Search Results for: network

A new approach to networking protocols with ETSI
ETSI ISG NIN (Non-IP Networking) has been formed to standardize protocols that will provide better support for 21st century use cases than the TCP/IP-based networking used in current systems is able to. Kevin Smith will describe the problems mobile operators experience with the current technology and how the new technology might be deployed. Then John Grant will outline the main features of the new protocols.

TOPICS:

Network Automation for Microservices Deployments
With microservices becoming the architecture of choice for application deployments, network services need to undergo a major overhaul to support the altered traffic flows and enforce strict governance. This webinar will help you Leverage microservices for faster application development and deployment Democratize network operations in microservices for NetOps and DevSecOps while enforcing centralized management Drive governance and policy-based orchestration across microservices deployments

TOPICS:

Network Automation for Microservices Deployments
With microservices becoming the architecture of choice for application deployments, network services need to undergo a major overhaul to support the altered traffic flows and enforce strict governance. This webinar will help you Leverage microservices for faster application development and deployment Democratize network operations in microservices for NetOps and DevSecOps while enforcing centralized management Drive governance and policy-based orchestration across microservices deployments

TOPICS:

Orion Network Performance Monitor
SolarWinds Orion is a web-based network performance monitoring solution trusted by thousands of network engineers worldwide.

SolarWinds, Inc.

Why Networking and Security Must Converge in the Cloud
We have experienced ten years of transformation across the enterprise in just the past ten months. Fueled by digital transformation and a massive shift to work-from-home, traditional enterprise networking and security infrastructures have been stretched to the breaking point. Legacy on-premises point-product approaches of yesteryear simply don’t make sense anymore. It’s time for a new model. Join Kumar Ramachandran to discuss why networking and security must converge in the cloud with a SASE architecture.

TOPICS:

Network Automation 101 - Where to begin
We will discuss the basics of network automation, how to implement a step-by-step incremental approach and introduce low-code automation solutions.

TOPICS:

Network Automation 101 - Where to begin
We will discuss the basics of network automation, how to implement a step-by-step incremental approach and introduce low-code automation solutions.

TOPICS:

Network Automation 101 - Where to begin
We will discuss the basics of network automation, how to implement a step-by-step incremental approach and introduce low-code automation solutions.

TOPICS:

Is Your Remote Employee Network Vulnerable?
Many organizations have no possible way of knowing the security status of their remote employee network. They’re unable to detect unknown exposures. They’re not warned of critical issues, and they’re unaware of vulnerabilities caused by employee laptops openly exposed to the public. Organizations need to securely manage: - Employees working from insecure networks (homes, cafes, airports, co-working locations, etc.) without using VPN - ISPs leaving Telnet enabled by default on leased routers in order to troubleshoot - Misconfigurations on remote employee networks that expose critical information Enter the Xpanse ASM for Remote Workers module. It combines endpoint details collected by Cortex® XDR™ with public asset information discovered by Xpanse. It then identifies security issues and alerts SecOps specialists. In this webinar, we’ll cover use cases on: - Securing the attack surface of your remote employees - Improving incident visibility and context by combining outside-in and inside-out data - Discovering endpoints in your networks that don’t have XDR installed - Identifying employees working in multiple locations or who aren’t using VPNs

TOPICS:

Is Your Remote Employee Network Vulnerable?
Many organizations have no possible way of knowing the security status of their remote employee network. They’re unable to detect unknown exposures. They’re not warned of critical issues, and they’re unaware of vulnerabilities caused by employee laptops openly exposed to the public. Organizations need to securely manage: - Employees working from insecure networks (homes, cafes, airports, co-working locations, etc.) without using VPN - ISPs leaving Telnet enabled by default on leased routers in order to troubleshoot - Misconfigurations on remote employee networks that expose critical information Enter the Xpanse ASM for Remote Workers module. It combines endpoint details collected by Cortex® XDR™ with public asset information discovered by Xpanse. It then identifies security issues and alerts SecOps specialists. In this webinar, we’ll cover use cases on: - Securing the attack surface of your remote employees - Improving incident visibility and context by combining outside-in and inside-out data - Discovering endpoints in your networks that don’t have XDR installed - Identifying employees working in multiple locations or who aren’t using VPNs

TOPICS: