Search Results for: network

The Key Role of Network Visibility for Zero Trust
Join Gigamon’s Ian Farquhar and John Kindervag, the “Creator of Zero Trust” to discuss the lost tenet of Zero Trust; access, inspection and analysis of all network traffic. In 2012 John called it “data access network”, or DAN, today it’s network visibility and elimination of blind spots and why EDRs are not enough, Logs are fragile and are not enough, Span ports are “so last century”, and Blind spots must be eradicated. Lastly, John will share five prescriptive steps to building an effective and pragmatic Zero Trust Network.

TOPICS:

The Key Role of Network Visibility for Zero Trust
Join John Kindervag, the “Creator of Zero Trust” and Ian Farquhar, Gigamon Security CTO as they discuss the lost tenet of Zero Trust; access, inspection and analysis of all network traffic. In 2012 John called it “data access network”, or DAN, today it’s network visibility and elimination of blind spots and why EDRs are not enough, Logs are fragile and are not enough, Span ports are “so last century”, and Blind spots must be eradicated. Lastly, John will share five prescriptive steps to building an effective and pragmatic Zero Trust Network.

TOPICS:

Internal Segmentation Firewalls for Zero-Trust Networks
Forrester VP and Principal Analyst John Kindervag discusses how traditional firewalls need to evolve into Internal Segmentation Firewalls for zero-trust networks. Instead of hierarchical networks with Next-Generation Firewalls at the edge, firewalls need to act as internal “network segmentation gateways” with high performance, security effectiveness and compatibility with existing deployments.

TOPICS:

Live Demo - Network Segmentation (Internal and External)
In this Live Demo, we will address the following: - Discover unnecessary internal network channels between machines (LM) - Discover unnecessary external network access (Data Exfiltration)

TOPICS:

Network Transformation Projects: Common Risks & How to Prevent Them
Many organizations are modernizing their networks; moving from MPLS to SD-WAN, dropping on-premises gateways and adopting cloud-based offerings, breaking out internet traffic, looking at VPN replacements. There are many benefits to modernizing, but there are risks, too. Organizations with complex networks and services often find themselves derailed by technology and business realities. In this webinar Nick Savvides, Forcepoint Senior Director of Strategic Business APAC, will explore common risks and key considerations in ambitious network transformations and share: • Mitigation strategies for common risks of network transformation projects • Key considerations to ensure successful, future-proofed secured network transformations • Strategies for building a balanced business case to gain approval for network transformation Don’t miss out on this informative 1-hour session designed to provide you with knowledge, insights and useful takeaways. APAC Time Zone: 9.30am IST / 12pm SGT / 2pm AEDT

TOPICS:

Network Transformation Projects: Common Risks & How to Prevent Them
Many organizations are modernizing their networks; moving from MPLS to SD-WAN, dropping on-premises gateways and adopting cloud-based offerings, breaking out internet traffic, looking at VPN replacements. There are many benefits to modernizing, but there are risks, too. Organizations with complex networks and services often find themselves derailed by technology and business realities. In this webinar Nick Savvides, Forcepoint Senior Director of Strategic Business APAC, will explore common risks and key considerations in ambitious network transformations and share: • Mitigation strategies for common risks of network transformation projects • Key considerations to ensure successful, future-proofed secured network transformations • Strategies for building a balanced business case to gain approval for network transformation Don’t miss out on this informative 1-hour session designed to provide you with knowledge, insights and useful takeaways. APAC Time Zone: 9.30am IST / 12pm SGT / 2pm AEDT

TOPICS:

Integrating Infoblox into Network Automation for DDI Management
There are a wide variety of solutions available today to help network teams move beyond using text files and spreadsheets as the preferred tool to manage IP address allocation for network devices. These solutions range from open source tools to commercially available software with features that provide more than IP address management. One popular commercial solution is Infloblox, which provides IP address management, along with DNS, DHCP, and more. Network teams who are moving forward in their automation journey will eventually realize that they spend a considerable amount of time in Infoblox managing resources, like IP addresses, and accessing that data so they can copy and paste it into other applications or automations. With Itential, network teams can automate this manual process, saving more time, reducing errors, and ensuring the entire end-to-end process is more efficient. By integrating the Itential Automation Platform with the Infoblox REST API, network teams can reference these DDI features directly and transform that data so it can be used to make changes to the network, update trouble tickets, or send notifications to the network team — all inside an automation workflow. In this demo, you will learn to: • Investigate the Infoblox DDI features using APIs. • Automate IP address reservations and queries. • Build a Data Transformation task for managing data from Infoblox. • Create an Itential automation workflow that utilizes this data to make a network change.

TOPICS:

[Demo] Introduction to Meter - See Network as a Service in Action
In this 20-minute product demo, learn what Network as a Service is and why it's quickly become a go-to solution for IT teams. See how Meter's dashboard gives you visibility and control across your entire network.

TOPICS:

Cybersecurity at the Edge for OT LAN and Edge Networks
Industrial asset owners experience unique challenges and security considerations when securing their network perimeter, focusing on OT LAN and Edge Networks. Want to learn about threats and vulnerabilities affecting critical networks, along with mitigation strategies? This session will explore: - Fortinet’s Security Fabric Platform approach for integrated security management of the LAN and Edge Networks in OT - The benefits of a unified approach for configuration, maintenance, and security operations - LAN Edge and SASE extensions, highlighting how these enable the extension of unified security across the smallest and most remote sites.

TOPICS:

Why A New Approach for a High-Performance, Hybrid Cloud Network Is Needed?
Join along in the discussion with Scott Raynovich from Futuriom and Ali Shaikh from Graphiant as they discuss how the new era of digital transformation is changing the way we have to do networking and what does it mean for the next generation of networking. Presenters: -Scott Raynovich, Founder and Chief Analyst of Futuriom, a cloud technology analysis firm -Ali Shaikh, Chief Product Officer from Graphiant, a Silicon Valley-based provider of next-generation Edge services. Graphiant has developed the Graphiant Network Edge, an “as-a-Service” solution that provides connectivity between the enterprise WAN, hybrid cloud, network edge, customers, and partners.

TOPICS: