Are you ready for 802.11ax? This fast approaching IEEE standard addresses some of today’s biggest high density and performance challenges – increasing capacity by up to 4x; improving spectral efficiency to benefit both 2.4GHz and 5GHz bands in a variety of environments.
Today’s 802.11ac standard already presents many fantastic capabilities for capacity and performance. So if you’re reviewing your network, which is right for you: 11ac or 11ax? And what will be the benefits of upgrading from 11ac?
Join us for this 30 minute quick-hit, reviewing 11ax’s most important components:
• PHY and MAC layer enhancements for better traffic management
• Downlink & uplink OFDMA; 8 x 8 MU-MIMO; Spatial re-use
• Considerations for clients and wider network enhancements
Intent Based Networking is a rapidly emerging analytics and automation capability for modern data center networks. Learn how the Forward Networks platform, a leading IBN solution, verifies network intent, i.e., is my network doing what we intend and aligned with all our policies. Customers can now reduce network outages and security risk, while gaining deeper analytical insight to network behavior than possible with traditional approaches.Read more >
This demo focuses on the Search capabilities in Forward Enterprise. Forward Networks builds a behaviorally accurate software model of an enterprise network and allows you to analyze network configurations and design. Learn how you can build an intent-based network starting with Forward Enterprise today. For more information: http://forwardnetworks.com/entepriseRead more >
Join us on November 8th, as ExtraHop, APCON, and Portland Community College (PCC) discuss the challenges PCC faced when trying to expand visibility and aggregate network traffic from multiple remote sites. The group will discuss how PCC was troubleshooting and managing their network in the past and how they’re now able to have visibility across multiple remote sites, access to instant dashboards, and the ability to go back in time to look at historical metrics -- all while staying within a tight budget.Read more >
Network administrators and engineers function as “human middleware” for their monitoring tools, according to Shamus McGillicuddy, Senior Analyst at EMA Research. Skilled humans still need to do much of the heavy lifting in terms of analyzing data.
That’s the problem holding back many network operations teams from achieving greater productivity. But there’s hope! EMA recently bestowed its Innovator’s Award on ExtraHop’s Addy machine learning offering for its ability to remove much of the burden from human operators. Join this webinar to learn how machine learning can help under-resourced network teams do more with less.
The advent of 5G mobile network technology is upon us, and implementation is quickly approaching.
For mobile network providers, vendors and enterprises, achieving a 5G version will require new technology innovations for scalability, efficiency and security. For consumers, it means a whole new wave of digital customer experience.
These next-generation networks will no doubt be in high demand for improving latency and bandwidth, but with more people connected than ever before, what are the potential security implications or concerns for both the enterprise and the consumer?
Join this expert panel moderated by Ahmed Banafa, Faculty member at SJSU & IoT Expert. He will be joined by expert panelists Lindsay Notwell, VP of 5G Strategy, Cradlepoint, Upkar Dhaliwal, System Architect, Future Wireless Technologies, and Mansoor Hanif, Director of Converged Networks and Innovation, BT.
A demonstration of Forward Enterprise Verify and Predict capabilities, part of the Forward Networks Intent Based Networking solution. Forward Networks verifies network configurations and data to ensure complete alignment with network and security policies and intent. For more information: http://forwardnetworks.com/enterpriseRead more >
In the new enterprise network reality, boundaries have blurred: the internet is central and out of your control. A modern approach to network analytics is now more important than ever. The good news is that it’s possible to get vastly better insights from network traffic data than ever before, due to the power of cloud and big data systems. The key is to link that network traffic data and show the benefit to the broader business. In this webinar guest speaker Forrester analyst Andre Kindness and Kentik Co-founder and CEO Avi Freedman will help you understand:
- The changes in enterprise networks that make modern network analytics a must-have
- Why it’s so important to combine network data with business context
- Examples of business intelligence driven by network data in IT organizations today
- How you can gain the business advantage that modern network analytics offers
Jim Meehan, Director of Solutions Engineering at Kentik, reviews using Kentik Detect for network peering analysis and planning purposes. This can be used by service providers, content source networks, and CDNs. Because Kentik Detect correlates flow data with other variables at full resolution, it gives organizations easily understood information to prioritize traffic for cost and performance.Read more >
How to win a battle against an army of cybercriminals, armed with inexpensive off-the shelf tools designed to create major disruption in your network and your customer’s operations?
The answer: Through a comprehensive approach that harnesses that same power – security automation, scalability, and collaboration across the broader security ecosystem.
In this webinar, you will learn:
• Why every minute counts in stopping malware from spreading
• Why leveraging comprehensive cloud-based threat intelligence is an essential and powerful element of securing next-generation service provider networks
• How to regain security operations efficiencies through a comprehensive platform that leverages integrated intelligence.
• How service providers can transform their network security posture to prevent next-generation attacks, enhance their brand, and secure their expansion into new revenue sources.
• Our new vision for shared security intelligence and seamless application integration
A breakthrough in network monitoring, Barefoot Deep Insight is first to provide the four ground truths for every packet in the network:
1. How did it get here? The sequence of switches the packet visited along its path.
2. Why is it here? The set of rules it matched upon at every switch along the way.
3. How long was it delayed? The time it spent buffered in every switch, to the nanosecond.
4. Why was it delayed? The packets, flows, and applications that the packet shared each queue with.
Armed with this information, Deep Insight detects almost any anomaly in the network.
This webinar will cover the concepts used and the technology behind Barefoot Deep Insight network monitoring and analytics system.
Automation. Everyone wants it, even if not every one can readily switch to it. Manual workflows are still quite common in today's networks and while Linux supports manual workflows, some traditional network operators find administering networks with the standard Linux network commands challenging.
With NCLU, Cumulus Linux makes manual workflows first class citizens in the network operator toolchain. Designed to please both Linux admins and traditional network operators, the primary goal of NCLU is to ease and simply the manual operation of networks.
Watch this webinar and learn:
- Why command line still matters, and what the characteristics of a good CLI look like
- How to simplify Linux network administration with NCLU
- How traditional network operators can start to reap the benefits of Linux networking
- Some everyday examples of network administration using NCLU
How do you balance protecting your company and keeping IT costs low? Join Verizon and Palo Alto Networks and learn about our new virtualized network security solution. This Security as a Service offering provides a best-in-class prevention-focused network platform in simplified service tiers. It offers subscribers flexible purchasing and service delivery models without sacrificing advanced threat protection.
Join this webinar to learn how to:
· Strengthen your network defenses while simplifying management.
· Get the security your network needs with flexible, cost-effective options.
· Give yourself time to focus on your business.
Additionally, we will explore Palo Alto Networks’ Security Lifecycle Review, a free tool that helps you understand the business and security risks your organization faces, providing an opportunity to review the findings and take action. The review looks into known and unknown threats and integrates existing Application Visibility Report data with WildFire™ cloud-based threat analysis service, SaaS-based application visibility, and more.
To serve their citizens, federal/national, state and local governments must gather, create, or process sensitive information. As various high-profile breaches have demonstrated, this data is not sufficiently protected, particularly from the insiders whose actions are responsible for the majority of public sector security incidents. Traditional network security focuses on detecting outsiders attempting to steal data or disrupt network operations, but does little to monitor or limit the actions of legitimate users that make mistakes or deliberately misuse data. User and directory controls verify legitimate users, but they won't prevent accidental disclosure of sensitive data, exfiltration of sensitive data by legitimate users, or insiders with stolen credentials from accessing data. Preventing security incidents and protecting government information requires a comprehensive, organization-wide access approach that can accommodate the context of individual users, the data they need access to, and the limits on what they can do with that data.
The Palo Alto Networks Next-Generation Security Platform prevents security incidents while fully enabling user productivity by granting access contextually to those who need it, and denying it to all others. This, coupled with denying all applications that are not needed by the organization, immediately reduces a government organization’s threat posture. Join us to learn more.
Simplified, cost-effective security delivered from the cloud is the groundbreaking path more and more organizations are taking – out of need, necessity, and convenience. Whatever your reason, these resources are designed to help you understand how you can move your organization’s networking and security from a state of complexity to a state of simplicity.Read more >
How will virtualization, cloud, mobility and IoT impact your legacy network and what’s the best strategy moving forward? Join networking consultant, Colin Murray from Dimension Data, as we discuss how SDN provides increased network management flexibility and eases implementation of fine-grained security policies.
Colin Murray, Principal Consultant at Dimension Data
Moderated by Justin Ong, Technical Advocacy Manager at Spiceworks
IT organizations are rapidly moving towards more efficient Opex models that incorporate the Cloud and game changing approaches like Software Defined Networking. What is the role of traditional Network Management in the presence of SDN and ‘Network-as-a-Service’ solutions for the Enterprise that are driven from the Cloud? Join Paul Congdon, CTO of Tallac Networks, for a discussion on the future role of Network Management in modern Enterprise campus networks.Read more >
A site reliability team investigates why they were blacklisted from a Google API. Misconfig? DDoS? Turns out it was an accident caused by the team's engineering interns, who wrote a bad script. Another team quickly located and eradicated spambots lurking in their infrastructure cloud -- after months of the bots evading basic detection methods. How did these teams make these discoveries? Flow data.
Flow data is now often paired with many other data sets, including BGP, geolocation, and business metadata, for network and security intelligence. The availability of open source and commercial big data technology and scale-out computing clusters makes it possible to realize the value that flow data has always promised, but never delivered in the past -- with use cases across sophisticated, accurate, and useful anomaly detection and alerting, as well as ad-hoc, exploratory analyses. In this webinar, Kentik's Jim Meehan, head of product marketing, will discuss real-world examples of network performance, anomaly detection, and forensic mysteries that were quickly solved via flow data. He will also cover current best practices for leveraging flow data.
As the volume and diversity of mobile devices on your network continue to rise, so does the need to ensure that every device is safe. Cybercriminals leverage vulnerable endpoints as backdoors to the network and according to Gartner "by 2017, the focus of mobile breaches will shift to tablets and smartphones from workstations."
As the attack surface of your network continues to multiply with each new device, network access control is essential to securing your assets and critical infrastructure.
Attend this webinar to get a complete understanding of NAC functionality and how you can leverage visibility, policies, and automation to secure the critical edge of your network, including:
- Safe Onboarding – Allow users to self-register their devices securely, to reduce the burden on IT Staff
- Device Profiling – Identifies and classifies every device on the network to provide greater visibility
- Endpoint Compliance – Ensure every device is safe enough to join the network, to reduce risk
- Network Automation – Dynamically provision network access based on policies that leverage user, device, and location
- Security Automation – Capture and automatically execute complex investigative workflows that are time consuming and error prone
- Rapid Threat Response – Dramatically reduce the time required to contain compromised or infected devices
Join Cumulus Networks & Mesosphere to learn the drivers behind the growth of containers in data centers of all sizes. We'll explore the top uses for containerized operations and discuss the implications on the network.
In this presentation you will learn:
• Ways that you can use new network softwares to maximize visibility and connectivity within your container environments.
• How to improve reliability and simplify operations in the cloud.
• Free tools available to you to test and monitoring and managing containerized networks
How do network operations teams at leading web companies like Pandora maintain the highest possible user experience? By relying on Kentik's big data analytics to gain insight, drive automation and deliver performance.Read more >
Join Cumulus Networks and guest speaker Andre Kindness from Forrester as we explore the latest technology shifts in data centers today. As cloud, containers, microservices and other technologies become more and more mainstream, software must be architected in new ways to address these smaller components.
All of this is impacting the the data center network, and we will talk through some of the ways that organizations can address the changes in the ever more complex data center. If you are an I&O professional, watch this webinar to see how you can simplify deployment and maintenance in the modern data center.
Unless you’ve been under a rock, you know that breaches continue to occur at an alarming rate. Despite massive investments in security technology, today’s organizations remain challenged to protect their infrastructure against the most advanced threats.
The pendulum continues to swing in a cyber war between hackers and those defending critical systems. What’s the common denominator? The Network. While it’s exploited by attackers to perform reconnaissance, compromise systems and exfiltrate data, it also provides a source of truth about malicious activity. This webinar will explore five key indicators that your network may have been breached and what you should expect to see from a network risk assessment.
The proliferation of IoT and agentless devices leaves IT security teams challenged with discovering these devices, monitoring their security posture and remediating threats. How can you achieve visibility and speed up the time from malware detection to remediation?
No longer can organisations rely on guarding their perimeter and trusting they know everyone and everything accessing their networks. Proactive threat prevention in today’s BYOD and IoT era requires continuous network access visibility and real-time intelligence. It also requires automatically applying context-aware security policies such as segmenting or quarantining devices and users without having to re-build networks or know the devices up front.
Webinar topics include:
- Network security trends and challenges, including the more destructive ransomware, wipers, etc.
- The importance of identifying and classifying managed and unmanaged devices
- Ways of limiting data breaches by detecting advanced threats and taking automated remediation actions
This webinar is jointly presented by Jon Wood, Systems Engineer, Palo Alto Networks®, and Rich Agar, Systems Engineer, ForeScout Technologies. It will provide you with an overview and applied use cases of the integration between Palo Alto Networks and ForeScout solutions.