Search Results for: network

DX NetOps: Modern Network Monitoring with Broadcom Software
[India Time Zone] IT operations teams often struggle to assemble an effective network performance management (NPM) toolkit because the landscape is becoming increasingly complex each day. The Operations, Administration, and Management (OAM) based low fidelity data collection methods e.g. SNMP, ping had been historically targeted towards human operators to monitor and diagnose the traditional data center networks. With modern high-definition network telemetry data from SDN, SD-WAN, hybrid cloud(s), real-time observability becomes a challenge, resulting in blind spots, higher MTTR. The sheer volume, velocity, and veracity of network monitoring data stream isn’t actionable by human operators efficiently anymore; it’s only suitable to be consumed by machines. Broadcom is collecting your personal data when you submit such information as part of the BrightTALK registration process. Your personal data is processed according to Broadcom's Privacy Policy: https://www.broadcom.com/company/legal/privacy/policy When you interact with Broadcom, this serves as your authorization to BrightTALK to provide your contact information to Broadcom in order for Broadcom to follow up on your interaction.

TOPICS:

Exploring the Key Components of a Zero Trust Network Architecture
A Zero Trust Network Architecture (ZTNA) is a security framework that assumes that no user or device can be trusted by default. Instead, access to resources is granted based on the user's identity and the context of the request. Users and devices must be authenticated and authorized before they are allowed to access any resources. In this interview, Benny Lakunishok, CEO, Zero Trust Networks, discusses why a Zero Trust approach to security remains important, what the key elements of a ZTNA are and how to implement Zero Trust successfully across your organization.

TOPICS:

Under the Hood: Technical Preview of CloudGuard Network Security as a Service
Jeff Engel, Cloud Security Technical Marketing Engineer at Check Point, provides a technical preview and showcases some of the newest innovations to CloudGuard Network Security as a Service (NSaaS). See how easy it is to extend cloud native network security to protect your AWS infrastructure and improve security operations. In this technical session presented together with CheckMates, you will see how CloudGuard NSaaS is integrated with AWS services making it easier to scale and manage advanced threat prevention services.

TOPICS:

EP 101: A New Education & Collaboration Network for Sustainable Finance
After many years in the asset management industry, Kirshman launched Impact Metropolis as a social network and video hosting site dedicated to the sustainable and impact investing community. According to Kirshman, as sustainable investing becomes more mainstream, collaboration and sharing of information is being impacted. Kirshman describes how Impact Metropolis is both aggregating resources across the sector and providing a platform where individuals and businesses, both new to impact investing and seasoned professionals, can network, promote their services, and connect with others in the field.

TOPICS:

Roundtable: DDI for Supporting Network Best Practices and Initiatives
“You never know how much data you have until you put it all into one place. Having the primary source of truth be the IPAM was eye-opening for us.” - Ben Higgins, formerly of WPI Join the roundtable moderated by EfficientIP, alongside network managers from McGill University and Worcester Polytechnic Institute, as they candidly discuss the use of DDI (DNS-DHCP-IPAM) within their networks. This session covers: --COVID-19 shifts --Helpful integrations and future strategic IT initiatives --Advice to peers --Use of EfficientIP SOLIDserver

TOPICS:

THREE BEERS IT Ep.5–Network Automation and AI Ops
Automation on the network: most hated ally or best loved enemy? IT professionals have a long-running love/hate relationship with automation tools. Automation is essential to scale and speed—but has tended to have problems in environments that are multivendor, multigenerational, and inconsistent in configuration. That is to say, most environments! John is joined by Dave Siegel, a pro with decades of experience building, operating, and automating networks. They dig into how IT teams can build a better relationship with the automation they depend on more and more each day. ON TAP: • “Lonely Blonde” American Blonde Ale, Fulton Brewing (Minneapolis, MN) • Kilchoman “Sanaig” Single Malt Scotch (Islay) WITH: Host: John Burke – CTO and lead researcher, Nemertes Guest: David Seigel – President of Siegel Group—“Focusing on transformative network projects” – IT After Hours – About THREE BEERS IT: A home for disinhibited conversations about the world of IT, the things that don’t get said until you’re on your 3rd beer…

TOPICS:

Foundational Network and Security Building Blocks for Digital Transformation
Infoblox DNS, DHCP and IP Address Management (or DDI) Core Network Services deliver next-level visibility, resiliency and control for traditional, software-defined, and multi-cloud networking environments. It empowers IT and DevOps through automated provisioning and centralized control of the distributed enterprise, ensuring that only approved device access network resources. Cloud service requests are directed to the most efficient entry points, and guarantees local survivability of active sessions even if datacenter connections are lost. Our capabilities enable you to stay ahead of the growing demands of your organization and helps protect against rising cyber security threats and improves remediation response times. This webinar will cover how to: - Simplify and automate multi-cloud deployments - Strengthen and optimize your security posture - Provide cloud-native foundation for locally survivable secure Edge

TOPICS:

5G Networks and Edge Computing for a Greener World
Just as cloud-native, virtualized 5G networks continue to bring tremendous benefits in bandwidth connectivity, they also reduce environmental costs compared to previous network technologies. This webinar will explain how zero-touch provisioning allows the new RAN and core, based on Commercial-Off-The-Shelf (COTS) hardware and containerized software, to be configured and upgraded remotely. This drastically reduces the number of costly technician visits. Supermicro will also detail developments in 5G networks and edge computing, powered by the industry’s broadest portfolio of systems supporting 3rd Gen Intel® Xeon® Scalable processors. These high-performance infrastructures enable smarter cities, stores, and factories, increasing efficiency in the production of goods and services. Additionally, we will examine how modular system upgrades and re-purposing of equipment eliminate significant amounts of e-waste.

TOPICS:

Preventing Cyber Attacks on Enterprise Networks and IoT Devices
Cyber criminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 67% of enterprises use IoT, many organizations are exposed. A range of IoT devices are connected to corporate networks, which extends the attack surface, providing more entry points for hackers. Join the webinar to learn how to prevent enterprise-related IoT cyber attacks by: •Exposing all IoT security risks across the network •Easily creating zero trust policies to secure thousands of IoT devices •Enforcing multi-layered protections at the network and device levels Can't join this session? Please join us for another session on July 30th at 9 am London | 11 am Paris | 4 pm HKT: https://bit.ly/2B4Sq3F

TOPICS:

[On demand] Protecting Networks and Applications As A Managed Security Service
Managed security service providers (MSSPs) who sell managed security services to their enterprise customers and tenants continue to evolve these security services to meet the complex requirements associated with threat mitigation in a multi-cloud and hybrid environment. To be successful as a business, MSSPs must strike a delicate balance between providing scalable and cost-effective security services, overcoming cost and operational challenges, and differentiation with an innovative security portfolio without impacting the quality-of-service experience (QoE.) This webinar will document and provide open discussion on how MSSPs are navigating this evolving landscape. Topics to be discussed include: - The security impacts of the evolving threat landscape - The challenges of protecting networks and applications in a multi-cloud, multi-tenant environment - Key use cases for protecting networks and applications for carriers and service providers - How to enable network and application security services quickly and cost-effectively

TOPICS: