Search Results for: network

How to Recognize Malicious DNS with Free Network Monitoring Tools
DNS is woven into the fabric of both the Internet and corporate intranets. It works so well that you might even forget it exists—until it is used against you. Hackers are using DNS to find Command and control (C2) servers, control compromised systems, and exfiltrate your data. In this free training webinar, a group of security experts from LogRhythm and Ultimate Windows Security team up to show you how to spot threatening DNS activity with LogRhythm NetMon Freemium. You’ll learn about the malicious use of DNS and how to detect: - Domain-generation-algorithm (DGA) queries - C2 data tunneled through DNS - Data exfiltration via tunneled DNS Watch now to learn how to stop hackers from exploiting DNS to infiltrate your network.

TOPICS:

SMALL BYTES: How To Understand the Business Impact of Network Performance
NetOps from Broadcom provides a comprehensive set of tools for creating, managing, and monitoring business services, Service Level Agreements (SLAs), and service customer models. In this episode, learn how to leverage our NetOps fault-management capabilities to provide real-time and historical insights into the status of your service management network components. Broadcom is collecting your personal data when you submit such information as part of the BrightTALK registration process. Your personal data is processed according to Broadcom's Privacy Policy: https://www.broadcom.com/company/legal/privacy/policy When you interact with Broadcom, this serves as your authorization to BrightTALK to provide your contact information to Broadcom in order for Broadcom to follow up on your interaction.

TOPICS:

Engineering a Better Network Solution: SD-WAN for the Win!
With a vision to expand its offices, increase the number of supported job sites, and migrate critical applications and data to the cloud via Azure and AWS, BGE needed to adopt a new network architecture able to support future growth and opportunities. Rather than continue investing in a costly and inflexible MPLS transport that didn’t support its need for cloud connectivity, BGE sought a modernized technology solution. In this webinar, learn how BGE implemented SD-WAN via its partner, Meriplex Communications, with business changing results. * Speakers: Michael Franklin, Director and CIO at BGE, Inc Rachel Richburg, Account Executive at Meriplex David Turner, Principal Technologist at Meriplex

TOPICS:

Automating Network Infrastructure Tasks with A10 and HashiCorp
Cloud adoption has been on the rise and many organizations operate their application services in multi and/or hybrid-cloud environments. While both bring benefits for services it also increases complexity for managing and operating application delivery globally and across multiple clouds and data centers. This requires collaboration between NetOps and DevOps teams to optimize the operation, thus motivating organizations to move towards software-defined data center (SDDC) architectures, enabling an orchestration and automation approach using DevOps tool chains. In this webinar, we will discuss: • Challenges in hybrid-cloud based application deployment • How the Network Infrastructure Automation approach helps Day-N operation • Demo: A10 Thunder ADC integration with HashiCorp NIA tools

TOPICS:

Why Sangfor is a “Visionary” in the Gartner Magic Quadrant for Network Firewalls
Sangfor is once again named a “Visionary” in the prestigious Gartner Magic Quadrant for Network Firewalls 2022. The latest recognition marks the 8th year Sangfor has been recognized in this Magic Quadrant and the 2nd consecutive year as a Visionary, an affirmation of the continuous innovation and powerful functionality delivered by Sangfor’s NGAF brand of Next-Generation Firewalls. In this session, we will help you better understand what it means to be a Gartner Visionary, and how Sangfor meets the criteria. You will also get an exclusive first preview of the new technologies that will propel Sangfor NGAF to a new level in 2023. KEY TAKEAWAYS 1. What it means to be a Gartner Visionary, and how Sangfor meets the criteria. 2. A live demo of the technologies Sangfor NGAF uses to deliver simplified and effective security. 3. The new technologies Sangfor NGAF will bring to market in 2023.

TOPICS:

Defeating Ransomware: Exploring a Collaborative Network-to-Storage Architecture
Ransomware attacks continue to escalate in the enterprise. Analyst groups report that such attacks were occurring every 11 seconds in 2021 with the frequency increasing all the time. Analysts further note mean recovery costs of US$1.82M, median payments of US$400K, and total 2023 ransom payments in excess of US$1 billion. It is a serious threat to the enterprise, and one that is growing every day. Traditional, single-layer protection mechanisms (i.e., firewall) can be easy to circumvent by clever ransomware tactics (e.g., breaking up the ransomware into pieces and reassembling it once it passes through the firewall). This vendor-agnostic presentation will review the architecture and benefits of a multilayer, collaborate network-to-storage protection architecture that is starting to be implemented by some vendors and will likely become more commonplace going forward.

TOPICS:

The Growing Need for API Security in Telecom Networks and Services
The Growing Need for API Security in Telecom Networks and Services Trends, Drivers, and Solutions Application programming interfaces (APIs) have been a key component in communication service providers (CSPs) ability to maintain and provide services to their customers. As CSPs are evolving and transforming, so does the role and exposure of critical APIs, bringing with it an expended attack surface and higher risk that must be mitigated. The webinar will cover: - "Traditional" domains of API interworking in telecoms - The evolution of the role of APIs - API attack surface and risks - API cybersecurity solutions and best practices. Speakers: - Pablo Molinero, Senior Director, Product Management for Telco, Fortinet - Ronen Shpirer, Director, Telco Solutions Marketing, Fortinet - Tom Walker, Director, Consulting Systems Engineer - Telco & 5G, Fortinet

TOPICS:

Transforming the Energy Industry with 5G Private Networks
5G private networks are transforming the energy sector by enabling advanced technologies that boost operational efficiency and safety. In this webinar, we will explore the deployment of 5G in thermal power plants, hydropower facilities, solar farms, nuclear plants, and wind farms. We’ll highlight how 5G supports high-definition video surveillance, real-time communications, advanced data analytics, video-based diagnostics, AR-guided maintenance, and remote operations with robotics and drones. These innovations offer tangible benefits, including reduced downtime, streamlined fault detection and resolution, improved operational efficiency, and decreased reliance on manual labor. Join us to discover how 5G is reshaping energy production and management, driving the industry towards a more efficient and reliable future.

TOPICS:

Infoblox #3: DNS….. One of the Best Weapons for Securing Networks?
Today’s sophisticated cybersecurity attacks often unfold in the blink of an eye. To respond quickly, your security teams need to see security incidents as they happen to ensure that attempts to hack your server environment are thwarted before entry into your machines. Whether detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks – DNS can help with this and much more. But are you leveraging it as part of your cyber strategy? Nearly all threats use the DNS system therefore threats in your network can easily be seen in your DNS data. Join Infoblox and (ISC)2 on March 21, 2019 at 1:00PM Eastern as we bring in experts from IDC and ELEVI for a discussion on how leveraging DNS can help identify attacks as they happen or even prevent them before they happen, remediate attacks faster, and help detect and stop malware from spreading.

TOPICS:

Protecting Stateful Devices on Your Network Edge from DDoS Attacks
Firewalls, VPN concentrators, IDS/IPS, load balancers, etc., all have one thing in common. They are stateful devices. That makes them very susceptible to DDoS attacks – more specifically, state exhaustion attacks. To protect these devices from DDoS attacks, you need dedicated, stateless DDoS attack protection technology deployed in front of your stateful infrastructure. Join Netscout and (ISC)2 on December 14, 2021 at 1:00p.m. GMT as we examine: · Why stateful devices like firewalls are susceptible to DDoS attacks. · Why industry best practices (and firewall vendors) suggest deploying stateless DDoS protection in front of your firewall to protect it and other stateful devices. · How and why organizations should prepare and defend around the first and last line of network perimeter defense to protect the availability and performance of firewalls and other stateful infrastructure from cyber threats.

TOPICS: