Search Results for: network

Preventing Cyber Attacks on Enterprise Networks and IoT Devices
Cyber criminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 67% of enterprises use IoT, many organizations are exposed. A range of IoT devices are connected to corporate networks, which extends the attack surface, providing more entry points for hackers. Join the webinar to learn how to prevent enterprise-related IoT cyber attacks by: •Exposing all IoT security risks across the network •Easily creating zero trust policies to secure thousands of IoT devices •Enforcing multi-layered protections at the network and device levels Can't make this session? Please join us for another session on July 30th at 9 am PST | 12 pm EST: https://bit.ly/3jah585

TOPICS:

Intelligent auto-scaling for Open RAN Network Slicing
Communication Service Providers (CSPs) face an ongoing challenge: managing the ever-growing network traffic generated by countless devices while simultaneously developing innovative business models, maintaining high-availability service-level agreements (SLAs), and reducing operational costs (OPEX). Open-RAN architecture brings a paradigm shift to this equation, enabling cloud-native RAN management through AI-powered microservices orchestrated on RAN Intelligent Controllers. By leveraging Intel® FlexRAN™ SDKs, AI/ML inferencing libraries, and AI accelerations in Intel® Xeon® processors, we demonstrate the efficient deployment of high-performance, value-added AI-based RAN applications without requiring dedicated AI chips. As the 5G ecosystem evolves, responsiveness and scalability become increasingly crucial. Canonical proudly supports Intel® FlexRAN™ and Intel® Xeon® using Ubuntu 22.04 LTS with real-time kernel, ensuring seamless integration and performance optimization. In this deep dive webinar, we will guide you through the implications for telecom operators and how this innovative architecture and framework can enhance performance by intelligently auto-scaling the Distributed Unit (DU) in a FlexRAN-based 5G using general-purpose hardware. Key topics to be covered include: - FlexRAN: Revolutionizing Radio Access Networks - AI in RAN: Empowering Intelligent Network Management - Network Slicing: Optimizing Resources for Tailored Service Delivery - Ubuntu Real-Time Kernel: Maximizing Responsiveness and Performance - Secure Open Source: Ensuring Network Integrity and Security - MicroK8s: Simplifying Kubernetes Deployment for Telco Applications - Join us as we explore the future of telco networks and unveil groundbreaking advancements in AI-driven auto-scaling, radio service slicing, and Open-RAN technology.

TOPICS:

ETSI Security Week: 5G Network Certification
This webinar will provide a status of the policy and industry actions to enable effective security of and trust in 5G networks.

TOPICS:

GitOps, Terraform, and Cloud Networking – DevOps concepts and applications
Learn about cloud DevOps concepts and practical applications for cloud networking. This Tech Talk will focus on Infrastructure as Code Automation that enterprises are widely embracing as they strive to maximize speed, agility and efficiency in deploying and operating cloud networking and security. We will discuss the Aviatrix Terraform provider, give an overview of GitOps, and discuss the practical application of these technologies and principles by demonstrating a GitOps workflow with a real-world Aviatrix Egress FQDN filtering example.

TOPICS:

GitOps, Terraform, and Cloud Networking – DevOps concepts [emea]
Learn about cloud DevOps concepts and practical applications for cloud networking. This Tech Talk will focus on Infrastructure as Code Automation that enterprises are widely embracing as they strive to maximize speed, agility and efficiency in deploying and operating cloud networking and security. We will discuss the Aviatrix Terraform provider, give an overview of GitOps, and discuss the practical application of these technologies and principles by demonstrating a GitOps workflow with a real-world Aviatrix Egress FQDN filtering example.

TOPICS:

Roundtable: DDI for Supporting Network Best Practices and Initiatives
“You never know how much data you have until you put it all into one place. Having the primary source of truth be the IPAM was eye-opening for us.” - Ben Higgins, WPI Join the roundtable moderated by EfficientIP, alongside network managers from McGill University and Worcester Polytechnic Institute, as they candidly discuss the use of DDI (DNS-DHCP-IPAM) within their networks. This session covers: --COVID-19 shifts --Helpful integrations and future strategic IT initiatives --Advice to peers --Use of EfficientIP SOLIDserver

TOPICS:

VIDEO: Network Data Can Reveal Hospital Security Risks
In 2023, numerous hospitals saw hacking events that shut down their IT systems and halted patient care.; having to deny ER visits and send patients to unaffected hospitals in the area. In this Small Bytes session, learn how hospitals and healthcare agencies can use Network Management by Broadcom to help security operations teams accelerate and isolate the root cause of network breaches and hacking attempts, while protecting their revenue, their reputation and most importantly....patient health.

TOPICS:

Securing Your Remote Workforce with Okta and Palo Alto Networks
Has your security posture kept pace with your rapidly growing remote workforce? Gain actionable insights to secure your remote employees from the industry leaders in identity and access management and cloud-delivered network security. Join Sami Laine, Director of Technology Strategy at Okta, and Shankar Chandrashekar, Field CTO Prisma Access and SaaS at Palo Alto Networks, to discover the network security challenges facing organizations with distributed or remote workforces and how you can address them. In this session, you’ll learn: • How to stay ahead of bad actors with a proactive security posture • How to streamline security management and maintain consistent security policies • How to enable seamless, secure remote access for your end users • How the priorities of CIOs and CISOs are changing with the transformation to large-scale remote work

TOPICS:

How to easily eliminate Wi-Fi vulnerabilities in your edge network
In this webinar we will provide hands-on examples of how you can quickly strengthen your cybersecurity wireless network perimeter in just a few easy steps, finding vulnerabilities before they are exploited. Learn how you can proactively reduce wireless complaints by improving Wi-Fi performance, connectivity, and availability, in an easy six-step process that can be used by all levels of staffing expertise from beginner to expert. Get hands-on examples of how network and InfoSec teams can streamline their processes and improve staff efficiencies. AGENDA: • How to easily validate controls at the edge • Effectively inventory everything, including all wireless IoT, OT, and unmanaged headless devices • Quickly test and demonstrate policy compliance • Save money, time, and effort to ensure your wireless edge is running securely and at optimally • Enable close collaboration between network and security teams to maximize cybersecurity posture

TOPICS:

DX NetOps: Modern Network Monitoring with Broadcom Software
[India Time Zone] IT operations teams often struggle to assemble an effective network performance management (NPM) toolkit because the landscape is becoming increasingly complex each day. The Operations, Administration, and Management (OAM) based low fidelity data collection methods e.g. SNMP, ping had been historically targeted towards human operators to monitor and diagnose the traditional data center networks. With modern high-definition network telemetry data from SDN, SD-WAN, hybrid cloud(s), real-time observability becomes a challenge, resulting in blind spots, higher MTTR. The sheer volume, velocity, and veracity of network monitoring data stream isn’t actionable by human operators efficiently anymore; it’s only suitable to be consumed by machines. Broadcom is collecting your personal data when you submit such information as part of the BrightTALK registration process. Your personal data is processed according to Broadcom's Privacy Policy: https://www.broadcom.com/company/legal/privacy/policy When you interact with Broadcom, this serves as your authorization to BrightTALK to provide your contact information to Broadcom in order for Broadcom to follow up on your interaction.

TOPICS: