Past Events
Optimize your trading infrastructure -  See, understand and act fast.

Optimize your trading infrastructure - See, understand and act fast.
Join Corvil and VSS Monitoring in discussing the challenges and methodology of monitoring high volume, multi-asset markets, hop-by-hop in real-time. High quality network data is key to understanding the nuances in the trading loop, from the delivery of market data to the timely submission of orders, many components affect performance.

Thought Leadership Sponsor

Thought Leadership Sponsor
The Open Networking User Group is an exclusive gathering for high level IT business leaders and their technical staff. ONUG Fall will bring together 300 IT business leaders of large corporations who manage private and public infrastructure, financial analysts, investors, and industry leaders.

GITEX 2014

GITEX 2014
Network with thousands of CSOs, CIOs, Senior Directors and decision makers from Construction, Finance & Banking, Government, Oil & Gas sectors looking for companies specialized in pioneering security solutions to safeguard mobility devices, corporate networks, business processes and information stores.

Eliminating instrumentation complexity in the high-density data center

Eliminating instrumentation complexity in the high-density data center
Enterprise, including particular Financial Services networks, poses unique challenges to monitor and manage. While performance remains a top priority to maintain competitiveness, regulatory compliance, security assurance and risk mitigation must also be addressed. Market data messages (such as FIX protocol) and, in some cases, proprietary protocols, can add to the complexity, as these may require intelligent traffic capture that performs filtering beyond Layer 4.

Infosecurity Russia 2014

Infosecurity Russia 2014
Infosecurity Russia is the only event with 11 years history, leading annual Information Security and IT event in Russia and CIS. This conference brings together industry experts and IT leaders to talk about the latest trends gaining momentum in IT and Information security. The state of information security, compliance and governance is at an inflection point. It is ready for a move to the next part of the curve: addressing growing risks of cyber security and meeting the challenges of new opportunities - such as cloud, social networking and mobility.

Type of Security Breaches and Solutions

Type of Security Breaches and Solutions
Security Threats and Network Complexity have been evolving at an accelerating speed and are moving from lower layers to Layer 7 and finally to the cloud. As a Network Engineer and a Security Operations Engineer, do you ever feel like it is impossible to catch up to the bad actors? Do you live in a world of ever-tightening budgets where you are asked to do more with fewer tools? Do you feel like the tools we, Network Equipment Manufacturers and Security Providers, provide are complicated to setup and maintain? Do you find yourself spending inordinate amounts of time trying to setup Layered Security Defenses?

Managing the Health and Performance of IT Systems in Financial Services

Managing the Health and Performance of IT Systems in Financial Services
For operators of complex financial IT environments, minimizing latency and ensuring "always on" performance are mandatory for maintaining relevance in a highly competitive industry. Identifying and reconciling issues across multiple systems and geographies can be a considerable challenge, especially since performance is measured in fractions of a second.

Bring Unlimited Network Visibility to your Clients

Bring Unlimited Network Visibility to your Clients
You are invited to attend a live ChannelCast on Thursday, August 28. New challenges for network performance & security monitoring. CRN Editor, Chief Technologist, Christopher Dawson and VSS Monitoring global VP of Sales & Alliance team up to present the new market opportunities in the channel for resellers entering the NPB market

A Day in Life of a Security Operations Engineer

A Day in Life of a Security Operations Engineer
Security Threats and Network Complexity have been evolving at an accelerating speed and are moving from lower layers to Layer 7 and finally to the cloud. As a Network Engineer and a Security Operations Engineer, do you ever feel like it is impossible to catch up to the bad actors? Do you live in a world of ever-tightening budgets where you are asked to do more with fewer tools? Do you feel like the tools we, Network Equipment Manufacturers and Security Providers, provide are complicated to setup and maintain? Do you find yourself spending inordinate amounts of time trying to setup Layered Security Defenses?

Impacts of 40G/100G Network for Network and Security Monitoring

Impacts of 40G/100G Network for Network and Security Monitoring
Learn how to implement network performance and security monitoring for 40G and 100G networks . . .
. . . To ensure a secure and optimized infrastructure as big network data flows

War Room Problem Solving is Damaging Your IT Team

War Room Problem Solving is Damaging Your IT Team
As your business grows and expands, so does the complexity of managing application and network performance to deliver quality end user experience. The added challenge is that the IT landscape within most organizations is made up of independent networks and applications, managed by teams within their own siloes of responsibility, often with their own tools optimized for specific discipline. When issues arise, it requires a collaborative analysis at the problem in order to reach an agreed upon identification of the issue, which often drives the cross-functional IT team into the "War Room" scenario.

Financial Services Webinar, Part 1

Financial Services Webinar, Part 1
This is part 1 of a 4-part Financial Services series. As network data has exploded in volume, velocity and variety, network security and monitoring solutions have been behind the curve in adopting new technologies and approaches to cost-effectively scale and accommodate continuous monitoring in consolidated physical, virtual and cloud based datacenters.

Cisco Live 2014

Cisco Live 2014
VSS Monitoring invites you to a one-of-a-kind event, see the leading industry and technology visionaries who are giving shape to the world of tomorrow. See for yourself the latest technologies and services available from VSS Monitoring and more than 200 Cisco partner companies. VSS Monitoring experts are on hand to address your specific questions and to demonstrate how you can extend and enhance your Cisco environment. Visit us at Booth #2211.

Big Data Visibility, Part 2

Big Data Visibility, Part 2
Considerations for Ramping to a Big Data Network Monitoring Architecture (Part 2 of 2)
Big data techniques and technologies can be powerful tools for scaling network monitoring and forensics. They can also facilitate new use cases for network data, potentially beyond the scope of Operations.

Big Data Visibility, Part 1

Big Data Visibility, Part 1
Leveraging a Big Data Model in the IT Domain(Part 1 of 2)
Even as network data has exploded in volume, velocity and variety, network monitoring solutions have been behind the curve in adopting new technologies and approaches to cost-effectively scale and accommodate a widening virtualization trend. Customers are demanding greater freedom in how applications are deployed and are moving to a consolidated, shared model of data using big data frameworks, such as Hadoop, which enable large-scale processing and retrieval for multiple stakeholders.

Infosecurity Europe 2014

Infosecurity Europe 2014
Infosecurity Europe is Europe's largest, dedicated information security event. Addressing today's strategic and technical issues in an unrivalled education programme and showcasing the most diverse range of new and innovative products and services, the event is a must-attend for all professionals responsible for safeguarding their businesses corporate assets.

Mar 19th Webinar

Mar 19th Webinar
Future Proof Your Data Centers' Network and Security Monitoring
As network evolves, data center (DC) also transforms along with it. Such transformation demands continuous configuration of services and devices in the DC, whether for performance, security or analytics, making deployment and management even more cumbersome. Top 2014 DC trends, such as virtualization (i.e. vDC) and software-defined network (SDN), further increase network blind spots and - in light of NSA data-snooping revelation - heighten the need for DC monitoring.

RSA Conference  2014

RSA Conference 2014
RSA Conferences are the pulse point of the security industry where leading practitioners connect to protect. People come from all around the world to gain security knowledge and learn more about cyber security at RSA than anywhere else.

Mobile World Congress

Mobile World Congress
Mobile World Congress is the blueprint for the NEXT big innovation. The mobile ecosystem continues to expand at lightning speed, with endless innovation and new applications of connected technology. Featured at GSMA Mobile World Congress are the latest and greatest innovations in the largest mobile industry exhibition driven by leading mobile operators, vendors and content owners from across the world.

Feb 19th Webinar

Feb 19th Webinar
Network Intelligence Optimization for Security Service Assurance (Part 2 of 2)
This is a continuation of our 2-part series focusing on Defense-in-Depth Network Security - a panel discussion - with panelists: Jim Frey, VP of Research Network Management from EMA; Curt Schwaderer, Chief Software Architect at IP Fabrics, and Tony Zirnoon, Sr. Director of Global Security Strategies from VSS Monitoring.

Feb 5th Webinar

Feb 5th Webinar
Architecting Defense-in-depth Network Security (Part 1 of 2)
Today's rapidly growing network speeds and increased complexity such as Virtualization, Tunneling with Encapsulation and Encryption pose challenges for IT Network and Security professionals trying to manage and secure them. The IT organization, as a whole, needs to ensure end-to-end visibility, and data access to meet and exceed agreed upon business, network and application performance SLAs while keeping their infrastructure and data secure.

Carrier Network Virtualization

Carrier Network Virtualization
PANEL - Developing SDN in the Datacentre and the Cloud
Dec. 10

Whether you are interested in SDN and OpenFlow in the Datacenter, the development of the C-RAN, Virtualization in the Evolved Packet Core, or potential application uses for NFV in Policy, Security or DPI areas.

ISS World Asia

ISS World Asia
SPEAKER: Kumar Rajaram
Dec 5, Track 4, Session C @ 10:30am


ISS World Asia Pacific is the world's largest gathering of Asian Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Lawful Interception, Hi-Tech Electronic Investigations and Network Intelligence Gathering.

SOIEL INTERNATIONAL

SOIEL INTERNATIONAL
SPEAKER - Marco Romagnoli
Big Data mean a whole different kind of information originated by multiple systems that characterize more and more, today and in the future, company business.

LTE North America 2013

LTE North America 2013
PANEL - Network Optimization
Nov 21 @ 3:20pm

With North America being the world's dominant LTE market and subscriptions forecast to boom six-fold from 26 million at end-2012 to 162 million by end-2017, according to Informa Telecoms & Media, this year's LTE North America event falls at an incredibly exciting time.