Hi [[ session.user.profile.firstName ]]

Designing with DFS Channels

One of the most common questions that Wi-Fi expert Devin Akin hears from Wi-Fi professionals is, “Should I use DFS (UNII-2 and UNII-2e) channels in my Wi-Fi design?” There are many moving parts to DFS, and the regulatory rules differ depending on where the Wi-Fi network implementation is located.

This webinar sheds light on regulatory requirements and new advancements in DFS channel scanning. Devin will cover:

· Expected vs. common client device behavior

· Troubleshooting real and false positive events

· How Dual 5GHz can impact designing with DFS

· Designing by area, and for high density and capacity

· New 802.11 amendments impact client behavior

If you design medium and large Wi-Fi networks, this is a must-attend webinar.

Devin Akin is the founder of Divergent Dynamics, a Wi-Fi Systems Integrator, Value-Added Reseller (VAR), and Training organization. Akin has over 20 years in IT, with 15 years in WLAN specifically, and was recently named to the TWW Top 100 Wireless Technology Experts list for 2014.
Recorded Sep 28 2017 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Devin Akin, CEO, Divergent Dynamics
Presentation preview: Designing with DFS Channels
  • Channel
  • Channel profile
  • Empowering Your Network to Stop DDoS Attacks Sep 19 2019 3:30 pm UTC 60 mins
    Scott Iekel-Johnson, Director of Product Management, DDoS Protection at NETSCOUT
    The goal to network protection is pretty simple. We must get ahead of the threats and protect our investments. Instead we continue to play catchup to attackers. While this goal is far from being achieved, we must abandon the idea that discreet solutions can solve multi-vectored threats. No single technology can solve this type of problem by itself. This goes for DDoS attacks like any other sophisticated threat.

    Join NETSCOUT as we discuss how smarter visibility can drives a smarter DDoS protection strategy. As we evolve our Arbor platforms for next generation of DDoS attacks, we are helping Service Providers and Enterprises change their approach to DDoS mitigation.

    In this webinar you will learn how to:

    • Detect attacks by combining smart analytics with best-in-class data

    • Defend from attacks by orchestrating multiple network protections simultaneously

    • Monitor comprehensive protection through a single interface

    With almost 20 years of expertise, the Arbor platforms have unparalleled visibility and knowledge on network-based attacks. Register for this webcast to listen how The Arbor platforms once again raise the bar on network visibility and DDoS protection.
  • UC Smarter, with “Visibility without Borders” from NETSCOUT Recorded: Aug 13 2019 44 mins
    Ray Krug, Solutions Architect, NETSCOUT
    NETSCOUT Visibility without Borders, provides key service performance, and security insights into all digital transformation projects such as Enterprise UC&C; Contact Center; and Data Center Transformation to Private and Public Clouds.
    In this webinar explore how NETSCOUT provides actionable visibility into UC&C Service quality to increase enterprise collaboration and productivity or improve customer service in your Contact Center including:

    • Discover how NETSCOUT vendor agnostic Service Assurance platform can help minimize downtime, and maximize UC&C Service Performance in Cisco, Microsoft, Avaya Enterprise UC and Contact Center environments

    • With example customer use cases, learn how wire data, translated into actionable insights, helps solve UC&C problems faster -such as dropped calls and poor audio quality.

    • Realize UC&C Systems are a complex interconnected set of services, and with holistic visibility of all the moving parts, you can stop the finger pointing and reduce MTTR when troubleshooting issues.

    • Learn how NETSCOUT provides insights beyond just UC&C, and into all aspects of Data Center Transformation Projects in Private and Public Clouds
  • Cloud Computing Magazine Webinar: Consolidation of NetOps and SecOps Recorded: Aug 8 2019 41 mins
    Sanjay Munshi Vice President, Product Management, NETSCOUT
    Attendees will better understand how to derive and manage “smart data” and how it drives NETSECOPS consolidation. Key to realizing benefits is a platform architecture with distributed instrumentation and centralized analytics. Learn how to solve tool clutter through streamlining the multiple tools used today across environments. Further, attendees will understand how Smart data and a Smart Platform can propel early warning detection. Finally, discover how to consolidate detection and forensic investigations using smart data methods.

    What Attendees will learn:

    • What smart data means and how it drives NETSECOPS consolidation
    • The value of a smart platform architecture with distributed instrumentation and centralized analytics
    • How to solve “tool clutter”
    • How a Smart data / Platform can drive early warning detection
    • How to consolidate Detection and Forensic investigations


    Sanjay Munshi
    Vice President, Product Management, NETSCOUT

    Bio - Sanjay Munshi is the Vice President of Product Management at NETSCOUT, a leading provider of business assurance, a powerful combination of service assurance, cybersecurity, and business intelligence solutions. In this role Sanjay is responsible for Product Management and Sales Enablement functions defining the vision, strategy, and execution plans that drive the company’s business results for software solutions in the data centers of Enterprises and Service Providers.
  • Cybercrime’s Innovation Machine Recorded: Aug 6 2019 25 mins
    Hardik Modi, Senior Director, Threat Intelligence, NETSCOUT & Jessica Gulick, CEO, Katzcy & VP, Women's Society of Cyberjutsu
    It’s hard to express the scale of today’s cyber threat landscape, let alone its global impact. We can tell you that there were nearly four million DDoS attacks around the world in the last six months, and that attack frequency grew by 39 percent. Or that the NETSCOUT ASERT team saw 20,000 unique samples per month from just one family of IoT malware. Or even that it can take only five days from the discovery of a new attack vector to the availability of tools for the script-kiddie designed to exploit that vulnerability.

    These numbers, while startling, don’t fully convey the impact of that steady drumbeat of new threats. Cybercrime has entered the mainstream of our culture to an unprecedented extent, and it is here to stay.

    Join this video interview live from Las Vegas during Black Hat to learn more about:
    - The big trends in DDoS
    - New attack vectors found in the past six months and what this means for device and software security
    - What enterprises can do to protect themselves
  • Security Without Borders In the Multi-Cloud Recorded: Aug 6 2019 59 mins
    Rick McElroy (Carbon Black) | Neil Thacker, (Netskope) | Hardik Modi (NETSCOUT) | Shahrokh Shahidzadeh (Acceptto)
    Digital Transformation, 5G and the Internet of Things are creating wider and deeper opportunities and risks for technology and business organizations to pioneer and navigate. These new boundaries are difficult for organizations to get visibility into and contain threats across them. In a the new world of micro services, serverless computing, software defined infrastructure and Multi-Cloud, old enterprise threat and vulnerability models must transform.

    Learn how to achieve consistent and continuous monitoring across your entire infrastructure, as well as within the services and providers you rely on. Getting early, accurate warning into the risks that threaten applications and infrastructure is critical.

    Learn why Security and DevOps / Infrastructure teams need to lean into and how to do it at scale.

    - Rick McElroy, Principal Security Strategist, Carbon Black (Moderator)
    - Neil Thacker, CISO, Netskope
    - Hardik Modi, Senior Director, Threat Intelligence, NETSCOUT
    - Shahrokh Shahidzadeh, CEO, Acceptto
  • The Age of Smarter Network Visibility & DDoS Protection is Now Recorded: Jul 30 2019 49 mins
    Zach Wilkinson - Product Manager, Jamal Bethea - Product Marketing Manager, Traffic Visibility Solutions at NETSCOUT
    Your network traffic deserves a purpose-built network Visibility and DDoS protection solution to address your business requirements, but it should be able to provide more. Service Provider and Enterprise businesses share similar struggles when it comes to traffic troubleshooting to maintaining your network uptime. The network is a business and left unprotected, could cause more significant harm for your employees, or even worse, your customers.

    While NETSCOUT continues to enhance our customers' ability to view, analyze, and mitigate their network traffic patterns, other security vendors continue to find the standard challenging to maintain. With enhancements to our Network Visibility and DDoS Protection solution, not only do we continue to address your Visibility and DDoS requirements; we are solving your ability to work smarter and not harder.

    In this webinar, you will learn about improving:

    •Content and subscriber analysis patterns make it easier to see how users value network connectivity so you can forecast future traffic patterns;
    •Operation support requirements such as AWS compatibility, OTT Managed Objects definitions and Webhook notifications; and
    •DDoS attack mitigation capabilities with improved speed to detection and protection with enhanced packet inspection and smarter traffic mitigation design.
  • How to Enforce Threat Intelligence at Your Perimeter Recorded: Jun 6 2019 34 mins
    Tom Bienkowski, Director, Product Marketing, NETSCOUT
    Be it public, commercial, or private, cyber threat intelligence comes from many different sources and plays a vital role in an organization's cybersecurity strategy. But threat intelligence by itself is useless unless it can be made actionable.

    So, once you have that intelligence in hand, how do you enforce it at the perimeter of your network?

    Register for this live webinar and learn about:
    •Utilizing threat intelligence from a variety of sources;
    •How stateless technology at the network perimeter can take the load off stateful devices such as NextGen Firewalls;
    •The latest threat trends identified in NETSCOUT's Threat Intelligence Report and 14th Annual Worldwide Infrastructure Security Report.

    Register today, space is limited.
  • A New Way to Solve Wi-Fi Problems Recorded: May 21 2019 42 mins
    John Anderson, NETSCOUT Product Manager
    IT has traditionally measured and reported on Wi-Fi KPI’s, then tried to determine if the alert really reflects a problem, and then escalated to a Wi-Fi expert. But, does the alert really mean there is a problem affecting users? And, is it actually a Wi-Fi problem or something else in the network?
    Join NETSCOUT’s Jason Chaffee as he discusses a new way to monitor Wi-Fi using nGeniusPULSE to:
    •DETECT – based on user experience of apps and services
    •ISOLATE – isolate fault to Wi-Fi link, network, server, or app. If Wi-Fi, isolate to access point
    •DIAGNOSE – address specific issue on specific access points
  • Live Demo of OptiView XG Recorded: Apr 11 2019 64 mins
    Mike Pennacchi, Network Protocol Specialists
    Troubleshooting performance problems in today’s networks is only getting more complex:

    • Growth of 10G links with limited visibility
    • Increasing demands on wireless networks
    • Complex infrastructure with outdated documentation

    Last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.

    Please join us for a free webinar where Mike Pennacchi will talk about these issues and present a live demo of the OptiView® XG Network Analysis Tablet.

    XG expedites network performance problem solving by automating root cause analysis and providing guided troubleshooting to address problem areas - anywhere on the network – wired or wireless.
  • NETSCOUT Threat Intelligence Report 2H 2018: Dawn of the Terrorbit Era Recorded: Feb 28 2019 57 mins
    Hardik Modi, Sr Director - Threat Intelligence, NETSCOUT and Richard Hummel, Threat Intelligence Manager, NETSCOUT
    When it comes to the global threat landscape, the second half of 2018 revealed the equivalent of attacks on steroids, as attackers bulked up existing tactics, rapidly evolved new ones, and applied smart business techniques to vastly accelerate their growth rate. IoT devices were attacked within five minutes of being plugged into the internet. Nation-state APT group activity ratcheted up in volume and targets while existing actors continued to innovate, including the first observed use of Chrome extensions to enable persistence in the STOLEN PENCIL campaign. Finally, the use of business practices such as the affiliate model empowered crimeware such as Danabot to achieve rapid global targeting.

    Attend this webcast to learn about:

    Nation State Innovation in APT: new groups discovered and new TTPs combining custom tools and crimeware

    Crimeware goes to B School: We saw a robust marketplace driven by well-stocked innovation pipelines from rapidly growing organizations

    Understanding the ever-changing DDoS landscape – key vertical targeting and techniques

    Register today, space is limited.
  • Scaling security at the Internet edge with stateless technology Recorded: Feb 20 2019 32 mins
    Tom Bienkowski – NETSCOUT Arbor, Director, Product Marketing
    As the scale of all types of attacks continues to increase, traditional stateful perimeter security devices like firewalls often strain to keep up. Adding stateless technology between the firewall and the Internet router, armed with advanced reputation and threat intelligence data, can decrease the heavy load on your existing perimeter defenses, protect them from state exhaustion attacks, and even provide blocking of outbound threats (like bots communicating with C&C). This webinar will explore the realm of stateless technology and the Internet edge, with best practices, lessons learned, and key deployment strategies that will prepare attendees for a future of increasing and diverse attacks.

    During this webinar we will talk more about:

    - Understand the limitations of existing perimeter security solutions because of their stateful nature

    - See how stateless technology can protect you from inbound attacks (like DDOS), more efficiently block inbound IoCs and outbound threats (communications with suspicious destinations based on reputation)

    - Learn how stateful and stateless technologies can work together the make a more secure Internet edge

    - Arm yourself with protection against Internet-scale attacks

    - Answers to audience questions during live Q&A​

    Featured Speaker:

    Tom Bienkowski – NETSCOUT Arbor, Director, Product Marketing

    Tom has been in the network and security field for over 20 yrs. During this time, he has worked for large enterprises as a Network Engineer and for multiple network management and security vendors where he has had roles in Sales Engineering /Management, Technical Field Marketing and Product Management. Currently at NETSCOUT he’s a Director of Product Marketing focusing on their industry leading Edge Defense and Threat Intelligence solutions. Tom routinely speaks at IT security events around the world providing insights into cyber threats and best practices in defense.
  • State of the Cloud in the Enterprise Recorded: Feb 4 2019 28 mins
    Dr. Mazin Yousif, Editor IEEE Cloud Computing Magazine
    Cloud computing has become the de-facto hosting platform for all types of applications, social innovations and use cases such as Big Data, the Internet of Things, smart mobility and social networking – basically it is the new normal. This is true everywhere including all industry sectors and companies in all sizes.

    Bringing new technology into the market always comes with many challenges. This is no different for cloud computing, even though its adoption in the market has been very fast. I usually bucket cloud adoption challenges in three categories, namely: migration, Total Cost of Ownership (TCO) and Data handling. According to surveys by Netscout and RightScale published in 2018, a cloud users leverage on average around 5 clouds; hybrid and multi-clouds are likely the future; security, managing cost and lack of skilled resources rank on the top challenges; & as expected there are still migration challenges.

    In this talk, I will provide my views on the state of cloud computing in the enterprise, talk about the challenges and talk about the typical role of the CIO to deal with digital transformation challenges.

    Key Take away:

    -Enterprises uses many cloud services at any one time
    -Hybrid cloud and multi-clouds seem to be the way forward
    -Cloud challenges in the Enterprises vary based on the size of the enterprise and where they are in the cloud adoption journey.
    -The central IT organization has morphed its role as cloud adoption increases
  • The App is Slow! Learn how to resolve performance issues Fast with nGenuisONE Recorded: Jan 29 2019 23 mins
    Serguei Frampol, Oracle Database Administrator, Forte Data Solutions
    All too often application performance issues first reveal themselves by the end-user’s call to the helpdesk, exclaiming “this application is slow!”

    When this happens, getting to root-cause quickly and allowing for effective troubleshooting and minimal downtime is key to the business and end-user experience.

    Join Serguei Frampol, Oracle Database Administrator with Forte Data Solutions as he discusses how to leverage nGeniusONE to:

    • Gain visibility of all tiers of an Enterprise database deployment
    • Pinpoint the tier, server or application interaction at the root cause of an issue
    • Gain insight into volumes and performance degradations to the database
    • Solve real-life use cases including: slow web applications and e-business suite scenarios
  • Best Practices for Network Packet Aggregation and Visibility Recorded: Dec 19 2018 52 mins
    Eric Gray, Chief Solutions Architect, NETSCOUT and Erik Hjelmstad Security Visibility Specialist, NETSCOUT
    You need full traffic flow visibility for your service assurance and cyber security tools to perform effectively. This means that they should only process the traffic they are designed to see. Otherwise, they waste precious resources filtering or load balancing packets before the security logic can be applied.

    Please join NetScout for the first of our 4-part series on Best Practices for Packet Aggregation. In this first session you will learn:

    • Why organizations are turning to packet aggregators help control their costs of network security and monitoring tools.
    • What packet aggregators do and how they function.
    • What you should consider when selecting the right packet aggregator for your environment?

    Please join NETSCOUT Technology experts, Mark Doering and Eric Gray for this webinar focused on demystifying the market offerings around packet aggregation.
  • What’s new with AirCheck G2 v3? Recorded: Nov 28 2018 36 mins
    Julio Petrovitch, Product Manager
    AirCheck G2 has new enhancements that will allow wireless professionals to get over the air firmware updates and upload more test results to the complimentary Link-Live Cloud Service. Over-the-network profile sharing will also now be available.
    Additionally, there has been enhanced AP name support and improved packet captures!
    Attend this webinar with CWNP Julio Petrovitch, the AirCheck G2 product manager to learn more.
  • How NETSCOUT Customers Master Remote Site Monitoring Recorded: Nov 13 2018 52 mins
    Jason Chaffee, Sr. Product Manager NETSCOUT
    Where are people accessing your network and business critical apps from? If yours’ is like most organizations, the list of “remote sites” continues to grow. And that list is way beyond just the traditional branch office. From each of these locations where people need the network to do their jobs, IT is expected to provide support and troubleshoot issues. Join NETSCOUT on this webinar to learn about the visibility needed to deliver this support and explore:

    * Real-life examples of how companies around the world are monitoring critical network and apps, no matter where they are accessed.

    * Why it is critical to monitor your network even when no one is using the system.

    * How to monitor from locations that do not have IT support on site.

    Attend the webinar and get a free eBook:

    Remote Sites: Monitoring Performance Across the Distributed Enterprise
  • Navigating the High Power PoE minefield with confidence Recorded: Nov 13 2018 50 mins
    Vincent Choi, Senior Product Manager
    With the ratification of the IEEE 802.3bt standard, new types of PoE devices are bound to be introduced in the market. With heightened safety and interoperability concerns, you will need to know the challenges that high power PoE brings as well as the status of the cabling and PoE equipment market today. This webinar covers the following topics:
    •Quick review: How does PoE work
    •What are considerations when deploying High Power PoE
    •Are there standardized best practices to help deployment?
    The overall benefit of PoE is to facilitate the ease of deployment of network connected devices. When deploying a PoE system the power delivery, types and classes, and power managements must be considered. This webinar will arm you with the knowledge to deploy PoE enabled devices in the most effective way possible.
  • How Carriers Gain Visibility in the Hybrid/Multi-Cloud Recorded: Nov 5 2018 52 mins
    Dr. Vikram Saksena
    Dr. Vikram Saksena, Sr. Director, SBO, NETSCOUT discusses how carriers and enterprises can gain a single source of truth for both application performance and security management in complex, multi-vendor environments.
  • NETSCOUT Election Security Initiative - Common-Sense Steps for Elections Recorded: Nov 2 2018 8 mins
    Mike McNerney
    Elections systems are like banks, in that our faith in their security matters almost as much as the actual security itself. As we are beginning to learn, if you undermine that faith, you can do a lot of damage. One only needs to turn on cable news for a few minutes to realize that our nation’s adversaries have proven they can attack our elections and be effective.
  • NETSCOUT Election Security Initiative - Common-Sense Steps for Elections Recorded: Oct 25 2018 8 mins
    Mike McNerney
    Elections systems are like banks, in that our faith in their security matters almost as much as the actual security itself. As we are beginning to learn, if you undermine that faith, you can do a lot of damage. One only needs to turn on cable news for a few minutes to realize that our nation’s adversaries have proven they can attack our elections and be effective.
Ensuring a connected world--one network at a time
NETSCOUT is a market leader in real-time service assurance and cybersecurity solutions for today’s most demanding service provider, enterprise and government networks. NETSCOUT’s Adaptive Service Intelligence (ASI) technology continuously monitors the service delivery environment to identify performance issues and provides insight into network-based security threats, helping teams to quickly resolve issues that can cause business disruptions or impact user experience. NETSCOUT delivers unmatched service visibility and protects the digital infrastructure that supports our connected world. To learn more, visit www.netscout.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Designing with DFS Channels
  • Live at: Sep 28 2017 6:00 pm
  • Presented by: Devin Akin, CEO, Divergent Dynamics
  • From:
Your email has been sent.
or close