Search Results for: network

Ansible Certified and Ansible validated content for networks
What if you could jump-start new automation projects with minimal effort and in less time? With Red Hat® Ansible® Automation Platform, you can. It includes more than 150 certified and validated content collections designed to provide you with the automation assets you need (roles, modules, plug-ins, playbooks, and more) across a range of IT domains, including network, cloud, security, edge, and more. You can use this content to create new automation solutions for the multivendor technologies you’ve implemented across your network and edge. In this webinar, we’ll focus on network automation content and network-related security content, such as firewalls. This will help you understand what content is available to support your automation efforts, whether you’re new to network automation or already using this platform to manage your network. We’ll also talk about the benefits of Red Hat Certified Content and explain our new Ansible validated content.

TOPICS:

Networking and Security Projections: Anticipating Trends and Challenges
Last year marked several significant trends in the networking and security spaces, alongside early adoption of artificial intelligence (AI), the 5G network launch, global inflation, and accelerated digital transformation. These developments leave many asking, “What’s next? What developments should we expect in 2024 and beyond?” Join David Hughes, HPE Aruba Networking's Chief Product Officer, as he shares the top networking and security trends for this year to support your customers and accelerate your network transformation. Hughes discusses the following burgeoning trends alongside James Robertson, VP of Industry Strategy at HPE Aruba Networks: 1. The state of 6GHz Wi-Fi adoption 2. Current zero trust principles and functionality 3. The death of the standalone firewall 4. How AI will liberate IT admins

TOPICS:

The Benefits of Integrating BPMN Tools with Network Automation
BPMN tools fall short in automating and orchestrating network operations functions as they are designed for graphically representing business processes, not network changes. However, there are added benefits of integrating the two together. Network automation tools like the Itential Automation Platform are designed to represent network and orchestration processes with features and functionality not provided by native BPMN-based platforms. Itential can easily integrate with existing BPMN environments to expose these capabilities to BPMN users. By integrating the two, teams can choose which platform is best suited for each of their specific use cases. In this live webinar, we’ll explore: • The difference between BPMN and network automation tools. • The unique capabilities of the Itential Automation Platform that are not provided by a native BPMN-based platform. • The 4 different integration options to choose from based on what provides the most for your business. • The added benefits of integrating BMPN with Itential’s network automation capabilities.

TOPICS:

Demystifying Enterprise Digitalization Powered by Intelligent Network
Enterprises are at the frontier of transformation incorporating technological disruptions with digitalization and automation as the game changers on their way to Industry 4.0. Technical advancements like edge computing, 5G, Internet of Things, and high expectations of consumers are continuously putting the network under pressure due to massive data traffic and data explosion creating a need for an intelligent network with disruption in security architecture, integrated yet flexible network design with a hyper-automated framework. While enterprises are facing challenges to adapt digitalization, how intelligent network framework can catalyze the transformation efficiently? Join our experts to understand their perspectives and views on the topic “Demystifying Enterprise Digitalization Powered by Intelligent Network” Presenters: - Kumkum Datta, Global Practice Head 5G4E, Tech Mahindra - Udayan Mukherjee, Chief Architect, Network and Edge Group, Intel

TOPICS:

Leverage Network Data To Minimize Your Cybersecurity Risk
Securing your network against bad actors requires visibility to detect and respond to the inevitable attacks on your organization. You can’t stop what you can’t see! The good news is you have the data you need in your network data. The bad news is that you may not be using that data to identify and mitigate cyberattacks. Join us in this webinar to learn the innovative ways that Advanced Network Detection and Response, based on scalable deep packet inspection from your network, will help your organization achieve comprehensive security protection with: • Always on, real-time detection of network activity to halt attackers in their tracks • Visibility into your dynamic attack surface and its traffic • Lateral movement tracking of attack to respond and mitigate quickly • Unlimited historical perspective of attack

TOPICS:

The Key Role of Network Visibility for Zero Trust
Join John Kindervag, the “Creator of Zero Trust” and Ian Farquhar, Gigamon Security CTO as they discuss the lost tenet of Zero Trust; access, inspection and analysis of all network traffic. In 2012 John called it “data access network”, or DAN, today it’s network visibility and elimination of blind spots and why EDRs are not enough, Logs are fragile and are not enough, Span ports are “so last century”, and Blind spots must be eradicated. Lastly, John will share five prescriptive steps to building an effective and pragmatic Zero Trust Network.

TOPICS:

The Key Role of Network Visibility for Zero Trust
Join Gigamon’s Ian Farquhar and John Kindervag, the “Creator of Zero Trust” to discuss the lost tenet of Zero Trust; access, inspection and analysis of all network traffic. In 2012 John called it “data access network”, or DAN, today it’s network visibility and elimination of blind spots and why EDRs are not enough, Logs are fragile and are not enough, Span ports are “so last century”, and Blind spots must be eradicated. Lastly, John will share five prescriptive steps to building an effective and pragmatic Zero Trust Network.

TOPICS:

The Key Role of Network Visibility for Zero Trust
Join Gigamon’s Ian Farquhar and John Kindervag, the “Creator of Zero Trust” to discuss the lost tenet of Zero Trust; access, inspection and analysis of all network traffic. In 2012 John called it “data access network”, or DAN, today it’s network visibility and elimination of blind spots and why EDRs are not enough, Logs are fragile and are not enough, Span ports are “so last century”, and Blind spots must be eradicated. Lastly, John will share five prescriptive steps to building an effective and pragmatic Zero Trust Network.

TOPICS:

The Key Role of Network Visibility for Zero Trust
Join Gigamon’s Ian Farquhar and John Kindervag, the “Creator of Zero Trust” to discuss the lost tenet of Zero Trust; access, inspection and analysis of all network traffic. In 2012 John called it “data access network”, or DAN, today it’s network visibility and elimination of blind spots and why EDRs are not enough, Logs are fragile and are not enough, Span ports are “so last century”, and Blind spots must be eradicated. Lastly, John will share five prescriptive steps to building an effective and pragmatic Zero Trust Network.

TOPICS:

The Key Role of Network Visibility for Zero Trust
Join Gigamon’s Ian Farquhar and John Kindervag, the “Creator of Zero Trust” to discuss the lost tenet of Zero Trust; access, inspection and analysis of all network traffic. In 2012 John called it “data access network”, or DAN, today it’s network visibility and elimination of blind spots and why EDRs are not enough, Logs are fragile and are not enough, Span ports are “so last century”, and Blind spots must be eradicated. Lastly, John will share five prescriptive steps to building an effective and pragmatic Zero Trust Network.

TOPICS: