Search Results for: network

Introduction to Network Detection and Response
With cyber threats on the rise each year, ensuring the security of your IT estate and being able to respond quickly to any potential threat is more crucial than ever. This is why Network Detection and Response tools play such a critical role in your security posture. In this webinar, Filip Cerny, Flowmon Product Marketing Expert at Progress, will introduce you to our Network Detection & Response tools, exploring the benefits of adding them to the solutions already deployed in your network infrastructure.

TOPICS:

Network Disaggregation & Quality Assurance
* Click on the video to see attachments pertaining to this webinar | With the advent and deployment of NFV solutions by Telco’s and Enterprises alike, NFV has provided much greater flexibility in addressing changing requirements. It also provides added control over both current and future functionality while reducing operational expenses and eliminating vendor lock-in. NFV is part of a larger trend towards Network disaggregation enabling the Telecommunications industry towards agile networks. While Disaggregation has become standard in data centers and cloud networks, it is yet to fully penetrate the network edge. There has been a separation of hardware and software vendors, leading to the usage of white box edge switches but the complete evolution in disaggregating the hardware is still under progress. However, advances in both software and hardware have created a robust ecosystem of networking applications that can be used as building blocks to create an industry-standard NOS for telco networks. In such a scenario, it is crucial to have a differentiated testing and validation strategy to account for application and hardware options from multiple vendors that are all supported by a single standardized NOS with standardized interfaces running on bare metal or fully virtualized deployments models. This webinar intends to provide technical insights about the importance of formulating a testing program tailored specifically for a DANOS (Disaggregated Network Operation System) Platform based on an Open Architecture. We would provide an overview of disaggregated systems, its associated layers, specific testing methodologies and explore test scenarios to validate DANOS using Intel hardware. Presenters: - Jason Chandralal, General Manager, Network and Embedded Systems Testing, Happiest Minds Technologies - Laxman Patil, Senior Architect, Network Testing, Happiest Minds Technologies

TOPICS:

Protocols for Advanced Secure Networks
The underlying technology of Advanced Secure Networks, which incorporate entanglement-based quantum networks in combination with PQC, challenges existing security paradigms, but also holds the key to protection from the evolving threat landscape. Utilizing Advanced Secure Networking protocols, entanglement-based networks can ensure the confidentiality and integrity of information exchange, providing a level of security that is fundamentally based on the laws of physics and secure against computational advancements - including those expected from quantum computing. Join Bruno Rijsman, Aliro Fellow, for an overview of protocols used in advanced secure networks, as well as the fundamental approaches to quantum-safe security. In this webinar you will learn: - The difference between discrete variable versus continuous variable protocols. - The difference between prepare-and-measure versus entanglement-based protocols, leading to the concept of advanced secure networking. - Concrete examples of protocols such as BB84, E91, BBM92, and MDI. - Side-channel attacks against real-world implementations and mitigation techniques. - Existing standards and areas where standards are currently missing. Organizations who are preparing their businesses, security posture, and connectivity for the evolving threat landscape are investigating how to plan, design, and implement advanced secure networking solutions today. This webinar will help prepare you to navigate the evolving threat landscape.

TOPICS:

Network Traffic Visibility in the Cloud
In this real-training-for-free session we will discuss the options for cloud based network traffic analysis and how it differs from on-prem approaches. The use cases for this technology which include: Security analysts lack visibility within cloud networks. They do not have the visibility they need to troubleshoot operational and security issues within their AWS networks and want to eliminate this blind spot so that they have 'end to end' traffic visibility across all their network. Security analysts want DPI/full packet analysis in their AWS estates. They want more detail than VPC flow logs to detect security threats and to perform forensics on past events. Compliance and security personnel want cloud based IDS solutions. IDS is a key requirement for some compliance standards such as PCI Amazon launched a network traffic mirroring service in 2019 called VPC traffic mirroring. This allows you to span, or copy, network traffic going to and from one or more EC2 Elastic Network Interfaces and send it to a traffic analysis system. From a security perspective, we can now deploy cloud based out-of-band intrusion detection and analysis tools to look for malicious activity in the network traffic. During this call we will check out the VPC traffic mirroring feature in AWS and show how to set up a traffic mirroring session to capture activity associated with a number of ENIs. Topics include: -Mirror Sessions -Mirror Targets -Mirror Filters Using the data captured from this we will then look at how this can be used for incident detection and response.

TOPICS:

Delivering an Application Led Network
Enterprises are adopting cloud at an increasing pace, and with it their expectations from network services are changing. There has been a shift of focus away from bandwidth-based connectivity services. Instead, enterprises are looking for providers that can promise simplicity and flexibility in how they design, deploy, secure, monitor and manage networking services in a “multicloud” world. This means delivering secure, managed networking – not just in the WAN, but in the LAN and datacenter as well. In this session STL Partners will join Juniper and IBM to share our latest analysis on enterprise network trends. We will argue that the current appetite for SD-WAN is an opportunity for service providers to play a bigger role in helping enterprises to make the transition to multicloud and set out the pathways to making this happen.

TOPICS:

Delivering an Application Led Network
Enterprises are adopting cloud at an increasing pace, and with it their expectations from network services are changing. There has been a shift of focus away from bandwidth-based connectivity services. Instead, enterprises are looking for providers that can promise simplicity and flexibility in how they design, deploy, secure, monitor and manage networking services in a “multicloud” world. This means delivering secure, managed networking – not just in the WAN, but in the LAN and datacenter as well. In this session STL Partners will join Juniper and IBM to share our latest analysis on enterprise network trends. We will argue that the current appetite for SD-WAN is an opportunity for service providers to play a bigger role in helping enterprises to make the transition to multicloud and set out the pathways to making this happen.

TOPICS:

Is Software the Key to Network Modernization?
As operators seek to deliver new customer services and business models, they must transform and modernize their networks. This effort will require the move to virtualized infrastructure and network services in the cloud, as well as using data and analytics to effectively secure the signaling core…all while enabling interworking between legacy and next-generation network services. In this webinar, NetNumber will discuss the importance of a software-defined signaling core, and how its TITAN ALL-G software platform can reinvent a telco's operations.

TOPICS:

The Risks From Unsecured Networks (APAC)
** This is an APAC focused webinar ** More than 88% of malware trying to enter your network can be stopped with a DNS filtering solution. These allow admins to take back control of their network, securing all devices, preventing internet misuse, and improving productivity. A filtered DNS solution is capable of blocking DDoS attacks, botnets, cache poisoning, and other threats. In this webinar, we’ll discuss the importance of network security and how Webroot® DNS Protection can benefit your business and protect against attacks.

TOPICS:

The Risks From Unsecured Networks (APAC)
** This is an APAC focused webinar ** More than 88% of malware trying to enter your network can be stopped with a DNS filtering solution. These allow admins to take back control of their network, securing all devices, preventing internet misuse, and improving productivity. A filtered DNS solution is capable of blocking DDoS attacks, botnets, cache poisoning, and other threats. In this webinar, we’ll discuss the importance of network security and how Webroot® DNS Protection can benefit your business and protect against attacks.

TOPICS:

Masterclass: The Future of Network Security
Watch this exclusive webinar, kicked off by Nir Zuk, who sets the context on the Strata Network Security Platform before transitioning into a solution showcase led by Amol Bhandarkar. Don't miss this opportunity to revolutionize your network security strategy in 35 minutes or less. #StrataCloudManager #PaloAltoNetworks #Cybersecurity

TOPICS: