Hi [[ session.user.profile.firstName ]]

Best Practices for Troubleshooting UC&C Issues On-premise and in the Cloud

Assuring UC&C service quality as you bring together multiple vendors and platforms into your complex, hybrid infrastructure is an everyday challenge. Getting to root-cause quickly so you can reduce MTTR is a requirement.

Learn from our NETSCOUT Engineers, Rene Alvarado and Leon Li, both who bring over 20 years of experience working with the Fortune 100, deploying UC &C and solving the most critical business application performance problems.

In this 60 minute interactive presentation, featuring real-world examples, you will learn:

• How you can optimize your Unified Communication & Collaboration Services with best practices to help save money and time, avoid headaches, and protect the quality of your UC&C environment.

• How to identify the causes of poor quality so you can attack and remediate them immediately, before moving on to migration and deployment of your UC cloud deployment

• When you experience UC&C service degradation, the information you need to remedy the problem

• Best practice troubleshooting workflows for signaling voice/video quality issues
Recorded Oct 25 2018 41 mins
Your place is confirmed,
we'll send you email reminders
Presented by
NETSCOUT: Jim Frazier, Regional Director, Rene Alvarado, Solutions Engineer, Leon Li,Solutions Engineer
Presentation preview: Best Practices for Troubleshooting UC&C Issues On-premise and in the Cloud
  • Channel
  • Channel profile
  • The Age of Smarter Network Visibility & DDoS Protection is Now Jul 30 2019 3:30 pm UTC 45 mins
    Zach Wilkinson - Product Manager, Jamal Bethea - Product Marketing Manager, Traffic Visibility Solutions at NETSCOUT
    Your network traffic deserves a purpose-built network Visibility and DDoS protection solution to answer your requirements, but it should be able to achieve much more. What if we said it should not stop at analysis and mitigation? What if we told you both solutions could work smarter? An intelligent way to analyze and protect your network is here.

    While NETSCOUT continues to enhance our customers' ability to view, analyze and mitigate their network traffic patterns, other security vendors continue to find the standard challenging to maintain. With enhancements to our Network Visibility and DDoS Protection solution not only do we continue to address your Visibility and DDoS requirements; we are solving your ability to work smarter and not harder.

    In this webinar you will learn about:
    - Content and subscriber analysis patterns make it easier to see how users value network connectivity so you can forecast future traffic patterns
    - Introduction of AWS compatibility, OTT MO definitions, and Webhook Notifications addresses operational support requirements
  • Live Demo of OptiView XG Jun 13 2019 5:00 pm UTC 60 mins
    Mike Pennacchi, Network Protocol Specialists
    Troubleshooting performance problems in today’s networks is only getting more complex:

    • Growth of 10G links with limited visibility
    • Increasing demands on wireless networks
    • Complex infrastructure with outdated documentation

    Last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.

    Please join us for a free webinar where Mike Pennacchi will talk about these issues and present a live demo of the OptiView® XG Network Analysis Tablet.

    XG expedites network performance problem solving by automating root cause analysis and providing guided troubleshooting to address problem areas - anywhere on the network – wired or wireless.
  • How to Enforce Threat Intelligence at Your Perimeter Jun 6 2019 3:30 pm UTC 45 mins
    Tom Bienkowski, Director, Product Marketing, NETSCOUT
    Be it public, commercial, or private, cyber threat intelligence comes from many different sources and plays a vital role in an organization's cybersecurity strategy. But threat intelligence by itself is useless unless it can be made actionable.

    So, once you have that intelligence in hand, how do you enforce it at the perimeter of your network?

    Register for this live webinar and learn about:
    •Utilizing threat intelligence from a variety of sources;
    •How stateless technology at the network perimeter can take the load off stateful devices such as NextGen Firewalls;
    •The latest threat trends identified in NETSCOUT's Threat Intelligence Report and 14th Annual Worldwide Infrastructure Security Report.

    Register today, space is limited.
  • A New Way to Solve Wi-Fi Problems Recorded: May 21 2019 42 mins
    John Anderson, NETSCOUT Product Manager
    IT has traditionally measured and reported on Wi-Fi KPI’s, then tried to determine if the alert really reflects a problem, and then escalated to a Wi-Fi expert. But, does the alert really mean there is a problem affecting users? And, is it actually a Wi-Fi problem or something else in the network?
    Join NETSCOUT’s Jason Chaffee as he discusses a new way to monitor Wi-Fi using nGeniusPULSE to:
    •DETECT – based on user experience of apps and services
    •ISOLATE – isolate fault to Wi-Fi link, network, server, or app. If Wi-Fi, isolate to access point
    •DIAGNOSE – address specific issue on specific access points
  • Live Demo of OptiView XG Recorded: Apr 11 2019 64 mins
    Mike Pennacchi, Network Protocol Specialists
    Troubleshooting performance problems in today’s networks is only getting more complex:

    • Growth of 10G links with limited visibility
    • Increasing demands on wireless networks
    • Complex infrastructure with outdated documentation

    Last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.

    Please join us for a free webinar where Mike Pennacchi will talk about these issues and present a live demo of the OptiView® XG Network Analysis Tablet.

    XG expedites network performance problem solving by automating root cause analysis and providing guided troubleshooting to address problem areas - anywhere on the network – wired or wireless.
  • NETSCOUT Threat Intelligence Report 2H 2018: Dawn of the Terrorbit Era Recorded: Feb 28 2019 57 mins
    Hardik Modi, Sr Director - Threat Intelligence, NETSCOUT and Richard Hummel, Threat Intelligence Manager, NETSCOUT
    When it comes to the global threat landscape, the second half of 2018 revealed the equivalent of attacks on steroids, as attackers bulked up existing tactics, rapidly evolved new ones, and applied smart business techniques to vastly accelerate their growth rate. IoT devices were attacked within five minutes of being plugged into the internet. Nation-state APT group activity ratcheted up in volume and targets while existing actors continued to innovate, including the first observed use of Chrome extensions to enable persistence in the STOLEN PENCIL campaign. Finally, the use of business practices such as the affiliate model empowered crimeware such as Danabot to achieve rapid global targeting.

    Attend this webcast to learn about:

    Nation State Innovation in APT: new groups discovered and new TTPs combining custom tools and crimeware

    Crimeware goes to B School: We saw a robust marketplace driven by well-stocked innovation pipelines from rapidly growing organizations

    Understanding the ever-changing DDoS landscape – key vertical targeting and techniques

    Register today, space is limited.
  • Scaling security at the Internet edge with stateless technology Recorded: Feb 20 2019 32 mins
    Tom Bienkowski – NETSCOUT Arbor, Director, Product Marketing
    As the scale of all types of attacks continues to increase, traditional stateful perimeter security devices like firewalls often strain to keep up. Adding stateless technology between the firewall and the Internet router, armed with advanced reputation and threat intelligence data, can decrease the heavy load on your existing perimeter defenses, protect them from state exhaustion attacks, and even provide blocking of outbound threats (like bots communicating with C&C). This webinar will explore the realm of stateless technology and the Internet edge, with best practices, lessons learned, and key deployment strategies that will prepare attendees for a future of increasing and diverse attacks.

    During this webinar we will talk more about:

    - Understand the limitations of existing perimeter security solutions because of their stateful nature

    - See how stateless technology can protect you from inbound attacks (like DDOS), more efficiently block inbound IoCs and outbound threats (communications with suspicious destinations based on reputation)

    - Learn how stateful and stateless technologies can work together the make a more secure Internet edge

    - Arm yourself with protection against Internet-scale attacks

    - Answers to audience questions during live Q&A​

    Featured Speaker:

    Tom Bienkowski – NETSCOUT Arbor, Director, Product Marketing

    Tom has been in the network and security field for over 20 yrs. During this time, he has worked for large enterprises as a Network Engineer and for multiple network management and security vendors where he has had roles in Sales Engineering /Management, Technical Field Marketing and Product Management. Currently at NETSCOUT he’s a Director of Product Marketing focusing on their industry leading Edge Defense and Threat Intelligence solutions. Tom routinely speaks at IT security events around the world providing insights into cyber threats and best practices in defense.
  • State of the Cloud in the Enterprise Recorded: Feb 4 2019 28 mins
    Dr. Mazin Yousif, Editor IEEE Cloud Computing Magazine
    Cloud computing has become the de-facto hosting platform for all types of applications, social innovations and use cases such as Big Data, the Internet of Things, smart mobility and social networking – basically it is the new normal. This is true everywhere including all industry sectors and companies in all sizes.

    Bringing new technology into the market always comes with many challenges. This is no different for cloud computing, even though its adoption in the market has been very fast. I usually bucket cloud adoption challenges in three categories, namely: migration, Total Cost of Ownership (TCO) and Data handling. According to surveys by Netscout and RightScale published in 2018, a cloud users leverage on average around 5 clouds; hybrid and multi-clouds are likely the future; security, managing cost and lack of skilled resources rank on the top challenges; & as expected there are still migration challenges.

    In this talk, I will provide my views on the state of cloud computing in the enterprise, talk about the challenges and talk about the typical role of the CIO to deal with digital transformation challenges.

    Key Take away:

    -Enterprises uses many cloud services at any one time
    -Hybrid cloud and multi-clouds seem to be the way forward
    -Cloud challenges in the Enterprises vary based on the size of the enterprise and where they are in the cloud adoption journey.
    -The central IT organization has morphed its role as cloud adoption increases
  • The App is Slow! Learn how to resolve performance issues Fast with nGenuisONE Recorded: Jan 29 2019 23 mins
    Serguei Frampol, Oracle Database Administrator, Forte Data Solutions
    All too often application performance issues first reveal themselves by the end-user’s call to the helpdesk, exclaiming “this application is slow!”

    When this happens, getting to root-cause quickly and allowing for effective troubleshooting and minimal downtime is key to the business and end-user experience.

    Join Serguei Frampol, Oracle Database Administrator with Forte Data Solutions as he discusses how to leverage nGeniusONE to:

    • Gain visibility of all tiers of an Enterprise database deployment
    • Pinpoint the tier, server or application interaction at the root cause of an issue
    • Gain insight into volumes and performance degradations to the database
    • Solve real-life use cases including: slow web applications and e-business suite scenarios
  • Best Practices for Network Packet Aggregation and Visibility Webinar Series Recorded: Dec 19 2018 52 mins
    Eric Gray, Chief Solutions Architect, NETSCOUT and Erik Hjelmstad Security Visibility Specialist, NETSCOUT
    You need full traffic flow visibility for your service assurance and cyber security tools to perform effectively. This means that they should only process the traffic they are designed to see. Otherwise, they waste precious resources filtering or load balancing packets before the security logic can be applied.

    Please join NetScout for the first of our 4-part series on Best Practices for Packet Aggregation. In this first session you will learn:

    • Why organizations are turning to packet aggregators help control their costs of network security and monitoring tools.
    • What packet aggregators do and how they function.
    • What you should consider when selecting the right packet aggregator for your environment?

    Please join NETSCOUT Technology experts, Mark Doering and Eric Gray for this webinar focused on demystifying the market offerings around packet aggregation.
  • What’s new with AirCheck G2 v3? Recorded: Nov 28 2018 36 mins
    Julio Petrovitch, Product Manager
    AirCheck G2 has new enhancements that will allow wireless professionals to get over the air firmware updates and upload more test results to the complimentary Link-Live Cloud Service. Over-the-network profile sharing will also now be available.
    Additionally, there has been enhanced AP name support and improved packet captures!
    Attend this webinar with CWNP Julio Petrovitch, the AirCheck G2 product manager to learn more.
  • How NETSCOUT Customers Master Remote Site Monitoring Recorded: Nov 13 2018 52 mins
    Jason Chaffee, Sr. Product Manager NETSCOUT
    Where are people accessing your network and business critical apps from? If yours’ is like most organizations, the list of “remote sites” continues to grow. And that list is way beyond just the traditional branch office. From each of these locations where people need the network to do their jobs, IT is expected to provide support and troubleshoot issues. Join NETSCOUT on this webinar to learn about the visibility needed to deliver this support and explore:

    * Real-life examples of how companies around the world are monitoring critical network and apps, no matter where they are accessed.

    * Why it is critical to monitor your network even when no one is using the system.

    * How to monitor from locations that do not have IT support on site.

    Attend the webinar and get a free eBook:

    Remote Sites: Monitoring Performance Across the Distributed Enterprise
  • Navigating the High Power PoE minefield with confidence Recorded: Nov 13 2018 50 mins
    Vincent Choi, Senior Product Manager
    With the ratification of the IEEE 802.3bt standard, new types of PoE devices are bound to be introduced in the market. With heightened safety and interoperability concerns, you will need to know the challenges that high power PoE brings as well as the status of the cabling and PoE equipment market today. This webinar covers the following topics:
    •Quick review: How does PoE work
    •What are considerations when deploying High Power PoE
    •Are there standardized best practices to help deployment?
    The overall benefit of PoE is to facilitate the ease of deployment of network connected devices. When deploying a PoE system the power delivery, types and classes, and power managements must be considered. This webinar will arm you with the knowledge to deploy PoE enabled devices in the most effective way possible.
  • How Carriers Gain Visibility in the Hybrid/Multi-Cloud Recorded: Nov 5 2018 52 mins
    Dr. Vikram Saksena
    Dr. Vikram Saksena, Sr. Director, SBO, NETSCOUT discusses how carriers and enterprises can gain a single source of truth for both application performance and security management in complex, multi-vendor environments.
  • NETSCOUT Election Security Initiative - Common-Sense Steps for Elections Recorded: Nov 2 2018 8 mins
    Mike McNerney
    Elections systems are like banks, in that our faith in their security matters almost as much as the actual security itself. As we are beginning to learn, if you undermine that faith, you can do a lot of damage. One only needs to turn on cable news for a few minutes to realize that our nation’s adversaries have proven they can attack our elections and be effective.
  • NETSCOUT Election Security Initiative - Common-Sense Steps for Elections Recorded: Oct 25 2018 8 mins
    Mike McNerney
    Elections systems are like banks, in that our faith in their security matters almost as much as the actual security itself. As we are beginning to learn, if you undermine that faith, you can do a lot of damage. One only needs to turn on cable news for a few minutes to realize that our nation’s adversaries have proven they can attack our elections and be effective.
  • Best Practices for Troubleshooting UC&C Issues On-premise and in the Cloud Recorded: Oct 25 2018 41 mins
    NETSCOUT: Jim Frazier, Regional Director, Rene Alvarado, Solutions Engineer, Leon Li,Solutions Engineer
    Assuring UC&C service quality as you bring together multiple vendors and platforms into your complex, hybrid infrastructure is an everyday challenge. Getting to root-cause quickly so you can reduce MTTR is a requirement.

    Learn from our NETSCOUT Engineers, Rene Alvarado and Leon Li, both who bring over 20 years of experience working with the Fortune 100, deploying UC &C and solving the most critical business application performance problems.

    In this 60 minute interactive presentation, featuring real-world examples, you will learn:

    • How you can optimize your Unified Communication & Collaboration Services with best practices to help save money and time, avoid headaches, and protect the quality of your UC&C environment.

    • How to identify the causes of poor quality so you can attack and remediate them immediately, before moving on to migration and deployment of your UC cloud deployment

    • When you experience UC&C service degradation, the information you need to remedy the problem

    • Best practice troubleshooting workflows for signaling voice/video quality issues
  • Future Proof Your Network - Get NFV Smarter Recorded: Oct 24 2018 52 mins
    Stephanie Gibbons Principal Analyst, Ovum and Bruce Kelley, Jr, CTO, Service Provider, NETSCOUT
    With dynamic service and network configuration taking place within a complex operating environment, service assurance platforms will need to optimize intelligence to identify if a fault is at the virtual network function (VNF), physical network function (PNF), or cloud infrastructure to assure the reliability and quality of services in a hybrid network environment. End-to-end service management is crucial as Carrier Service Providers (CSP) aspire to the real networking end game: closed-loop automation.

    In this webinar learn about:

    • Why CSPs are turning hard into the network virtualization journey
    • Why Telco cloud, automation, and analytics are essential to NFV
    • Ready or not: lingering concerns for CSPs over NFV
    • 5 key features for a successful NFV platform
    • NETSCOUT’s carrier-grade, software-optimized solution – designed for the cloud

    Our presenters will discuss the complexities and challenges for CSPs, as they transition from traditional platforms to deploying and managing the new software-based platforms and applications, required for service agility in a hybrid networking environment.
  • Secure and Successful Deployments of NSX: Extend Your Visibility with NETSCOUT Recorded: Oct 16 2018 60 mins
    Ray Krug, Enterprise Solutions Architect NETSCOUT
    Making the decision to evolve to the agile NSX SDDC environment as part of your Digital Transformation initiative brings its own challenges of security design and application deployment; and is not without risk. This means that maintaining visibility to assure your business service into this new virtual, secure world is critical to migration success.

    Join Ray Krug, Enterprise Solutions Architect as he discusses how you can leverage NETSCOUT, a VMware Ready Certified Partner in Networking and Security for SDDC space, and your existing nGenusONE Service Assurance platform to extend continuous visibility of your micro-segmented environment, to assure the successful deployment and ongoing security and performance of services in your NSX environment.

    Key takeaways from this session:

    •The challenges faced by IT, DevOPs and Security in the NSX SDDC

    •How NETSCOUT can extend the visibility you already depend on with deployment in an NSX environment.

    •An example use case of application deployed in NSX being monitored by NETSCOUT

    •Demonstrate how NETSCOUT provides visibility for SDDC in NSX and beyond into the public cloud.
  • Future Smarter with NETSCOUT – Migrate to the Hybrid Cloud with Confidence. Recorded: Oct 2 2018 47 mins
    Ray Krug, Enterprise Solutions Architect, NETSCOUT
    The ever-increasing pace of digital transformation is making businesses ever more reliant on interconnected software applications, substantially increasing complexity for deploying and managing these new services. In addition, increased dependence on hybrid cloud magnifies the risk that these technologies may slow down or end up failing. In this webinar, join Ray Krug, Enterprise Solutions Architect at NETSCOUT to learn about:

    • The challenges facing IT teams and the potential barriers that threaten the operation and migration of applications on-prem, off-prem and in hybrid environments

    • How you can extend the smart data your IT team has relied on in your physical and virtual worlds to maintain continuity, visibility and service throughout the transition to public cloud

    • Real-life examples of how businesses have harnessed this visibility in their Cloud environments.
Ensuring a connected world--one network at a time
NETSCOUT is a market leader in real-time service assurance and cybersecurity solutions for today’s most demanding service provider, enterprise and government networks. NETSCOUT’s Adaptive Service Intelligence (ASI) technology continuously monitors the service delivery environment to identify performance issues and provides insight into network-based security threats, helping teams to quickly resolve issues that can cause business disruptions or impact user experience. NETSCOUT delivers unmatched service visibility and protects the digital infrastructure that supports our connected world. To learn more, visit www.netscout.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices for Troubleshooting UC&C Issues On-premise and in the Cloud
  • Live at: Oct 25 2018 5:00 pm
  • Presented by: NETSCOUT: Jim Frazier, Regional Director, Rene Alvarado, Solutions Engineer, Leon Li,Solutions Engineer
  • From:
Your email has been sent.
or close