Breakout Session A
A1: LEARN THE LATEST WITH JUNIPER
Jeff Bird, Security Sales Specialist | Juniper Networks
Juniper's exact topic is to be determined. They plan on giving a breakout on the latest IT at that time and updating the audience on network solutions and services to help you achieve greater business value.
A2: TECHNOLOGY TRENDS IMPACTING YOUR CUSTOMER INTERACTION
Matt Neimeier, Customer Interaction Specialist | Mitel
Discussion of identifying customer behaviors, their expectations and how technology can meet those expectations.
Breakout Session B
B1: THE ARUBA 360 SECURE FRAMEWORK:
SECURING THE ENTERPRISE.VISIBILITY. CONTROL. RESPONSE.
Dan DesRosiers, Director of Security Sales| HPE
Malicious insiders and IoT-based attacks continue to grow, bypassing your perimeter security defenses. Learn how to reduce the risks and vulnerabilities to your enterprise. You need a seamless path from device and user discovery, wired and wireless access control, attack detection and adaptive response – based on set policies.
B2: SECURITY VIA EXTREME FABRIC AND EXTREME CONTOL
Scott Singer and Grag Mckillip, Account Executives | Extreme Networks
Introductory session on how to provide increased security utilizing user roles and access policies via Extreme’s G2 infrastructure and XMC (formerly Netsight). Come see how XMC can integrate with G-suite, Palo Alto, Fortinet and others. Will also learn about Extreme’s new Campus Fabric offering, which provides the ultimate solution to multicast and traffic hyper segmentation.
Breakout Session C
C1: HPE Makes Hybrid IT Simple
Bob Pothier, Solutions Architect | HPE
Learn how software defined HPE solutions like Infosight, Simplivity and Synergy, powered by HPE OneView, can create positive business outcomes from IT to your organization.
C2: $100 SAYS WE CAN BREAK INTO YOUR NETWORK IN UNDER 10 HOURS
Heather, Lantz, Chief Operating Officer | Infogressive
Why are we so confident? With more than a decade of experience, Infogressive knows that the majority of companies don’t have a solid security foundation. This foundation along with educated and trained engineers is a requirement to preventing the BIG BREACH. Join this breakout to learn what is a part of that solid foundation, how to go about implementing it and hear the real-world horror stories of what happens when the BIG BREACH occurs.