Search Results for: network

Enhanced Security Posture with the latest from Palo Alto Networks App for Splunk
Watch this webinar to see the evolution of our Palo Alto Networks App for Splunk with release of our App 6.0 Version. In this session, we demonstrate how using Splunk integrated with Palo Alto Networks Platform across your endpoint, network, user activity and threat intelligence, can enable you to effectively: - Identify malicious activity and gain key context to help prevent similar threats - Apply methods to help improve accuracy and further mitigate risk - Automate context gathering and response actions to accelerate investigations, and to more effectively contain and prevent threats You will also see how to get deeper insights with dashboards combining data from existing technology investments with Palo Alto Networks.

TOPICS:

AI-Powered Digital Twins: Hands-On Session for Streamlined Network Management
Join Mike Lossmann, a digital twin expert with over 18 years of experience in managing complex networks, as he demonstrates AI Assist, a generative AI feature in Forward Enterprise. AI Assist allows engineers to interact with the network as if they were conversing with a colleague. This feature enables querying the network to understand its behavior, troubleshoot issues, and prove compliance using natural language. Attend this session to see AI Assist in action.

TOPICS:

AI-Powered Digital Twins: Hands-On Session for Streamlined Network Management
Join Mike Lossmann, a digital twin expert with over 18 years of experience in managing complex networks, as he demonstrates AI Assist, a generative AI feature in Forward Enterprise. AI Assist allows engineers to interact with the network as if they were conversing with a colleague. This feature enables querying the network to understand its behavior, troubleshoot issues, and prove compliance using natural language. Attend this session to see AI Assist in action.

TOPICS:

The ETSI Zero-touch network and Service Management (ZSM) architecture framework
The pivotal deployment of 5G and network slicing has triggered the need for a radical change in the way networks and services are managed and orchestrated. Full end-to-end automation of network and service management has become an urgent necessity for delivering services with agility and speed and ensuring the economic sustainability of the very diverse set of services offered by Digital Service Providers. The ultimate automation target is to enable largely autonomous networks which will be driven by high-level policies and rules (AKA intent); these networks will be capable of self-configuration, self-monitoring, self-healing and self-optimization without further human intervention. All this requires a new flexible end-to-end architecture framework designed for closed-loop automation and optimized for data-driven machine learning and artificial intelligence algorithms. The ETSI ISG ZSM was formed with the goal to accelerate the definition of the required end-to-end architecture, and the presenter will introduce the ETSI ZSM architecture that was published on August 2019.

TOPICS:

5G READY: SECURE AND MODERNIZE YOUR 4G/LTE NETWORK
Most mobile operators are moving ahead with their 5G plans, some tentatively and others aggressively. Those who don’t act, face the very real prospect of being left behind in the greatest technology transformation in decades. To Modernize your 4G/LTE networks for 5G, we will outline four strategic investments that mobile operators should consider today while delving into the myths and realities around them. These four areas are: •Upgrading network management •Consolidating network functions •Boosting security at key protection points •Virtualizing network functions In the security portion of this webinar, we also spotlight key concerns where modern Gi/SGi firewalls and advanced machine learning powered DDoS protection are essential. By carefully investing in upgrades to support specific 5G use cases, network operators can monetize their near-term investments and at the same time modernize the existing infrastructure in preparation for the eventual migration to a full 5G architecture.

TOPICS:

SMALL BYTES: Automatically fix non-compliant network devices before an outage
According to Uptime Institute's Annual Outage Analysis for 2023, the most common cause of network outages is device configuration changes. In this Small Bytes session, learn how Network Management by Broadcom can help your organization avoid costly network outages with automated rollback of network device configurations to a known good state; before user impact and social media scolding. Broadcom is collecting your personal data when you submit such information as part of the BrightTALK registration process. Your personal data is processed according to Broadcom's Privacy Policy: https://www.broadcom.com/company/legal/privacy/policy When you interact with Broadcom, this serves as your authorization to BrightTALK to provide your contact information to Broadcom in order for Broadcom to follow up on your interaction.

TOPICS:

Network & security designs considerations for PaaS db such as RDS and SQL (emea)
CSPs provide a number of PaaS services across different applications and databases. Although PaaS services take care of the application platform management, at the end of the day, these cloud provider services have a network interface to the Virtual Network (VPC, VNet, VCN etc.) that customers must manage. All the network connectivity and security then becomes the customer’s responsibility. In this tech talk, Aviatrix Solutions Architects will focus on PaaS Database services, using Amazon RDS and Azure SQL as examples.

TOPICS:

Elevating Networking: AI-Native, Marvis VNA, and AI for Data Centers
How much better could the lives of you, your users, and your team be with the next level of self-driving network optimization? And what platform characteristics are essential for trusting AI to deliver on that promise securely and reliably? Join our special edition demo to find out. You’ll learn about: - The unique differentiators in Juniper’s AI-Native Networking Platform - Marvis Minis, a new self-driving network optimization capability, as well as Marvis VNA for the data center - How our new Marvis capabilities are delivering improvements in customer environments

TOPICS:

Best practices for layer 2 network encryption in the public and private sector
Whether you are a government, military or commercial organization, you need to ensure that your data is encrypted in transit. As corporate and government espionage intensifies, with high profile fibre tapping cases, such as UK’s GCHQ extensive fibre tapping becoming public news, encryption of data in transit is essential. Cyber-threats to data in motion are real and occurring constantly. By protecting the data itself with encryption you render it useless to a 3rd party, but can it keep up with your network? Data network growth, increasingly sensitive data and bandwidth demands are creating a shift to the more efficient encryption of sensitive traffic at Layer 2. Layer 2 affords secure encryption that is up to 50% more efficient than competing technologies such as IPsec with little or no impact on network performance. Join your fellow professionals for a best practice session to understand how these triple certified encryptors, CAPS, FIPS and Common Criteria certified solutions can be used on a Layer 2 network to protect data in motion for government and military organizations, as well as financial and other commercial enterprises. Specifically CAPS provides assurance for the UK government, its agencies and commercial enterprises working with the government. With proven reliability, high throughput, and low latency, SafeNet network encryption devices ensure security and certified assurance across Layer 2 networks.

TOPICS:

Top Enterprise Multi-Cloud Networking Requirements for Google - GCP (emea)
Has multi-cloud networking become a critical requirement for your enterprise cloud strategy? Have you architected for multi-cloud optionality, planning to support business strategies that include new customer requirements, M&A integrations or simply because some applications operate better in one cloud verses another? In this webinar experts from Google and Aviatrix will discuss how a multi-cloud network platform compliments native GCP services to maintain the simplicity and agility of cloud, while delivering enterprise-class operational visibility, automation and security across a multi-cloud network architecture. Spence Nelson, Senior Cloud Network Engineer at Workfront will join us to discuss how he leverages Aviatrix to deliver a repeatable cloud network design across Workfront’s multi-cloud environment. Together we will highlight key enterprise requirements including: Compliance and Governance – multi-cloud encryption, multi-cloud segmentation, consistent multi-cloud connection policies, secure Internet egress filtering and repeatable designs and automation. Hybrid Site-to-Cloud Connectivity – High-performance encryption for Google Cloud Interconnect, branch office connectivity and advanced multi-cloud traffic engineering Application Perspective – Multi-Cloud networking for Anthos, GKE, Cloud Functions and legacy VM applications

TOPICS: