Hi [[ session.user.profile.firstName ]]

Testimonial: Nic.br works with NETSCOUT Arbor to protect availability

NIC.br needed to improve the protection of its infrastructure by keeping its systems always available for use by its own teams and customers. The decision to strengthen their defenses against denial of service attacks was a strategic decision in response to the fact that these attacks have been increasing in both frequency and complexity.

A particularly worrying reality for Brazil among the most targeted countries in the world for these attacks, ranking fifth in the ranking of those who suffer most from DDoS attacks, according to data from the 13th Annual Report on Global Network Infrastructure Security (WISR - Worldwide Infrastructure Security Report) from NETSCOUT Arbor.
Recorded Apr 25 2018 5 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Interview
Presentation preview: Testimonial: Nic.br works with NETSCOUT Arbor to protect availability

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Garantizar la continuidad del negocio para ubicaciones remotas y domésticas Recorded: Apr 20 2020 41 mins
    Damian Miguelez Llamas, Engineer NETSCOUT
    Asegurar la continuidad del negocio protegiendo las VPN. Ahora más que nunca es crítico proteger el acceso VPN de ataques tales como los ataques DDoS. En estos momentos en los que una gran parte de los usuarios están trabajando desde casa, una caída de las VPN resulta en la paralización del negocio. Es probable que después del confinamiento El número de usuarios trabajando en remoto se incremente notablemente con respecto al número que había antes de la situación del COVID-19. Por lo tanto, los accesos VPN son y serán más críticos que nunca y deben protegerse frente a posibles ataques.
  • Ensure Business Continuity by Maximizing Visibility Into Your VPN Services Recorded: Apr 16 2020 31 mins
    NETSCOUT Experts: Paul Barrett, CTO Enterprise, Lewis Sharpe, Enterprise IT Architect
    In NETSCOUT’s Business Continuity webinar series, we are sharing how to ensure the performance, availability, and security of essential business services like the network, VPN, VDI, UC&C, Call Centers, Office365, and other SaaS applications.

    In this second webinar of the series, we will discuss the challenges presented by different VPN architectures when the entire company is working remotely. In this webinar, NETSCOUT experts Paul Barrett, CTO for Enterprise and Lewis Sharpe, Enterprise IT Architect, will discuss:
    •How NETSCOUT’s IT organization is using nGeniusONE to gain the visibility it needs to ensure employees have uninterrupted and unimpaired access to the business services they need to work effectively and efficiently from home.
    •Understanding the usage and performance of VPN links, gaining visibility into which services are being used via VPN, whether the Split VPN rules can be further optimized, and helping remote workers to understand how to use the VPN services available more efficiently.
    •Visibility into the impacts that saturated VPN connections has on UC&C service audio and video quality.
    •Tips for quickly configuring VPN centric views and reports in nGeniusONE
  • Arbor DDoS Threat Intel for Situational Awareness Recorded: Apr 9 2020 30 mins
    Tom Bienkowski
    Are you prepared to properly defend yourself if you’re the next target? Join us as we demonstrate Cyber Threat Horizon. Cyber Threat Horizon is a free tool allowing you to leverage global visibility derived from the Arbor Threat Level Analysis System (ATLAS) to gain unique insight into DDoS attack trends and statistics such as size, frequency, attack vector, region of world and/or industry sector – enabling you to gain the situational awareness you need to determine your risk and/or preparedness for a DDoS attack.
  • Ensuring Business Continuity for Remote and Home Locations Recorded: Apr 2 2020 33 mins
    NETSCOUT Experts: Tom Bienkowski Director, Product Marketing and Darren Anstee, CTO
    The COVID-19 pandemic is causing unprecedented work/learn from home policies to be implemented globally and at massive scale. Now running at/near-maximum capacity, the VPN gateway has become a crucial link in the chain of communication from home users to corporate resources. Even the smallest sized DDoS attack now poses a significant threat.

    Join NETSCOUT experts for this brief, informative webinar where you will learn about:

    •Which specific types of DDoS attacks pose the biggest threat to
    your VPN Gateway.
    •How to use Arbor DDoS protection products to mitigate DDoS attacks
    that impact your VPN gateway.
    •New short-term licenses design to easily allow you to increase
    mitigation capacity for Arbor DDoS protection products.
    •A Top 10 List of Other Best Practices for VPN Resiliency.

    In this webinar, which is a first in a series of webinars, we will also introduce you to NETSCOUT’s Business Continuity resource site. The site contains a plethora of information related to how NETSCOUT solutions can help you ensure the performance and availability of essential business services like the network, VDI, UC&C, Call Centers, Office365, and other SaaS applications.
  • NETSCOUT Threat Intelligence Report 2H 2019 Recorded: Mar 5 2020 52 mins
    Gary Sockrider and Richard Hummel
    Today’s attackers have abandoned the equivalent of sledgehammers for a quiver of custom arrows as they increasingly conduct extensive reconnaissance and choose weapons specifically tailored to exploit the defensive weaknesses they discover. Even worse, they have an ever-growing range of new or increasingly used vectors to choose

    NETSCOUT has released the latest Threat Intelligence Report providing findings covering the second half of calendar year 2019. In addition to this detail, this report also includes key findings from the 15th Annual Worldwide Infrastructure Security Report (WISR). Register to listen to our experts highlight these findings from the report. During this webcast, you will learn about: 

    • The rise in Global DDoS attack frequency.
    • Bypassing stout defenses through advance reconnaissance.
    • Highlights from our 15th Annual WISR, and much more.

    Register today, space is limited.
  • What Do Experts Think:Top Security Trends and Recommended RSA Sessions to Attend Recorded: Jan 30 2020 27 mins
    Jim Frazier, Regional Director; Gary Sockrider, Director, Security Technologies; Tom Bienkowski, Director, Product Marketing
    Going or considering attending the RSA 2020 Conference in San Francisco Feb 23-27th? Interested in learning more about the latest cyber threats and best practices in defense? Join NETSCOUT security experts as they share their recommendations for the top sessions to attend in order to gain knowledge on how the industry is evolving and the latest threats impacting business today.

    In this webinar you will learn about:

    - Recommendations on which RSA sessions our experts plan to attend and why.

    - Leading trends coming from the security industry today and into 2020;

    - Latest DDoS attack threats and how they are impacting businesses; and

    - An exclusive invitation to participate in NETSCOUT’s DDoS Attack War Games

    With two decades of expertise and visibility into the landscape, NETSCOUT has fostered security leadership and developed vital research to empower organizations to stay protected. As a key sponsor at RSA, NETSCOUT will be expanding on the information discussed in this webinar and share our vision for security into the next decade.
  • Ensure Successful Application Migrations to AWS Recorded: Jan 14 2020 61 mins
    Ray Krug, Solutions Architect, NETSCOUT and Michael Segal, Strategic Alliances, NETSCOUT
    The combination of cloud, colo and virtualization is changing the data center in ways we never expected in the past. As enterprises implement new technology and look to improve connectivity, the complexity of this hybrid cloud environment adds both security and performance challenges to mission critical applications. It’s not enough to isolate a problem to a specific domain, you need to have visibility across the entire hybrid cloud infrastructure.

    In this webinar you will learn:

    •What is smart data and how to use it to intelligently and efficiently analyze traffic flows for a contextual view of service, and its' interdependencies end-to-end across the service delivery infrastructure.

    •How to accelerate deployments of services into AWS, while assuring application reliability, availability, responsiveness, and business continuity.

    •Real-world examples of how NETSCOUT’s customers have gained visibility across the environment as they build and migrate applications to AWS.
  • Ensure risk-free UC&C and contact center deployments through NETSCOUT visibility Recorded: Dec 17 2019 48 mins
    Ray Krug, Solutions Architect, NETSCOUT
    Delivering high quality UC services for your Enterprise or your Contact Centre is critical to your long-term success. Possibly the first touch your customers have with your organization, or an enabler for efficient collaboration in your organization, you need positive interactions for your business to thrive.

    Attend the webinar: Ensuring risk-free UC&C and contact centre deployments through NETSCOUT visibility solutions and learn about: 

    - Pinpointing the source of failure or quality issues for inbound and outbound calls 

    - Best practices for ongoing performance monitoring Enterprise UC and your Contact centres

    - Leveraging active and synthetic testing for UC availability

    - Ensuring successful UC deployments on premise, in the Cloud or with SaaS providers

    - Customer Success stories for improving your UC performance
  • Packet Brokers for Cost-effective Unified Visibility Across NetOps and SecOps Recorded: Dec 11 2019 51 mins
    Ray Jones, Senior Director, NETSCOUT
    In today’s threat landscape, more tools means more security, right? Not necessarily. The resulting tool sprawl places new and stressful demands on security and network operations. The challenges are especially acute when it comes to active (inline) security systems that are designed to act on live network traffic. Every change or upgrade means a potential network disruption. Trying to deal with this sprawl can be a true IT nightmare.

    Please join Ray Jones, Senior Director at NETSCOUT as we discuss how full packet visibility empowers your security systems to perform at their utmost efficiency – by processing the traffic they are designed to see. In the webinar you will learn:

    How to get unified visibility that allows multiple IT groups to access packet flows without creating disruptions

    Real world examples of how to optimize the flow of traffic from the network to your security systems and monitoring tools

    Ways you can leverage NETSCOUT’s cost-effective and flexible software-driven network packet brokers- at scale
  • Monitoring Encrypted Traffic to Ensure Efficiency and Availability Recorded: Nov 13 2019 46 mins
    Erik Hjelmstad, Senior Technical Marketing Engineer
    In order to ensure networks are efficient, we need to monitor all traffic flowing through the wire. There are many tools to help, but they all rely on being able to read and decode network traffic. When the network traffic is encrypted, these tools provide limited value.

    With the nGenius Decryption Appliance (nDA), you get full visibility into all of the traffic across your network, and the ability to send that traffic to just the tools that need to see it.

    In the Webcast, you will learn about:

    • Expanding visibility by utilizing PFS in front of nDA.
    • Limiting types of decrypted traffic to ensure known good traffic stays encrypted
    • Finding malicious attacks that would otherwise be hidden by encryption
  • Solving UC&C Performance Issues in Contact Centers Recorded: Nov 12 2019 51 mins
    Ray Krug, Solutions Architect, NETSCOUT
    Delivering high quality services in your Contact Center is critical to your long-term success. Your contact center is often the first touch your customers have with your organization, and enables positive and lucrative interactions with your business.

    Join this webinar and learn about:

    •Pinpointing the source of failure or quality issues for in-bound and outbound calls
    •Best practices for ongoing performance monitoring of Contact Centers
    •Leveraging active and synthetic testing for Contact Center availability
    •Ensuring successful Contact Center deployments on premise, in the Cloud or with SaaS providers
    •Customer Success stories for improving Contact Center performance
  • Empowering Your Network to Stop DDoS Attacks Recorded: Sep 19 2019 37 mins
    Scott Iekel-Johnson, Director of Product Management, DDoS Protection at NETSCOUT
    The goal to network protection is pretty simple. We must get ahead of the threats and protect our investments. Instead we continue to play catchup to attackers. While this goal is far from being achieved, we must abandon the idea that discreet solutions can solve multi-vectored threats. No single technology can solve this type of problem by itself. This goes for DDoS attacks like any other sophisticated threat.


    Join NETSCOUT as we discuss how smarter visibility can drives a smarter DDoS protection strategy. As we evolve our Arbor platforms for next generation of DDoS attacks, we are helping Service Providers and Enterprises change their approach to DDoS mitigation.


    In this webinar you will learn how to:

    • Detect attacks by combining smart analytics with best-in-class data

    • Defend from attacks by orchestrating multiple network protections simultaneously

    • Monitor comprehensive protection through a single interface


    With almost 20 years of expertise, the Arbor platforms have unparalleled visibility and knowledge on network-based attacks. Register for this webcast to listen how The Arbor platforms once again raise the bar on network visibility and DDoS protection.
  • Visibility into Applications Anywhere with NETSCOUT Solutions for VMware NSX-T Recorded: Sep 17 2019 40 mins
    Ray Krug, Solutions Architect, NETSCOUT
    With NSX-T, VMware is providing the ability to deliver applications and networks anywhere. NETSCOUT certified solutions for VMware NSX bridges the collaboration and knowledge gap between application, server and network operations teams as they operate in VMware NSX, cloud and legacy environments. Join this webinar to learn about:
    •The challenges and impacts facing IT as applications are hosted between private, public and multi-cloud environments.
    •How NETSCOUT automates the transformation of wire data into Smart Data to provide an early warning system into the issues and fastest path to resolution into the applications and services that you deliver to you customers and users.
    •Examples of how to reduce MTTR with true visibility into the health of application components, their inter-dependencies and interactions with the broader IT infrastructure.
  • Visibility into Applications Anywhere with NETSCOUT Solutions for VMware NSX-T Recorded: Sep 17 2019 41 mins
    Ray Krug, Solutions Architect, NETSCOUT
    With NSX-T, VMware is providing the ability to deliver applications and networks anywhere. NETSCOUT certified solutions for VMware NSX bridges the collaboration and knowledge gap between application, server and network operations teams as they operate in VMware NSX, cloud and legacy environments. Join this webinar to learn about:
    •The challenges and impacts facing IT as applications are hosted between private, public and multi-cloud environments.
    •How NETSCOUT automates the transformation of wire data into Smart Data to provide an early warning system into the issues and fastest path to resolution into the applications and services that you deliver to you customers and users.
    •Examples of how to reduce MTTR with true visibility into the health of application components, their inter-dependencies and interactions with the broader IT infrastructure.
  • NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine Recorded: Sep 5 2019 31 mins
    Hardik Modi, Senior Director, Threat Intelligence and Richard Hummel, Manager, Intelligence
    Cybercrime has entered the mainstream, and the operational model being used has become efficient and effective at invading corporate networks, accessing government agencies and spreading misinformation to the public. While sophisticated malware continues to advance, deceptive practices and social engineering continue to lead the intrusion race.

    NETSCOUT has released the latest Threat Intelligence Report which provides insight into orchestrated attacks and activities analyzed through the first half of the 2019 calendar year. Register to listen to our experts highlight the findings in the latest report. During this webcast, you will learn about: 

    Attackers increasingly taking advantage of everything to discover and weaponize new attack vectors

    DDoS attack frequency growth, especially in the 100 to 400 Gbps capacities

    Malware targeting IoT devices behind firewalls

    Geopolitical adversaries targeting one another to social engineer and misinform the masses

    Register today, space is limited.
  • The Age of Smarter Network Visibility & DDoS Protection is Now Recorded: Jul 30 2019 49 mins
    Zach Wilkinson - Product Manager, Jamal Bethea - Product Marketing Manager, Traffic Visibility Solutions at NETSCOUT
    Your network traffic deserves a purpose-built network Visibility and DDoS protection solution to address your business requirements, but it should be able to provide more. Service Provider and Enterprise businesses share similar struggles when it comes to traffic troubleshooting to maintaining your network uptime. The network is a business and left unprotected, could cause more significant harm for your employees, or even worse, your customers.

    While NETSCOUT continues to enhance our customers' ability to view, analyze, and mitigate their network traffic patterns, other security vendors continue to find the standard challenging to maintain. With enhancements to our Network Visibility and DDoS Protection solution, not only do we continue to address your Visibility and DDoS requirements; we are solving your ability to work smarter and not harder.

    In this webinar, you will learn about improving:

    •Content and subscriber analysis patterns make it easier to see how users value network connectivity so you can forecast future traffic patterns;
    •Operation support requirements such as AWS compatibility, OTT Managed Objects definitions and Webhook notifications; and
    •DDoS attack mitigation capabilities with improved speed to detection and protection with enhanced packet inspection and smarter traffic mitigation design.
  • Enforcing Threat Intelligence at The Network Perimeter Recorded: Jul 16 2019 41 mins
    Tom Bienkowski, Director, Product Marketing, NETSCOUT Chris Rodriguez, Research Manager, Cybersecurity Products, IDC
    Digital transformation (DX) brings both new opportunities and differentiation; along with increases in the cybersecurity attack surface and risk to organizations.

    As bad actors continue to change their techniques, tactics and procedures (TTPs), continuous cyber threat intelligence plays a vital role in protection. But cyber threat intelligence by itself is useless unless it can be made actionable.

    Join NETSCOUT and IDC analyst Chris Rodriguez in this webinar to learn how organizations can enforce continuous threat intelligence at the network perimeter using stateless technology to not only complement stateful components of the cyber security stack (e.g. NGFWs), but also provide the benefit of bi-directional protection.
  • NETSCOUT Worldwide Infrastructure Security Update Recorded: Mar 21 2019 30 mins
    Gary Sockrider, Director – Security Technologist, NETSCOUT
    NETSCOUT’s 14th Annual Worldwide Infrastructure Security Report (WISR) offers a unique view into the most critical security challenges facing today's network operators. The report covers a wide variety of topics, from attack vectors to DNS pitfalls, to key organizational issues such as incident response training and staffing challenges.

    This year, the survey is further enhanced by regional break downs of the Enterprise respondents, thanks to our partners at Intelliclear. Attack types, targets, techniques, motivations, impacts, and costs are all broken out for US and Canada, Brazil, UK, Germany, France, and Japan.

    Join this webcast to learn:

    The challenges ahead for those involved in day-to-day network and security operations.

    How your network infrastructure may be impacted by the rapidly changing threat landscape.

    What your peers are doing to address the threats, as well as persistent staffing challenges.

    Register today, space is limited.
  • Optimizing Traffic Capacity in an Age of Terabit DDoS Attacks Recorded: Feb 12 2019 48 mins
    JP Blaho, Senior Manager, Product Management, NETSCOUT Arbor
    Consumer reliance on the Internet as well as business dependencies continue to expand through Cloud-based applications and services. This demand places an increased burden on Service Provider networks. Additionally, the growth in volumetric-based DDoS attacks is making it difficult for Service Providers to discern what is good traffic versus bad.

    In this session, NETSCOUT Arbor will walk you through a series of use cases to show how Service Providers are optimizing their current DDoS protection capacity while incorporating predictability in their growth strategy.
  • NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018 Recorded: Aug 23 2018 59 mins
    Hardik Modi, Sr Director – Threat Intelligence and Richard Hummel, Threat Intelligence Manager, NETSCOUT
    The symbiotic nature of the digitally transformed world also adds vulnerability, as malicious actors, nation states, criminal organizations, or even individuals can capitalize on the interdependencies that wind through our pervasively connected world.

    The availability of innovative DDoS attack tools and techniques has lowered the barrier of entry, which means an increase in the number of attackers launching DDoS attacks. Attack targets have also diversified. It used to be that finance, gaming, and e-commerce verticals were likely targets. Today, any organization, for any real or perceived offense or affiliation, can become a target of a DDoS attack. This while APT group and crimeware activity continues to grow, as actors in this space develop and unleash increasingly sophisticated attacks worldwide.

    Attend this webcast to learn:

    •Understand what is happening on the DDoS Landscape – the largest attacks and what is driving them
    •How Nation-State activity is going ‘internet-scale’
    •Botnets, crimeware, intrusions – how these facets of the threat landscape tie in together
Webcasts for Network and Security Pros
Current DDoS and Cyber Threat strategies, best practices and latest trends.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Testimonial: Nic.br works with NETSCOUT Arbor to protect availability
  • Live at: Apr 25 2018 3:45 pm
  • Presented by: Interview
  • From:
Your email has been sent.
or close