loader from loading.io

24. Networking: SASE – Where the Network and Security Worlds Collide

World Wide Technology - TEC37

Release Date: 02/24/2021

No Bad WiFi Series, Episode 5 – Aruba show art No Bad WiFi Series, Episode 5 – Aruba

World Wide Technology - TEC37

In Episode 5 of World Wide Technology’s No Bad WiFi series, we meet up with Mason Coffman and Robin Jellum from Aruba. They take us on a journey through Aruba Central with AIOps to automatically identify performance issues and improve the user experience. Scott Boda from WWT walked us through our Aruba Central lab environment and we spoke with Stew Goumans to find out what’s new at Ekahau.  Panelists

info_outline
No Bad WiFi Series, Episode 4 – Cradlepoint show art No Bad WiFi Series, Episode 4 – Cradlepoint

World Wide Technology - TEC37

In this new No Bad WiFi episode from World Wide Technology, we chat with Anthony Lawson from Cradlepoint and he took us down the Pathway to 5G.

info_outline
30.  Data Center-  Data Protection Strategies for Cyber Resiliency show art 30. Data Center- Data Protection Strategies for Cyber Resiliency

World Wide Technology - TEC37

As threats to organizations’ data environments become more sophisticated and persistent, the need to prevent and rapidly recover from adverse cyber events has become critical. The right data protection and backup solution can help keep an organization’s data secure, and critical infrastructure up and running. In this TEC 37 episode from World Wide Technology, you’ll hear WWT experts Chris Konrad, Dominic Greco and Richard Thomas talk about how the right data protection and backup solution can help keep an organization’s data secure, and critical infrastructure up and running. ...

info_outline
29.  Multicloud - What the Covid Spike in Cloud Adoption Means for Your Business show art 29. Multicloud - What the Covid Spike in Cloud Adoption Means for Your Business

World Wide Technology - TEC37

COVID took most organizations by surprise. Companies that had previously ignored cloud technology and strategy became increasingly disrupted. Even companies in the process of digital transformation — while better positioned than most — were unprepared for the magnitude of the challenge. As organizations increasingly accept that COVID is a longer-term challenge, they also have a chance to appreciate the pandemic’s silver lining: enabling “work from anywhere” and accelerating technology modernization across all parts of the business — even those areas previously not considered. In...

info_outline
28. Automation & Orchestration – Ansible vs Terraform.  Which is Better and Why? show art 28. Automation & Orchestration – Ansible vs Terraform. Which is Better and Why?

World Wide Technology - TEC37

Ansible and Terraform are some of the leading tools for automating infrastructure and driving infrastructure as code. In this TEC37 episode from World Wide Technology (WWT), WWT experts Tyler Hatton and Wasantha Hewawal Gamage discuss the foundations for a successful automation strategy and where each tool fits in a larger automation strategy. Panelists WWT Resources

info_outline
27. Digital Workspace – Ready for Reopening show art 27. Digital Workspace – Ready for Reopening

World Wide Technology - TEC37

Many companies are actively evaluating and testing technologies that can help them keep employees and visitors safe in workplaces and public spaces when they reopen. There are a lot of possibilities, but what is truly viable and necessary? WWT experts Joe Berger and Kait Miller, along with Arnaud Caigniet from Cisco, discuss what organizations are planning for, and how to prioritize various technologies. We’ll take a look at IoT, office hoteling, shared space management, sensors and occupancy monitoring technologies that are being used to reopen offices and shared spaces. Panelists: WWT...

info_outline
26.  Security – Would Zero Trust Have Prevented the SolarWinds Breach? show art 26. Security – Would Zero Trust Have Prevented the SolarWinds Breach?

World Wide Technology - TEC37

Zero Trust is a framework that combines Identity and Access Management (IAM), Enterprise Segmentation and other security components to provide “least access” protection to corporate networks and resources. WWT Cybersecurity architects Steve Brodson, Ricky Boyd and Ken Dunham join host Robb Boyd to discuss the key ways in which a Zero Trust Architecture could have protected against the Solar Winds-based attacks that made the news in December. Additional Resources from WWT:

info_outline
25. Carrier Networking – Private LTE and CBRS show art 25. Carrier Networking – Private LTE and CBRS

World Wide Technology - TEC37

In the first episode of World Wide Technology’s TEC37 Networking Series, host Robb Boyd and WWT’s Syed Jafri and Chandler Heath discuss the role of Private LTE networks.  These networks will help enterprises increase in-building capacity, provide a better end user experience and enhance the capabilities for enterprise level applications of Internet of things, while also providing a platform for the broader adoption of 5G. Enterprises undergoing digital transformation can use Private LTE on the new CBRS band to improve in-building connectivity complementing WiFi6. This high-speed,...

info_outline
24. Networking: SASE – Where the Network and Security Worlds Collide show art 24. Networking: SASE – Where the Network and Security Worlds Collide

World Wide Technology - TEC37

Since Gartner introduced the term Secure Access Service Edge (SASE) in 2019, technology leaders have been trying to figure out what this merging of network and security architectures means for their organizations. In this episode of TEC37, we dig into the evolution of SASE, how it works and some considerations when evaluating SASE solutions.  Join host Robb Boyd as he speaks with WWT’s Mike Schmidt, Security Architect; Michael Pfeiffer, Cloud Networking Architect; and Jordan Martin, Networking Architect. They’ll discuss how the worlds of...

info_outline
 No Bad Wi-Fi Series E03 BONUS Segment – Meraki IoT Sensors show art No Bad Wi-Fi Series E03 BONUS Segment – Meraki IoT Sensors

World Wide Technology - TEC37

In this No Bad Wi-Fi Serious Episode 3 bonus segment we talked with WWT’s Chandler Heath about his IoT sensor deployments and the variety of use cases where sensors can be leveraged.

info_outline
 
More Episodes

Since Gartner introduced the term Secure Access Service Edge (SASE) in 2019, technology leaders have been trying to figure out what this merging of network and security architectures means for their organizations.
In this episode of TEC37, we dig into the evolution of SASE, how it works and some considerations when evaluating SASE solutions. 
Join host Robb Boyd as he speaks with WWT’s Mike Schmidt, Security Architect; Michael Pfeiffer, Cloud Networking Architect; and Jordan Martin, Networking Architect.
They’ll discuss how the worlds of networking and security have collided to meet the technology needs of today’s large organizations. 

Mike Schmidt, WWT

Jordan Martin, WWT

Michael Pfeiffer, WWT

Robb Boyd, Host

Additional Content from WWT:

Multicloud Interconnect Discovery Workshop

Secure Access Service Edge (SASE) Briefing

Securing Your Cloud Transformation with SASE