Join us on November 8th, as ExtraHop, APCON, and Portland Community College (PCC) discuss the challenges PCC faced when trying to expand visibility and aggregate network traffic from multiple remote sites. The group will discuss how PCC was troubleshooting and managing their network in the past and how they’re now able to have visibility across multiple remote sites, access to instant dashboards, and the ability to go back in time to look at historical metrics -- all while staying within a tight budget.Read more >
Network administrators and engineers function as “human middleware” for their monitoring tools, according to Shamus McGillicuddy, Senior Analyst at EMA Research. Skilled humans still need to do much of the heavy lifting in terms of analyzing data.
That’s the problem holding back many network operations teams from achieving greater productivity. But there’s hope! EMA recently bestowed its Innovator’s Award on ExtraHop’s Addy machine learning offering for its ability to remove much of the burden from human operators. Join this webinar to learn how machine learning can help under-resourced network teams do more with less.
In the new enterprise network reality, boundaries have blurred: the internet is central and out of your control. A modern approach to network analytics is now more important than ever. The good news is that it’s possible to get vastly better insights from network traffic data than ever before, due to the power of cloud and big data systems. The key is to link that network traffic data and show the benefit to the broader business. In this webinar guest speaker Forrester analyst Andre Kindness and Kentik Co-founder and CEO Avi Freedman will help you understand:
- The changes in enterprise networks that make modern network analytics a must-have
- Why it’s so important to combine network data with business context
- Examples of business intelligence driven by network data in IT organizations today
- How you can gain the business advantage that modern network analytics offers
Jim Meehan, Director of Solutions Engineering at Kentik, reviews using Kentik Detect for network peering analysis and planning purposes. This can be used by service providers, content source networks, and CDNs. Because Kentik Detect correlates flow data with other variables at full resolution, it gives organizations easily understood information to prioritize traffic for cost and performance.Read more >
A breakthrough in network monitoring, Barefoot Deep Insight is first to provide the four ground truths for every packet in the network:
1. How did it get here? The sequence of switches the packet visited along its path.
2. Why is it here? The set of rules it matched upon at every switch along the way.
3. How long was it delayed? The time it spent buffered in every switch, to the nanosecond.
4. Why was it delayed? The packets, flows, and applications that the packet shared each queue with.
Armed with this information, Deep Insight detects almost any anomaly in the network.
This webinar will cover the concepts used and the technology behind Barefoot Deep Insight network monitoring and analytics system.
How to win a battle against an army of cybercriminals, armed with inexpensive off-the shelf tools designed to create major disruption in your network and your customer’s operations?
The answer: Through a comprehensive approach that harnesses that same power – security automation, scalability, and collaboration across the broader security ecosystem.
In this webinar, you will learn:
• Why every minute counts in stopping malware from spreading
• Why leveraging comprehensive cloud-based threat intelligence is an essential and powerful element of securing next-generation service provider networks
• How to regain security operations efficiencies through a comprehensive platform that leverages integrated intelligence.
• How service providers can transform their network security posture to prevent next-generation attacks, enhance their brand, and secure their expansion into new revenue sources.
• Our new vision for shared security intelligence and seamless application integration
Automation. Everyone wants it, even if not every one can readily switch to it. Manual workflows are still quite common in today's networks and while Linux supports manual workflows, some traditional network operators find administering networks with the standard Linux network commands challenging.
With NCLU, Cumulus Linux makes manual workflows first class citizens in the network operator toolchain. Designed to please both Linux admins and traditional network operators, the primary goal of NCLU is to ease and simply the manual operation of networks.
Watch this webinar and learn:
- Why command line still matters, and what the characteristics of a good CLI look like
- How to simplify Linux network administration with NCLU
- How traditional network operators can start to reap the benefits of Linux networking
- Some everyday examples of network administration using NCLU
How do you balance protecting your company and keeping IT costs low? Join Verizon and Palo Alto Networks and learn about our new virtualized network security solution. This Security as a Service offering provides a best-in-class prevention-focused network platform in simplified service tiers. It offers subscribers flexible purchasing and service delivery models without sacrificing advanced threat protection.
Join this webinar to learn how to:
· Strengthen your network defenses while simplifying management.
· Get the security your network needs with flexible, cost-effective options.
· Give yourself time to focus on your business.
Additionally, we will explore Palo Alto Networks’ Security Lifecycle Review, a free tool that helps you understand the business and security risks your organization faces, providing an opportunity to review the findings and take action. The review looks into known and unknown threats and integrates existing Application Visibility Report data with WildFire™ cloud-based threat analysis service, SaaS-based application visibility, and more.
To serve their citizens, federal/national, state and local governments must gather, create, or process sensitive information. As various high-profile breaches have demonstrated, this data is not sufficiently protected, particularly from the insiders whose actions are responsible for the majority of public sector security incidents. Traditional network security focuses on detecting outsiders attempting to steal data or disrupt network operations, but does little to monitor or limit the actions of legitimate users that make mistakes or deliberately misuse data. User and directory controls verify legitimate users, but they won't prevent accidental disclosure of sensitive data, exfiltration of sensitive data by legitimate users, or insiders with stolen credentials from accessing data. Preventing security incidents and protecting government information requires a comprehensive, organization-wide access approach that can accommodate the context of individual users, the data they need access to, and the limits on what they can do with that data.
The Palo Alto Networks Next-Generation Security Platform prevents security incidents while fully enabling user productivity by granting access contextually to those who need it, and denying it to all others. This, coupled with denying all applications that are not needed by the organization, immediately reduces a government organization’s threat posture. Join us to learn more.
Simplified, cost-effective security delivered from the cloud is the groundbreaking path more and more organizations are taking – out of need, necessity, and convenience. Whatever your reason, these resources are designed to help you understand how you can move your organization’s networking and security from a state of complexity to a state of simplicity.Read more >
IT organizations are rapidly moving towards more efficient Opex models that incorporate the Cloud and game changing approaches like Software Defined Networking. What is the role of traditional Network Management in the presence of SDN and ‘Network-as-a-Service’ solutions for the Enterprise that are driven from the Cloud? Join Paul Congdon, CTO of Tallac Networks, for a discussion on the future role of Network Management in modern Enterprise campus networks.Read more >
A site reliability team investigates why they were blacklisted from a Google API. Misconfig? DDoS? Turns out it was an accident caused by the team's engineering interns, who wrote a bad script. Another team quickly located and eradicated spambots lurking in their infrastructure cloud -- after months of the bots evading basic detection methods. How did these teams make these discoveries? Flow data.
Flow data is now often paired with many other data sets, including BGP, geolocation, and business metadata, for network and security intelligence. The availability of open source and commercial big data technology and scale-out computing clusters makes it possible to realize the value that flow data has always promised, but never delivered in the past -- with use cases across sophisticated, accurate, and useful anomaly detection and alerting, as well as ad-hoc, exploratory analyses. In this webinar, Kentik's Jim Meehan, head of product marketing, will discuss real-world examples of network performance, anomaly detection, and forensic mysteries that were quickly solved via flow data. He will also cover current best practices for leveraging flow data.
As the volume and diversity of mobile devices on your network continue to rise, so does the need to ensure that every device is safe. Cybercriminals leverage vulnerable endpoints as backdoors to the network and according to Gartner "by 2017, the focus of mobile breaches will shift to tablets and smartphones from workstations."
As the attack surface of your network continues to multiply with each new device, network access control is essential to securing your assets and critical infrastructure.
Attend this webinar to get a complete understanding of NAC functionality and how you can leverage visibility, policies, and automation to secure the critical edge of your network, including:
- Safe Onboarding – Allow users to self-register their devices securely, to reduce the burden on IT Staff
- Device Profiling – Identifies and classifies every device on the network to provide greater visibility
- Endpoint Compliance – Ensure every device is safe enough to join the network, to reduce risk
- Network Automation – Dynamically provision network access based on policies that leverage user, device, and location
- Security Automation – Capture and automatically execute complex investigative workflows that are time consuming and error prone
- Rapid Threat Response – Dramatically reduce the time required to contain compromised or infected devices
Join Cumulus Networks & Mesosphere to learn the drivers behind the growth of containers in data centers of all sizes. We'll explore the top uses for containerized operations and discuss the implications on the network.
In this presentation you will learn:
• Ways that you can use new network softwares to maximize visibility and connectivity within your container environments.
• How to improve reliability and simplify operations in the cloud.
• Free tools available to you to test and monitoring and managing containerized networks
How do network operations teams at leading web companies like Pandora maintain the highest possible user experience? By relying on Kentik's big data analytics to gain insight, drive automation and deliver performance.Read more >
Join Cumulus Networks and guest speaker Andre Kindness from Forrester as we explore the latest technology shifts in data centers today. As cloud, containers, microservices and other technologies become more and more mainstream, software must be architected in new ways to address these smaller components.
All of this is impacting the the data center network, and we will talk through some of the ways that organizations can address the changes in the ever more complex data center. If you are an I&O professional, watch this webinar to see how you can simplify deployment and maintenance in the modern data center.
Packet buffer memory is among the oldest topics in networking, and yet it never seems to fade in popularity. Starting from the days of buffers sized by the bandwidth delay product to what is now called "buffer bloat", from the days of 10Mbps to 100Gbps, the discussion around how deep should the buffers be never ceases to evoke opinionated responses.
In this webinar we are joined by JR Rivers, co-founder and CTO of Cumulus Networks, who has designed many ultra-successful switching chips, switch products, and compute platforms, to discuss the innards of buffering. This webinar will cover data path theory, tools to evaluate network data path behavior, and the configuration variations that affect application visible outcomes.
In episode 2 of our series on automating network configuration, we will dive deeper into the how-to's for managing an automated network in production. We'll walk you through the model of CI/CD (Continuous Integration / Continuous Delivery), including deploying changes with more confidence than you could before. We'll show you how Cumulus Linux simplifies much of automation thanks to simplifications and innovations in configuration from CLAG to Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP). Come prepared for a lively webinar with real-time demos and active audience participation.Read more >
Network automation may seem passe now; seemingly everyone knows how to do it. You want to join the ranks, but where to begin? And what does the journey look like? In this 2 part webinar, we'll go from soup to nuts on automation of network configuration, from downloading Ansible to doing continuous integration and continuous development with network operations. Along the way, we'll demonstrate how Cumulus Linux simplifies much of automation thanks to simplifications and innovations in configuration from CLAG (Chassis Link Aggregation) to OSPF (Open Shortest Path First) and BGP (Border Gateway Protocol).
Even if you think you know BGP unnumbered, come see how we've simplified it even further. We'll walk through configuring L2 networks, L3 networks, and VxLAN overlays.
Over the next several years, ESG sees organizations adopting a security operations and analytics platform architecture (SOAPA) that ties together best-of-breed cybersecurity tools. Wire data—full L2-L7 analytics—from network security analytics platforms will play a key role in these SOAPA portfolios because of its real-time nature and because every threat must necessarily traverse the network. This webinar will explain the SOAPA approach and how wire data fits, and will include use cases for integration and orchestration of wire data with other security tools such as SIEM platforms.Read more >
According to the latest Verizon Data Breach Investigations Report, 93% of compromises occur within minutes. Traditional security tools do not have the "shutter speed" to detect and remediate these threats fast enough. By analyzing network behavior on the wire as it happens, correlating it with threat intelligence, and then orchestrating remediation actions, organisations gain the capabilities needed to conduct "hand-to-hand" combat against cyber adversaries.Read more >
Join Tony Fortunato, Senior Network Performance Specialist with The Technology Firm for an hour of networking troubleshooting, tips and tricks.
Troubleshooting performance problems in today’s networks is only getting more complex. Last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.
Tony will be using the OptiView XG on a live network to show you how to do many baselines, tips and tricks that take 5 minutes or less of your time. We will covering topics such as; the value of SNMP, wireless, documentation, dependency analysis, packet capture and traffic generation. Tony will also take questions from the audience as well as review any emails or questions from the last session.
This session is informative for either the Network novice or the seasoned veteran.
Voice quality monitoring is essential for anyone, whether Service Provider or Enterprise, with voice deployed in their network. It is an indispensable capability – from either a business or operational viewpoint – in the network infrastructure, and is often costly and complex. VeloCloud VQM allows you to monitor, diagnose and proactively troubleshoot network issues before they impact business-critical voice communications.
This webinar discusses:
- The tangible benefits of the VeloCloud VQM solution
- Explains how VeloCloud integrates VQM with SD-WAN architecture
- Provides details on the licensing models to enable VeloCloud VQM in your network
- Diagnosing and solving your voice quality challenges with VeloCloud VQM