Hi [[ session.user.profile.firstName ]]

High-Performing 5G Telco Clouds - Optimize Virtualized Infrastructure

Service providers are migrating to 5G networks where Network Function Virtualization (NFV) and containerization are key building blocks of their telco cloud architecture. This requires integration of complex hardware and software solutions from diverse vendors, and the performance of the complete system is only as good as the weakest link. This means it is critical to dimension and configure the NFV infrustructure (NFVI) properly to scale and sustain these high-performance workloads. The NFVI must achieve the often competing goals of scalability, performance, and reliability, requiring a new, rigorous, and repeatable methodology to test the virtualized infrastructure. This methodology should assess compute, network, storage, and orchestrator performance to help service providers perform vendor selection, optimize their virtualized infrastructures, and identify performance bottlenecks. Keysight Cloud Peak is a software application that implements such methodologies in an easy-to-use framework. In this webinar we will discuss these challenges, how Cloud Peak provides comprehensive methodologies to address them, and review actual test results that compare NFVI solutions from different vendors.
Recorded Sep 29 2020 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Vlad Laslau, Senior Technical Product Manager, Keysight Technologies. Bill Queen, Director of Business Development, Keysight
Presentation preview: High-Performing 5G Telco Clouds - Optimize Virtualized Infrastructure

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Realize the Promise of Next Generation SD-WAN with Edgeless Testing Nov 12 2020 6:00 pm UTC 60 mins
    Keysight Technologies Product Management Panelists: Sashi Jeyaretnam and Amritam Putatunda
    Modern SD-WANs promise seamless connectivity, multi-cloud access, high performance, improved security, and lower cost. While transitioning to SD-WAN seems like an obvious strategy, if not done right, can bring more problems than benefits.

    Although enterprises are fast to implement next-generation software-defined wide-area network (SD-WAN) deployments, many come with challenges like tunnel flaps, performance drops, latency spikes, and inconsistent quality of experience (QoE) and security. These factors are amplified by the highly dynamic, unpredictable conditions introduced by public cloud providers, service provider connectivity, and other third-party elements that enable these geographically distributed environments.

    Join our webinar to learn about unique challenges faced by organizations building and deploying SD-WAN technologies and best test practices for a successful outcome. We will employ Keysight’s CyPerf distributed, elastic test solution to examine edgeless test methodologies that provide insights into end user QoE, security posture, and performance bottlenecks of networks connected through SD-WAN in pre- and post-deployment scenarios.
  • OT & ICS Cybersecurity - Bridging the gap between OT and IT Oct 29 2020 4:00 pm UTC 29 mins
    Eric Floyd – Director of Business Development Mayra Salman – Senior Manager, Product Management
    Digital transformation and Industry 4.0 bring a myriad of industrial devices and processes online for the first time. Complex ICS, OT, and SCADA networks must efficiently and quickly deliver critical control data to devices and applications. Cyber defenses must extend to these new locations and technologies. Several prominent attacks have already taken place in industrial sectors and regulatory authorities are now increasing compliance requirements for Critical Infrastructure Protection.

    Join this session and hear how to gain real-time visibility across Industrial Control System (ICS) environments to detect complex threats that appear suddenly or develop over time. You will learn how to: 

    -gain visibility of industrial devices for the first time 
    -accelerate response time across ICS environments 
    -improve operational technology (OT) uptime and efficiency
  • Go Hack Yourself – The Leap to Proactive Cybersecurity Oct 28 2020 4:00 pm UTC 23 mins
    Steve McGregory, Senior Director, Keysight Technologies
    Effective cybersecurity defense requires continuous, seamless interaction between SecOps teams and their supporting technology. We often deploy products and technologies in an attempt to block and identify threats, but experience (and headlines) shows us this is often ineffective – so we deploy new products in an eternal game of catch-up. But the problem is often not that our products, processes and people are deficient; it’s that products are not correctly configured and deployed, and we’re not aware of configuration and process gaps until we’re tracking down a breach.  

    But it doesn’t have to be this way – by clever use of threat intelligence, we can get ahead of threats by continuously attacking our own networks and finding problems before they can be exploited. 

    As a SecOps practitioner, you constantly ask yourself the following questions:

    -Am I getting a good return on my cybersecurity investments? 
    -Am I safer today than I was a week, month, or year ago? 
    -What’s my highest priority, today, to fix or improve? 

    These are the right questions to ask, and you’d probably sleep much better if you could answer them with confidence! 
     
    Join us for a discussion on how Keysight can help you answer these questions and get in front of emerging threats, continuously measuring and improving your cybersecurity posture.
  • Consolidating SOC/NOC Tools for Greater Security & Efficiency Recorded: Oct 23 2020 31 mins
    Experts from Keysight Technologies and ExtraHop
    Security operations and network operations often need the same data for their investigations and troubleshooting, but end up using different tools and technology, leading to tool bloat and excess spending and operational friction. As cyber threats grow more sophisticated and IT budgets and staffs are squeezed and stretched thin, it grows more important to consolidate tools, leverage shared data and technology, and get the maximum value from every expenditure.  

    In this session, we'll describe how the combined solution of Keysight and ExtraHop Reveal(x) provides complete visibility and real time network detection and response (NDR) to detect stealthy security threats and enable rapid application troubleshooting from a single, simple interface.
  • Going on the Offensive: Protecting Your Network with Threat Intelligence Recorded: Oct 22 2020 28 mins
    Scott Register, VP of Security Solutions, Keysight
    You can’t manage what you can’t measure, and until now, it has been hard to measure how effective your cybersecurity efforts really are.  In your highly dynamic business environment, a single change or misconfiguration can expose your company and its assets to hackers. A new class of breach defense tools helps SecOps teams continuously assess and test network security.  

    Keysight’s Network Threat Simulator helps organizations effectively test and measure security on live production networks. Beyond simply identifying security gaps, the Keysight Network Threat Simulator instructs you how to close those gaps, step by step. Join us to learn how you can get more from the security infrastructure you already have.
  • See It to Secure It: The Hidden Fundamentals of Security Recorded: Oct 21 2020 28 mins
    Recep Ozdag, VP and GM, Keysight Technologies
    You can't secure what you can't see. That's why it is imperative to have a network visibility platform that provides 100% data access to traffic flowing on any network segment--physical, virtual, or cloud--at any speed. Keysight’s powerful packet processing engine pinpoints exactly the right traffic using context-awareness derived from packet details and delivers it to your security solutions at high speed. 

    During this session we will discuss the fundamentals to gain visibility into your network and how our solutions have helped the world’s largest government, healthcare, financial, and utilities organizations boost application performance,  improve incident response time, and reduce security threats.
  • Panel Session: Data Driven Visibility to Improve Security Recorded: Oct 20 2020 58 mins
    Experts from Keysight, ExtraHop and Nozomi
    For decades of near-limitless budgets and unsatisfactory results, the time has come for both security and business leaders to recognize that their approach to cybersecurity is not working. Join this interactive session security experts from Keysight, ExtraHop, and Nozomi will discuss how better visibility into your network data can improve security.  

    During this session the panelist will cover:  

    -Best practices to accelerate your incident response and breach detection  
    -How do you go beyond detection and response to build a proactive security strategy  
    -Optimize network security in today's environments with the increase of WFH users
  • Finding Evil Wherever It Lurks - Detect and Investigate Threats with FireEye Recorded: Oct 13 2020 30 mins
    Allison Wong, Principal Cloud, Solution Architect FireEye
    New cyberattacks appear every day and defenders need to stay a step ahead. If protecting your network, hybrid clouds, and business operations feels like a race against time, attend this timely session to learn new strategies used by the world’s leading security experts.

    Experts from FireEye and Ixia will explore the power of advanced network visibility in detecting threats in real time to optimize investigations and forensics. Join this webinar to see what visibility means to a typical day in the life of security operations including:

    • Detecting threats and acting faster
    • Gaining complete visibility across your network, hybrid clouds, and business operations
    • Providing forensics teams with better data

    As network perimeters vanish, visibility proves vital to monitoring and securing performance, meeting compliance mandates, and side-stepping data breaches.

    Attend this session for a real-world take on creating the visibility and peace of mind you deserve.
  • Networks Exposed: Building Smart Networks for Optimum Digital Transformation Recorded: Oct 8 2020 40 mins
    Kristi Thiele, Director Sales Engineering
    Are you dealing with alert fatigue, a staff shortage, and a growing rate of attacks? You are not alone and not all is lost! The new business environment demands IT support for a wider range of monitoring, security and compliance requirements. This creates significant burdens on network performance and security tools as the data volumes increase and the boundaries are not easily defined.

    Visibility into your network data is essential when looking to build a smart network in today’s age of digital transformation. Join this session with Kristi Thiele, Director of Solution Engineering at Keysight as we discuss:

    · The fundamentals of achieving network visibility into every part of your network
    · The importance of optimized tool performance with reliable packet delivery
    · Common use cases for network visibility, including improved network security, cost reduction, and optimized network performance
  • How to Maximize Breach and Attack Simulation Activities Recorded: Oct 8 2020 58 mins
    Scott Register, VP, Product Management and Kyle Flaherty, Security Strategy and Growth at Keysight Technologies
    This webinar will enable you to discover the benefits of pre-production and live network testing. Learn how breach and attack simulation functionality can be leveraged to optimize the security and robustness of government networks.

    Join us to:

    -Understand what breach and attack simulation means
    -Learn the benefits of breach and attack simulation
    -Discover how to deploy the right type of testing scenarios for pre-production and live environments and how they are different
  • Discovering and Securing IoT and Unmanaged Devices with ExtraHop and Keysight Recorded: Sep 30 2020 45 mins
    Karen Crowley, Sr. PMM, ExtraHop, Kurt Skowronek, SE, ExtraHop & Greg Copeland, Director Business Development at Keysight
    A lack of visibility into IoT and an inability to monitor unmanaged devices expands your attack surface, posing a threat to the security of your hybrid networks. Because IoT devices can't be instrumented with agents and generate a high volume of data, traditional approaches to security cannot be implemented. With Keysight and ExtraHop, you can discover and monitor all devices in context of the rest of your network , to detect and respond to attacks before they become a breach. Viewers of this webinar will learn:

    • How attackers exploit IoT and unmanaged devices to gain unauthorized access.
    • How network detection and response and machine learning play a significant role in investigating incidents
    • How together ExtraHop and Keysight provide comprehensive visibility into all devices to stop attacks before they cause damage.
  • High-Performing 5G Telco Clouds - Optimize Virtualized Infrastructure Recorded: Sep 29 2020 59 mins
    Vlad Laslau, Senior Technical Product Manager, Keysight Technologies. Bill Queen, Director of Business Development, Keysight
    Service providers are migrating to 5G networks where Network Function Virtualization (NFV) and containerization are key building blocks of their telco cloud architecture. This requires integration of complex hardware and software solutions from diverse vendors, and the performance of the complete system is only as good as the weakest link. This means it is critical to dimension and configure the NFV infrustructure (NFVI) properly to scale and sustain these high-performance workloads. The NFVI must achieve the often competing goals of scalability, performance, and reliability, requiring a new, rigorous, and repeatable methodology to test the virtualized infrastructure. This methodology should assess compute, network, storage, and orchestrator performance to help service providers perform vendor selection, optimize their virtualized infrastructures, and identify performance bottlenecks. Keysight Cloud Peak is a software application that implements such methodologies in an easy-to-use framework. In this webinar we will discuss these challenges, how Cloud Peak provides comprehensive methodologies to address them, and review actual test results that compare NFVI solutions from different vendors.
  • How Can You Reduce SecOps Alert Fatigue? Recorded: Sep 3 2020 3 mins
    Mike Hodge, Product Marketing, Keysight
    Hackers aren't perfect, so why are cyber attacks so hard to prevent? Alert fatigue is the culprit, and you need a threat intelligence gateway to prevent it.
  • How Does Edge Computing Affect Your Network? Recorded: Aug 27 2020 4 mins
    Mike Hodge, Product Marketing, Keysight
    How do you future-proof your network for edge computing? That's easy. Tune in and discover how to deploy an edge-optimized network architecture!
  • Networks Exposed: Build smart networks for optimum digital transformation Recorded: Aug 13 2020 49 mins
    Kristi Thiele, Director of Solution Engineering at Keysight
    Are you dealing with alert fatigue, a staff shortage, and a growing rate of attacks? You are not alone and not all is lost! The new business environment demands IT support for a wider range of monitoring, security and compliance requirements. This creates significant burdens on network performance and security tools as the data volumes increase and the boundaries are not easily defined.

    Visibility into your network data is essential when looking to build a smart network in today’s age of digital transformation. Join this session with Kristi Thiele, Director of Solution Engineering at Keysight as we discuss:

    · The fundamentals of achieving network visibility into every part of your network
    · The importance of optimized tool performance with reliable packet delivery
    · Common use cases for network visibility, including improved network security, cost reduction, and optimized network performance
  • Viavi + Keysight: Stack Cybersecurity Odds in your Favor with more & Better Data Recorded: Jul 30 2020 35 mins
    Matt Allen, Senior Solutions Engineer, VIAVI Solutions and Phil Trainor, Director, Security Solutions- Engineering, Keysight
    According to Cybersecurity Ventures, global spending on cybersecurity products and services will exceed $1 trillion from 2017 to 2021 – yet breaches still make headlines. Join VIAVI Solutions and Keysight to stack the odds in your favor by mounting a faster response using better data from your network and clouds.

    Learn to collect and use enhanced data flows, logs and packets in tandem – quickly and efficiently – to spot threats, block attacks, and bridge the gap between network and security operations (NetOps and SecOps).

    Register for this webinar to learn:
    •Best practices to speed incident response
    •How to collect and streamline packet, log, and flow data to improve security
    •How to share and optimize data across NetOps and SecOps

    If you cannot attend the live broadcast, please register and we will send you a link to the recording when it is available.
  • Best Practices to Optimize and Secure Your Trading Infrastructure Recorded: Jul 23 2020 54 mins
    Daniel Edmunds, Fixnetix and Areg Alimian, Keysight Technologies
    Reliable gap detection, high-resolution microburst detection, and real-time latency measurements throughout your global trading infrastructure are all integral to accelerating problem remediation — but increasing network complexity coupled with higher data volumes is making it exceedingly difficult. And, while performance is an very important dimension, having an in-depth view of your infrastructure security and indicators of compromise are just as important. Do you have the insights into the effectiveness of your current security posture and actionable intelligence to improve it?

    In this webinar with Fixnetix and Keysight, experts share best practices and recommendations on implementing trading infrastructure monitoring fabric for both performance and network security.

    Join us and learn how to:
    •Understand the unique challenges that have arisen from present day market volatility
    •Improve trading profitability while reducing the strain on trading infrastructure and service disruptions
    •Necessitate rapid issue identification, isolation, and problem resolution
    •Proactively assess your network security by simulating the latest attacks, identifying misconfigurations, and fixing vulnerabilities

    If you cannot attend the live event please register and we will email you thee on-demand link when it is available.
  • Find it Before They Do with Threat Simulator Recorded: Jul 21 2020 33 mins
    Andrew Young, Security Solutions Architect, Keysight Technologies
    You can’t manage what you can’t measure. Now, for the first time, effectively measure your security posture and drive continuous improvement. Keysight's Threat Simulator gives you dynamic network intelligence by constantly probing your network for weaknesses and vulnerabilities. Its patented recommendation engine provides easy to follow, step by step instructions for remediation.

    Join this session and learn more about how Threat Simulator can help you better fortify your network.
  • From Edge to Core, Stay Protected with Keysight Recorded: Jul 21 2020 25 mins
    Scott Stevens, Vice President, Keysight
    Change is constant and just like everything else organizations' networks are ever evolving. As you add more devices, increase the number of work from home employees, and new cyber threats emerge, how do you ensure you are not only securing your network, but maintain performance and user experience.

    During this session we will review how Keysight can help your organization to achieve: 

    * Access to network data from remote sites for real-time visibility operations  

    * Automate network performance checks and improve the application delivery experience for remote workers 
    * Validate the security posture of your networks with real applications and complete range of threat vectors
  • Keep Your Defenses Strong with Failsafe and Continuous Security Monitoring Recorded: Jul 21 2020 22 mins
    Kristi Thiele, Solutions Engineering Director, US, Keysight
    You cannot protect your organization from the constant threat of cyberattacks with best-effort security monitoring. You need 100% data access and visibility as well as the intelligence to evaluate vast volumes of traffic, without slowing or disrupting your network. Embracing a security architecture for continuous visibility means validating security before deployment and protecting production networks with comprehensive data inspection.

    Join this session and learn how Keysight's inline security solutions can ensure constant monitoring and the fastest possible recovery with a high availability configuration.
Accelerating Innovation to Connect and Secure the World
Let us help you simulate your designs, validate your prototypes, manufacture with the highest quality, and test and monitor your network strength within your data center and into the cloud.

Enterprises, governments and service providers use Keysight solutions to improve network and security operations (NetOps and SecOps) and IT management through an end-to-end visibility infrastructure that includes physical and virtual networks, applications, and security. View our content and learn how Keysight can strengthen your security posture through rigorous testing and improve network performance with dynamic network intelligence.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: High-Performing 5G Telco Clouds - Optimize Virtualized Infrastructure
  • Live at: Sep 29 2020 4:00 pm
  • Presented by: Vlad Laslau, Senior Technical Product Manager, Keysight Technologies. Bill Queen, Director of Business Development, Keysight
  • From:
Your email has been sent.
or close