Search Results for: network

Does Your Network Need a Watchman?
Join SonicWall Cybersecurity expert & Senior Solutions architect, Muhammed Jihad, as he explores the risks of not inspecting encrypted traffic — such as security holes, ransomware, and compliance issues - and what your network needs to do to gain visibility into this growing attack vector.

TOPICS:

Non-IP Networking: where, why and how
ETSI ISG NIN (Non-IP Networking) was formed to support 21st century use cases by standardizing a platform that is not reliant on the TCP/IP suite, though TCP/IP is one of the protocols it supports. Speakers will include: - John Grant (NIN chair): who will give an outline of the main features; documents published and in preparation; - Leo Wang (Birmingham City University) and a speaker from University of Surrey (probably Ning Wang, tbc): outlining previous academic work and new trials; - Kevin Smith (NIN vice-chair; Vodafone): Implementing Non-IP networking over 3GPP cellular access. The webinar will close with a Q&A session.

TOPICS:

About Arctic Wolf Networks
Arctic Wolf Networks provides a dynamic security service that combines world-class security engineering, advanced machine intelligence, and comprehensive up-to-the-minute service intel for effective, affordable cybersecurity. Watch this brief video to more about Arctic Wolf and AWN CyberSOC.

TOPICS:

How to Detect Ransomware in your Network
Do you know that your network is under attack every 39 seconds? Do you know that it takes an average of 300 days to detect a ransomware attack or data exfiltration? The ever-changing nature of ransomware oftentimes allows it to slip under the radar of the perimeter, bypass end-point security, and get lost in a bunch of false positives or hide in blind spots in network visibility. That is why it is crucial to detect ransomware at an early stage and act before it harms your organization. Join this webinar to learn: - How NDR and NPMD solutions address these security issues and enable organizations to proactively protect themselves - Discover what a common ransomware scenario looks like from the attacker's perspective - Learn how Kemp's Flowmon solutions are able to detect the ransomware attack several times during its deployment, using a combination of AI, Machine Learning and behavior patterns

TOPICS:

Off-Network: The New Security Normal
Long gone are the days when Security Professionals could protect their actual network and not have to worry about organization, employee, student or customer information being at risk. In today's always-connected world, much happens beyond the network (especially in the cloud) and the concept of perimeter security has all but evaporated. Wherever Users are - the office, the classroom, traveling, or working from home - organizations need to enable security so Users can easily and safely to do their jobs. Users want to be able to just "connect" and work-- oblivious to the dangers out there. Moving security "behind the scenes" means needing to be more predictive about how attacks will happen and engaging early in the attack cycle. DNS-layer security is an important component piece of an overall security strategy that aims to stop attacks before they cause irreparable harm. Watch this webcast to learn more.

TOPICS:

How to Prepare Your Network for the Cloud
Enterprise application migration to the cloud is forcing the re-evaluation of traditional WAN architectures. The wide distribution, dynamic nature and public cloud location of these cloud application workloads significantly changes the architectural requirements. Both private network and Internet accessibility must be considered. How can both on-premises and cloud applications be seamlessly incorporated into the same architecture, operational management, and business policies? What are the critical ingredients of a WAN architecture to provide the performance, security, reliability and operational efficiency necessitated by these new hybrid or cloud application architectures? Join us to learn how SD-WAN (Software-Defined Wide Area Network) can optimally address these new requirements. Gain an understanding of the different approaches - Do It Yourself, Cloud Delivered SD-WAN as a Service, and Managed SD-WAN solutions from service providers.

TOPICS:

Automation for Heterogeneous Networks
Automation is essential to enable very large-scale and agile networks that can be dynamically reconfigured to meet the ever-changing workload demands stemming from the IoT, autonomous vehicles, and enhanced edge applications providing immersive experiences. In this webinar FRINX will take you through existing challenges, new solution approaches and real life case studies detailing how we solve automation at global scale.

TOPICS:

Network Troubleshoot from the Bottom Up
In this webinar, we are going to take a close look at the OSI model and how it can be used as a template for getting to the root of network problems quickly. As part of this troubleshooting process, we will explore how the NetAlly EtherScope nXG may be used to validate layers 1-4. – Review of the OSI model – The role of each layer – Validating each layer from the bottom up – Troubleshooting when a failure occurs – Ensuring the fix had the desired results

TOPICS:

Transforming the Network Edge
Slow deployment times, expensive private lines, and jittery connections are all realities of today’s WAN infrastructure. VMware SD-WAN™ by VeloCloud® aims to change that by rethinking the WAN. Through Dynamic Multipath Optimization™, zero touch deployments, hyperscale Orchestrators and cloud optimized gateways, VMware SD-WAN aims to solve your WAN challenges and prepare your network for the future. In this webinar we will go over the basics of the VMware SD-WAN solution, including: connection reliability, performance, deployments, security, connection to the cloud, a live demo and more.

TOPICS:

Transforming the Network Edge
Slow deployment times, expensive private lines, and jittery connections are all realities of today’s WAN infrastructure. VMware SD-WAN™ by VeloCloud® aims to change that by rethinking the WAN. Through Dynamic Multipath Optimization™, zero touch deployments, hyperscale Orchestrators and cloud optimized gateways, VMware SD-WAN aims to solve your WAN challenges and prepare your network for the future. In this webinar we will go over the basics of the VMware SD-WAN solution, including: connection reliability, performance, deployments, security, connection to the cloud, a live demo and more.

TOPICS: