SD-WAN Adoption Drives Greater Demand for Integrated Branch Security
Thursday, November 8, 2018
12:00 p.m New York / 5:00 p.m London
With the rise of SD-WAN there is now an increased urgency for service providers and customers to implement SD-WAN with integrated security.
In response to this market demand, many service providers have implemented a managed SD-WAN model that simplifies security for their enterprise customers. Not surprisingly, managed SD-WAN- services have been widely adopted, utilizing either an outsourced or SaaS-based service.
This webinar will discuss:
- The rise of SD-WAN as an alternative to traditional enterprise WAN; what is driving its growth
- The security challenges inherent in SD-WAN vis-à-vis traditional WAN
- The options for meeting this challenge (built-in, a second box or cloud-delivered security)
Rik Turner, Principal Analyst, Infrastructure Solutions, Ovum
close this window
Rik is a principal analyst in Ovum's IT Security and Technology team, specializing in cybersecurity technology trends, IT security, compliance, and call recording.
Rik provides analysis and insight on market evolution and helps end users determine what type of technology and which vendor they should be pursuing.
Rik has also worked in Ovum's Financial Services Technology team, with a specialization in capital markets technology. Prior to joining Ovum, he worked as an IT journalist, specializing in networking and security, and as a foreign correspondent in Brazil, where he worked, among others, for the Financial Times and The Economist.
Atchison Frazer, WW Head of Marketing, Versa Networks
close this window
Atchison Frazer brings over 20 years of strategic IT marketing expertise and leadership to Versa Networks, helping to influence growth markets from SD-WAN to High Performance Computing, Infrastructure Performance Management and UTM security.
Prior to Versa Networks, he was global marketing leader for SD-WAN pioneer Talari Networks, and before that CMO at Xangati (acquired by Virtual Instruments). Previously, Atchison served as CMO for ADC-vendor KEMP Technologies and also was CMO of HPC and HFT switch-fabric innovator Gnodal Ltd (acquired by Cray).
Earlier in his career, Atchison was responsible for services strategy, global marketing and sales enablement for Cisco’s global enterprise theatre and enterprise transformation market segments, including acquisition integration, enterprise security software and network optimization services. Atchison also has held senior marketing and communications management roles with Servgate, Fortinet and HP Enterprise.
Atchison earned a B.A. in Political Science from the University of Louisville.
Webinar Archive Registration
To register for this webinar, please complete the form below. Take care to provide all required information (indicated in red
). Press Register
to complete your registration. If you have already registered for our site or for one of our webinars, you may login
to register without re-entering your information.
DHS-CISA has issued a security advisory about GE Carescape medical instrumentation that enumerates many vulnerabilities present in them.
Inside of Windows is a methodology called Encrypting File System. It works on individual files or folders, rather than at the whole disk level like BitLocker does.
Microsoft is doing something concrete about container security with the release of the Microsoft Application Inspector, a cross-platform tool whose primary objective is to identify source code features in a systematic and scalable way.
One threat actor is taking advantage of the current problems with Citrix ADC/Netscaler for their own advantage.
The European data infrastructure GAIA-X can help connect thedisparate needs of German firms and create market access for providers from the EU and beyond.
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity.