Search Results for: network

Stellar Cyber Network Detection and Response Demo
Stellar Cyber NDR is the most comprehensive, easiest-to-use NDR available, enabling you to identify, investigate, and eliminate attacks in your network faster than ever before.

TOPICS:

Palo Alto Networks rockets resiliency by transforming IT
Learn how Palo Alto Networks simplified its problem management processes and created transparency into business-impacting outages. The company accomplished this by creating a single portal to capture the root cause of incidents, review outages, and see initial findings—gaining much-needed visibility and reducing ad hoc report requests. Join us for an overview of experience management at Palo Alto Networks, along with ServiceNow’s own approach to service management. You’ll learn how you can overcome today’s challenges to: -Deliver scalable IT services on a single ITSM cloud platform -Increase IT agent productivity, innovate faster -Resolve issues faster with platform-native AI Featured speakers: Nicole Tate, director of employee experience, Palo Alto Networks Kristen Hoyt, ITSM product marketing manager, ServiceNow

TOPICS:

Energy consumption and sustainable 5G networks
The success of Open RAN relies heavily on high-performing, multi-vendor network architectures that are tested, validated, and fully interoperable. However, the proliferation of edge devices created with open RAN networks leads to a further discussion on how to minimize energy consumption and deliver these solutions in a highly sustainable manner–not just at the edge but in the data center as well. As enterprise customers expect the companies they do business with to find “greener” sources of energy and address the draining of our global resources, we focus this session on the initiatives underway that are designed to reconcile industry technologies with the rising environmental impacts. Oscar Toorell Head of Technology, Engineering Unit Cloud RAN Ericsson Shamik Mishra CTO, Connectivity Capgemini Vinodh Raghunathan Director, Commercial Readiness for Infrastructure SW, Network and Edge Group Intel Rimma Iontel Chief Architect, Global Telco Red Hat

TOPICS:

Network Traffic Analysis and the ATT&CK Framework
The internet has enabled the perpetration of crimes at huge distances with impunity. But defenders can inspect network traffic for signs of malicious activity and where it originates. This session examines how we can use the MITRE ATT&CK framework to codify and share intelligence on attacker behaviors derived from network traffic analysis. We will look at how traffic is collected, stored and analyzed. We provide an overview of tools for analysis of network packets and flows, and explain how these tools can help us identify the malicious use of non-standard protocols, protocol abuse, tunneling, port scanning, lateral movement, command and control, and data ex-filtration. We will also discuss automated detection of suspicious traffic using signature-based, behavior-based, rule-based, and anomaly-based algorithms. Finally, we will introduce Security Onion, a Linux distro similar to Kali Linux, but for defenders.

TOPICS:

Is your Network Security Prepared for the Post-Pandemic World?
The pandemic Work From Home (WFH) era fueled a dramatic shift to edge networking using technologies like SASE, SD-WAN, and cloud. With all the changes in the network, it is only reasonable to expect change in how you test and troubleshoot these new technologies and approaches. Join Keysight and (ISC)2 on July 22, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as we explore the industry’s first cloud-native test solution, Keysight CyPerf as a new way of testing.

TOPICS:

How Network Rail Transformed Its Enterprise Architecture with LeanIX
Join Christopher Hardwick from Network Rail as he shares his experience with LeanIX. He'll cover why they chose LeanIX, what insights they've gained, and their plans for the future. Why use LeanIX EA? Discover why Network Rail selected LeanIX EA and the outcomes that they were seeking to achieve. Their Journey and Key Benefits: Hear about our journey with LeanIX, key learnings during implementation and adoption, and the benefits that we are now realising. Their Future Plans: Hear about our future plans and use-cases to maximise the value and adoption of LeanIX across the wider organisation.

TOPICS:

How to Mitigate Voice Fraud Before it Disrupts Your Enterprise Network
Analytics and network visibility address robocalls, fraud, TDoS, and more Only 54.2% of organizations have a comprehensive security strategy for their contact centers, and another 35.2% have plans or evaluation underway. Technology options are plentiful to support any number of security strategies. With employees and agents working remotely at the majority of companies, network-based security strategies are more effective at preventing voice fraud. By stopping fraud before it reaches the enterprise, organizations prevent traffic from chewing up resources—including employees at large, IVRs, contact center agent time, and network capacity. Join Robin Gareiss, Metrigy CEO and principal analyst, and Dan Teichman, Director, Solutions Marketing, and Shambhu Rai, Principal Product Manager at Ribbon to learn about how to improve enterprise voice security, backed by real-world business metrics. We will address the following: - What security methods are companies deploying in their contact centers? Should you manage it internally or outsource it to a Managed Service Provider? - What is the value of stopping robocalls, fraud and TDoS attacks before they reach the internal enterprise network? - How do SBCs, analytics, and SIP trunking play a role in securing contact centers and addressing UC voice security problems? - How can machine learning continuously improve security and operational efficiency?

TOPICS:

No time for downtime: Fixing network packet loss
Network packet loss, jitter and latency, have always been major obstacles standing in the way of clear communication, but with hybrid working it's even more essential that your user experience is the best it can be. Unified communication and collaboration ecosystems are far more complex than they’ve ever been, and even the smallest amount of downtime, outages, poor video and audio quality can severely affect an organizations bottom line. In this webinar, IR’s Solutions Engineer Chuck Geisler will share a complete guide to understanding, monitoring and fixing network packet loss, to ensure your lines of communication are always open.

TOPICS:

SD-WAN for Next-Generation Retail Networks
Retailers are constantly under pressure to deliver a better in-store experience for shoppers as part of an omni-channel engagement model. Much of these changes are driving new network requirements, including in-store wireless, sensors and beacons, streaming audio and video content, and new retail management systems. Traditional store networks just cannot keep up with these demands. Software-defined WAN (SD-WAN) is gaining significant momentum with hundreds of retail companies as a solution to keep up with the demands of these bandwidth hungry applications, and to provide a platform to deliver next-generation services to stores.

TOPICS:

Leveraging Network Insights to Inform your XDR Outcomes
There are seemingly endless views across the cybersecurity industry on what XDR should and shouldn’t include. In reality, XDR strategies can leverage any and all of an organization’s telemetry sources, but there are a few that are foundational to a strong and effective XDR solution. In our last webinar, we discussed how endpoint telemetry was critical to detecting, investigating and responding to threats effectively, but network telemetry is equally foundational. Join us to explore the importance of leveraging network insights to inform better XDR outcomes and to help organizations protect against today’s most dangerous complex threats.

TOPICS: