Search Results for: network

Work from anywhere: Reimagine your network and security with SASE
Streaming music may seem like no big deal. But when remote workers use their favorite apps to stream music, store files, and collaborate during the workday, it puts your network at risk. So, how do you deliver internet access, verify identities, and embrace a work from anywhere model without the risk of dangerous threats? In this seminar, we will answer this fundamental question and show how companies can regain control in an increasingly distributed workplace.

TOPICS:

Work from anywhere: Reimagine your network and security with SASE
Streaming music may seem like no big deal. But when remote workers use their favorite apps to stream music, store files, and collaborate during the workday, it puts your network at risk. So, how do you deliver internet access, verify identities, and embrace a work from anywhere model without the risk of dangerous threats? In this seminar, we will answer this fundamental question and show how companies can regain control in an increasingly distributed workplace.

TOPICS:

Work from Anywhere: Reimagine your Network and Security with SASE
Streaming music may seem like no big deal. But when remote workers use their favorite apps to stream music, store files, and collaborate during the workday, it puts your network at risk. So, how do you deliver internet access, verify identities, and embrace a work from anywhere model without the risk of dangerous threats? In this seminar, we will answer this fundamental question and show how companies can regain control in an increasingly distributed workplace.

TOPICS:

Multi-Cloud Networking Traffic Flow Challenges
Organizations often move fast in developing their digital footprints – often before they’ve chosen the best platform for their application services. In their quest to offer more focused functions across multiple applications in a micro-service architecture, they also create a fragmented environment that makes it impossible to manage and secure the services and provide efficient operations. If you’re dealing with this, you’re not alone. Join the F5 Distributed Cloud team to break down the truth of multi-cloud networking. We'll highlight the multiple traffic flows observed by a common enterprise today and show you how F5 Distributed Cloud Services can solve traffic flow challenges in a multi-cloud, multi-cluster, multi-service application delivery and security environment. In this webinar, we’ll cover: - The benefits of proxy architectures for a multi-cloud environment  - Exposing a service between Kubernetes clusters no matter the cluster flavors  - Legacy on-prem application and service availability to cloud/cluster - The ins and outs of cloud-to-cloud networking and cloud-native service to another cloud

TOPICS:

Building Network Automations: Publishing & Sharing Automations
Getting started with automating network infrastructure requires a logical, step-by-step approach. You should start simple with a relevant use case and translate the process into a series of logical tasks. Then, you can build out integrations and surrounding processes to ensure it works with your infrastructure and meets your standards. Last, you will implement your tasks until the workflow is complete. In the fifth part of this demo series on how to build automated workflows with Itential, we will conclude by showing you how to publish a workflow in Operations Manager to extend the use of automation across your organization both for Itential users and the networking team’s end users. We’ll explore the four different trigger methods that initiate these shared workflows and how each can work in your environment. In this live demo, Rich Martin, Director of Technical Marketing at Itential, will show you step-by-step how to: • Publish a workflow for self-service by another Itential user within the platform. • Publish a workflow with an API endpoint to run outside the Itential platform such as end users in ServiceNow or GitLab. • Publish a workflow on a schedule for recurring tasks. • Publish a workflow to respond to an event for immediate execution and response.

TOPICS:

Use Breakthrough Performance HW to Secure your Network
Secure Increasingly Encrypted Traffic and Enable Cloud Adoption The increasing use of encrypted traffic and rapid consumption of cloud-based applications, coupled with ever-increasing data center consolidation, are driving new processing power, performance and capacity requirements. We will discuss how high-performance hardware appliances help deliver next-generation security capabilities anywhere in the network, including data center cores and enterprise perimeters, as well as branch and remote offices.

TOPICS:

Are you in the Dark When it Comes to Network Visibility? Detect More with NDR
Protecting your environment against cyberattacks is a complex challenge for the whole organisation. And it’s a challenge that’s here to stay. In a world where compromise is a matter of ‘when’ not ‘if’, analysts can’t afford to leave gaps in their visibility and wasting their time on chasing false alarms. They need to gain visibility to see their entire environment that automatically raises the most pertinent threats to investigate. Meanwhile, Chief Information Security Officers (CISOs) are under huge amounts of pressure to balance budgets and limited resources with the inevitability of a breach. To ease the burden, organisations need a solution that can remove uncertainty from advanced threats that evade the perimeter and build a comprehensive picture of the risks their organisation is facing. In this webinar, you’ll learn all you need to know about network detection and response (NDR) and its high-level protection capabilities for overcoming modern security challenges. The LogRhythm team will delve into how you can gain 360-degree visibility into both known and unknown threats that cross your network. Join us to discover: • Real world scenarios where attackers were thwarted by NDR that could have been otherwise unnoticed • The capabilities of NDR and how it can ease the analyst workflow • NDR’s place in a modern security monitoring strategy

TOPICS:

Intro to the Network Automation Maturity Model: How to Assess Where You Are
Overall adoption of network automation and orchestration has grown steadily in the past few years, but within and across an organization, the rate of adoption can vary greatly. Clear patterns have begun to emerge. Individuals begin with scripts to automate tasks. Those can then grow into larger automations, usually with team-wide participation, and in some cases evolve into end-to-end orchestrations and self-service. As the approach to automation evolves, its benefits can expand in scope across the organization. Based on direct experience working with hundreds of teams and the observations of thousands of projects across the community, Itential experts have developed the Network Automation & Orchestration Maturity Model. The purpose of the model is to define consistent stages that can be used to measure progress in automation and orchestration teams and initiatives, which will help engineers and business leaders alike to maximize the impact of automation and orchestration. In this live webinar, Morgan Stern, VP of Automation Strategy and Rich Martin, Director of Technical Marketing at Itential, will walkthrough: • Why maturity models matter in emerging technology areas. • How engineers and teams can use the maturity model to improve their successes in automation. • How business leaders can use the maturity model to measure their current capabilities and improve their long-term automation strategies.

TOPICS:

Cloud Network Security: The Role of Software Firewalls
As enterprises migrate their workloads, applications and data to the cloud, why should business security practitioners consider software firewalls for protecting their cloud environments? Raj Patil of Palo Alto Networks shares his top customer use cases. In a video interview with Information Security Media Group, Patil discussed: Use cases for private, public and hybrid cloud architectures; Outlying uses cases beyond cloud and virtual environments; Tips for deployment and orchestration tools.

TOPICS:

Taking full advantage of NVMe-oF over an IP Network
NVMe-oF over an IP Network has the potential to provide significant benefits in application environments ranging from the Edge to Data Center. However, to fully unlock its potential, we first need to overcome NVMe over Fabrics' discovery challenges. This discovery challenge, specific to IP based fabrics is due to their de-centralized nature which can add a high degree of complexity to an infrastructure. This session will highlight innovative efforts by Dell and VMware to enable an NVMe-oF IP based fabric to be easily centrally managed - unlocking performance and cost advantages.

TOPICS: