Hi [[ session.user.profile.firstName ]]
Sort by:
    • How to Make Network Analytics Useful for the Whole Business
      How to Make Network Analytics Useful for the Whole Business Kentik Co-founder & CEO Avi Freedman and Forrester Analyst Andre Kindness Upcoming: Oct 19 2017 5:30 pm UTC 60 mins
    • In the new enterprise network reality, boundaries have blurred: the internet is central and out of your control. A modern approach to network analytics is now more important than ever. The good news is that it’s possible to get vastly better insights from network traffic data than ever before, due to the power of cloud and big data systems. The key is to link that network traffic data and show the benefit to the broader business. In this webinar guest speaker Forrester analyst Andre Kindness and Kentik Co-founder and CEO Avi Freedman will help you understand:

      - The changes in enterprise networks that make modern network analytics a must-have
      - Why it’s so important to combine network data with business context
      - Examples of business intelligence driven by network data in IT organizations today
      - How you can gain the business advantage that modern network analytics offers

      Read more >
    • Network Command Line Utility: A command line to improve network automation
      Network Command Line Utility: A command line to improve network automation Dinesh Dutt, Cumulus Networks Chief Scientist Recorded: Apr 1 2017 5:15 pm UTC 79 mins
    • Automation. Everyone wants it, even if not every one can readily switch to it. Manual workflows are still quite common in today's networks and while Linux supports manual workflows, some traditional network operators find administering networks with the standard Linux network commands challenging.

      With NCLU, Cumulus Linux makes manual workflows first class citizens in the network operator toolchain. Designed to please both Linux admins and traditional network operators, the primary goal of NCLU is to ease and simply the manual operation of networks.

      Watch this webinar and learn:
      - Why command line still matters, and what the characteristics of a good CLI look like
      - How to simplify Linux network administration with NCLU
      - How traditional network operators can start to reap the benefits of Linux networking
      - Some everyday examples of network administration using NCLU

      Read more >
    • Virtualized Network Services: Cyber Security on Your Terms
      Virtualized Network Services: Cyber Security on Your Terms Marcelo Lima, Global Channel Sales - Technical Lead, Palo Alto Networks and Anuj Dutia, Product Marketing Director, Verizon Recorded: Nov 8 2016 5:00 pm UTC 56 mins
    • How do you balance protecting your company and keeping IT costs low? Join Verizon and Palo Alto Networks and learn about our new virtualized network security solution. This Security as a Service offering provides a best-in-class prevention-focused network platform in simplified service tiers. It offers subscribers flexible purchasing and service delivery models without sacrificing advanced threat protection.

      Join this webinar to learn how to:
      · Strengthen your network defenses while simplifying management.
      · Get the security your network needs with flexible, cost-effective options.
      · Give yourself time to focus on your business.

      Additionally, we will explore Palo Alto Networks’ Security Lifecycle Review, a free tool that helps you understand the business and security risks your organization faces, providing an opportunity to review the findings and take action. The review looks into known and unknown threats and integrates existing Application Visibility Report data with WildFire™ cloud-based threat analysis service, SaaS-based application visibility, and more.

      Read more >
    • The Advantages of User ID/Awareness in Public Sector Network Security
      The Advantages of User ID/Awareness in Public Sector Network Security Neil Mantle - Systems Engineer - Palo Alto Networks Recorded: Mar 21 2017 6:05 pm UTC 32 mins
    • To serve their citizens, federal/national, state and local governments must gather, create, or process sensitive information. As various high-profile breaches have demonstrated, this data is not sufficiently protected, particularly from the insiders whose actions are responsible for the majority of public sector security incidents. Traditional network security focuses on detecting outsiders attempting to steal data or disrupt network operations, but does little to monitor or limit the actions of legitimate users that make mistakes or deliberately misuse data. User and directory controls verify legitimate users, but they won't prevent accidental disclosure of sensitive data, exfiltration of sensitive data by legitimate users, or insiders with stolen credentials from accessing data. Preventing security incidents and protecting government information requires a comprehensive, organization-wide access approach that can accommodate the context of individual users, the data they need access to, and the limits on what they can do with that data.

      The Palo Alto Networks Next-Generation Security Platform prevents security incidents while fully enabling user productivity by granting access contextually to those who need it, and denying it to all others. This, coupled with denying all applications that are not needed by the organization, immediately reduces a government organization’s threat posture. Join us to learn more.

      Read more >
    • Network Access Control 101: Securing the Critical Edge of Your Network
      Network Access Control 101: Securing the Critical Edge of Your Network Tom Murphy, CMO, Bradford Networks Recorded: Oct 7 2014 3:00 pm UTC 31 mins
    • As the volume and diversity of mobile devices on your network continue to rise, so does the need to ensure that every device is safe. Cybercriminals leverage vulnerable endpoints as backdoors to the network and according to Gartner "by 2017, the focus of mobile breaches will shift to tablets and smartphones from workstations."

      As the attack surface of your network continues to multiply with each new device, network access control is essential to securing your assets and critical infrastructure.

      Attend this webinar to get a complete understanding of NAC functionality and how you can leverage visibility, policies, and automation to secure the critical edge of your network, including:

      - Safe Onboarding – Allow users to self-register their devices securely, to reduce the burden on IT Staff
      - Device Profiling – Identifies and classifies every device on the network to provide greater visibility
      - Endpoint Compliance – Ensure every device is safe enough to join the network, to reduce risk
      - Network Automation – Dynamically provision network access based on policies that leverage user, device, and location
      - Security Automation – Capture and automatically execute complex investigative workflows that are time consuming and error prone
      - Rapid Threat Response – Dramatically reduce the time required to contain compromised or infected devices

      Read more >
    • Packet Buffers: Best Practices for A Buff Network
      Packet Buffers: Best Practices for A Buff Network JR Rivers, Cumulus Networks Co-founder and CTO Recorded: May 14 2017 3:40 pm UTC 75 mins
    • Packet buffer memory is among the oldest topics in networking, and yet it never seems to fade in popularity. Starting from the days of buffers sized by the bandwidth delay product to what is now called "buffer bloat", from the days of 10Mbps to 100Gbps, the discussion around how deep should the buffers be never ceases to evoke opinionated responses.

      In this webinar we are joined by JR Rivers, co-founder and CTO of Cumulus Networks, who has designed many ultra-successful switching chips, switch products, and compute platforms, to discuss the innards of buffering. This webinar will cover data path theory, tools to evaluate network data path behavior, and the configuration variations that affect application visible outcomes.

      Read more >
    • Network Automation: Tools, Challenges and Solutions
      Network Automation: Tools, Challenges and Solutions Dinesh Dutt, Cumulus Networks Chief Scientist Recorded: Apr 12 2017 12:30 am UTC 88 mins
    • Network automation may seem passe now; seemingly everyone knows how to do it. You want to join the ranks, but where to begin? And what does the journey look like? In this 2 part webinar, we'll go from soup to nuts on automation of network configuration, from downloading Ansible to doing continuous integration and continuous development with network operations. Along the way, we'll demonstrate how Cumulus Linux simplifies much of automation thanks to simplifications and innovations in configuration from CLAG (Chassis Link Aggregation) to OSPF (Open Shortest Path First) and BGP (Border Gateway Protocol).

      Even if you think you know BGP unnumbered, come see how we've simplified it even further. We'll walk through configuring L2 networks, L3 networks, and VxLAN overlays.

      Read more >
    • How to Integrate your Software-Defined Network and Cloud Communications
      How to Integrate your Software-Defined Network and Cloud Communications Fan Gu, Sr. Product Manager, VeloCloud Networks Recorded: Mar 16 2017 5:00 pm UTC 24 mins
    • Voice quality monitoring is essential for anyone, whether Service Provider or Enterprise, with voice deployed in their network. It is an indispensable capability – from either a business or operational viewpoint – in the network infrastructure, and is often costly and complex. VeloCloud VQM allows you to monitor, diagnose and proactively troubleshoot network issues before they impact business-critical voice communications.

      This webinar discusses:

      - The tangible benefits of the VeloCloud VQM solution
      - Explains how VeloCloud integrates VQM with SD-WAN architecture
      - Provides details on the licensing models to enable VeloCloud VQM in your network
      - Diagnosing and solving your voice quality challenges with VeloCloud VQM

      Read more >
    • Debunking SD-WAN Myths for Effective Enterprise Network Transformation
      Debunking SD-WAN Myths for Effective Enterprise Network Transformation Joel Stradling, Research Director, Global Data, Peter Juffernholz, Associate VP Global Network Services, TATA Communications Recorded: Sep 28 2017 5:00 pm UTC 61 mins
    • Many enterprises are currently on a trajectory for virtualizing their network services. There is a clear evolution path emerging - one that is taking customers from their legacy IP and Ethernet VPNs towards Hybrid VPNs - whereby the Internet is increasingly taking traffic loads and must be business-grade, and then towards SDN/NFV.

      The next phase of the customer WAN journey is already underway for many enterprises. SD-WAN services are now available from a large variety of suppliers including telcos, systems integrators, platform developers, hardware vendors, cloud providers and software developers. The SD-WAN term has become a huge buzzword gleefully bandied about by many in technology, but what are the real underlying issues that enterprises must consider? How can enterprises guarantee a consistent customer experience for application and network performance across the distributed WAN locations?

      Join Joel Stradling - Global Data’s Research Director for Global Managed and Hosted IT Services, and Peter Juffernholz – Senior Network Executive from Tata Communications in a live webinar. Joel and Peter will examine the SD-WAN transformation customer journey to provide insights about what might be the right fit for your enterprise and to de-bunk marketing myths.

      Takeaways from this webcast:
      -Key reasons why enterprises are deploying SD-WAN
      -Debunking SD-WAN myths with our feet-on-the-ground reality check
      -How do you determine which SD-WAN model is right for your enterprise?
      -Technical and business considerations while evaluating managed SD-WAN providers
      -Deploying an SD-WAN in phases

      Read more >
    • How High-Performing IT Teams Tame Network Complexity
      How High-Performing IT Teams Tame Network Complexity Shamus McGillicuddy, Sr. Network Mgmt Analyst, Enterprise Management Assoc; Mark Towler, Sr. Product Marketing Manager Recorded: Jun 15 2016 6:00 pm UTC 41 mins
    • IT Teams are being overwhelmed by the increasing complexity of the networks they’re required to manage. Not only do they have too much to do, they paradoxically also have too many tools with which to try to do it! Yet there are a number of clear similarities found amongst the IT teams that are most productive and most effective. Ipswitch and Enterprise Management Associates both surveyed IT teams worldwide to find out how the best IT teams were able to cope.

      The webinar will present our findings and answer key questions such as:

      •What are the emerging challenges facing IT professionals?
      •How are these challenges impacting their business and their end-users?
      •How do the most productive IT teams address increasingly complex networks?
      •Why are additional management tools and outsourced management counterproductive?

      Data shows that increasing network complexity doesn’t have to degrade the effectiveness of IT teams or the businesses they support. Join this webinar to find out how the high-performing IT professionals manage this – and learn what not to do as well!

      This session will be presented by Shamus McGillicuddy, Senior Network Management Analyst for Enterprise Management Associates as well as Mark Towler, Senior Product Marketing Manager for Ipswitch.

      Read more >
    • Five Indicators Your Network May Have Been Breached
      Five Indicators Your Network May Have Been Breached Tony Thompson, General Manager, Threat Detection, SS8 Networks Recorded: Aug 10 2017 5:00 pm UTC 29 mins
    • Unless you’ve been under a rock, you know that breaches continue to occur at an alarming rate. Despite massive investments in security technology, today’s organizations remain challenged to protect their infrastructure against the most advanced threats.

      The pendulum continues to swing in a cyber war between hackers and those defending critical systems. What’s the common denominator? The Network. While it’s exploited by attackers to perform reconnaissance, compromise systems and exfiltrate data, it also provides a source of truth about malicious activity. This webinar will explore five key indicators that your network may have been breached and what you should expect to see from a network risk assessment.

      Read more >
    • The Role of Internal Network Traffic Analysis in Cybersecurity
      The Role of Internal Network Traffic Analysis in Cybersecurity Rob Westervelt, Research Manager, IDC Security + Arabella Hallawell, Sr. Director ADVT Product Marketing, Arbor Networks Recorded: Dec 8 2016 5:00 pm UTC 61 mins
    • This joint webinar between IDC and Arbor Networks will discuss how the threat landscape is rapidly evolving with financially motivated attackers, nation-states, and hacktivists out to disrupt business operations, steal data, or conduct corporate or cyberespionage.

      IDC analyst Rob Westervelt will examine an emerging category of solutions called Internal Network Traffic Analysis, which provide innovative approaches to attack detection and prevention. A comprehensive approach for data protection has network monitoring and traffic inspection at its core. Network traffic analysis is an essential element of most threat prevention and data protection strategies. He will explore why these solutions are a requirement and describes the most critical components necessary to identify and contain attacker movement before critical network resources and servers containing sensitive data are exposed.

      Arbor’s Arabella Hallawell, herself a former industry analyst with Gartner, will discuss the role of Arbor Networks solutions in addressing the challenges described above.

      Read more >