Search Results for: network

Network Monitoring for the Next-Gen Data Center
Digital transformation is pushing for consolidated, denser and more intelligent data centers. At the same time, explosive growth of data driven by mobility, smart devices, IoT, 5G and digital services is driving trends like edge computing and micro-data centers. These data centers are more compute and data intensive with far more network traffic and higher need for embedded instrumentation for monitoring. The next-gen data centers employ new architectures and design techniques that make monitoring tricky as traditional tools and techniques go obsolete. Attend this session to learn: • What the next-gen data center architecture looks like from edge to the core • How the combination of high-performance fabrics with overlay SDx technologies and intelligent controls influences the network traffic patterns and processing • How to monitor the above network architectures effectively to turn network data into actionable information

TOPICS:

Software Defined Networking has Arrived: Are You Ready to Manage it?
Join us on this webcast as we discuss the exciting findings from the recent Dimensional Research survey of network professionals about their SDN plans, rollouts and challenges and get ahead of the curve for your SDN deployment. Learn how Network Management Operations from Micro Focus can help you deploy SDN more effectively to drive down cost and enhance performance and agility in your environment.

TOPICS:

Securing your Network Infrastructure: Segmentation & Compliance Verification
Solution Architect Cristian Cordero takes us through key security use cases of IP Fabric's automated network assurance platform. See how to interact with the NIST database to understand critical vulnerabilities that can compromise your network estate, explore our Python SDK and Splunk add-ons, and see how an API-first, developer-friendly platform can enhance your security efforts.

TOPICS:

How to Automate Network Change Management Processes with ServiceNow
Are you spending a considerable amount of time in ITSM systems like ServiceNow as a part of your network change process? What if you could save valuable time being stuck in tickets and instead have these systems integrated into your day-to-day operations as fully automated network change management processes? If you’ve attempted to program automations that integrate to these kinds of systems, you’ve probably realized how quickly it becomes a difficult and complex a process. That’s where Itential can help — we can get you started quickly building network automations to include systems like ServiceNow that will save you and your team more time. Rich Martin, Senior Technical Marketing Engineer at Itential, will demonstrate automation techniques that integrate with ServiceNow, networking, and messaging systems in the Itential Automation Platform. In this live demo, he will showcase: • Using advanced automation logic and transformations with ServiceNow. • Real-time notification of ServiceNow tickets in messaging systems. • Reusability of ServiceNow workflows and transformation. • Publishing the ServiceNow automation within the platform.

TOPICS:

Core Network Resilience for Sustainable Business Growth
As ISPs build out networks to unserved and underserved communities, they need to reconsider the effectiveness of their networking and security infrastructure for long term growth. The threat landscape has grown and rural communities are especially vulnerable to DDoS and other cyberthreats. A10 Networks is an Intel® Network Builders ecosystem member and uses Intel technology in its hardware appliances. This webinar will discuss: • The growing DDoS threat and why rural communities should be concerned • The important role of DNS security • What is CGNAT and why IPv4/IPv6 support should still be an important build-out consideration • Case studies from regional ISPs ISPs attending will gain visibility into today's security challenges and provide concrete recommendations on critical investments that should be made along with their fiber and fixed wireless buildouts. Speakers: • Terry Young, Director of Service Provider Product marketing • Jose De Abreu, SE Director North America Service Providers, Latin America and Caribbean

TOPICS:

A Step Beyond: Our Predictions for the Future of Storage + Networking.
In this engaging talk Darrel A. Kent (Hitachi Vantara) and Howard L. Johnson (Brocade Storage Networking) we talk through their predictions for the future of storage and networking. In this talk we discuss where we've come from, where we are and where we think we are going including: • Why being data driven is more important than being data rich. • How consumer expectations and demands are driving advances in our technologies. • How DNA might be the next storage system.

TOPICS:

SASE Research: Network Security is Converging in the Cloud
Network security is no longer confined to the data center. Its new address is in the cloud. As security shifts toward the user and their infinite number of devices, the tried-and-true perimeter-based security model just can’t keep pace. Digital business transformation and 5G are demanding a new approach that reduces complexity, improves speed and agility, and secures the new network architecture of tomorrow. The future of network security is now. Join us to learn why Gartner is introducing a new market category, the secure access service edge (SASE), which converges security services in the cloud. Get recommendations to help you shape your security for 2020 and keep it simple, scalable, and flexible.

TOPICS:

Zero Trust Network Segmentation simplified with Microsegmentation
The concept of Zero Trust has revolutionized cybersecurity by challenging the traditional perimeter-based security model. However, its implementation, particularly regarding network segmentation, has often presented challenges due to its complexity and potential disruption to existing workflows. This webinar proposes an innovative approach leveraging microsegmentation to overcome these hurdles and deliver a seamless Zero Trust implementation using Akamai Guardicore Segmentation solution. -Divide networks into manageable segments without disrupting workflows. -Achieve granular control based on user identity and application behaviour. -Provide unparalleled visibility and threat response. -Improve overall security posture with enhanced network security control.

TOPICS:

Why You Must Move from a Network Firewall Device to Firewall as a Service
Network firewalls have always been a staple in an organization’s security strategy but with the changes in how people work, perimeter security has expanded to meet new use cases. The change in how organizations implement their perimeter security is exacerbated by the move to work-from-anywhere model that employees have grown accustomed to since the beginning of the COVID-19 pandemic. According to Gartner, “by 2025, 30% of new deployments of distributed branch-office firewalls will switch to firewall as a service, up from less than 10% in 2021.” Firewall as a Service, or FWaaS, helps bring traditional network firewall capabilities into the cloud which allows organizations to extend their corporate security policies to users and devices anywhere. Transition to the cloud comes with the advantages of the as-a-service model. Join Dogu Narin, Head of Products at Versa Networks, as he explains the differences between FWaaS and traditional network firewall devices along with the market forces driving new deployments toward FWaaS. In this webinar, you’ll learn: - How to move beyond on-prem perimeter-based network security to a more contextual model - How to build contextual security protocols based on user, role, device, application, location, security posture of the device, and content - How to integrate services such as SD-WAN, ZTNA, CASB, SWG, and VPN via FWaaS

TOPICS:

Securing Your Environment with Intelligent Network Detection & Response
How do you cover visibility gaps, detect ransomware and respond prior to locking down of digital assets? Who is responsible for monitoring, detecting and responding to the increasing threats to business continuity? Successful threat detection is a multi-layered approach that requires the right tools, methods and approaches. There’s no single magic bullet but with the right building blocks (including a scalable NDR solution), organizations can be successful in detecting and preventing exploits by extracting the insights from the network. This webinar will address the challenges of detecting and remediating threats to your network and critical applications that could compromise business continuity. We will look at how you can: A: Principles and Approaches for Network Threat Detection B: Preparing your organization for ransomware attack C: Use Cases Kemp’s product portfolio is centered on helping customers deliver the best possible application experience by addressing the requirements of modern application load balancers, network visibility, and response to emerging security threats in the network. The core components of this portfolio are the LoadMaster ADC & WAF, Flowmon NPMD, and Flowmon ADS. Presenter: Henry Kay, Solutions Architect, Asia, Kemp Technologies Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²

TOPICS: