Search Results for: network

Mitigating Potential Security Threats to Zero-Touch Network & Service Automation
This is the 4th and last event of the 2023 ETSI ZSM Webinar Series. The ultimate target of zero-touch network & service automation is a largely autonomous operation, enabling self-management, self-healing and self-optimization – without further human intervention. Trust is a major barrier to adoption and striving to build it requires a continuous learning process. As more automation processes are deployed and operate securely and efficiently, human trust will increase. Having native security (e.g. an adaptive secured framework, access control, trustworthiness, data protection) can help to establish confidence and instill trust as the automated processes deliver the intended business outcomes. The webinar will present the results of the comprehensive study that was conducted by the ZSM group in ETSI report ZSM010 on potential security threats and risks to the ZSM framework and solutions. It will introduce mitigation options, countermeasures and security controls to address them. Furthermore, it will present additional capabilities and services being specified in ETSI ZSM 014 to ensure secured and trusted ZSM framework and solutions. Finally, a PoC on security SLA assurance in 5G network slices will be demonstrated.

TOPICS:

Operationalizing Cyber Threat Intel for Computer Network Defense: Focus on Iran
Operationalizing Cyber Threat Intelligence (CTI) helps mitigate risk by focusing people, processes, and technology on the threat activity matters. Above all, it allows organizations to take a more proactive, structured, and holistic approach to security that reduces dwell time and shortens the time frame from identification to fix. In today's dynamic threat environment, it is critical to boosting your overall cyber security return on investment. Join us as we look specifically at how cyber threat intelligence can help improve computer network defense (CND) operations. Our experts will share: • A case study, that will examine the intelligence tied to recent Iranian geopolitical events and demonstrate how operators can pivot from intelligence reporting to high confidence alerting and targeted threat hunting • FireEye’s Iranian relevant threat intelligence along with the MITRE ATT&CK framework to help decision makers improve their overall network security posture by prioritizing security investments based on adversary capabilities • How intelligence enhances your overall cyber security investment and places your operations ahead of the threat • Methods for automating vulnerability management and patch prioritization by correlating intelligence to vulnerability scan data

TOPICS:

Defining the cloud-enabled branch: How cloud apps drive network transformation
Amazon, Azure and SaaS are already on everyone's mind. When your data center workloads move to cloud, is your corporate backhaul the most efficient way to get to the applications? The migration of applications from the data center to the cloud is forcing organizations to rethink their branch network and security architectures to enable local internet breakouts. What are the challenges of local breakouts and the hybrid branch? Join this webcast to discuss considerations for securely moving your branch workloads to the cloud to enable a better user experience, manage costs, and reduce risk.

TOPICS:

Build Confidence in Network Automations with Itential’s Dynamic JSON Forms
In order to have confidence in what you’re automating, network teams need the ability to deliver structured and validated input data to a network automation. One of the fundamental components of the Itential Automation Platform is JSON Forms, which does just that. These forms can be quickly created using a low-code, drag-and-drop canvas, tested, and used with an automation. One unique feature of Itential’s JSON Forms that makes this possible is the ability to populate data from a drop-down form element using a dynamic API call. This provides an additional set of guardrails to validate input to the data provided to an automation and using dynamic API calls within a form ensures that the most up to date and valid data is presented to a user before an automation is run. In this live demo, Rich Martin, Director of Technical Marketing at Itential, will show you step-by-step how to: • Demonstrate building and testing of JSON Forms using a visual, low-code canvas. • Implement API calls to populate data dynamically data in drop down elements. • Access data from API calls within the Itential platform. • Access data from API calls to external systems like ITSMs or IPAMs. • Utilize Dynamic JSON Forms in an Itential workflow and from ServiceNow.

TOPICS:

3 Key Tips to Implement Security Control Effectively in Your Enterprise Network
Everyone hopes to have zero-risk and zero security incidents in their corporate environment, but there is no such thing as zero risks. How do we choose appropriate security controls, and implement them effectively in order to minimize risk and maximize protection capabilities? Sangfor has the answers you need and the solutions you want - getting you as close to zero-risk as possible. Join Sangfor experts on October 27th, 2020 for an in-depth discussion on how to effectively control your enterprise network and get the tips, strategies and information on products you need, to get the security you want.

TOPICS:

Single Use Manufacturing within the Bristol-Myers Squibb Manufacturing Network
By Lance Marquardt, Associate Director – Upstream Processing for Hopewell Clinical Manufacturing at Bristol-Myers Squibb and Sara Bell, Senior Marketing Manager for Mercks’s single-use product portfolio. An overview of the current use of single use manufacturing within the Bristol-Myers Squibb manufacturing networks and planned future state. The challenges in implementing single use manufacturing for commercial production will be discussed. Comparisons will be made to the implementation of past improvements and the plans for future improvements, such as continuous processing.

TOPICS:

Palo Alto Networks Webinar: Automatically Detect and Prevent Unknown Threats
Join Taylor Ettema, Global Product Manager and Sean McMahon, Senior Systems Engineer for this impactful webinar. This webinar will cover how to: Simply deploy Threat Prevention, URL Filtering, WildFire and a next-generation firewall policy from your Palo Alto Networks enterprise security platform. Get up and running quickly with real-world policy recommendations, including integrated logging and reporting of all key threat events. Turn on automated discovery and protection for unknown, zero-day malware and exploits with WildFire.

TOPICS:

How to use DX RESTmon to Integrate Third Party Network Monitoring with AIOps
This is a REPLAY video of a brief tutorial on how to integrate third party network monitoring data like Solarwinds into AIOps from Broadcom for advanced analytical insights and predictions. Q&A will not work for this replay. Broadcom is collecting your personal data when you submit such information as part of the BrightTALK registration process. Your personal data is processed according to Broadcom's Privacy Policy: https://www.broadcom.com/company/legal/privacy/policy When you interact with Broadcom, this serves as your authorization to BrightTALK to provide your contact information to Broadcom in order for Broadcom to follow up on your interaction.

TOPICS:

How to deploy Zero Trust Network Access in 15 mins for employees & contractors
You may not know it, but Zero Trust Network Access (ZTNA) can take just 15 minutes to deploy. For employees, contractors and partners, you can now quickly ensure least privilege access—flawlessly. Join us for a live 30-minute Zero Trust Expert Session to see how you can: • Deploy *clientless* remote access, with no agent required • Offer single sign-on with your current identity provider • Define and enforce granular in-app policies • Prevent lateral movement with application layer access • Gain full visibility into all user activity post-login Get your questions answered in this live demo and Q&A. Can't make this time? For APAC sessions, go to: https://www.brighttalk.com/webcast/16731/502279 Explore other 30-minute Zero Trust Expert Sessions below: How to secure internet access for remote employees - Harmony Connect case study Weds. 8th Sept, 4pm London | 8am Pacific Time | 11am Eastern Time https://www.brighttalk.com/webcast/16731/502225 How to get started with Zero Trust Network Access – Top Three Use Cases Weds. 29th Sept, 4pm London | 8am Pacific Time | 11am Eastern Time https://www.brighttalk.com/webcast/16731/502226

TOPICS:

How to deploy Zero Trust Network Access in 15 mins for employees and contractors
You may not know it, but Zero Trust Network Access (ZTNA) can take just 15 minutes to deploy. For employees, contractors and partners, you can now quickly ensure least privilege access—flawlessly. Join us for a live 30-minute Zero Trust Expert Session to see how you can: • Deploy *clientless* remote access, with no agent required • Offer single sign-on with your current identity provider • Define and enforce granular in-app policies • Prevent lateral movement with application layer access • Gain full visibility into all user activity post-login Get your questions answered in this live demo and Q&A. Can't make this time? For AMER/EMEA sessions, register here: https://www.brighttalk.com/webcast/16731/501736 Explore upcoming 30-minute Zero Trust Expert Sessions below: How to secure internet access for remote employees - Harmony Connect case study Weds. 8th Sept, 10am Singapore | 11am Tokyo | 12pm Sydney https://www.brighttalk.com/webcast/16731/502283 How to get started with Zero Trust Network Access – Top Three Use Cases Weds. 29th Sept, 10am Singapore | 11am Tokyo | 12pm Sydney https://www.brighttalk.com/webcast/16731/502287

TOPICS: