Search Results for: network

Modern Network Compliance: What It Is & How to Achieve It
For enterprise networks to be compliant they must encompass two things: standards that define how networks are configured and ensuring those standards are enforced rigidly and uniformly across the network, whether it is physical, virtual, or cloud. However, today’s modern and exploded network infrastructure includes a multitude of edge devices such as switches, routers, firewalls, load balancers, and with the addition of cloud-based services it’s only getting more complex. Effective management of the network in a holistic manner is crucial for operational consistency. Regardless of your network size or type, constant configuration changes to infrastructure components based on business and technical requirements are inevitable and organizations need a modern approach to ensure configuration compliance across all network devices and services. In this webinar we will discuss: • Modern network compliance and why a modernized approach and process is required for today’s enterprise networks. • Sources and categories of network compliance. • How to extend compliance into cloud networks and show how to maintain compliance by implementing a Configuration Validation method into any configuration change process. • The necessity of moving beyond the break-check-fix cycle with Configuration Validation.

TOPICS:

Navigating the Future of Network Security
The continuing pandemic has changed the way we work. Increased data in motion from video conferencing, email, make-shift work environments, and remote applications have shifted the way we utilize our network and think about security. In addition, the dynamics of network architectures are changing, and security professionals and individuals are struggling to adapt. Modern organizations must rely on a complex mix of connectivity over both public Internet and private WANs, leaving security administrators challenged to balance requirements for network performance and strong security as more data traverses networks out of their control. Network Independent Encryption, is one of the innovative technologies developed to meet the demands of modern network architectures. Using Transport Independent Mode (TIM), security professionals can encrypt data concurrently at network Layers 2, 3, or 4. Our experts for this session will discuss current and future network architectures, including TIM, and give advice on how to secure your network without compromising performance.

TOPICS:

Ask me anything: Network automation
You have questions; we have answers. Many of our customers use Red Hat® Ansible® Automation Platform to automate their networks, along with other aspects of their IT operation. Whether you’re an existing customer using this platform for network automation, expanding your Ansible Automation Platform solution into your network from another area like infrastructure, or new to Ansible Automation Platform for network automation, join us for answers to your most burning questions on network automation. We’ll include overview information, such as tips, news, and other information as we get started, but the main focus will be on your questions. In this webinar, we’ll cover: A few pieces of overview information, such as tips, links to valuable technical resources, and news. Your network automation questions, so you’re better prepared to implement network automation.

TOPICS:

The Path to Network Infrastructure Agility
The digital transformation is affecting enterprise networks driving a heightened need for infrastructure agility. It requires a rethinking of traditional approaches and focuses on business outcomes. Watch our on-demand webinar the webinar to learn more about: - The various network infrastructure management challenges posed by the digital transformation - How to achieve network infrastructure agility - The advantages of Network Automation

TOPICS:

Managing Heterogeneous Networks: The Practical Way
The modern-day network is not simple. With multiple OSs, remote endpoints, and devices distributed all over the world, it isn’t easy to protect. Many organizations, including yours, face the challenge of safeguarding heterogeneous networks from growing vulnerabilities and cyber threats. So, how do you effectively protect a complex network environment? Join our live webinar as we discuss: - The unique challenges of managing heterogeneous networks - Proven strategies to secure hybrid, on-premise, remote, and other network types - Practical tools and techniques to identify and mitigate vulnerabilities across diverse environments

TOPICS:

Application Awareness for Network Visibility
Let’s face it: in the 21st century whatever network buzzwords we have in our I.T. enterprise are really focused on application delivery. How does the network enable the business, and more specifically the applications that the business needs to run. So why focus network visibility exclusively on packets, when it is the applications that are important to our users and our customers? With Gigamon Application Intelligence, you can visualize the applications running across your network and make decisions for your environment based on applications, not just packets. Register for this webinar to learn how, within your existing infrastructure you can: · Achieve full visibility to applications on your network and the resources they consume · Filter out low-risk traffic, for improved detection performance · Understand how application metadata can benefit network security and performance measurements

TOPICS:

QKD and Entanglement-based Networks
Advanced Secure Networks, networks that incorporate entanglement-based quantum networking and PQC, are redefining the landscape of network security, offering new levels of protection for the sensitive data we send and receive everyday. Understanding the differences and tradeoffs between Quantum Key Distribution (QKD) and Entanglement-based Key Distribution (EKD) can help you prepare for a data secure future. Join Brian Doolittle, Quantum Physicist at Aliro Quantum, in this exploration of QKD and EKD. In this webinar you’ll learn: - Why sharing secret keys is important and the drawbacks of classical solutions. - What quantum key distribution (QKD) is, how it works, and the difference between prepare-and-measure and entanglement-based protocols. - How key distribution can be scaled using trusted relay networks vs. entanglement-based key distribution (EKD) networks. - Practical considerations for key distribution networks. Organizations who are preparing their businesses, security posture, and connectivity for an ever-evolving threat landscape are investigating how to plan, design, and implement Quantum Networking solutions today. This webinar will help prepare you to navigate the future.

TOPICS:

How to make your network resistant to lateral movement
After gaining an initial foothold a hacker will use known techniques to propagate within your network in search of their objective. These techniques enable them to cloak their presence and escalate privileges to access high value assets undetected. Many of the techniques rely on vulnerability exploits, network misconfigurations and other weaknesses. Attend this webinar where we will discuss ➤ Lateral movement tactics & techniques ➤ How to discover network weaknesses that enable lateral movement ➤ What you can do to make your network more resistant to lateral movement

TOPICS:

SASE- A new way to think about security and networking
Secure access service edge (SASE) seems to be on everybody's mind these days. And why not? With all of the new security threats and the potential for network intrusions, businesses are starting to realize that security and networking must be viewed as two sides of the same coin. In this session, we will look at the following topics and how businesses can benefit from implementing a SASE solution: - Why integrating security with networking is a better way to secure company assets - The advantages of single platform SASE - Potential organizational and business impacts Presenters: Keith O'Brien - CTO WW Service Provider, Palo Alto Networks Yogesh Ranade - Sr. Director, Product Management, Palo Alto Networks Beth Cohen - Advanced Networking Product Manager at Verizon, Verizon Business Group David Grady - Cybersecurity Evangelist, Verizon Business Group

TOPICS:

6 Degrees of Network Security
Are common security pitfalls putting your network at risk? We get it. More and more users are working wherever they please — not always using the VPN. And you may not have visibility to all the apps in use across your organization. While firewalls are ok, they won’t protect users when they are off network. There’s a lot standing between you and a safe network. Your security shouldn’t be one of them. Join us for our webinar, "6 Degrees of Network Security," and learn how to avoid 6 common security pitfalls that put your users, their devices, and your data at risk.

TOPICS: