Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Live Demo of OptiView XG
    Live Demo of OptiView XG
    Mike Pennacchi, Network Protocol Specialists Recorded: Apr 11 2019 64 mins
    Troubleshooting performance problems in today’s networks is only getting more complex:

    • Growth of 10G links with limited visibility
    • Increasing demands on wireless networks
    • Complex infrastructure with outdated documentation

    Last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.

    Please join us for a free webinar where Mike Pennacchi will talk about these issues and present a live demo of the OptiView® XG Network Analysis Tablet.

    XG expedites network performance problem solving by automating root cause analysis and providing guided troubleshooting to address problem areas - anywhere on the network – wired or wireless.
  • NETSCOUT Threat Intelligence Report 2H 2018: Dawn of the Terrorbit Era
    NETSCOUT Threat Intelligence Report 2H 2018: Dawn of the Terrorbit Era
    Hardik Modi, Sr Director - Threat Intelligence, NETSCOUT and Richard Hummel, Threat Intelligence Manager, NETSCOUT Recorded: Feb 28 2019 57 mins
    When it comes to the global threat landscape, the second half of 2018 revealed the equivalent of attacks on steroids, as attackers bulked up existing tactics, rapidly evolved new ones, and applied smart business techniques to vastly accelerate their growth rate. IoT devices were attacked within five minutes of being plugged into the internet. Nation-state APT group activity ratcheted up in volume and targets while existing actors continued to innovate, including the first observed use of Chrome extensions to enable persistence in the STOLEN PENCIL campaign. Finally, the use of business practices such as the affiliate model empowered crimeware such as Danabot to achieve rapid global targeting.

    Attend this webcast to learn about:

    Nation State Innovation in APT: new groups discovered and new TTPs combining custom tools and crimeware

    Crimeware goes to B School: We saw a robust marketplace driven by well-stocked innovation pipelines from rapidly growing organizations

    Understanding the ever-changing DDoS landscape – key vertical targeting and techniques

    Register today, space is limited.
  • Scaling security at the Internet edge with stateless technology
    Scaling security at the Internet edge with stateless technology
    Tom Bienkowski – NETSCOUT Arbor, Director, Product Marketing Recorded: Feb 20 2019 32 mins
    As the scale of all types of attacks continues to increase, traditional stateful perimeter security devices like firewalls often strain to keep up. Adding stateless technology between the firewall and the Internet router, armed with advanced reputation and threat intelligence data, can decrease the heavy load on your existing perimeter defenses, protect them from state exhaustion attacks, and even provide blocking of outbound threats (like bots communicating with C&C). This webinar will explore the realm of stateless technology and the Internet edge, with best practices, lessons learned, and key deployment strategies that will prepare attendees for a future of increasing and diverse attacks.

    During this webinar we will talk more about:

    - Understand the limitations of existing perimeter security solutions because of their stateful nature

    - See how stateless technology can protect you from inbound attacks (like DDOS), more efficiently block inbound IoCs and outbound threats (communications with suspicious destinations based on reputation)

    - Learn how stateful and stateless technologies can work together the make a more secure Internet edge

    - Arm yourself with protection against Internet-scale attacks

    - Answers to audience questions during live Q&A​

    Featured Speaker:

    Tom Bienkowski – NETSCOUT Arbor, Director, Product Marketing

    Tom has been in the network and security field for over 20 yrs. During this time, he has worked for large enterprises as a Network Engineer and for multiple network management and security vendors where he has had roles in Sales Engineering /Management, Technical Field Marketing and Product Management. Currently at NETSCOUT he’s a Director of Product Marketing focusing on their industry leading Edge Defense and Threat Intelligence solutions. Tom routinely speaks at IT security events around the world providing insights into cyber threats and best practices in defense.
  • State of the Cloud in the Enterprise
    State of the Cloud in the Enterprise
    Dr. Mazin Yousif, Editor IEEE Cloud Computing Magazine Recorded: Feb 4 2019 28 mins
    Cloud computing has become the de-facto hosting platform for all types of applications, social innovations and use cases such as Big Data, the Internet of Things, smart mobility and social networking – basically it is the new normal. This is true everywhere including all industry sectors and companies in all sizes.

    Bringing new technology into the market always comes with many challenges. This is no different for cloud computing, even though its adoption in the market has been very fast. I usually bucket cloud adoption challenges in three categories, namely: migration, Total Cost of Ownership (TCO) and Data handling. According to surveys by Netscout and RightScale published in 2018, a cloud users leverage on average around 5 clouds; hybrid and multi-clouds are likely the future; security, managing cost and lack of skilled resources rank on the top challenges; & as expected there are still migration challenges.

    In this talk, I will provide my views on the state of cloud computing in the enterprise, talk about the challenges and talk about the typical role of the CIO to deal with digital transformation challenges.

    Key Take away:

    -Enterprises uses many cloud services at any one time
    -Hybrid cloud and multi-clouds seem to be the way forward
    -Cloud challenges in the Enterprises vary based on the size of the enterprise and where they are in the cloud adoption journey.
    -The central IT organization has morphed its role as cloud adoption increases
  • The App is Slow! Learn how to resolve performance issues Fast with nGenuisONE
    The App is Slow! Learn how to resolve performance issues Fast with nGenuisONE
    Serguei Frampol, Oracle Database Administrator, Forte Data Solutions Recorded: Jan 29 2019 23 mins
    All too often application performance issues first reveal themselves by the end-user’s call to the helpdesk, exclaiming “this application is slow!”

    When this happens, getting to root-cause quickly and allowing for effective troubleshooting and minimal downtime is key to the business and end-user experience.

    Join Serguei Frampol, Oracle Database Administrator with Forte Data Solutions as he discusses how to leverage nGeniusONE to:

    • Gain visibility of all tiers of an Enterprise database deployment
    • Pinpoint the tier, server or application interaction at the root cause of an issue
    • Gain insight into volumes and performance degradations to the database
    • Solve real-life use cases including: slow web applications and e-business suite scenarios
  • Best Practices for Network Packet Aggregation and Visibility Webinar Series
    Best Practices for Network Packet Aggregation and Visibility Webinar Series
    Eric Gray, Chief Solutions Architect, NETSCOUT and Erik Hjelmstad Security Visibility Specialist, NETSCOUT Recorded: Dec 19 2018 52 mins
    You need full traffic flow visibility for your service assurance and cyber security tools to perform effectively. This means that they should only process the traffic they are designed to see. Otherwise, they waste precious resources filtering or load balancing packets before the security logic can be applied.

    Please join NetScout for the first of our 4-part series on Best Practices for Packet Aggregation. In this first session you will learn:

    • Why organizations are turning to packet aggregators help control their costs of network security and monitoring tools.
    • What packet aggregators do and how they function.
    • What you should consider when selecting the right packet aggregator for your environment?

    Please join NETSCOUT Technology experts, Mark Doering and Eric Gray for this webinar focused on demystifying the market offerings around packet aggregation.
  • What’s new with AirCheck G2 v3?
    What’s new with AirCheck G2 v3?
    Julio Petrovitch, Product Manager Recorded: Nov 28 2018 36 mins
    AirCheck G2 has new enhancements that will allow wireless professionals to get over the air firmware updates and upload more test results to the complimentary Link-Live Cloud Service. Over-the-network profile sharing will also now be available.
    Additionally, there has been enhanced AP name support and improved packet captures!
    Attend this webinar with CWNP Julio Petrovitch, the AirCheck G2 product manager to learn more.
  • How NETSCOUT Customers Master Remote Site Monitoring
    How NETSCOUT Customers Master Remote Site Monitoring
    Jason Chaffee, Sr. Product Manager NETSCOUT Recorded: Nov 13 2018 52 mins
    Where are people accessing your network and business critical apps from? If yours’ is like most organizations, the list of “remote sites” continues to grow. And that list is way beyond just the traditional branch office. From each of these locations where people need the network to do their jobs, IT is expected to provide support and troubleshoot issues. Join NETSCOUT on this webinar to learn about the visibility needed to deliver this support and explore:

    * Real-life examples of how companies around the world are monitoring critical network and apps, no matter where they are accessed.

    * Why it is critical to monitor your network even when no one is using the system.

    * How to monitor from locations that do not have IT support on site.

    Attend the webinar and get a free eBook:

    Remote Sites: Monitoring Performance Across the Distributed Enterprise
  • Navigating the High Power PoE minefield with confidence
    Navigating the High Power PoE minefield with confidence
    Vincent Choi, Senior Product Manager Recorded: Nov 13 2018 50 mins
    With the ratification of the IEEE 802.3bt standard, new types of PoE devices are bound to be introduced in the market. With heightened safety and interoperability concerns, you will need to know the challenges that high power PoE brings as well as the status of the cabling and PoE equipment market today. This webinar covers the following topics:
    •Quick review: How does PoE work
    •What are considerations when deploying High Power PoE
    •Are there standardized best practices to help deployment?
    The overall benefit of PoE is to facilitate the ease of deployment of network connected devices. When deploying a PoE system the power delivery, types and classes, and power managements must be considered. This webinar will arm you with the knowledge to deploy PoE enabled devices in the most effective way possible.
  • How Carriers Gain Visibility in the Hybrid/Multi-Cloud
    How Carriers Gain Visibility in the Hybrid/Multi-Cloud
    Dr. Vikram Saksena Recorded: Nov 5 2018 52 mins
    Dr. Vikram Saksena, Sr. Director, SBO, NETSCOUT discusses how carriers and enterprises can gain a single source of truth for both application performance and security management in complex, multi-vendor environments.

Embed in website or blog