Search Results for: network

Caring for the SPF+, QSFP, QSFP-DD, OSFP optical transceivers in your network
Join the Fiber Optics Tech Consortium (FOTC) for our upcoming webinar! Tap into the expertise of our members and earn a BICSI Continuing Education Credit. Optical transceivers are a mission critical component for every optical network. The number of optical transceivers being used is growing quickly as organizations need to be able to reliably transmit information securely at higher data rates with faster transmission. This webinar will review the different parts of optical transceivers and the common optical interconnect types including LC duplex, MPO and VSFF. It will cover some of the common challenges while working with optical transceivers and share practical ways to ways to address and avoid these challenges. This program is intended to provide helpful information to network installers, network designers and network owners who are or will be working with optical transceivers.

TOPICS:

Networking Software Demo Series: A Deep Dive into Cisco DNA Center
Cisco DNA Center offers a low-risk, lower-cost, incremental approach to adopting network technologies in your branch, campus, and wireless environments. It simplifies and automates the way you communicate with the network and reduces the complexity of day-to-day changes through automated workflows. Cisco DNA Center also provides insights into your end-user device onboarding and connected experience; network devices; and policies. Join us for a live webinar as we provide an overview of Cisco DNA Center and demonstrate key capabilities and applications from both the automation and assurance perspectives.

TOPICS:

Redefine Your Mobile Network Security Strategy: Prepare for 5G & IoT
You’re invited to witness the sheer impact 5G and IoT has brought to telcos and service provider organizations today and to gain the best approaches for securing your network. Join Heavy Reading and A10 Networks experts as they provide valuable research into the expanding attack surface and share how you can protect your network for your customers. Don’t risk your CAPEX and OPEX. Learn how to manage the evolving threat landscape and hear the common use cases to know how to build a robust security strategy. You’ll walk away with the following insights in this webinar: * The top security vulnerabilities in the era of 5G and IoT * How to achieve Gi/SGI LAN efficiencies * Approaches to strengthen security postures in mobile networks * Use cases and solutions for differentiating service offerings

TOPICS:

How Smart DDI Enables Gartner’s 3 Network Automation Recommendations
Taking cues from the Gartner document "3 Ways to Improve Network Automation" (Ted Corbett, Jonathan Forest, Josh Chessman; ID G00382803), this webinar video reviews how smart DDI enables the implementation of Gartner’s 3 recommendation for improving network automation.

TOPICS:

In the Lab with Tenable OT Security: Finding Bad Guys on Your OT Network
One of the most fundamental ways you can protect your OT operations is by proactively monitoring user behavior. Tenable OT Security has a comprehensive set of policies for detecting user activities: who has entered the OT network and what have they done. To help you better monitor and manage user activity on your OT networks, join Dominic Storey for this on-demand “In the Lab” session, exploring best practices for using the Tenable OT Security policy architecture. Through discussion and demonstration, the session explores: * Using policies to manage user access and actions * How Tenable OT Security helps you keep the bad guys off of your networks

TOPICS:

In the Lab with Tenable OT Security: Finding Bad Guys on Your OT Network
One of the most fundamental ways you can protect your OT operations is by proactively monitoring user behavior. Tenable OT Security has a comprehensive set of policies for detecting user activities: who has entered the OT network and what have they done. To help you better monitor and manage user activity on your OT networks, join Dominic Storey for this on-demand “In the Lab” session, exploring best practices for using the Tenable OT Security policy architecture. Through discussion and demonstration, the session explores: * Using policies to manage user access and actions * How Tenable OT Security helps you keep the bad guys off of your networks

TOPICS:

Small Bytes: How to create custom network delivery exp dashboards for your NOC
Small Bytes Episode #11 - The DX NetOps console provides best in breed flexible dashboards and workflows drive world-class Operational usability across networks both big and small. With the recent addition of AppNeta Network Path data, NetOps custom dashboards now provide customizable views into how your networks are connecting your users and applications. Learn how to take advantage of the NetOps custom dashboarding to create Network delivery experience dashboards tailored to your specific needs and use cases. Broadcom is collecting your personal data when you submit such information as part of the BrightTALK registration process. Your personal data is processed according to Broadcom's Privacy Policy: https://www.broadcom.com/company/legal/privacy/policy When you interact with Broadcom, this serves as your authorization to BrightTALK to provide your contact information to Broadcom in order for Broadcom to follow up on your interaction.

TOPICS:

Going Beyond Secure Remote Access with Zero Trust Network Access
In today’s mobile work environment, organizations need to figure out how best to balance security protection with providing end-user access to necessary resources. Modern security solutions are moving away from Virtual Private Networking (VPN) to the identity- and context-based security model of Zero Trust Network Acess (ZTNA). In our webinar, Going Beyond Secure Remote Access with Zero Trust Network Access, we’ll discuss why you need to reconsider your network authentication and security approach and the benefits and possibilities of ZTNA for the modern working environment. Join us as we discuss: How to create end user satisfaction and support ZTNA vs VPN Steps and Tips to plan your journey to ZTNA Strategy for faster deployment, higher control and visibility Developing a future-proof infrastructure that scales

TOPICS:

Going Beyond Secure Remote Access with Zero Trust Network Access
In today’s mobile work environment, organizations need to figure out how best to balance security protection with providing end-user access to necessary resources. Modern security solutions are moving away from Virtual Private Networking (VPN) to the identity- and context-based security model of Zero Trust Network Acess (ZTNA). In our webinar, Going Beyond Secure Remote Access with Zero Trust Network Access, we’ll discuss why you need to reconsider your network authentication and security approach and the benefits and possibilities of ZTNA for the modern working environment. Join us as we discuss: How to create end user satisfaction and support ZTNA vs VPN Steps and Tips to plan your journey to ZTNA Strategy for faster deployment, higher control and visibility Developing a future-proof infrastructure that scales

TOPICS:

Deep dive into Networking and Security design best practices for AWS Fargate
AWS Fargate provides a managed compute engine service to run your containerized workloads in AWS. It works with both Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes Service (EKS). The aim of AWS Fargate is to reduce the management overhead for customers in managing the container infrastructure and focus on applications only. Although AWS Fargate solves the management challenges for compute and storage, networking and security remains the customers responsibility. When you deploy workloads on AWS Fargate, you choose the VPC/Subnet for connectivity and from there on the workload acts and behaves same as any other EC2 instance in your VPC. In this session, we will discuss: Overview of AWS Fargate for Containers How it works and how the networking and security becomes your responsibility Share best practice designs for AWS Fargate to improve networking and security Demonstrate end to end workflow with Advanced Networking, Security and Operational Visibility into traffic

TOPICS: