Search Results for: network

Middlebox Security Protocol explained
ETSI's new Middlebox Security Protocol (MSP) standards describe a new approach to network security; using middleboxes for layered defence and for management of secure enterprise networks – without infringing user privacy. The MSP standards are designed to protect enterprise networks, facilitating secure management and vital network operations, whilst giving control of user data back to the user. This webinar will describe use cases for MSP, outline projects from the hackathon held on 13 June 2018 and explain the standard for implementers.

TOPICS:

SDP & 'Black-Cloud' Protection
Security has become of paramount importance in recent times, especially due to the advent of cloud computing and virtualization. With so many devices in the mix, users have the choice of working from anywhere they want. The rapid increase in global IP traffic have challenged network service providers to scale and improve infrastructure to meet this new demand. We explore the merits and performance of Software Defined Perimeters to withstand DDoS attacks in multiple network implementations including hybrid cloud applications, network function virtualization and software defined networks.

TOPICS:

SDP & ‘Black-Cloud’ Protection
Security has become of paramount importance in recent times, especially due to the advent of cloud computing and virtualization. With so many devices in the mix, users have the choice of working from anywhere they want. The rapid increase in global IP traffic have challenged network service providers to scale and improve infrastructure to meet this new demand. We explore the merits and performance of Software Defined Perimeters to withstand DDoS attacks in multiple network implementations including hybrid cloud applications, network function virtualization and software defined networks.

TOPICS:

Common Wi-Fi Issues Caused by Wired Problems – Edge Switches
Your Wi-Fi network end-users keep complaining about slow speeds… Not only that, even though your Wi-Fi environment looks great you have noticed that client devices keep connecting to the network at low data rates. Well, the root cause of the issue may not be related to your Wi-Fi network performance. The problem may be caused by the way your edge switches are configured. Join us for the next Tech Chat, with special guest Rowell Dionicio and learn how edge switch configuration can affect your Wi-Fi network performance.

TOPICS:

Advanced 5G and Edge Service Provisioning using SDN
One of the many capabilities operators will be rolling out along with their 5G network enhancements is the delivery of Edge-based low-latency applications, improving network connectivity for enterprise applications, massive numbers of devices, and IoT services. The implementation of these new high-availability services will increasingly demand zero-touch provisioning and simplified network management. Join Supermicro in a webinar discussing how its efficient Edge hardware and innovative solution partners ease deployment of 5G-based services in a distributed, virtualized network.

TOPICS:

Symantec Protection Suite Challenge
Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.

Symantec Corporation

Maximize Existing Security Tools - Address Palo Alto CVE-2024-3400 Vulnerability
In light of the critical CVE-2024-3400 vulnerability disclosed by Palo Alto Networks, it’s clear that traditional security tools need to be leveraged more effectively to detect and mitigate sophisticated threats. This webinar will guide attendees on how to enhance the utility of existing security infrastructures, like NDR, SIEM, Elastic, or even observability tools, to achieve deeper network visibility and security intelligence, ensuring robust defense mechanisms against both known and emerging threats. This is a show-and-tell session where you will see advanced practices for: - Enhanced East-West Traffic Monitoring: Strategies to ensure comprehensive inspection of lateral communication within networks using your current security tools. - Decryption and Compliance: Balancing the decryption of network traffic for security purposes while maintaining strict compliance and privacy standards. - Intelligence Extraction from Network Traffic: Techniques to harness rich metadata from network packets in your SIEM for proactive threat detection. - Post-Breach Threat Detection: Best practices for utilizing network-derived metadata for identifying and responding to post-compromise activities, including practical applications of Indicators of Compromise (IoCs).

TOPICS:

Live Demo: The Automated Data Center in Action
Are you ready to reap the benefits of intent-based networking in your data center? Join us to learn how Juniper’s Apstra Solution empowers your IT team to automate the data center network from design to deployment and throughout operations. Our Apstra solution is intent-based to maximize network performance, scale, and agility. It applies design templates for everything from cabling to provisioning, so your network continues to operate as it was intended. This intent-based system continually validates changes, alerting your operations teams of brownouts or deviations from your original intent. In this webinar, we’ll demonstrate how Juniper’s Apstra Solution can reduce your design and deployment time from months or weeks to days or hours. We’ll drill down into: - Templates: Templatize the design, validation, and deployment of your data center network, regardless of hardware vendor. - Closed-loop assurance: Use intent-based analytics for a single source of truth from implementation to operations. - Intent Time Voyager feature: Roll back your entire network—not just individual devices—to a previous state, regardless of variations in hardware or network operating systems.

TOPICS:

Demo: The Automated Data Center in Action
Are you ready to reap the benefits of intent-based networking in your data center? Join us to learn how Juniper’s Apstra Solution empowers your IT team to automate the data center network from design to deployment and throughout operations. Our Apstra solution is intent-based to maximize network performance, scale, and agility. It applies design templates for everything from cabling to provisioning, so your network continues to operate as it was intended. This intent-based system continually validates changes, alerting your operations teams of brownouts or deviations from your original intent. In this webinar, we’ll demonstrate how Juniper’s Apstra Solution can reduce your design and deployment time from months or weeks to days or hours. We’ll drill down into: - Templates: Templatize the design, validation, and deployment of your data center network, regardless of hardware vendor. - Closed-loop assurance: Use intent-based analytics for a single source of truth from implementation to operations. - Intent Time Voyager feature: Roll back your entire network—not just individual devices—to a previous state, regardless of variations in hardware or network operating systems.

TOPICS:

Demo: The Automated Data Center
Are you ready to reap the benefits of intent-based networking in your data center? Join us to learn how Juniper’s Apstra Solution empowers your IT team to automate the data center network from design to deployment and throughout operations. Our Apstra solution is intent-based to maximize network performance, scale, and agility. It applies design templates for everything from cabling to provisioning, so your network continues to operate as it was intended. This intent-based system continually validates changes, alerting your operations teams of brownouts or deviations from your original intent. In this webinar, we’ll demonstrate how Juniper’s Apstra Solution can reduce your design and deployment time from months or weeks to days or hours. We’ll drill down into: - Templates: Templatize the design, validation, and deployment of your data center network, regardless of hardware vendor. - Closed-loop assurance: Use intent-based analytics for a single source of truth from implementation to operations. - Intent Time Voyager feature: Roll back your entire network—not just individual devices—to a previous state, regardless of variations in hardware or network operating systems.

TOPICS: