More people in the UK shop online that in any other country. This is driving significant changes in the types and volumes of network traffic. In this webinar Mike will discuss trends in retail and ecommerce that are shaping the way we consume online services.Read more >
Interested in learning how to leverage your F5 Local Traffic Manager (LTM) to balance application traffic within a Rackspace Private Cloud environment? Come learn some load balancing fundamentals as well as basic F5 tasks such as creating pools and virtual servers. Advanced topics such as session persistence and SSL offloading with also be covered. This session lays the groundwork for more advanced F5 LTM usage in the future.
Register now to reserve your spot and to submit questions during the event.
Rackspace Private Cloud Network Archtiect – An IT professional for over 14 years with extensive experience in application networking technologies and OpenStack networking., James now specializes in OpenStack for Rackspace in San Antonio, Texas, and is a Network Architect for the Rackspace Private Cloud team. James recently published a book “Learning OpenStack Networking (Neutron)” available on Amazon here: http://bit.ly/learnOSNeutron
Find out how traffic managers help manage your website in the same way call management systems help your customer service reps.Read more >
Traffic Analysis got you down? Netflow and IPFIX protocols can assist in troubleshooting network performance issues and utilization levels while increasing productivity for enterprises and service providers. Come listen to the options provided by Dell SonicWALL to perform traffic analysis and reporting using Netflow and IPFIX in your environment.Read more >
KEMP’s Virtual LoadMaster™ (VLM) for Azure has quickly grown to become the leading 3rd party load balancing and traffic management solution in the Azure Marketplace. Join us to understand the specific applications, deployment use cases and functionality that are driving demand.Read more >
Combating Advanced Cyber-threats grows more challenging every day. Cyber criminals are cloaking their attacks within Secure Sockets Layer (SSL) traffic, knowing very well that perimeter security devices are blind to their exploits.
Despite solving the dilemma that all of your network security devices can have the ability to scrutinize SSL traffic with the right tools in place, the issue of maintaining user privacy is the next concern. How can you inspect SSL traffic for threats while maintaining the privacy of employee online banking, healthcare, and shopping transactions?
Increased SSL usage causes new headaches for IT security. Monitoring and enforcing compliance with internal and external standards for acceptable use of SSL encryption is difficult at best and needs to be able to look at ALL SSL traffic, not just port 443. Implementation of weak encryption keys and sub-par cipher suites often give organizations a false sense of security.
This workshop will provid Decision Makers and Security Practitioners with the knowledge to equip existing security devices to inspect SSL traffic and maintain high performance capabilities, while maintaining user privacy and enforcing SSL-usage standards, with a common criteria certified device.
Don’t miss this opportunity to learn more.
Join LinkedIn-approved speaker and SMB consultant Sandy Jones-Kaminski of Bella Domain Media to get her top 10 tips for boosting your brand, generating leads and driving traffic to your site by maximizing LinkedIn in less than an hour a week.Read more >
This webinar will give you hands-on experience of an SDN Network based on Open vSwitches (OVS), managed both manually as well as by an OpenDaylight (ODL) controller. Using the right quality assessment methodologies and tools is necessary in order to understand how the network performs, as well as to deliver expected service quality.
The webinar will show live data plane tests to gain insight into how traffic flows are handled by the SDN network.
This interactive webinar will explore the inevitable explosion of mobile data traffic in the MEA region, providing a forum for MEA carriers to discuss strategies to overcome this new challenge through network bandwidth optimisation. Find out how to reduce your network traffic management cost by 50% through accurate self-optimising solutions, and minimise your CAPEX when increasing network capacity through effective forecasting of subscriber network usage and requirements.Read more >
The vast majority of cyber-attacks on business begin with a phishing email, tailored to deceive an unsuspecting employee into clicking on a link or attachment containing malware. Do you have a strategy to defend against these attacks? Does it involve stopping malware before it enters your network? In this webcast, we’ll discuss how advanced malware detection technologies can detect and eliminate advanced malware in-line with traffic, before it has a chance to deliver its payload and attempt to steal your sensitive information.
In this webinar:
• You will learn about the multiple infiltration mechanisms used by cybercriminals in phishing attacks
• You will see how advanced malware detection engines can detect these attacks
• You will walk away with an understanding of how advanced malware detection technologies fit into a connected security infrastructure
Don’t miss this webcast if you are responsible for the security of your organization’s sensitive information. We will cover the latest in advanced malware detection for a critical element of your security practice – email traffic – and how this technology fits into the larger picture of defence against malware.
The conversion game has changed: multiple channels, multiple devices, and a realm of customer data have altered the landscape far past conversion optimization. Join Fanplayr and 3Q Digital in a free webinar that will cover how to drive quality traffic to your site and how to shift your strategies to hit today's consumers with the exact right offer at the exact right time. Bring questions!Read more >
Thanks to the seemingly insatiable appetite for data on the move, mobile data traffic is expected to continue growing at a phenomenal rate into the foreseeable future. Besides the volume of data flowing through wireless networks, the number of connected devices is also expected to explode as a result of growth in machine-to-machine (M2M) deployments. As such, mobile data clearly needs to be proactively managed in order to keep CAPEX and OPEX under control, ensure fair use of network resources, guarantee quality of service (QoS), and enable operators to monetize their infrastructure investments. The introduction of VoLTE, conversational video, and other such QoS-sensitive services makes this all the more critical. Certain key mechanisms such as policy and charging control (PCC) and deep packet inspection (DPI) can be employed to manage and monetize mobile data. These techniques should work flawlessly within a live network in order to meet the above-mentioned objectives, with comprehensive lab testing being the only way to ensure such cohesion.
This webinar will focus on the following topics and more:
• Lab testing of wireless networks and elements from a mobile data management and monetization perspective
• The growing significance of PCC and DPI in next-generation wireless networks
• Various test scenarios spanning aspects, including guaranteed bit rate (GBR) and maximum bit rate (MBR) enforcement, charging and dynamic policy updates
Application aware network performance management enables IT admins to get a holistic view of their network and application infrastructure. In this webinar, you will learn the basics of AANPM and see how it can solve your network issues, while saving costs.Read more >