Search Results for: network

Enhanced edge computing for business applications with private mobile networks
Businesses traditionally deploy local area networks (LAN), such as WiFi, to provide network connectivity to their infrastructure and users. These networks can be flexibly deployed at low cost but are limited in their performance and security capabilities. Furthermore, businesses often need to support seamless connectivity for a large number of devices and users, despite their location and mobility characteristics on site. Private mobile networks (PMN) provide an alternative. With PMNs, network systems that control data communications are deployed on site. This provides superior performance compared to traditional LAN solutions and public mobile networks whose software runs in a distant geographical location. Business applications that carry user and device data can enjoy reduced latency when interacting with back-end systems running on platforms hosted by an enterprise. Having a dedicated mobile network for your business means that the deployment and planning of the network can be optimised for your specific needs. Your business application requirements can now dictate how the network should operate but not vice versa. Configuring the network according to business requirements means you’re in a better position to meet customer needs. In this webinar, we will talk about private mobile networks and edge computing in more detail, and explain how this technology provides benefits to various industry sectors. We will go through: A technology overview of private mobile networks Sector requirements for PMN solutions Advancements in mobile networking that deliver PMNs with better edge computing capabilities Canonical provides industry leading solutions for edge computing. You will learn about how our products and solutions can deliver the efficiency, reliability and security your business needs.

TOPICS:

Discover Hidden Cyber Threats with Network Forensics, presented by FireEye
Many modern cyber attacks routinely bypass firewalls and other perimeter defenses, leaving security professionals to play “whack-a-mole,” beating down threats as quickly and efficiently as they can. A network forensics strategy can give security professionals visibility into network traffic, and allow them to quickly find the threats hiding in their network. Join Bill Cantrell, Vice President of Network Product Management at FireEye, to get insight that will help you: • Understand the benefits of a network forensics strategy • Leverage network forensics to improve security and increase traffic visibility • Gain insights into how network forensics improves incident response times and reduces risk of loss • See how network forensics enables retrospective threat hunting Date and Time: Thursday, June 28, 2018 at 8:00 a.m. PT/ 11:00 a.m. ET

TOPICS:

Intel® Xeon® Scalable Processors for Networking Usages - Part 1
* Click on the video to see attachments pertaining to this webinar | Discover how platform technologies enable Intel® Xeon® Scalable Processors to better address 5G, cybersecurity, and network AI for cloud-native and virtual networks. Presenters: - Xiaojun Li, Sales Director, Next Wave OEM & eODM, Network & Communications Sales Org (NCS), Intel - Chris Cavigioli, Network Platforms Product Manager, Network Platforms, Intel

TOPICS:

Unlock the potential of your network data with IP Fabric's Python SDK.
Calling all network engineers and developers! In this quick 3-minute overview, Solution Architect Justin Jeffery described how to use the Python SDK he built with IP Fabric to make use of normalized, vendor-neutral network data. Yes, that means no parsing is needed by developers - the network data from IP Fabric is consumable and searchable within the platform. This is an invaluable resource to get Network Automation projects off the ground. What would you do first with access to all the network data you need, no fuss?

TOPICS:

Zero Trust Network Access: Secure, Controlled, and Deployed from Everywhere
Many large enterprises assume that their internal networks are safer than their external networks because they are protected by perimeter firewalls. In reality, internal networks can be just as unsafe as external networks as soon as a compromised device is permitted access within the perimeter. Also, the rise in the work-from-anywhere economy has expanded the attack surface beyond the capability of legacy VPN solutions. Join Suraj Chandrasekaran, Director of Solution Engineering at Versa Networks, as he explains the need to create Zero Trust Network Access that is based on a user’s device and credentials rather than network location. This change is critical to protect against attacks to devices that are within or outside the network perimeter. In this webinar, you’ll learn: - How attackers run network discovery and look for the weakest links (i.e. IoT devices) - How perimeter firewalls and legacy VPN solutions allow compromised endpoints or credentials - How to create a program that is agnostic to location but strictly vets every device’s current state and user credentials to access enterprise resources

TOPICS:

Modern Network Security: How Technology and Smart Practices are Reducing Risk
Networks are under pressure like never before. For networking security leaders, too many blind spots in their network security operations means too many vulnerabilities with the shift to hybrid work, data, applications, intellectual property, and personal information is no longer stashed safely behind a corporate firewall. Today, it can be anywhere. Fortunately, security solutions and practices have transformed thanks to the cross pollination of security, data analytics, cloud, and networking protocols like Software-Defined Wide Area Networking (SD-WAN). Smart use of modern network security solutions and practices give CISOs their best chance fight against threats and mitigate risk. In this webcast, we’ll explore: • The current trending threats facing networks, like authentication vulnerabilities, malware, phishing, denial of service attacks. • Where current network security measures are falling short. • The importance of observability, security intelligence, AI and ML in a network security strategy. • Steps that security and networking leaders can take to shore up defenses. • How a managed services partner can help. Our Speakers Chris Kissel, Research Director, Security & Trust Products, IDC Jim Malone, Senior Content Director, CIO Marketing Services

TOPICS:

Resolve Complex Network Bottlenecks Using Application Delivery Automation
Agility is key to keeping your network up and running but is challenging given today’s high-performance requirements. This is why you need a solution that can minimize downtime, identify the root cause of errors, and take preventive measures to ensure maximum network performance and application availability. Join this webinar to learn from Guruprasad Ramamoorthy, VP, Global Head of Network Architecture, Engineering & Operations, S&P Global, on how to simplify and speed up application delivery by improving network and application uptime and performance. By attending this webinar, you will learn key strategies for collaborating with NetOps, SecOps, and Application teams to reduce network complexity and gain a centralized view of your application infrastructure, as well as: -Why Network Complexity is a Bottleneck to Delivery -The Business Benefits of Automation -An Automation-Driven Journey to ‘The Gold Standard’ of Network Performance

TOPICS:

Intel Network Platforms Group Strategy Overview Part 2
* Click on the video to see attachments pertaining to this webinar | Join leaders from Intel’s Network Platforms Group as they discuss technology trends and strategy from edge to cloud. This Part 2 will focus on Wireless Access and Radio, Visual Cloud, Core Network, Wireline and Converged Access, and Cable. Presenters: - Xiaojun (Shawn) Li, Sales Director, Next Wave OEM & eODM, Network & Communications Sales Org (NCS), Intel - Alix McDonald,  Chief of Staff and Business Manager, Intel Network Platforms Group (NPG), Wireless Access Network Division (WAND) - Mike Downs, Visual Cloud Manager - Partner Enablement and Strategy, Intel Network Platforms Group (NPG), Visual Infrastructure Division & NPG Strategy (VIDS) - Thuy Nguyen,  Segment Manager – Cable, Intel Network Platforms Group (NPG), Wireline & Core Network Division (WCND)

TOPICS:

Smart Building Connectivity: Technology for Future Ready Network Infrastructure
Buildings need robust network infrastructure to become smart. A smart building network acts as the central nervous system that provides the critical connections between all the devices, sensors, systems, and occupants and allows them to communicate. Without a reliable, 24x7 available and secure network, the flow of data between the crucial functions of a building would not be possible. With the right network technology in place, the combination of building systems, including building security, HVAC, environmental sensors, lighting, and networking devices are now all be centrally orchestrated across the building’s network infrastructure. This helps building owners and managers address business objectives such as Environmental, Social and Corporate Governance (ESG) and new operational efficiencies while providing a more desirable, healthy, and enjoyable indoor environment. This webinar will explore various elements and considerations of the smart building network infrastructure based on the technical assessment criteria developed by members of TIA for the SPIRE Smart Building Assessment and Verification Program by UL. This includes but is not limited to: • Cabling Infrastructure • Wireless Coverage • Expansion & Future Readiness • Network Infrastructure Security • Network Resilience

TOPICS:

Network & Security Teams Collaboration Key to Successful Digital Transformation
According to EMA (Enterprise Management Associates) “NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transformation” report, 75% enterprises have seen an increase of collaboration between Network and Security teams but only 39% are successful doing it. In this webinar you will discover why a successful NetSecOps collaboration is essential for Digital Transformation and that for most organizations, public cloud, work-from-anywhere, data center modernization, and the internet of things are all driving the need for their network and security teams to work together. You will also learn: -- Why the security team’s need to examine network data is leading to more collaboration between networking and security groups, -- How automation enables better collaboration between these teams, -- How network management tools are supporting these partnerships.

TOPICS: