Search Results for: network

Simple, Secure Networking with SD WAN
Others may take your network for granted–but you can’t afford to. Somehow, you have to connect your business to a growing number of cloud and SaaS providers while providing strong security and fulfilling high service-level expectations for a growing number of diverse applications.   How can you do all this without increasing your headcount? We invite you to join this interactive, online discussion with experts in software-defined networking to learn:   - The often unexpected impact of increasing cloud connectivity on company networks - Why SD WANs enable more efficient use of bandwidth–while maintaining security and reliable quality-of-service - Three key best practices for transitioning to SD WAN Join Verizon VP of Network and Security Product Management, Vickie Lonker, with Versa Networks Director of Marketing, Rob McBride, and Verizon Sr. Product Manager, Anuj Dutia, for a discussion on the future of your multi-site network.

TOPICS:

Multi-Cloud Network Security and Compliance
In this TechTalk we will focus on how enterprises are leveraging the Aviatrix cloud network platform to improve overall security posture, ensure corporate and regulatory compliance and embrace the exponential growth in enterprise cloud networking complexity by building on the combination of cloud security best practices and a multi-cloud network architecture. During this session, we will discuss: End-to-end and high-performance encryption (up to 90 Gbps) Multi-cloud network segmentation Simplified secure Internet egress filtering Operational visibility and automation

TOPICS:

How to assess your network readiness for digital transformation
Is your IT team prepared for digital transformation as other IT organizations? In this webinar, leading industry analysts, Dr. Jim Metzler and Steve Taylor will share the results of their landmark research, assessing enterprise network readiness for digital transformation. Dr. Metzler recently developed a unique network assessment model for digital transformation. Steve Taylor applied that model to more than 200 enterprises across the globe. Join us as they share their research with Dave Greenfield, technology evangelist at Cato Networks, and learn: - How to assess your own digital transformation readiness - The details behind the network assessment model - The key questions to ask when applying that model to your organization - What you need to do to determine if your network is ready for digital transformation

TOPICS:

How to assess your network readiness for digital transformation
Is your IT team prepared for digital transformation as other IT organizations? In this webinar, leading industry analysts, Dr. Jim Metzler and Steve Taylor will share the results of their landmark research, assessing enterprise network readiness for digital transformation. Dr. Metzler recently developed a unique network assessment model for digital transformation. Steve Taylor applied that model to more than 200 enterprises across the globe. Join us as they share their research with Dave Greenfield, technology evangelist at Cato Networks, and learn: - How to assess your own digital transformation readiness - The details behind the network assessment model - The key questions to ask when applying that model to your organization - What you need to do to determine if your network is ready for digital transformation

TOPICS:

Design, Visualize, and Troubleshoot Quantum Networks
Quantum networks continue to gain traction with public sector organizations and interest with security-sensitive enterprises. Given the sophistication of quantum networks, technology professionals need to understand how to design, simulate, visualize, and troubleshoot these networks before they commit to purchasing devices and software. Join Michelle Fernandez, Member of Technical Staff with Aliro Quantum, as she demonstrates several examples of quantum network design necessary to build entanglement-based quantum networks. Michelle will show how each of these is designed, describe what protocols are necessary for each design, run the actual simulation of these designs, visualize the results, and troubleshoot potential problems. In this webinar you will learn: - What a few common examples are of quantum network designs - How entanglement, swapping, and fiber optic parameters can be simulated - How to run a quantum network design simulation and visualize the results - What approaches to take with the results to root cause design problems Organizations who are preparing their businesses, security posture, and connectivity for the quantum age are investigating how to plan, design, and implement quantum-secure cybersecurity solutions today. This webinar will help prepare you to navigate the quantum future.

TOPICS:

Network Security Consolidation In the Federal Government
As organizations have grown so have their security requirements. Where basic firewalling and URL filtering were fine before, now organizations have added in IPS and Sandboxing technologies. This product sprawl has led to fragmentation in management and security coverage. Attackers are employing more advanced techniques to infiltrate networks and systems. In order to prevent these attacks, an agency's security must operate in a tightly knit and automated fashion. One in which building new protections against these attacks must occur automatically while ensuring continuous operations of services. Join Tighe Schlottog, Security Architect for Palo Alto Networks, and Joe Kim, VP of Engineering at Squadra Solutions, as they discuss how to increase security and efficacy of Network Security by consolidating point products into the Palo Alto Networks Security Operating Platform. Register for the webinar and learn: •The security gaps and risks posed by security point products. •How Network Security Consolidation can simplify management and increase responsiveness of Security Operations teams. •Best Practices for Network Security Consolidation. Speakers: -Joe Kim, VP of Engineering, Squadra Solutions -Tighe Schlottog, Security Architect, Palo Alto Networks

TOPICS:

The Convergence of Cybersecurity and Network Operations Teams
In the past, cybersecurity and network operations teams typically functioned in isolated silos within organizations, often leading to limited communication and interaction between them. This organizational structure often resulted in a lack of understanding between the two teams, as they focused on their specific domains without fully grasping the challenges faced by the other. As a consequence, cybersecurity initiatives might have been viewed as restrictive and obstructive by network operations, while network changes or configurations might have unknowingly introduced security vulnerabilities. In this webinar we will discuss why there is the need for convergence of Cybersecurity and Network Operations Teams and how it can be made possible. 1. Understanding the Need for Convergence • Exploring the challenges faced by traditional cybersecurity and network operations silos. • Highlighting the evolving threat landscape and its impact on network security. • Discussing the benefits of integrating both teams for enhanced security and operational efficiency. 2. Building a Collaborative Culture • Overcoming cultural barriers between cybersecurity and network operations teams. • Promoting communication and fostering a collaborative mindset. • Encouraging shared knowledge and skillsets for mutual growth. 3. Real-time Threat Intelligence and Incident Response • Leveraging network operations data for real-time threat detection. • Integrating cybersecurity insights into network monitoring and incident response. • Case studies illustrating the effectiveness of collaborative incident handling. 4. Streamlining Operations and Resource Utilization • Identifying areas of overlap and resource duplication. • Streamlining tools and technologies for both teams. • Maximizing cost savings and operational efficiency.

TOPICS:

Bringing Hyperconverged Networking to the Enterprise Cloud
Plexxi’s software-defined network fundamentally changes the scalability and economics for customers deploying the latest scale-out applications and hyperconverged infrastructure. With Plexxi, organizations can deploy a single IP network that supports all workloads. On a per-workload basis, administrators can: define workload policies, allocate path bandwidth, and isolate workload traffic across the Plexxi fabric, eliminating the need to deploy multiple, separate networks. The ability to support multiple, diverse workloads on a single IP network fabric and control them through software is a fundamental requirement that Plexxi clearly understands and uniquely delivers. Plexxi’s software control plane, programmatic APIs, and pre-built Connect Integration Packs deliver zero-touch integration and dynamic, Nutanix-specific, workload optimizations that simplify ongoing management. This webinar will discuss the ease-of-use, tight integration, and cost benefits of deploying Plexxi as the scale-out network for Nutanix environments. You’ll learn how Plexxi’s next-generation design fundamentally change the speed and economics of deploying Nutanix through: •Single, flat network topology for simple deployment and scaling •Dynamic, event-driven provisioning and allocation of network resources •Per-workload control for optimized performance and security •Building block scalability of network resources We look forward to you joining our Plexxi/Nutanix webinar, as we look at how Plexxi brings the benefits of hyperconverged networking to the Nutanix Enterprise Cloud Platform.

TOPICS:

Enhancing Network Visibility with Merged Snapshots
In this video, Mike demonstrates how to merge segments for an integrated view in highly segmented networks. Agency IT departments are charged with maintaining mission-ready networks to support services, remote work, and support warfighter operations. These networks are highly segmented to tightly control access and contain risk in the event of a security incident. Within agency networks, various segments often fall under distinct administrative controls, making it nearly impossible to visualize connectivity, ensure security zone segmentation, or perform a complete path search. While necessary for security, this segmentation can hinder troubleshooting and optimization efforts, especially when network issues span multiple domains. Forward Enterprise addresses this challenge with its innovative “merged snapshots” feature.

TOPICS:

How to Integrate ServiceNow Into Your Network Automation Process
Today’s network environment is more elastic and dynamic than ever before, and network teams are tasked to keep up with an increasing volume of network changes daily. Despite this, the need to follow structured change request processes has become a requirement. This process includes opening tickets, waiting for approval, updating them, and closing them. Because these are typically manual processes, network practitioners spend a considerable amount of time in ITSM systems like ServiceNow managing tickets instead of focusing on network-related work. Itential provides a no-code approach to ServiceNow integration and automation of these processes as steps in a workflow. Rich Martin, Senior Technical Marketing Engineer at Itential, will demonstrate how to integrate ServiceNow with the Itential Automation Platform for network automation. In this live demo, we will showcase: • How to easily integrate ServiceNow with Itential’s platform. • How to build automation steps from ticket open to ticket closure. • One-step data transformations with ServiceNow. • The coordination with ServiceNow approvals.

TOPICS: