Hi [[ session.user.profile.firstName ]]

Future Proof Your Network - Get NFV Smarter

With dynamic service and network configuration taking place within a complex operating environment, service assurance platforms will need to optimize intelligence to identify if a fault is at the virtual network function (VNF), physical network function (PNF), or cloud infrastructure to assure the reliability and quality of services in a hybrid network environment. End-to-end service management is crucial as Carrier Service Providers (CSP) aspire to the real networking end game: closed-loop automation.

In this webinar learn about:

• Why CSPs are turning hard into the network virtualization journey
• Why Telco cloud, automation, and analytics are essential to NFV
• Ready or not: lingering concerns for CSPs over NFV
• 5 key features for a successful NFV platform
• NETSCOUT’s carrier-grade, software-optimized solution – designed for the cloud

Our presenters will discuss the complexities and challenges for CSPs, as they transition from traditional platforms to deploying and managing the new software-based platforms and applications, required for service agility in a hybrid networking environment.
Recorded Oct 24 2018 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Stephanie Gibbons Principal Analyst, Ovum and Bruce Kelley, Jr, CTO, Service Provider, NETSCOUT
Presentation preview: Future Proof Your Network - Get NFV Smarter
  • Channel
  • Channel profile
  • Fix Wi-Fi Issues Fast with nGeniusPULSE Oct 16 2019 5:00 pm UTC 60 mins
    John Anderson, Product Manager, NETSCOUT
    Wi-Fi access to the network can be a frequent source of performance issues. However, there are many other sources of performance issues, and not all Wi-Fi problems are due to the Wi-Fi.

    As a result, the ability to quickly identify service performance issues and determine the problem source is critical to restoring the service and minimizing impacts.

    Join us in examining real-world cases where performance issues affecting services over Wi-Fi impacted productivity and identifying the cause in the Wi-Fi or other part of the network led to rapid resolution.

    Learn how nGeniusPULSE helps enterprises:

    Monitor the performance of critical business services at every site, using both Wi-Fi and Ethernet access.

    Identify issues affecting the availability and performance of services: 

    Wi-Fi issues such as RF interference, excessive channel utilization, poor signal coverage

    Other issues such as WAN congestion, slow route hops, server and application problems.

    Isolate faults to the Wi-Fi network or other part of the network

    Focus troubleshooting on the specific fault and resolve the issue quickly
  • Empowering Your Network to Stop DDoS Attacks Recorded: Sep 19 2019 37 mins
    Scott Iekel-Johnson, Director of Product Management, DDoS Protection at NETSCOUT
    The goal to network protection is pretty simple. We must get ahead of the threats and protect our investments. Instead we continue to play catchup to attackers. While this goal is far from being achieved, we must abandon the idea that discreet solutions can solve multi-vectored threats. No single technology can solve this type of problem by itself. This goes for DDoS attacks like any other sophisticated threat.

    Join NETSCOUT as we discuss how smarter visibility can drives a smarter DDoS protection strategy. As we evolve our Arbor platforms for next generation of DDoS attacks, we are helping Service Providers and Enterprises change their approach to DDoS mitigation.

    In this webinar you will learn how to:

    • Detect attacks by combining smart analytics with best-in-class data

    • Defend from attacks by orchestrating multiple network protections simultaneously

    • Monitor comprehensive protection through a single interface

    With almost 20 years of expertise, the Arbor platforms have unparalleled visibility and knowledge on network-based attacks. Register for this webcast to listen how The Arbor platforms once again raise the bar on network visibility and DDoS protection.
  • See How to Use NETSCOUT nGeniusPULSE to Extend Your Visibility Recorded: Sep 18 2019 41 mins
    Jason Chaffee, Sr. Product Manager, NETSCOUT
    Join NETSCOUT to see how to use NETSCOUT nGeniusPULSE to extend your visibility. With automated, continuous synthetic testing, you can monitor access to critical services from the client perspective and correlate service delivery with network infrastructure health.

    Jason will demo how easy it is to monitor:

    - Business Application Availability

    - Remote Site Assurance

    - Path and Network

    - Wi-Fi and Infrastructure Performance
  • Visibility into Applications Anywhere with NETSCOUT Solutions for VMware NSX-T Recorded: Sep 17 2019 40 mins
    Ray Krug, Solutions Architect, NETSCOUT
    With NSX-T, VMware is providing the ability to deliver applications and networks anywhere. NETSCOUT certified solutions for VMware NSX bridges the collaboration and knowledge gap between application, server and network operations teams as they operate in VMware NSX, cloud and legacy environments. Join this webinar to learn about:
    •The challenges and impacts facing IT as applications are hosted between private, public and multi-cloud environments.
    •How NETSCOUT automates the transformation of wire data into Smart Data to provide an early warning system into the issues and fastest path to resolution into the applications and services that you deliver to you customers and users.
    •Examples of how to reduce MTTR with true visibility into the health of application components, their inter-dependencies and interactions with the broader IT infrastructure.
  • Visibility into Applications Anywhere with NETSCOUT Solutions for VMware NSX-T Recorded: Sep 17 2019 41 mins
    Ray Krug, Solutions Architect, NETSCOUT
    With NSX-T, VMware is providing the ability to deliver applications and networks anywhere. NETSCOUT certified solutions for VMware NSX bridges the collaboration and knowledge gap between application, server and network operations teams as they operate in VMware NSX, cloud and legacy environments. Join this webinar to learn about:
    •The challenges and impacts facing IT as applications are hosted between private, public and multi-cloud environments.
    •How NETSCOUT automates the transformation of wire data into Smart Data to provide an early warning system into the issues and fastest path to resolution into the applications and services that you deliver to you customers and users.
    •Examples of how to reduce MTTR with true visibility into the health of application components, their inter-dependencies and interactions with the broader IT infrastructure.
  • UC Smarter, with “Visibility without Borders” from NETSCOUT Recorded: Aug 13 2019 44 mins
    Ray Krug, Solutions Architect, NETSCOUT
    NETSCOUT Visibility without Borders, provides key service performance, and security insights into all digital transformation projects such as Enterprise UC&C; Contact Center; and Data Center Transformation to Private and Public Clouds.
    In this webinar explore how NETSCOUT provides actionable visibility into UC&C Service quality to increase enterprise collaboration and productivity or improve customer service in your Contact Center including:

    • Discover how NETSCOUT vendor agnostic Service Assurance platform can help minimize downtime, and maximize UC&C Service Performance in Cisco, Microsoft, Avaya Enterprise UC and Contact Center environments

    • With example customer use cases, learn how wire data, translated into actionable insights, helps solve UC&C problems faster -such as dropped calls and poor audio quality.

    • Realize UC&C Systems are a complex interconnected set of services, and with holistic visibility of all the moving parts, you can stop the finger pointing and reduce MTTR when troubleshooting issues.

    • Learn how NETSCOUT provides insights beyond just UC&C, and into all aspects of Data Center Transformation Projects in Private and Public Clouds
  • RF Propagation Modelling for 5G RAN Planning & Design Recorded: Aug 13 2019 62 mins
    Burak Berksoy, Director of RF Engineering at NETSCOUT and moderator, James Crenshaw, Senior Analyst with Heavy Reading
    NETSCOUT has conducted over 2500 Continuous Wave (CW) measurements in 3.5, 28, and 39 GHz frequencies and created hundreds of 5G RF propagation models. The webinar will summarize key learnings from RF propagation modeling studies in Sub-6 Ghz and mmWave for practical applications in 5G radio access network planning & design.

    Key Topics include:

    - Why accurate propagation modeling for 5G RAN Planning & Design is important?

    - What will be some challenges you may face in higher frequencies?

    - How far should you expect mmWave to propagate?

    About Burak Berksoy:

    Burak has a PhD in Electrical Engineering and has been with NETSCOUT for 11 years. He is currently the Director of RF Engineering Services. Burak is actively engaged in supporting NETSCOUT customers move to 5G with RAN planning and design through RF Propagation Modelling practice.
  • Cloud Computing Magazine Webinar: Consolidation of NetOps and SecOps Recorded: Aug 8 2019 41 mins
    Sanjay Munshi Vice President, Product Management, NETSCOUT
    Attendees will better understand how to derive and manage “smart data” and how it drives NETSECOPS consolidation. Key to realizing benefits is a platform architecture with distributed instrumentation and centralized analytics. Learn how to solve tool clutter through streamlining the multiple tools used today across environments. Further, attendees will understand how Smart data and a Smart Platform can propel early warning detection. Finally, discover how to consolidate detection and forensic investigations using smart data methods.

    What Attendees will learn:

    • What smart data means and how it drives NETSECOPS consolidation
    • The value of a smart platform architecture with distributed instrumentation and centralized analytics
    • How to solve “tool clutter”
    • How a Smart data / Platform can drive early warning detection
    • How to consolidate Detection and Forensic investigations


    Sanjay Munshi
    Vice President, Product Management, NETSCOUT

    Bio - Sanjay Munshi is the Vice President of Product Management at NETSCOUT, a leading provider of business assurance, a powerful combination of service assurance, cybersecurity, and business intelligence solutions. In this role Sanjay is responsible for Product Management and Sales Enablement functions defining the vision, strategy, and execution plans that drive the company’s business results for software solutions in the data centers of Enterprises and Service Providers.
  • Cybercrime’s Innovation Machine Recorded: Aug 6 2019 25 mins
    Hardik Modi, Senior Director, Threat Intelligence, NETSCOUT & Jessica Gulick, CEO, Katzcy & VP, Women's Society of Cyberjutsu
    It’s hard to express the scale of today’s cyber threat landscape, let alone its global impact. We can tell you that there were nearly four million DDoS attacks around the world in the last six months, and that attack frequency grew by 39 percent. Or that the NETSCOUT ASERT team saw 20,000 unique samples per month from just one family of IoT malware. Or even that it can take only five days from the discovery of a new attack vector to the availability of tools for the script-kiddie designed to exploit that vulnerability.

    These numbers, while startling, don’t fully convey the impact of that steady drumbeat of new threats. Cybercrime has entered the mainstream of our culture to an unprecedented extent, and it is here to stay.

    Join this video interview live from Las Vegas during Black Hat to learn more about:
    - The big trends in DDoS
    - New attack vectors found in the past six months and what this means for device and software security
    - What enterprises can do to protect themselves
  • Security Without Borders In the Multi-Cloud Recorded: Aug 6 2019 59 mins
    Rick McElroy (Carbon Black) | Neil Thacker, (Netskope) | Hardik Modi (NETSCOUT) | Shahrokh Shahidzadeh (Acceptto)
    Digital Transformation, 5G and the Internet of Things are creating wider and deeper opportunities and risks for technology and business organizations to pioneer and navigate. These new boundaries are difficult for organizations to get visibility into and contain threats across them. In a the new world of micro services, serverless computing, software defined infrastructure and Multi-Cloud, old enterprise threat and vulnerability models must transform.

    Learn how to achieve consistent and continuous monitoring across your entire infrastructure, as well as within the services and providers you rely on. Getting early, accurate warning into the risks that threaten applications and infrastructure is critical.

    Learn why Security and DevOps / Infrastructure teams need to lean into and how to do it at scale.

    - Rick McElroy, Principal Security Strategist, Carbon Black (Moderator)
    - Neil Thacker, CISO, Netskope
    - Hardik Modi, Senior Director, Threat Intelligence, NETSCOUT
    - Shahrokh Shahidzadeh, CEO, Acceptto
  • The Age of Smarter Network Visibility & DDoS Protection is Now Recorded: Jul 30 2019 49 mins
    Zach Wilkinson - Product Manager, Jamal Bethea - Product Marketing Manager, Traffic Visibility Solutions at NETSCOUT
    Your network traffic deserves a purpose-built network Visibility and DDoS protection solution to address your business requirements, but it should be able to provide more. Service Provider and Enterprise businesses share similar struggles when it comes to traffic troubleshooting to maintaining your network uptime. The network is a business and left unprotected, could cause more significant harm for your employees, or even worse, your customers.

    While NETSCOUT continues to enhance our customers' ability to view, analyze, and mitigate their network traffic patterns, other security vendors continue to find the standard challenging to maintain. With enhancements to our Network Visibility and DDoS Protection solution, not only do we continue to address your Visibility and DDoS requirements; we are solving your ability to work smarter and not harder.

    In this webinar, you will learn about improving:

    •Content and subscriber analysis patterns make it easier to see how users value network connectivity so you can forecast future traffic patterns;
    •Operation support requirements such as AWS compatibility, OTT Managed Objects definitions and Webhook notifications; and
    •DDoS attack mitigation capabilities with improved speed to detection and protection with enhanced packet inspection and smarter traffic mitigation design.
  • How to Enforce Threat Intelligence at Your Perimeter Recorded: Jun 6 2019 34 mins
    Tom Bienkowski, Director, Product Marketing, NETSCOUT
    Be it public, commercial, or private, cyber threat intelligence comes from many different sources and plays a vital role in an organization's cybersecurity strategy. But threat intelligence by itself is useless unless it can be made actionable.

    So, once you have that intelligence in hand, how do you enforce it at the perimeter of your network?

    Register for this live webinar and learn about:
    •Utilizing threat intelligence from a variety of sources;
    •How stateless technology at the network perimeter can take the load off stateful devices such as NextGen Firewalls;
    •The latest threat trends identified in NETSCOUT's Threat Intelligence Report and 14th Annual Worldwide Infrastructure Security Report.

    Register today, space is limited.
  • A New Way to Solve Wi-Fi Problems Recorded: May 21 2019 42 mins
    John Anderson, NETSCOUT Product Manager
    IT has traditionally measured and reported on Wi-Fi KPI’s, then tried to determine if the alert really reflects a problem, and then escalated to a Wi-Fi expert. But, does the alert really mean there is a problem affecting users? And, is it actually a Wi-Fi problem or something else in the network?
    Join NETSCOUT’s Jason Chaffee as he discusses a new way to monitor Wi-Fi using nGeniusPULSE to:
    •DETECT – based on user experience of apps and services
    •ISOLATE – isolate fault to Wi-Fi link, network, server, or app. If Wi-Fi, isolate to access point
    •DIAGNOSE – address specific issue on specific access points
  • NETSCOUT Threat Intelligence Report 2H 2018: Dawn of the Terrorbit Era Recorded: Feb 28 2019 57 mins
    Hardik Modi, Sr Director - Threat Intelligence, NETSCOUT and Richard Hummel, Threat Intelligence Manager, NETSCOUT
    When it comes to the global threat landscape, the second half of 2018 revealed the equivalent of attacks on steroids, as attackers bulked up existing tactics, rapidly evolved new ones, and applied smart business techniques to vastly accelerate their growth rate. IoT devices were attacked within five minutes of being plugged into the internet. Nation-state APT group activity ratcheted up in volume and targets while existing actors continued to innovate, including the first observed use of Chrome extensions to enable persistence in the STOLEN PENCIL campaign. Finally, the use of business practices such as the affiliate model empowered crimeware such as Danabot to achieve rapid global targeting.

    Attend this webcast to learn about:

    Nation State Innovation in APT: new groups discovered and new TTPs combining custom tools and crimeware

    Crimeware goes to B School: We saw a robust marketplace driven by well-stocked innovation pipelines from rapidly growing organizations

    Understanding the ever-changing DDoS landscape – key vertical targeting and techniques

    Register today, space is limited.
  • Scaling security at the Internet edge with stateless technology Recorded: Feb 20 2019 32 mins
    Tom Bienkowski – NETSCOUT Arbor, Director, Product Marketing
    As the scale of all types of attacks continues to increase, traditional stateful perimeter security devices like firewalls often strain to keep up. Adding stateless technology between the firewall and the Internet router, armed with advanced reputation and threat intelligence data, can decrease the heavy load on your existing perimeter defenses, protect them from state exhaustion attacks, and even provide blocking of outbound threats (like bots communicating with C&C). This webinar will explore the realm of stateless technology and the Internet edge, with best practices, lessons learned, and key deployment strategies that will prepare attendees for a future of increasing and diverse attacks.

    During this webinar we will talk more about:

    - Understand the limitations of existing perimeter security solutions because of their stateful nature

    - See how stateless technology can protect you from inbound attacks (like DDOS), more efficiently block inbound IoCs and outbound threats (communications with suspicious destinations based on reputation)

    - Learn how stateful and stateless technologies can work together the make a more secure Internet edge

    - Arm yourself with protection against Internet-scale attacks

    - Answers to audience questions during live Q&A​

    Featured Speaker:

    Tom Bienkowski – NETSCOUT Arbor, Director, Product Marketing

    Tom has been in the network and security field for over 20 yrs. During this time, he has worked for large enterprises as a Network Engineer and for multiple network management and security vendors where he has had roles in Sales Engineering /Management, Technical Field Marketing and Product Management. Currently at NETSCOUT he’s a Director of Product Marketing focusing on their industry leading Edge Defense and Threat Intelligence solutions. Tom routinely speaks at IT security events around the world providing insights into cyber threats and best practices in defense.
  • State of the Cloud in the Enterprise Recorded: Feb 4 2019 28 mins
    Dr. Mazin Yousif, Editor IEEE Cloud Computing Magazine
    Cloud computing has become the de-facto hosting platform for all types of applications, social innovations and use cases such as Big Data, the Internet of Things, smart mobility and social networking – basically it is the new normal. This is true everywhere including all industry sectors and companies in all sizes.

    Bringing new technology into the market always comes with many challenges. This is no different for cloud computing, even though its adoption in the market has been very fast. I usually bucket cloud adoption challenges in three categories, namely: migration, Total Cost of Ownership (TCO) and Data handling. According to surveys by Netscout and RightScale published in 2018, a cloud users leverage on average around 5 clouds; hybrid and multi-clouds are likely the future; security, managing cost and lack of skilled resources rank on the top challenges; & as expected there are still migration challenges.

    In this talk, I will provide my views on the state of cloud computing in the enterprise, talk about the challenges and talk about the typical role of the CIO to deal with digital transformation challenges.

    Key Take away:

    -Enterprises uses many cloud services at any one time
    -Hybrid cloud and multi-clouds seem to be the way forward
    -Cloud challenges in the Enterprises vary based on the size of the enterprise and where they are in the cloud adoption journey.
    -The central IT organization has morphed its role as cloud adoption increases
  • The App is Slow! Learn how to resolve performance issues Fast with nGenuisONE Recorded: Jan 29 2019 23 mins
    Serguei Frampol, Oracle Database Administrator, Forte Data Solutions
    All too often application performance issues first reveal themselves by the end-user’s call to the helpdesk, exclaiming “this application is slow!”

    When this happens, getting to root-cause quickly and allowing for effective troubleshooting and minimal downtime is key to the business and end-user experience.

    Join Serguei Frampol, Oracle Database Administrator with Forte Data Solutions as he discusses how to leverage nGeniusONE to:

    • Gain visibility of all tiers of an Enterprise database deployment
    • Pinpoint the tier, server or application interaction at the root cause of an issue
    • Gain insight into volumes and performance degradations to the database
    • Solve real-life use cases including: slow web applications and e-business suite scenarios
  • Best Practices for Network Packet Aggregation and Visibility Recorded: Dec 19 2018 52 mins
    Eric Gray, Chief Solutions Architect, NETSCOUT and Erik Hjelmstad Security Visibility Specialist, NETSCOUT
    You need full traffic flow visibility for your service assurance and cyber security tools to perform effectively. This means that they should only process the traffic they are designed to see. Otherwise, they waste precious resources filtering or load balancing packets before the security logic can be applied.

    Please join NetScout for the first of our 4-part series on Best Practices for Packet Aggregation. In this first session you will learn:

    • Why organizations are turning to packet aggregators help control their costs of network security and monitoring tools.
    • What packet aggregators do and how they function.
    • What you should consider when selecting the right packet aggregator for your environment?

    Please join NETSCOUT Technology experts, Mark Doering and Eric Gray for this webinar focused on demystifying the market offerings around packet aggregation.
  • How NETSCOUT Customers Master Remote Site Monitoring Recorded: Nov 13 2018 52 mins
    Jason Chaffee, Sr. Product Manager NETSCOUT
    Where are people accessing your network and business critical apps from? If yours’ is like most organizations, the list of “remote sites” continues to grow. And that list is way beyond just the traditional branch office. From each of these locations where people need the network to do their jobs, IT is expected to provide support and troubleshoot issues. Join NETSCOUT on this webinar to learn about the visibility needed to deliver this support and explore:

    * Real-life examples of how companies around the world are monitoring critical network and apps, no matter where they are accessed.

    * Why it is critical to monitor your network even when no one is using the system.

    * How to monitor from locations that do not have IT support on site.

    Attend the webinar and get a free eBook:

    Remote Sites: Monitoring Performance Across the Distributed Enterprise
  • How Carriers Gain Visibility in the Hybrid/Multi-Cloud Recorded: Nov 5 2018 52 mins
    Dr. Vikram Saksena
    Dr. Vikram Saksena, Sr. Director, SBO, NETSCOUT discusses how carriers and enterprises can gain a single source of truth for both application performance and security management in complex, multi-vendor environments.
Ensuring a connected world--one network at a time
NETSCOUT is a market leader in real-time service assurance and cybersecurity solutions for today’s most demanding service provider, enterprise and government networks. NETSCOUT’s Adaptive Service Intelligence (ASI) technology continuously monitors the service delivery environment to identify performance issues and provides insight into network-based security threats, helping teams to quickly resolve issues that can cause business disruptions or impact user experience. NETSCOUT delivers unmatched service visibility and protects the digital infrastructure that supports our connected world. To learn more, visit www.netscout.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Future Proof Your Network - Get NFV Smarter
  • Live at: Oct 24 2018 3:00 pm
  • Presented by: Stephanie Gibbons Principal Analyst, Ovum and Bruce Kelley, Jr, CTO, Service Provider, NETSCOUT
  • From:
Your email has been sent.
or close