Search Results for: network

Making Your Private Cloud Network Run Like a Public Cloud - Part 1
From the public cloud, to the data center, and to the edge, enterprises are rethinking their networking and security strategies, priorities, technologies, and investment decisions to handle the unexpected. Traditional networks and security models have proved to be too rigid and have become blockers to address changes rapidly. The public cloud has quickly become the model to deliver this agility. In this talk, we will examine networking and security technologies that are designed to operate with the network-as-code model of the public cloud and bring that flexibility to the private cloud. Enterprises are building and managing full stack networks with broad and deep visibility today and deploying security policies rapidly without any hardware dependencies. In part one of this two-part session, we will discuss the networking and security aspects followed by part two which will cover application load balancing and application delivery services. Presenters: Umesh Mahajan - SVP/GM NSX Networking and Security (SDN) at VMware Andrew Hrycaj - Principal Network Engineer at IHS Markit Shiv Agarwal - VP, Cloud Management at VMware

TOPICS:

Full-Scale Deployment: the 3rd Stage in Implementing Quantum Networks
There are 3 key stages to launching a Quantum Network: Design and Emulation, Pilot and Trial, and Full Scale Deployment. In this session, we dive into the details of the third and final stage: Full Scale Deployment. Business leaders and technologists will gain a thorough understanding of the third stage of implementing Quantum Networking. In this webinar you will learn: – How to know when you’re ready to move from the Pilot and Trial stage to Full Scale Deployment – The unique capabilities of entanglement-based networks at full deployment – The benefits and requirements of building a quantum network to scale for enterprise applications – What considerations to take into account as you scale and use your quantum network to its full potential – What to expect once your full scale deployment is complete The next technology revolution will be quantum - and quantum networks are essential to the transformation. Organizations who are on the cutting edge of disrupting and transforming their industries are investigating how to launch full scale Quantum Networks. This webinar will prepare you for navigating the quantum future.

TOPICS:

Network Operations and Analytics from CA Tech for Retail Ensures Customer UX
Wireless is the new LAN and slow is the new down! Join us as we reveal how one of the largest retailers in the US adopted Network Operations and Analytics from CA Technologies to ensure secure and resilient wireless infrastructure that delivers exceptional app and in-store experiences while retaining customer and brand loyalty. Network Operations and Analytics from CA Technologies is a big data network monitoring platform with full stack analytics for assuring traditional and software-defined networks. The solution converts inventory, topology, network fault, device metrics, flow, and packet analysis into actionable intelligence for network operations team. Join us for a live demo to see how the Network Operations and Analytics platform can help you unlock the full value of your Cisco software-defined environments. Key technologies highlighted in full demo series: Cisco ACI, Cisco iWAN, Viptela, OpenStack, OpenContrail, Nuage, Juniper, Netrounds, Wireless, Traditional networks, Hybrid Cloud networks and much more. Broadcom is collecting your personal data when you submit such information as part of the BrightTALK registration process. Your personal data is processed according to Broadcom's Privacy Policy: https://www.broadcom.com/company/legal/privacy/policy When you interact with Broadcom, this serves as your authorization to BrightTALK to provide your contact information to Broadcom in order for Broadcom to follow up on your interaction.

TOPICS:

The IP Fabric Ansible Collection - Automate Network Discovery & Change Process!
Solution Architect Alex Gittings describes how you can use automated network assurance (with IP Fabric) and our Ansible collection to implement changes on your network confidently!

TOPICS:

Azure cloud architect’s guide to multi-cloud networking (EMEA)
The role of cloud architects have become critical to businesses as enterprises accelerate their migration of production workloads into the cloud. Many any IT teams began their journey to cloud leveraging the application services offered in AWS, however the migration of traditional business applications has driven cloud teams to Microsoft Azure as well. While there are clear benefits offered in Azure from an application and cost point of view, operating in a multi-cloud environment from a cloud networking point of view presents unanticipated challenges. Whether your cloud environment is expanding into Azure or Azure is your primary cloud and you are preparing for inevitable multi-cloud expansion, cloud network architects need to understand the Azure network framework and the advanced network, security and operational visibility services that can simplify multi-cloud networking.

TOPICS:

Secure SD-WAN Architecture: Scalable Advanced Routing & Network Topologies
Routing plays a fundamental role in every network, yet is not always considered initially when evaluating SD-WAN solutions. A Secure SD-WAN implementation also requires routing for both overlay operation and underlay integration. Join Yusuf Fidvi, Sr. Solutions Architect with Versa Networks, for this webinar to learn how an integrated architecture with advanced routings enables a scalable solution. Network architects, security architects, network engineers, and security engineers will find this webinar especially interesting as you will learn - Necessary routing technologies and protocols for SD-WAN deployments - Typical networking topologies used in SD-WAN - Routing requirements in SD-WAN which are sometimes overlooked - Best practices for implementing Secure SD-WAN and routing

TOPICS:

ONUG FALL '21 Broadcom's Network Congestion Monitoring and Microburst Detection
“Broadcom pushes the limits of modern network monitoring, delivering features like chipset network visibility, high scalability, and one of the strongest suites of network analytics capabilities in the industry,” says Shamus McGillicuddy, VP of Research, EMA. Join Broadcom as we uncover why Broadcom is the leading network observability vendor and recognized for delivering a new approach to monitoring network congestion caused by dynamic and unpredictable workloads. Congestion events and microbursts are hard to detect using traditional monitoring techniques which are mostly polling based. In this session, we will explain how Broadcom leverages gNMI (gRPC network management protocol), a highly efficient open source technology, to stream telemetry data to the collector. We will demonstrate how network hotspots can be easily identified and correlated to affected applications using gNMI and Broadcom silicon. Broadcom is collecting your personal data when you submit such information as part of the BrightTALK registration process. Your personal data is processed according to Broadcom's Privacy Policy: https://www.broadcom.com/company/legal/privacy/policy When you interact with Broadcom, this serves as your authorization to BrightTALK to provide your contact information to Broadcom in order for Broadcom to follow up on your interaction.

TOPICS:

SMALL BYTES: Solve Network Issues for Revenue-Generating Financial Services
The financial sector utilizes seconds or even milli-seconds to make money for their customers as well as to protect revenue for their shareholders. But spikes or congestion in network activity is still hard to identify for some network teams. In this Small Bytes session, learn how Network Management by Broadcom can help network teams quickly and easily identify network performance bottlenecks down to the device, interface, queue or buffer - all in order to protect the customer experience, revenue and brand. Broadcom is collecting your personal data when you submit such information as part of the BrightTALK registration process. Your personal data is processed according to Broadcom's Privacy Policy: https://www.broadcom.com/company/legal/privacy/policy When you interact with Broadcom, this serves as your authorization to BrightTALK to provide your contact information to Broadcom in order for Broadcom to follow up on your interaction.

TOPICS:

[Panel] Exploring Cloud Storage, Networking and Backup Best Practices in 2020
As we look ahead to 2020, join leading cloud storage, networking and backup experts as they share adoption, practice and deployment best practices. From learning how cloud is changing networking, to ramping up your storage infrastructure and implementing best-in-class backup strategies, this panel will uncover all you need to know about next-gen cloud storage, networking and backup. Moderator: Simon Ratcliffe, Principal Consultant, Ensono Panelists: Laura Jordana, Technical Marketing Engineer, Nutanix Kiran Sirupa, Director of Marketing, Anuta Networks Mike Goulding, Sales Engineer, Virtuozzo

TOPICS:

Perimeter 81 Presents: Network Traffic Control & Device Posture Check
Cybersecurity demands for today’s businesses have evolved even faster than expected, making it imperative for organizations to adapt to stay protected. The workforce is becoming more remote as employees work from homes and unsecured locations, but organizational firewalls are restricted to on-premise networks. For IT and business decision-makers, if your employees can work from anywhere - why can’t your firewall? And how can you ensure that employees' devices are secure wherever they are located? In this webinar, the Perimeter 81 team, Miryam Brand, Alon Gvili, and Daniel Goldfeld, introduces and demonstrates two new security features: Network Traffic Control and Device Posture Check. By enabling these new premium features, organizations can maintain greater control over network access and device security, helping network admins and IT teams secure their corporate networks. Join Perimeter 81 in highlighting our latest Firewall-as-a-Service feature Network Traffic Control (NTC), as well as our Device Posture Check (DPC), designed for better endpoint protection. Together, we will explore these new features with a live demo and an open audience Q&A session to learn more.

TOPICS: