Network infrastructure professionals understand that a reliable and secure infrastructure is crucial to enabling business execution. Join the network infrastructure community to interact with thousands of IT professionals. Browse hundreds of on-demand and live webinars and videos to learn about the latest trends in network computing, SDN, WAN optimization and more.
Cognitive services have hit the mainstream. Delivered through powerful, easy-to-use APIs, businesses can harness the power of artificial intelligence and machine learning and integrate them directly into their applications.
With Microsoft’s exciting release of Translator v3, we just announced our Translator BLOCK - bringing the power of the Microsoft AI platform to PubNub. Using the BLOCK, you can now quickly and accurately translate natural text and speech into a number of different languages with no additional servers or logic required. With Functions, all language translation takes place in the network.
In this webinar, we’ll introduce you to the new BLOCK, and show you how easy it is to implement powerful translation capabilities into your realtime app.
NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM EDT
Financial Services and GDPR: The next 60 days….
In response to GDPR and Privacy Shield changes, entities in the Financial Services Industries have taken initial steps to identify gaps and modify their public facing privacy policies. This session will focus on what these heavily regulated industries will have to do in the next 60 days to establish and maintain a legally defensible position with respect to privacy and security of personal data not only to comply with regulation but to be poised to do business in the 21st Century.
Network security needs are changing right before our eyes. Digital transformation is shifting workloads to the cloud, increasing mobile workforces, and expanding IoT footprints — and network on-ramps.
From branch locations to in-vehicle networks and IoT devices, cyberattacks become more advanced by the day. Today’s diverse network architectures and security needs make scalable solutions and flexible cyber threat intelligence essential. Many organizations want the cost savings and efficiencies of the cloud without having to sacrifice the level of security to which they’re accustomed.
Join Cradlepoint's Ken Hosac, VP of IoT Strategy, for this live webinar to explore the blending of legacy and next-generation measures to keep enterprise networks secure.
Hosac has helped drive Cradlepoint’s growth and development through roles in strategic planning, product management, solution strategy and thought leadership. He frequently represents the company at industry conferences and events, and served on the original Advisory Board for the IoT/M2M Evolution Magazine. Hosac has 25 years of experience in marketing, sales, R&D and manufacturing. Prior to joining Cradlepoint, he served as VP of Marketing for Casabyte (later acquired by JDS Uniphase). He also served as VP of Business Development for GoAhead Software (later acquired by Oracle). Hosac earlier spent 10 years at Hewlett Packard with cable modems and head-ends, set-top boxes, and personal computers in a variety of engineering and engineering management roles. He holds a B.S. degree in Electrical Engineering and an M.S. degree in Manufacturing Engineering, both from Stanford University.
Join Amandeep Nagra, Sr. Product Marketing Manager, Workspace services as he explores Why Citrix Workspace wins vs Workspace ONE.
With more IT resources moving to the cloud and a greater mobile workforce, you need to deliver a secure digital perimeter with a framework that enables greater user productivity, security, and IT management flexibility. This webinar shares why customers choose an integrated Workspace that maintains user context through apps, files and desktops across networks. Citrix Workspace offers a unified user and admin experience.
Some of Citrix Workspace key advantages include:
• Higher user productivity and a better experience
• Stronger security which extends to the cloud
• joe Greater flexibility to manage apps, data and devices for any on-prem, cloud or hybrid scenario
Machine learning based user behavioral analytics that feeds from Citrix product analytics and constantly refines the “normal” user behavior to proactively prevent compromised users from accessing corporate data
Leverage Threat Intelligence where it matters most.
Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.
This month's theme: Insider and Privilege Misuse
Our Verizon Threat Research Advisory Center presenters will be:
• John Rudolph, Principal Consultant, Identity and Access Management
• Steve Atnip, Senior Analyst, Threat Intelligence
• David Kennedy, Managing Principal, Open Source Intelligence
• Laurance Dine, Managing Principal, Investigative Response – EMEA
For this month's theme of 'Insider and Privilege Misuse' we'll feature John Rudolph, Principal Consultant, Identity and Access Management who'll discuss insider threat motivations, common denominators, and countermeasures, to include the Zero Trust approach. We'll then touch base on the IR Pulse and trends in our caseload, followed by:
In its inaugural report, Tenable Research explores who has the first-mover advantage – cyber criminals or security teams? What’s the difference in time between when an exploit is publicly available for a given vulnerability and the first time that security teams actually assess their systems? And why does this even matter to your organization?
The research team analyzed the 50 most prevalent critical and high-severity vulnerabilities from just under 200,000 vulnerability assessment scans over a three-month period. What did they find?
Alarmingly, all too often, the attackers have the advantage. On average, they have a seven-day head start on defenders. Threat actors are sprinting ahead, exploiting vulnerabilities before security teams have even left the starting blocks – before businesses even know they’re at risk.
Join Tenable and (ISC)² on Jul 18, 2018 (Wed) at 14:00 (Singapore Time) to understand how and why cyber attackers are beating your defence.
Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
Moderator: Tony Vizza, CISSP Director, Cybersecurity Advocacy for APAC, (ISC)²
The era of Artificial Intelligence is here. Enterprises face an extraordinary opportunity to innovate and lead. However, real-world AI initiatives are often stalled by scale-out storage infrastructure complexities.
In this webinar we’ll explore new approaches to enable AI-at-scale for enterprises, delivering time-to-insight in hours rather than weeks. We will also cover details and customer successes with AIRI™, the industry’s first complete AI-ready storage infrastructure, architected by Pure Storage® and NVIDIA® to extend the power of NVIDIA DGX™ systems.
Digital Transformation through IoT that focuses on digital exploration, agile mining operations, connected assets, and next gen safety brings significant benefits to mining companies and mining technology suppliers alike. Mining organizations that don’t embark on IoT-enabled Digital Transformation will find it more challenging to compete in uncertain resources cycle. With more than 80% of IoT projects not progressing beyond POC stages according to Gartner, there is a disconnect between IoT technology and IoT capabilities.
This stems from a technology-centric approach to IoT that focus on connected “things” and less on the expected business outcomes. A July 2017 McKinsey study found that 70% of their respondents identified “integrating IoT solutions into existing business workflows” as a capability gap. The IoT challenge that mining companies now face is less of a technology problem and more of a business process problem.
This webinar presents a framework that provides the business architecture for using IoT that connects IoT technology to operational capability and business outcomes. The I2OC framework focus on aligning IoT technology with benefits such as increased asset availability, reduced downtime, reduced costs, increased efficiencies, and improve safety and governance. Pieter uses a practical mining example to present the I2OC framework.
In the highly dynamic online landscape of misinformation, fake news, gossip, and the trading of absconded data, organizations must expand their cybersecurity arsenals in protecting their brands, personnel, facilities, and sensitive information. They must take into account what exists outside the perimeter in the greater cyber ecosystem: the surface, dark, and deep web. Locating and assessing these threats, however, is a challenge for even experienced threat hunters. The tools and techniques are non-standard. You should ask yourself, “Is my security team ready to tackle what lies beyond the perimeter?” If not, let us shed light on this topic. Register for LookingGlass' "Threats Beyond the Perimeter" webinar on Tuesday, July 17 @ 2 pm ET to hear Michael Suby, VP of Research at Frost & Sullivan and James Carnall, VP of Customer Support Group at LookingGlass discuss how these scenarios may affect your brand, employees, and facilities.
An understaffed security workforce is struggling to protect your evolving enterprise from ever changing cyber threats. Automation could be the answer to hardening your security posture in these shifting sands. However, the task of implementing automation across such a diverse and continuously morphing environment presents a challenge.
In this webinar, we will discuss the benefits, complexities and best practices of implementing security automation.
GlobalData research reveals that around 70% of businesses have either deployed or are deploying SD-WAN technology. Businesses are moving more and more of their IT estate into cloud platforms which is the driver for SD-WAN adoption. Of course, this easily enables SD-branches for enterprises to make their businesses more agile and cost-effective.
Join this webinar to understand the benefits and real-life experiences of end-users who have deployed hybrid WAN and SD-WAN services. Hear our speakers discuss the link between their analysis and the over-arching theme of enterprise digital transformation along with security, cloud, and applications. Get deep insights on how current enterprise WANs are transforming, and the drivers causing the change as we approach 2020. We will share insights from case-studies based on industrial applications of SD-WAN and hybrid VPNs across a handful of industry segments.
From this webinar, you’ll get a clear picture of how you can transform your network through tactical migration to hybrid VPN and SD-WAN.
· What does Digital Transformation mean to the Enterprise
· Drivers for Digital Transformation: Network & IT
· What should a fully managed hybrid/SD-WAN solution look like in 2020?
· Industry-specific challenges: Manufacturing, Services and Logistics
· SD-WAN/Hybrid WAN Case-studies
· Recommendations and Executive Summary
Many leading network operators as well as network equipment manufacturers have already recognized network slicing as an ideal network architecture for 5G deployment. It provides the flexibility for network operators to slice one physical network into dedicated virtual networks, logically separated from one another and dedicated for different types of services, with different characteristics and requirements.
Third and final part of our 'Breach Response Preparedness Series', a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.
Recovering from a large-scale incident is not an easy task. When compromised by an Advanced Persistent Threat, one must plan the efforts ahead of time to succeed in fully remediating and eradicating the attacker from the environment.
During this webinar, we will discuss:
- How to best remediate from such an event;
- The different stages of the preparation, when it is the best time to remediate, and how to classify actions;
- Examples of real investigations and remediation efforts to illustrate common complications like remediating too early, remediating partially and working with third party IT providers
Join your host Manfred Erjak, Professional Services Consultant, for a 25-minute webinar to discuss the latest incident remediation trends.
Knowing which threats are trending right now—and which vectors criminals are using to attack you—is the key to optimizing and fine-tuning your security policies and solutions for effective protection.
Barracuda collects a vast flow of real-time information and uses big data analytics to crunch those numbers in order to deliver up to date, actionable insights. In this interactive live session with Brianna Fischer and Fleming Shi will discuss:
• Latest threats in cyber security
• Real world examples of using threat intelligence in defending against cyber attacks
• How to use threat intelligence to fine tune your security policies
• How to gain access to the information you need to stay ahead of the biggest cyber threats
Register to learn the fastest, easiest way to get the information you need to stay ahead of the biggest cyber threat trends.
As the scale and complexity of cyber attacks grows faster than ever, new ways must be explored to fight back.
Using machines to perform tasks such as malware analysis and real-time anomaly detection means a faster time to protection, frees up analyst time for more advanced research, and marks a big step forward in the battle against cyber crime.
This session discusses how you can leverage machine learning and other artificial intelligence techniques to enhance and extend your existing detection methods.
As systems evolved from physical servers to virtual machines to the public cloud to containers, the design focus shifted from building a single robust, stable component to building a more stable microservice oriented system where individual service components can be modified or replaced without affecting the overall system. Enterprises in this evolution cycle continue to have a mix of their applications running on physical hardware, virtualized platforms, in public cloud infrastructures and Kubernetes container clusters.
During this webinar, experts from AWS and Ixia, a Keysight business will share:
•Strategies to provide packet visibility to your workloads in any environment
•Insights into planning and implementing strategies
•Review emerging designs and best practices
You will also see a step-by-step demonstration of how you can establish packet visibility into your workloads in Physical, Virtual, Cloud, Container or in a Kubernetes Cluster by continuing to maximize on your existing investment in APM, NPM and IDS tools.
Learn how you can improve container troubleshooting and performance using next-gen monitoring techniques; why containers are the future of enterprise workloads; how real companies are adopting container technology; and what you’ll need to prepare yourself for containers in the datacenter or the cloud.
With a wide range of SD-WAN solutions from dozens of vendors, how do you determine what’s best for your business?
With the adoption of cloud, and support for rich media applications and mobile users, network managers are moving towards a software-defined approach to evolve their WAN, but selecting the right vendor and consumption model can be overwhelming.
This webinar provides a decision framework for developing your strategy and making the right choices for your business.
In this webinar, you will learn:
• The specific capabilities SD-WAN solutions should be delivering
• MPLS vs SD-WAN and the pros and cons of each
• How to navigate the SD-WAN vendor landscape
• The predominant SD-WAN consumption models, and the benefits and pitfalls of each
A reliable network is crucial to the delivery of applications. Digital transformation is driving enterprise IT to re-evaluate their application delivery capabilities to ensure that the business continues to grow and innovate while delivering the best possible experience to branch users. This talk examines the expectations of the WAN and how to use it to effectively deliver virtualized applications from a centralized location, as well as the trend of cloud migration of IT resources as it pertains to user experience and WAN cost reduction.
In this webinar you will learn how:
•Intelligent traffic-steering allows Internet and SaaS breakout from the branch
•To ensure secure, cost-effective access to traditional and modern applications from the branch
•Real-time application classification can help utilize WAN links efficiently
•To use SD-WAN to improve the HDX experience for branch users
Even with a renewed focus on security, cloud applications have introduced new risks that many organizations have yet to address. Powerful productivity platforms have been widely deployed in an effort to enable employee communication and facilitate collaboration. Apps enabling employee communication and collaboration cannot be secured with traditional firewalls and gateways. They require a fundamental rethinking of security – a shift from endpoint and network-centric protection to data protection. Join Bitglass and (ISC)2 on July 12, 2018 at 1:00PM Eastern as we explore the five most common security oversights that may put your cloud data at risk.
Think of Marie Curie. Would you expect to find a fascinating number of similarities between the Curie's treatment of their work in the early 1900's and today's tech industry? I certainly didn't…
Join Mandy Whaley to explore how the Curie's used an approach similar to modern Open Source licensing to open the process for isolating radium to the scientific community, and how the limitations at the time on the rights of women to own intellectual property influenced this decision.
Also, learn how Marie Curie also used a strategy similar to Kickstarter to raise funds to buy radium for her own research, and how all of these experiences and lessons can help us today.
Netrolix leverages artificial intelligence to analyze network data to improve throughput by making more intelligent routing decisions. AI-WAN combines Netrolix Software Defined Gateways (SDG) with the company’s Machine Learning controller technology that provides deep analysis of network routes to identify the least congested and fastest data path through the network.
The Software Defined Gateway (SDG) is a multifunction network appliance that can be deployed as a router, switch, firewall, or SD-WAN appliance.
This provides full SD-WAN capabilities with intelligent switching of data across IP, multiprotocol label switching (MPLS), virtual private LAN service (VPLS), and virtual private network (VPN) connections, or it can be deployed as a termination point for carrier services.
The Machine Learning controller platform analyzes real-time and historical information on network performance including data center locations, service provider tendencies, current congestion issues, time of day, and historical traffic patterns.
Lastly, the Security Shield enhances these capabilities through the creation of unique security profiles for each device, location, and network in an enterprise. The Machine Learning technology analyzes data from these devices to spot traffic anomalies that are consistent with malware or network attacks.
edgeSuite is a fully secure, system control plane that integrates your applications and data into SPoG (Single Pane of Glass) in a 4D solution. edgeSuite is unique in the marketplace because it incorporates the data within your environment, and the methods used to manage your business to create a single tool for both back-end and front-end solutions. When you are dealing with multiple data sets and multiple data sources, you are faced with the problem of complex navigation of different software solutions, and the inability to access them simultaneously in an efficient and effective way. Come to our webinar and learn how you can optimize your current Micro Focus investments. Seeing is believing!
What you will learn:
•How our ETV technology collects data for visualization and actionable response
•How our Click-to-Write-Back and Click-to-Navigate technologies streamline operations over your digital transformation suite
•How to create Role-Based views
•How a Single Pane of Glass solution is built
This webinar looks at how to eliminate complexity, increase efficiency of security tools, and improve confidence in the overall security posture of your organisation.
Adrian Rowley, Gigamon’s Technical Director for EMEA, will discuss todays challenges in network security and how these can be resolved.
Attendees will learn how you can:
•Maximise network availability and operational simplicity of security tool upgrades with its integrated inline bypass technology
•Deliver unmatched depth and breadth of traffic intelligence that is essential to increasing efficiency of overburdened security and networking tools, while decreasing complexity
•Minimise Total Cost of Ownership and increase ROI by an average of 153%
Join Adrian Rowley to see why only Gigamon provides a full solution for networking tools and inline and out-of-band security tools across on-premises, remote, virtual and cloud environments.
This webinar, jointly hosted by the TIA Fiber Optics Tech Consortium and the Association for Passive Optical LANs, will discuss Passive optical LANs (POL) technology, comparing POL and traditional Ethernet switching architectures, and reviewing the Telecommunications Industry Association (TIA) standards applicable to the design and testing of POL solutions to address considerations such as splitters, connectors and signals.
Artificial intelligence (AI) and machine learning are starting to transform the way content is created, managed and delivered.
New cognitive-computing tools are enhancing creativity, eliminating mundane repetitive work and unlocking new value from content.
AI is suddenly everywhere: the ready availability of powerful AI services from all the major cloud providers means hundreds of media technology products are plugging into AI and offering new ways of working.
This webinar cuts through the hype to reveal how media companies are actually using AI tools throughout the content supply chain - from aiding craft and creative work in post-production, automating metadata extraction and compliance, to making smart content recommendations to audiences. Our speakers will explain how best to use AI, what we can and can't do, and how it will continue to change workflows into the future.
Michael Gamböck, Senior Strategy Relations EMEA, Creative Cloud Video, Adobe
Josh Wiggins, Chief Commercial Officer, GrayMeta
Neil Taylor, Lead Data Strategist for Commercial Innovations, Channel 4
Jean-Pierre Evain, Principal Project Manager, EBU Artificial Intelligence Committee
You're charged with building a bulletproof, tier one secure network. If your Domain Name System (DNS) goes down, nothing else matters. And, DNS is the leading attack vector for cyber villains. Say “Hack no! ” to DNS threats.
Join guest speaker Tony Scott, former CIO of the United States, Microsoft, and the Walt Disney Company, alongside leading practitioners from Aflac and McAfee in this live panel discussion. This unique gathering of industry experts will discuss their perspectives on building a safe, secure network and actionable best practices in this era of cloud and mobile. Moderated by Infoblox Chief DNS Architect Cricket Liu, this discussion will give you an opportunity to hear from the experts and ask questions about.
- What leading organizations are doing to secure their DNS
- When to best utilize DNS data, network context, and threat intelligence in your security operations
- How to integrate DNS data with your security ecosystem to accelerate threat mitigation and remediation
- How Aflac blocked nearly 37 million threat connections with < 100 false positives
Join us and our strategic partner, Versa Networks, for a discussion on Managed SD WAN Security Branch solutions. Through real use cases in deployments at scale, we will discuss how Managed SD WAN can help increase bandwidth, agility and reliability - while maintaining security.
Построение программно-определяемого ЦОД на базе гиперконвергентных платформ Dell EMC и технологий VMware. Обзор решения Dell EMC VMware Validated Design.
Вебинар проводится при поддержке компании Intel®
Les évolutions technologiques, les nouvelles normes, l’augmentation constante du trafic, la complexité des infrastructures réseau au sein desquelles l’information est de moins en moins visible, ainsi que les cyber-menaces de plus en plus sophistiquées ont un impact majeur sur les entreprise et les obligent à repenser l’architecture de sécurité.
Yann Samama discutera des défis actuels en matière de sécurité et comment ils peuvent être surmontés en abordant les sujets majeurs tels que :
* Augmenter la disponibilité du réseau tout en simplifiant la connectivité des outils grâce à une solution de module bypass
* Disposer d’une visibilité en tout point réseau afin d’améliorer de l’efficacité de l’ensemble des outils connectés tout en réduisant la complexité de leur exploitation
* Diminuer les coûts OPEX et CAPEX via un ROI très court-termisme
Découvrez les raisons pour lesquelles Gigamon propose la solution la plus complète et efficace pour la connectivité des outils en mode « inline et Out of band » au sein des environnements physiques, virtuels et de cloud public.
DevOps methodologies have become extremely popular to enable agile application development and delivery.
Unfortunately, when it comes to the associated network connectivity, such as whenever a new application needs to connect to an external resource, the process breaks. The application developer then needs to open change requests and wait for approvals which effectively breaks the continuous delivery cycle. As a result security is in the uncomfortable position of being a bottleneck and an impediment to innovation.
In this webinar, Anner Kushnir, AlgoSec’s VP of Technology will describe how the innovative 'Connectivity as Code' approach can be implemented to overcome these challenges, and seamlessly weave network security into the existing CI/CD pipeline in order to fully automate the application delivery process end-to-end.
Attend this webinar to learn how to:
•Seamlessly manage network connectivity as part of the DevOps process for faster, more agile and problem-free application delivery
•Avoid external out-of-band network connectivity problems that require separate and manual handling
•Ensure continuous compliance and auditability throughout the application delivery process
•Get clearly documented application connectivity requirements which help prevent disruptions to the business
•Bridge the gap between application developers and network security throughout the entire application lifecycle
Consumers are no longer just observers in the world of signage; today they can engage in an enriched, interactive viewing experience.
However, to become digital, applications need a secure, reliable network solution, providing faster ROI and added value. When digital signage is connected to the Internet, it’s possible for businesses to gain real-time intelligence and respond to information quickly. Wireless connectivity lets the network move fast to adjust messages as frequently as necessary. Businesses can also manage a single wireless network — with devices connecting across the world — from a single, remote location. Additionally, keeping digital signage on its own wireless network, physically separate from the main network, strengthens cybersecurity by shrinking a company’s attack surface.
Digital signage solutions may encompass many features including:
- Industrial monitoring
- Ambiance for & customer experience
- Data analysis & delivery plans for assisted selling
- Product information
- Brand messaging & marketing
- Real-time intelligence & customer engagement
- Self-service applications
Digital signage can reach consumers in a way that print and static signage can only dream of, and the adoption of digital signage is only growing as cloud, mobile, and wearables become the norm. However, implementation of these applications will not be successful without a constant, secure network connection.
Join Cradlepoint for a live webinar on July 24, 2018, at 9:00 am PT to learn about trends and advancements in digital signage and how reliable connectivity and cloud management impact and enable deployments.
Michael Dickens is a Senior Solutions Engineer at Cradlepoint. Over his 8-year tenure at Cradlepoint, he has brought the company from a consumer based applications company to full robust enterprise solutions. In his previous careers, he worked on DoD networks, ISPs, data center management, and he attended Boise State University.
Are you worried about orchestrating your NFV/SDN network services and edge computing applications? The Linux Foundation Open Network Automation Platform (ONAP) promised to be a key component of next generation networks to orchestrate, configure, monitor and automatically manage complex services and applications. With the recent Beijing release, the ONAP community has fortified software stability, harmonized northbound APIs with standard bodies, improved ONAP deployment using Kubernetes, added important functional features and created two new projects. If you have not followed the release too closely, join us for this webinar and learn all about it. In this webinar, you will learn:
•What is ONAP?
•How can ONAP help you?
•What is new in the Beijing release?
•How can you get involved?
Cloud Native platforms such as Kubernetes and Cloud Foundry help developers to easily get started deploying and running their applications at scale. But as this access to compute starts to become ubiquitous, how you secure and maintain compliance standards in these environments becomes extremely important. In this talk we'll cover the basics of securing Cloud Native platforms such as Kubernetes. We will also cover open source tools - such as Anchore, and Sysdig Falco - that can be used to maintain secure computing environment. Attendees will leave with a good understanding of the challenges of securing a Cloud Native platform and practical advice on using open source tools as part of their security strategy.
Networking is in a constant state of change, but the with the advent of cloud and virtualization, the current evolution is altering the way we’ve traditionally understood it. The Virtual Cloud Network is about virtualization, connecting data centers and branches and cloud to each other in a seamless and flexible manner that supports this evolution for the next several decades. The lynchpin to this new architecture is SD-WAN, with its pervasive, scalable, and adaptable framework.
In this webinar, Zeus Kerravala of ZK Research, discusses how SD-WAN is transforming networking and enabling the adoption of Virtual Cloud Network to occur.
(ISC)2 will hold its Security Congress 2018 in New Orleans, LA, October 8th – 10th. This conference will bring together 2000+ attendees and over 100 educational sessions. One of the 13 tracks that are being offered with focus on Cloud Security and challenges practitioners face when dealing with all things cloud. On July 24, 2018 at 1:00PM Eastern, join (ISC)2 and several of the speakers who’ll be presenting in the Cloud track as we preview their sessions, get an idea of what will be discussed and discuss the state of cloud security today.
Are you ready for 802.11ax? This fast approaching IEEE standard addresses some of today’s biggest high density and performance challenges – increasing capacity by up to 4x; improving spectral efficiency to benefit both 2.4GHz and 5GHz bands in a variety of environments.
Today’s 802.11ac standard already presents many fantastic capabilities for capacity and performance. So if you’re reviewing your network, which is right for you: 11ac or 11ax? And what will be the benefits of upgrading from 11ac?
Join us for this 30 minute quick-hit, reviewing 11ax’s most important components:
• PHY and MAC layer enhancements for better traffic management
• Downlink & uplink OFDMA; 8 x 8 MU-MIMO; Spatial re-use
• Considerations for clients and wider network enhancements
If you are considering deploying SD-WAN in your network, you probably hear a lot about its benefits. But, you may be unsure what it will take to move from your legacy MPLS and VPN network to SD-WAN. What problems will you face and how will you tackle them?
In this live webinar, Join Yishay Yovel, vice president of marketing at Cato Networks, to learn:
- Key planning considerations when migrating to SD-WAN
- Availability and capacity guidance for augmenting or replacing MPLS services with Internet services
- The impact of SD-WAN deployment on security, global connectivity, WAN management
- When to launch and how to fund the SD-WAN project
A segmented network operationalizes your network security policy, enables a demonstrable state of continuous compliance, and provides mitigation options for cyberattacks.
Our advice: organizations must go back to the basics to accomplish this crucial project.
This webinar will cover actionable tips for network segmentation based on the experience of over 2,000 organizations. We will share:
•Common pitfalls to avoid
•How to start segmenting your network today
•Tips for applicable enforcement
•Q&A from the attendees
This webinar will describe the new features introduced in the most recent DPDK release, 18.05. It will also describe some of the features planned for the next release, 18.08, which is due in August.
Key features included in the 18.05 release include: changes to the memory subsystem to allow dynamic allocation of memory, creation of a new API to support hardware and software acceleration of compression, extension of the vhost-user library to support a hardware accelerated data path, support for crypto operations via virtio, and the addition of port representors which provide a generic framework for virtual function management in DPDK.
It is now possible to proactively verify large enterprise networks are error-free, end-to-end. Network verification makes it possible to certify updates before pushing them live, to avoid outages and accelerate change windows. Join Forward Networks Co-Founder Nikhil Handigol to learn how this new network analysis technology can greatly simplify network IT and ensure 100% policy compliance. Includes a live demo.
Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. Traditional approaches to network protection are going away as the concept of a secure perimeter disappear.
In this webcast we’ll look at today’s new business paradigm, the challenges we now face, along with best practices for building a secure network in the cloud.
Join Hugh Thompson, CTO of Symantec, and Mark Urban, VP Product Strategy & Operations, Symantec as they share their vision for Cloud Generation Network Security and how they see leading companies of all sizes prepare for the future.
In this session they’ll discuss:
•. A security insider’s view of market trends and the 24/7/365 demands of a distributed workforce
•. The increased complexity of managing full security stack with limited resources
•. The technical challenges of securing cloud applications
•. Cloud solutions that solve cloud problems
It promises to be an insightful event for all security, network and IT professionals. After their presentation the speakers will also take questions from the audience.
We highly encourage you to register and reserve your spot today.
Dieses Webinar befasst sich mit der Beseitigung von Komplexität, der Steigerung der Effizienz von Sicherheitstools und der Verbesserung des Vertrauens in die allgemeine Sicherheitslage Ihres Unternehmens.
Daniela Fusaro, Senior Solutions Architect, diskutiert die heutigen Herausforderungen im Bereich der Netzwerksicherheit und wie diese gelöst werden können.
Die Teilnehmer lernen, wie man:
* Netzwerkverfügbarkeit und einfache Handhabung der Upgrades von Sicherheitstools durch integrierte Inline-Bypass-Technologie maximiert
* Unerreichte Tiefe und Breite der Traffic-Intelligenz bereitstellt, die für die Steigerung der Effizienz überlasteter Sicherheits- und Netzwerktools unerlässlich ist, während gleichzeitig die Komplexität verringert wird
* Gesamtbetriebskosten verringert und den ROI um durchschnittlich 153 % steigert
Melden Sie sich bei Daniela Fusaro an, um zu erfahren, warum nur Gigamon eine Komplettlösung für Netzwerktools sowie Inline- und Out-of-Band-Sicherheitstools in lokalen, Remote-, virtuellen und Cloud-Umgebungen bietet.
To keep pace with digital transformation and the rapid changes it brings, modern IT infrastructures have become increasingly complex. However, this complexity often equals added risk. To succeed, businesses must reduce downtime—and ultimately help their stakeholders succeed.
If you are using the management and provisioning capabilities of Red Hat® Satellite, you may find additional benefit from adding Red Hat Insights to monitor your IT environment. Insights helps to reduce complexity by proactively identifying and remediating issues before business operations are affected.
In this short webinar, you'll learn:
> Why Red Hat Insights might be of interest to your team.
> How to quickly and easily get your team started with Red Hat Insights.
> How to use Red Hat Ansible® Automation to streamline large and small deployments.
> The answers to your question from Red Hat experts.
> Get proactive infrastructure management by viewing your entire Red Hat ecosystem from one Satellite dashboard—to quickly view risks to stability, security, availability, and performance and get clear, prioritized, and actionable remediation instructions.
Almost 5 years, 48,000+ github stars, and tens of thousand of production deployments later we can safely say containers are a technology that is a here to stay. Theyre developer friendly, easy to operationalize, and allow organizations to provide stable and secure services to their customers.
While there are clear best practices for what it takes to build and run containers, there isn't as much knowledge around the performing forensic analysis of incidents that occur inside your containers.
In this webinar we'll cover:
- How containers change incident response and forensics
- Best practices around forensic data collection in container environments
- Compare opensource and commercial forensics options
- A live demo of multiple forensics investigations using Sysdig Inspect: an opensource container forensics tool
This webcast will provide an architectural view of the NVMe over Fabrics, the different technology approaches, and best practices to consider when evaluating this technology. During this session, you’ll be provided with real-world use cases and examples as well as the benefits of NVMe for the following key areas:
-How to migrate services from standard SCSI based to NVMe-oF based
solutions using FC
-Detailed architectural analysis and benefits achieved by deploying NVMe-
oF via GbE.
-Tradeoffs and decision to utilize mixed mode FC and GbE deployments.
In addition to the presentation, there will be a brief demo of the Vexata
NVMe-oF solution presented to show how the system performs for high frequency, enterprise use cases.
With an ever-changing threat landscape, the need for skilled security experts who can address your real business risks is at an all-time high. IT organizations who do not have the budget to hire security experts, are looking for help to hunt and triage advanced attacks, weed out false-positives, and address cyber threats that truly matter to their business.
In this upcoming webinar, get key insights from Sam McLane, CTSO, at Arctic Wolf Networks (AWN), on the importance of having a Concierge Security Engineer(CSE) on your side, who can act as your trusted advisor for your IT team.
By attending, you will:
- Discover the role of a CSE in AWN's SOC-as-a-service offering
- Understand how a CSE-based service is different from other managed-SIEM/SOC services
- Explore real life examples of how a CSE tackles security issues proactively for our customers
About our speaker:
Sam McLane leads CTSO at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University. Sam holds a master of science in mathematics from Temple University and a bachelor of science in mathematics from Washington and Lee University.