Hi [[ session.user.profile.firstName ]]

Monitoring in a Virtual Data Center

Over 70% of data centers are attacked each year. At the same time, up to 80% of the inter-VM ("east-west") traffic in a virtualized data center never reaches the physical network, where it can be monitored. This means that substantial part of your data center is hidden from you and a "blind spot" but could be visible and vulnerable to attackers. This webinar, "Monitoring in a Virtual Data Center" shows you how to gain visibility to protect yourself while optimizing network performance.
Recorded Dec 4 2014 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ixia and Corvil
Presentation preview: Monitoring in a Virtual Data Center

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • If You Can See It, You Can Protect It: Visibility & Cybersecurity Recorded: Feb 16 2017 61 mins
    Jeff Harris, Ixia -- Glenn Chagnot, Ixia -- Zeus Kerravala, ZK Research
    Where business security is concerned, IT needs to move with speed and without hesitation. Visibility can make all the difference.

    Join our experts from Ixia and ZK Research as they discuss the critical nature of unobstructed visibility in network security. Viewers will learn:

    · The building blocks of the Digital Enterprise and Digitization

    · Why the current state of IT Security is not scalable and how businesses are falling behind

    · How Visibility can tip the Security Scales in IT’s favor by exposing persistent threats and enabling the ability to “see” insider threats.
  • Testapedia + Ixia: Test and Measurement - Five Hot Buttons for 2017 Recorded: Feb 10 2017 64 mins
    Cory Tinkess
    2017 will be a year of significant change for many operators. Efforts to virtualize network functions and increase levels of automation; projects to upgrade fixed and mobile networks with new access technologies; and the need to manage evolving types and patterns of traffic will all leading to significant infrastructure upheaval. Against this backdrop, operators still need to ensure customers are getting what they pay for, which means their test and measurement activities need to alter too. Meanwhile, the T&M industry itself is being subjected to some of these changes: for instance, replacement of hardware probes with virtual probes, and the automation of test procedures.

    This on-demand webinar will look at hot themes in test and measurement in the coming year, and what these will mean for operators.
  • Real Life Threat Reduction Recorded: Feb 9 2017 52 mins
    Scott Register
    We have all seen the headlines about major data breaches at Yahoo, the Veterans Administration, Target, Anthem, and more, but have you ever stopped to think—those companies all had firewalls, IPS, SIEMs, and security pros on staff… how did the attacks get through? With Ixia’s ThreatARMOR, you can make your firewall and security team more efficient and effective.
  • Ixia and Mentor Graphics Networking Webinar Recorded: Feb 9 2017 34 mins
    Ron Squiers and Aniket Khosla
    The integration between Mentor Graphics and IXIA offers networking customers the ability to seamlessly integrate an IXIA virtual environment into an emulation-based verification flow, bringing the powerful advantages of emulation to the lab environment. This allows the reuse of traffic flow generation scripts for greater efficiency and improved debug, faster time-to-market, and gives design teams the ability to de-risk the challenges of complex chip designs.
  • Testapedia: Test in the Era of Vitualization Recorded: Feb 9 2017 62 mins
    Pierra Lynch, Ricardo Torres, Alistair Scott, Mats Nordlund
    Communications networks are being virtualized because virtualization provides remarkable benefits. Virtualization complicates operations, however. The responsibility for dealing with many of those complications falls on test & measurement companies.

    Even some of the network operators who are virtualizing as quickly as technology allows have not anticipated some of these issues. In this one-hour discussion, four leading T&M companies will not only identify the hidden pitfalls of virtualization, but talk about some of the best ways to side-step them. Industry collaboration is key to developing NFV testing and validation techniques that provide carriers with the assurance needed to move virtualization technologies from the lab to production. The importance of active, software-based test and service assurance becomes even greater as operators must ensure that their services are delivered right the first time and any issues can be detected in real-time in an end-to-end manner. Automation will be a key enabler of service agility. And at the end of the day -- or more accurately, at the edge of a virtualized network -- signal integrity will remain critical.
  • The 4 Keys to Improving Security Threat Detection Recorded: Feb 9 2017 58 mins
    Jason Landry, Dario David, and Greg Copeland
    You can't have network security monitoring without visibility to network data. You can't have visibility without context or you risk overwhelming security tools with irrelevant traffic. You can't add context to data without the performance to apply it at line rate. And you can't have performance without resilience to protect security tools and paths.

    In this webinar, we will show how to combine the four keys to improving security threat detection into a Security Fabric to deliver greater context and intelligent distribution to monitored traffic. You will learn how to create actionable threat intelligence specific to your organization and increase the value of your existing security tool infrastructure.
  • 2016 Cloud Megacast Recorded: Jan 4 2017 33 mins
    Christophe Olivier
    What if you could learn about the various cloud models and also gain insight into some of the leading products in each of those models? That’s exactly what you’ll get with the 2016 ActualTech Media Cloud MegaCast

    This is your unique opportunity to learn about:

    -What’s happening in across the cloud spectrum

    -Solutions to some of your most complex data center issues

    -Seven leading vendors how they’re driving positive outcomes for their customers.
  • Tap More. Worry Less Recorded: Dec 15 2016 37 mins
    Jonathan Petkevich
    Today’s networks are increasingly powerful and diverse but can suffer from significant blind spots making them difficult to audit and verify traffic. All too often, seemingly inexpensive solutions end up being unreliable or costly to deploy, or they do not scale as the organization grows.

    Watch this webcast to learn:

    • How Ixia Taps ensure compliance and security

    • Why quality matters

    • The breadth of the Ixia tap lineup
  • Build Resilient Security Right into your Network Recorded: Dec 1 2016 61 mins
    Lora O'Haver and Jason Landry
    You need 100% data access and visibility, and the intelligence to evaluate vast volumes of network traffic, without slowing or disrupting your network. A resilient security fabric does all this and helps scale your security infrastructure as needs change.
  • Resilient Security Monitoring: One Step at a Time Recorded: Dec 1 2016 52 mins
    Lora O'Haver and Jonathan Petkevich
    Your security architecture was designed to protect your business, but does it have the resiliency to deliver results in the event something doesn’t go as planned? Resiliency is attainable – even on a budget – when you take it step by step.
  • Leverage Ease of Use in Securing your Network Recorded: Nov 30 2016 51 mins
    Taran Singh, Director of Product Management
    Learn how to easily manage and secure networks and establish the fundamentals to grow a competitive advantage with security investment.
  • Three Crucial Concepts for Network Packet Broker Performance Recorded: Nov 30 2016 48 mins
    Taran Singh, Director of Product Management
    Network packet brokers (NPBs) that can inspect data without dropping a single packet are vital to extending the lifetime of slower application monitoring and security tools.
  • 6 Ways Network Visibility can Optimize your Network Recorded: Oct 31 2016 58 mins
    Keith Bromley, Paul Egitto, and Ben Cowan
    How to optimze your network and fifteen examples solution sets.
  • Five Ways to Maximize the Value of Security and Monitoring Tools Recorded: Sep 19 2016 56 mins
    Lora O'Haver and Keith Bromley
    Webinar on extending the life of security and monitoring tools.
  • Ixia Security MegaCast Recorded: Sep 13 2016 31 mins
    Scott Register
    A video presenting the solutions Ixia can offer in Network Security
  • Upgrading your Firewall? It's Time for an Inline Security Fabric Recorded: Aug 12 2016 29 mins
    Lora O'Haver and Roark Pollock
    Increase the Return on your Next Gen Firewall in 2016 and Beyond
  • Evaluating Inline Security Fabric Solutions Recorded: Aug 4 2016 30 mins
    Lora O'Haver and Jeff Harris
    Learn the key aspects of a high-performing security fabric—one that protects network availability and increases the inspection of traffic.
  • The Next Big Thing in Security Recorded: Dec 9 2015 55 mins
    Kushar Perera, Senior Product Manager, DNA and Peter Bahas, Senior Systems Engineer, Ixia
    - What challenges exist around operationalizing security protection
    - How to boost the performance of customers’ security investments while lowering overhead
    - How to minimize your exposure to the Internet Threat Landscape
  • What's on Tap Recorded: Dec 2 2015 60 mins
    Jason Landry (Ixia Sr. Manager, Solutions Marketing), Jonathan Petkevich (Product Mgr) and Rich Higgins (Master Cicerone)
    Discover some network monitoring tool tap varieties, then stay for some beer varieties! In the first half of this event, we will show you the different types of network taps along with some details on how they work, when to use them, and what varieties they come in. For the second half, Master Cicerone Rich Higgins will explore the who, what, where, why, and how of what is poured from a beer tap—including beer styles, regions, seasons, and much more.
  • Are Network Operations Teams Missing Out On Application Intelligence? Recorded: Jul 22 2015 37 mins
    Scott Register, Senior Director, Product Management - Ixia
    As enterprise network bandwidth explodes, security threats become more persistent and subtle. Corporate revenue depends on application delivery, and deep network visibility becomes indispensable. The challenge is delivering actionable insight without enormous tool expenditure. Join us to learn how you can gain rapid, meaningful network visibility through Ixia’s application intelligence solution.

    In this live session you will learn:
    • How to isolate issues using L2-7 filtering and Netflow
    • How to deal with the increase in encrypted traffic
    • How Ixia can help you reduce expense and use your tools more effectively

    Register now to reserve your spot.
Ixia makes hardware, software and system applications run stronger
Ixia provides the tools and capabilities organizations can use to test, visualize and secure their networks so their applications run stronger.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Monitoring in a Virtual Data Center
  • Live at: Dec 4 2014 8:25 pm
  • Presented by: Ixia and Corvil
  • From:
Your email has been sent.
or close