your registration. If you have already registered for our site or for one of our webinars, you may login
to register without re-entering your information.
Researcher finds Sophos firewalls can allow net-based RCE without authentication.
The rise of DevSecOps may be the reason that 70% of respondents to Radware's survey stated that the CISO was not the top influencer in deciding on security software policy.
Encrypted traffic from both Chrome and Firefox shown to be vulnerable.
Despite our best efforts, human defenders simply cannot process information at machine-speeds — and cyber-criminals are taking advantage. When human knowledge meets AI's precision, Cyber AI can augment the human at every stage of safeguarding the digital business.
UK-based business ISP analyzed data from its customers and found that the number of cyber attacks its customers experienced had increased over last year's summer period by 243%.
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity.