Search Results for: network

5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk
Join IT expert David Arbeitel and listen to the Podcast, "5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk" and discover how to make the most of your Vista migration.

Lumeta Corporation

Part 2: Running cloud-native Network Services with OSM Release SEVEN.
This session, the 2nd of a 2 part webinar will provide a deep dive on how to deploy Cloud Native Network Functions on Kubernetes with OSM, using either helm charts or Juju bundles and how to benefit from the new automatic placement feature in OSM for edge deployments.

TOPICS:

Zero trust - Cloudflare’s unique edge over Zscaler and Palo Alto Networks
"At a time when digital complexity and security fragmentation pose a growing challenge for many, it’s crucial to understand not only the range of services offered by security providers, but how they’re continuously innovating to drive greater simplicity and business resilience for organizations. In this session, we’ll avoid feature comparisons and instead explore Cloudflare’s unique vision and innovative approach to unifying diverse technologies and how it differs from industry incumbents like Zscaler and Palo Alto Networks. Join our security experts as they discuss: - What sets Cloudflare apart from other security providers like Zscaler and Palo Alto Networks - What’s next for Cloudflare and how it impacts the security landscape - Why we’re seeing a significant increase in recognition from industry analysts - How our continuous innovation will power the future of the Internet

TOPICS:

Are you at risk in multi-cloud? Top Network Security Blind Spots Revealed (emea)
As enterprises embrace large-scale cloud and multi-cloud, traditional security practices can leave businesses vulnerable to a variety of risks and side-effects. These risks are compounded by disparities and gaps in cloud-native security stacks. This webinar will examine these risks, the factors behind them, and how a Secure Cloud Networking approach helps to address them

TOPICS:

Detecting Lateral Movement with Open-Source Network Monitoring & MITRE ATT&CK
Lateral movement is how a cyberattack graduates from a limited breach to a data loss disaster. To cut down on attacker dwell time and reduce opportunity for lateral movement, organisations are advised to leverage the MITRE ATT&CK framework to look out for malicious actors’ TTPs, with an approach focused on visibility and explainable, evidence-based analytics. And to help execute this strategy, organizations can use telemetry data from open-source network analysis tools such as Zeek to capture and investigate activity across a broad set of network protocols. On 2 July 2024 at 1:00 p.m. BST Corelight and ISC2 will share how to make the most of MITRE ATT&CK and Zeek to: - Find pass the hash attacks whereby attackers authenticate without the user's cleartext password. - Spot attempts to gain unauthorized interactive access to workstations and servers via RDP. - Monitor FTP for potential transfers of malicious toolkits into your environment.

TOPICS:

Cloud Pragmatist, The Year Ahead: Top Trends in Secure Cloud Networking in 2022
Bryan “Woody” Woodworth and Eric Kavanagh discuss the trends and issues we will all be facing in 2022. Woody is a principal solutions strategist at Aviatrix. Previously Woody was a director specialist at Microsoft and an Azure Global Black Belt in networking and security. Eric is CEO of Bloor Group, a media-savvy analyst firm that is pioneering a new, transparent approach to traditional IT Analysis, where he looks at IT issues ranging from big data to cloud computing. Issues we’ll be discussing in this episode: Cloud security: what we can expect in terms of challenges and opportunities for those migrating to the cloud or moving to multi-cloud Hybrid/multi-cloud strategy: how the on-prem and cloud landscapes will be evolving in 2022 and how increasing CSP competition will impact vendor negotiations Trends impacting cloud network architecture: what you should be on the lookout for in 2022, including around AI/ML, cloud and edge compute, and RPA Career advancement: what skills and certifications will be valuable in 2022, and how companies will be managing the growing skills gap as more enterprises move to the cloud

TOPICS:

The Time Is Now to Add Cloud-Native Network Functions for Both 4G and 5G
Watch F5 senior leaders and Heavy Reading Research Director Jim Hodges discuss the evolution to cloud-native network functions (CNFs) during this on-demand webinar. CNFs address multiple pain points to reduce CapEX and OpEX costs and unify cloud infrastructure to support both Telco and IT workloads. The webinar highlights two key use cases for Gi LAN consolidation for VNFs and CNFs, and 5G Core Kubernetes security. In this webinar you will learn about three drivers we're seeing behind customer requests for CNFs: - Optimizing the 4G infrastructure while designing for 5G - Efficiency and control through cloud-native network functions - Edge as the perfect opportunity to build CNFs from the ground up By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time

TOPICS:

Lessons Learned/Best Practices for Building Secure Networks in Alibaba Cloud-eme
Global enterprises are adopting multi-cloud strategies for secure networking across the globe, including mainland China. Building an architecture that includes the China region has challenges. Aviatrix has partnered with Alibaba Cloud to eliminates those challenges. In this talk we will share the requirements, experiences and best practices to get started with the China region. We will also share a production case study showcasing an end-to-end solution.

TOPICS:

Prevention Week Pt 4: Use Breakthrough Performance HW to Secure your Network
Secure Increasingly Encrypted Traffic and Enable Cloud Adoption The increasing use of encrypted traffic and rapid consumption of cloud-based applications, coupled with ever-increasing data center consolidation, are driving new processing power, performance and capacity requirements. We will discuss how high-performance hardware appliances help deliver next-generation security capabilities anywhere in the network, including data center cores and enterprise perimeters, as well as branch and remote offices.

TOPICS:

Prevention Week Pt 4: Use Breakthrough Performance HW to Secure your Network
Secure Increasingly Encrypted Traffic and Enable Cloud Adoption The increasing use of encrypted traffic and rapid consumption of cloud-based applications, coupled with ever-increasing data center consolidation, are driving new processing power, performance and capacity requirements. We will discuss how high-performance hardware appliances help deliver next-generation security capabilities anywhere in the network, including data center cores and enterprise perimeters, as well as branch and remote offices.

TOPICS: