Securing a versatile, hybrid and highly scalable 4G and 5G radio access network (RAN) is more important than ever due to the evolving nature of technology and new possible use cases. Securing the RAN mandates a new kind of SecGW infrastructure, one that is agile and hybrid, and yet capable of supporting the mixed architectures and different performance, scalability and QoS requirements LTE-A and 5G bring to bear.
This webinar will present the mobile network evolution, its impact on the security requirements for LTE-A and 5G RAN and how Fortinet’s FortiGate platform provides a state-of-the-art security solution for the evolving mobile RAN.
Join IT expert David Arbeitel and listen to the Podcast, "5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk" and discover how to make the most of your Vista migration.
This session, the 2nd of a 2 part webinar will provide a deep dive on how to deploy Cloud Native Network Functions on Kubernetes with OSM, using either helm charts or Juju bundles and how to benefit from the new automatic placement feature in OSM for edge deployments.
"At a time when digital complexity and security fragmentation pose a growing challenge for many, it’s crucial to understand not only the range of services offered by security providers, but how they’re continuously innovating to drive greater simplicity and business resilience for organizations.
In this session, we’ll avoid feature comparisons and instead explore Cloudflare’s unique vision and innovative approach to unifying diverse technologies and how it differs from industry incumbents like Zscaler and Palo Alto Networks.
Join our security experts as they discuss:
- What sets Cloudflare apart from other security providers like Zscaler and Palo Alto Networks
- What’s next for Cloudflare and how it impacts the security landscape
- Why we’re seeing a significant increase in recognition from industry analysts
- How our continuous innovation will power the future of the Internet
As enterprises embrace large-scale cloud and multi-cloud, traditional security practices can leave businesses vulnerable to a variety of risks and side-effects. These risks are compounded by disparities and gaps in cloud-native security stacks. This webinar will examine these risks, the factors behind them, and how a Secure Cloud Networking approach helps to address them
Lateral movement is how a cyberattack graduates from a limited breach to a data loss disaster. To cut down on attacker dwell time and reduce opportunity for lateral movement, organisations are advised to leverage the MITRE ATT&CK framework to look out for malicious actors’ TTPs, with an approach focused on visibility and explainable, evidence-based analytics.
And to help execute this strategy, organizations can use telemetry data from open-source network analysis tools such as Zeek to capture and investigate activity across a broad set of network protocols.
On 2 July 2024 at 1:00 p.m. BST Corelight and ISC2 will share how to make the most of MITRE ATT&CK and Zeek to:
- Find pass the hash attacks whereby attackers authenticate without the user's cleartext password.
- Spot attempts to gain unauthorized interactive access to workstations and servers via RDP.
- Monitor FTP for potential transfers of malicious toolkits into your environment.
Bryan “Woody” Woodworth and Eric Kavanagh discuss the trends and issues we will all be facing in 2022. Woody is a principal solutions strategist at Aviatrix. Previously Woody was a director specialist at Microsoft and an Azure Global Black Belt in networking and security. Eric is CEO of Bloor Group, a media-savvy analyst firm that is pioneering a new, transparent approach to traditional IT Analysis, where he looks at IT issues ranging from big data to cloud computing.
Issues we’ll be discussing in this episode:
Cloud security: what we can expect in terms of challenges and opportunities for those migrating to the cloud or moving to multi-cloud
Hybrid/multi-cloud strategy: how the on-prem and cloud landscapes will be evolving in 2022 and how increasing CSP competition will impact vendor negotiations
Trends impacting cloud network architecture: what you should be on the lookout for in 2022, including around AI/ML, cloud and edge compute, and RPA
Career advancement: what skills and certifications will be valuable in 2022, and how companies will be managing the growing skills gap as more enterprises move to the cloud
Watch F5 senior leaders and Heavy Reading Research Director Jim Hodges discuss the evolution to cloud-native network functions (CNFs) during this on-demand webinar.
CNFs address multiple pain points to reduce CapEX and OpEX costs and unify cloud infrastructure to support both Telco and IT workloads. The webinar highlights two key use cases for Gi LAN consolidation for VNFs and CNFs, and 5G Core Kubernetes security.
In this webinar you will learn about three drivers we're seeing behind customer requests for CNFs:
- Optimizing the 4G infrastructure while designing for 5G
- Efficiency and control through cloud-native network functions
- Edge as the perfect opportunity to build CNFs from the ground up
By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time
Global enterprises are adopting multi-cloud strategies for secure networking across the globe, including mainland China. Building an architecture that includes the China region has challenges. Aviatrix has partnered with Alibaba Cloud to eliminates those challenges. In this talk we will share the requirements, experiences and best practices to get started with the China region. We will also share a production case study showcasing an end-to-end solution.
Secure Increasingly Encrypted Traffic and Enable Cloud Adoption
The increasing use of encrypted traffic and rapid consumption of cloud-based applications, coupled with ever-increasing data center consolidation, are driving new processing power, performance and capacity requirements. We will discuss how high-performance hardware appliances help deliver next-generation security capabilities anywhere in the network, including data center cores and enterprise perimeters, as well as branch and remote offices.