U.S. technology company
POPULARITY
In this special episode of Will 5G Change the World, presented in partnership with NETSCOUT, we continue our exploration of telco AI. Beyond the technological challenges to adoption, there are a number of key considerations around organizations and operating models. As operators reinvent as platform providers, this has major implications for the workforce. And following this platform approach, the foundation of a horizontal model is infrastructure, where AI has an important role to play in broader automation efforts. And, looking ahead, investments today in cloud-native and AI will set the stage for the evolution on to 6G. This episode features expert commentary from technologists with ABI Research, Orange, Red Hat and VIAVI Solutions.
US equity futures are indicating a mostly flat open as of 04:45 ET. This follows mixed markets in Asia, while European equity markets are higher. Momentum has been limited this week with activity light ahead of the long Easter weekend. The market continues to benefit from central bank rate cut expectations, though positioning dynamics and overstretched indicators are limiting gains. The Fed's Waller reiterated earlier views that there's no rush to cut interest rates, but still anticipates the first move this year. Companies mentioned: Take-Two, Embracer Group, Keysight, Spirent Communications, Viavi Solutions
This week on Network Break we discuss a new on-prem version of NetBox Labs’ source-of-truth software with enterprise support, why Selector AI is adding an LLM to its operations and observability product, and whether a new Web application firewall from Cloudflare can protect LLMs against malicious prompts. Viavi Solutions consolidates the network testing space with... Read more »
This week on Network Break we discuss a new on-prem version of NetBox Labs’ source-of-truth software with enterprise support, why Selector AI is adding an LLM to its operations and observability product, and whether a new Web application firewall from Cloudflare can protect LLMs against malicious prompts. Viavi Solutions consolidates the network testing space with... Read more »
This week on Network Break we discuss a new on-prem version of NetBox Labs’ source-of-truth software with enterprise support, why Selector AI is adding an LLM to its operations and observability product, and whether a new Web application firewall from Cloudflare can protect LLMs against malicious prompts. Viavi Solutions consolidates the network testing space with... Read more »
NetApp is updaing their ransomware protection solutions. They've made some new additions to their Automated Ransomware Protection (ARP) platform to address new attack vectors and improve logic for attack detection, including new methods like partial file encryption. NetApp is claiming a 99% precision in detection of ransomware attacks. They have also announced the availability of their Ransomware Recovery Guarantee for Keystone, their storage-as-a-service offering. These announcements come as part of a larger package including updates to SnapCenter and BlueXP Disaster Recovery. Time Stamps: 0:00 - Welcome to the Rundown 1:10 - Huawei Developing Magneto Electric Drives 5:25 - Ransomware Still Spreads after Lockbit Server Shutdown 8:29 - AWS Announces Unrestricted Free Data Transfers 12:06 - Viavi Acquiring Spirent 15:33 - Nutanix to Acquire D2iQ 18:33 - IBM's AI-Powered Storage Security 23:10 - NetApp Improves their Cybersecurity 36:20 - The Weeks Ahead 38:21 - Thanks for Watching Follow our Hosts on Social Media Tom Hollingsworth: https://www.twitter.com/NetworkingNerd Stephen Foskett: https://www.twitter.com/SFoskett Follow Gestalt IT Website: https://www.GestaltIT.com/ Twitter: https://www.twitter.com/GestaltIT LinkedIn: https://www.linkedin.com/company/Gestalt-IT Tags: #Rundown, #AI, #Storage, #Security, #Ransomware, #AWS, @GestaltIT, @SFoskett, @NetworkingNerd, @TechFieldDay, @TheFuturumGroup, @LockbitTech, @AWSCloud, @ViaviSolutions, @Spirent, @D2iQ, @NetApp, @IBM, #XFD11, #EFD3, #MFD11,
Demand generation and lead generation - where does one end, and the other begin? Turns out it's not quite so cut and dry. In this episode, Paul Gowans (Global Director Regional and Channel Marketing at VIAVI Solutions) shares his thoughts on: The evolving buyer journey The challenge of demand generation Tailoring campaigns to market maturity Geographic variation in market dynamics The role of data and analytics “Data-led marketing is like a flywheel. It's really difficult to get going, and get that momentum – it's hard! But once that thing starts spinning, you get results and it moves at a faster pace. So look at the data – the data's telling you something.” – Paul Gowans This episode is hosted by Richard Lane, Co-Founder and CCO of durhamlane. Find out more about durhamlane's services at durhamlane.co.uk. Want to chat about anything we've covered in this episode, or feature on the show? Contact us at theinsiders@durhamlane.com
In this segment, we'll explore some of the most useful lessons and interesting insights to come out of the last year's worth of breaches and data leaks! We'll explain why we will NOT be covering MGM in this segment. The breaches we will be covering include: - Microsoft AI Research Data Leak - Microsoft/Storm-0558 - CommutAir - Riot Games - Lastpass - CircleCI - RackSpace - Drizly (yes, this breach is older, but the full story just wrapped a year ago!) On this week's news segment, we go down a bit of a rabbit hole on data lakes and have a GREAT conversation about where security data wrangling might or might not go in the future. We also discuss Nord Security's funding and $3B valuation, try to figure out what Synqly is doing, and discuss IronNet's demise. We also find out which email solution is more secure (at least, according to insurance claim data), Google or Microsoft! We wrap up, learning that forms of CAPTCHAs are apparently broken now, $3800 gets you a gaming PC in the shape of a sneaker, and someone has created the DevOps equivalent of dieselgate! Each employee serves as a potential gateway to their organization, and the personal information of your workforce is readily accessible and exposed on the internet, making the organization susceptible to threats. DeleteMe is the solution that locates and eliminates personal data from the open web, safeguarding your organization. This segment is sponsored by DeleteMe. Visit https://www.securityweekly.com/deletemeisw to learn more about them! With all of the fancy tools, equipment, and logos most organizations are unable to understand where their data is and how it can be accessed. In the world of work from wherever and whenever orgs need a better handle on what this means. Ridge has worked to curate a set of solutions to meet and implement this need! This segment is sponsored by Ridge IT Cyber. Visit https://www.securityweekly.com/ridgeitisw to learn more about them! Why are we seeing a re-emergence of the demand for packet and flow-based forensic data in cloud environments? In this session, we'll discuss three reasons why IT leaders still need the same if not even better visibility in the cloud than they have in their data centers. We'll also discuss the growing demand for Threat Exposure Management (TEM). Why does a leading analyst describe this as a transformation technology and how can you quickly visualize your environment the way the attackers do? Segment Resources: https://www.viavisolutions.com/en-us/ptv/solutions/threat-exposure-management https://www.viavisolutions.com/en-us/ptv/solutions/high-fidelity-threat-forensics-remediation This segment is sponsored by VIAVI Solutions. Visit https://www.securityweekly.com/viaviisw to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
In this segment, we'll explore some of the most useful lessons and interesting insights to come out of the last year's worth of breaches and data leaks! We'll explain why we will NOT be covering MGM in this segment. The breaches we will be covering include: - Microsoft AI Research Data Leak - Microsoft/Storm-0558 - CommutAir - Riot Games - Lastpass - CircleCI - RackSpace - Drizly (yes, this breach is older, but the full story just wrapped a year ago!) On this week's news segment, we go down a bit of a rabbit hole on data lakes and have a GREAT conversation about where security data wrangling might or might not go in the future. We also discuss Nord Security's funding and $3B valuation, try to figure out what Synqly is doing, and discuss IronNet's demise. We also find out which email solution is more secure (at least, according to insurance claim data), Google or Microsoft! We wrap up, learning that forms of CAPTCHAs are apparently broken now, $3800 gets you a gaming PC in the shape of a sneaker, and someone has created the DevOps equivalent of dieselgate! Each employee serves as a potential gateway to their organization, and the personal information of your workforce is readily accessible and exposed on the internet, making the organization susceptible to threats. DeleteMe is the solution that locates and eliminates personal data from the open web, safeguarding your organization. This segment is sponsored by DeleteMe. Visit https://www.securityweekly.com/deletemeisw to learn more about them! With all of the fancy tools, equipment, and logos most organizations are unable to understand where their data is and how it can be accessed. In the world of work from wherever and whenever orgs need a better handle on what this means. Ridge has worked to curate a set of solutions to meet and implement this need! This segment is sponsored by Ridge IT Cyber. Visit https://www.securityweekly.com/ridgeitisw to learn more about them! Why are we seeing a re-emergence of the demand for packet and flow-based forensic data in cloud environments? In this session, we'll discuss three reasons why IT leaders still need the same if not even better visibility in the cloud than they have in their data centers. We'll also discuss the growing demand for Threat Exposure Management (TEM). Why does a leading analyst describe this as a transformation technology and how can you quickly visualize your environment the way the attackers do? Segment Resources: https://www.viavisolutions.com/en-us/ptv/solutions/threat-exposure-management https://www.viavisolutions.com/en-us/ptv/solutions/high-fidelity-threat-forensics-remediation This segment is sponsored by VIAVI Solutions. Visit https://www.securityweekly.com/viaviisw to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Each employee serves as a potential gateway to their organization, and the personal information of your workforce is readily accessible and exposed on the internet, making the organization susceptible to threats. DeleteMe is the solution that locates and eliminates personal data from the open web, safeguarding your organization. This segment is sponsored by DeleteMe. Visit https://www.securityweekly.com/deletemeisw to learn more about them! With all of the fancy tools, equipment, and logos most organizations are unable to understand where their data is and how it can be accessed. In the world of work from wherever and whenever orgs need a better handle on what this means. Ridge has worked to curate a set of solutions to meet and implement this need! This segment is sponsored by Ridge IT Cyber. Visit https://www.securityweekly.com/ridgeitisw to learn more about them! Why are we seeing a re-emergence of the demand for packet and flow-based forensic data in cloud environments? In this session, we'll discuss three reasons why IT leaders still need the same if not even better visibility in the cloud than they have in their data centers. We'll also discuss the growing demand for Threat Exposure Management (TEM). Why does a leading analyst describe this as a transformation technology and how can you quickly visualize your environment the way the attackers do? Segment Resources: https://www.viavisolutions.com/en-us/ptv/solutions/threat-exposure-management https://www.viavisolutions.com/en-us/ptv/solutions/high-fidelity-threat-forensics-remediation This segment is sponsored by VIAVI Solutions. Visit https://www.securityweekly.com/viaviisw to learn more about them! Show Notes: https://securityweekly.com/esw-334
Each employee serves as a potential gateway to their organization, and the personal information of your workforce is readily accessible and exposed on the internet, making the organization susceptible to threats. DeleteMe is the solution that locates and eliminates personal data from the open web, safeguarding your organization. This segment is sponsored by DeleteMe. Visit https://www.securityweekly.com/deletemeisw to learn more about them! With all of the fancy tools, equipment, and logos most organizations are unable to understand where their data is and how it can be accessed. In the world of work from wherever and whenever orgs need a better handle on what this means. Ridge has worked to curate a set of solutions to meet and implement this need! This segment is sponsored by Ridge IT Cyber. Visit https://www.securityweekly.com/ridgeitisw to learn more about them! Why are we seeing a re-emergence of the demand for packet and flow-based forensic data in cloud environments? In this session, we'll discuss three reasons why IT leaders still need the same if not even better visibility in the cloud than they have in their data centers. We'll also discuss the growing demand for Threat Exposure Management (TEM). Why does a leading analyst describe this as a transformation technology and how can you quickly visualize your environment the way the attackers do? Segment Resources: https://www.viavisolutions.com/en-us/ptv/solutions/threat-exposure-management https://www.viavisolutions.com/en-us/ptv/solutions/high-fidelity-threat-forensics-remediation This segment is sponsored by VIAVI Solutions. Visit https://www.securityweekly.com/viaviisw to learn more about them! Show Notes: https://securityweekly.com/esw-334
Dans ce 57e épisode des entretiens Decode Quantum, Olivier Ezratty accueille Guillaume de Giovanni, le CEO et fondateur de Viqthor. Ingénieur EFREI en électronique, son parcours l'a amené à travailler chez Aeroflex aux USA comme chef de produit dans l'électronique radio fréquence et microondes pendant 5 ans, puis chez Noise Extended Technologies où il était CEO pendant entre 2009 et 2017, puis comme directeur du business development chez VIAVI Solutions et d'une business unit chez SPHEREA jusqu'en 2021 dans l'électronique dans le domaine des satellites. Il lance Viqthor en 2022 qui est spécialisé dans l'électronique de contrôle des qubits ».
By Adam Turteltaub While the trade compliance focus these days tends to be on Russia and the hundreds of sanctions imposed, one old issue remains: The Arab League Boycott of Israel. Despite improving relationships between Israel and some of its neighbors, progress has not been uniform and risk remains. In this podcast, Matt Silverman, Global Trade Director and Senior Counsel at VIAVI Solutions and author of the chapter “U.S. Antiboycott Laws: Understanding the Impact and Ensuring Compliance” in the Complete Compliance and Ethics Manual, explains that the boycott prohibits companies and individuals from doing business in Israel or with other companies that do business with the country. The US antiboycott law makes it illegal for US companies and persons to support the boycott, or, for that matter, any boycott that the US does not endorse. It would seem simple enough, but it isn't. Individuals not familiar with the issue may not think twice of signing an agreement that says the company will follow the laws of the country where the sale is made. What they may not realize is that the country has laws on its books prohibiting business with Israel. Examples of boycott language can be found on websites of the US government. To comply with the US antiboycott law, both in the Middle East and elsewhere where boycotts may be in place, it is essential that employes be trained in what to watch out for. The company should also have an antiboycott policy. In addition, companies need to remember that there is an obligation to report any boycott requests. Listen in to learn more or read the chapter about the topic in the Complete Compliance and Ethics Manual.
On this episode of The Six Five – CXO, hosts Daniel Newman and Patrick Moorhead sit down with Sameer Vuyyuru Head of Worldwide Biz Dev & Telco Industry for AWS, and Anand Chandrasekher, Co-Founder and CEO of Aira Technologies. Their discussion covers: How their partnership is committed to solving complex challenges in the industry through collaboration with companies of all size and scale AWS's leadership in sustainability How running workloads on AWS helps accelerate innovation, and deliver greater value to end customers Aira's leadership in the application of machine learning to wireless How Aira is demonstrating that machine learning can deliver fundamental improvements in energy efficiency and performance in cellular networks Be sure to subscribe to The Six Five Webcast, so you never miss an episode.
An interview with Jim Neuens, Viavi Solutions' VP and GM of wireless field instruments, about the realities of 5G deployments, including spectrum issues, ongoing evolution at the cell site and workforce challenges that have to be addressed in order for mobile network operators to get the most out of their deployments. This is the second of a two-part sponsored podcast series.
The radio access network (RAN) is central to a wireless network deployment. It's the physical pieces of equipment we all see out in the wild, sometimes standing proudly and showing off its various antennas, sometimes being shy and trying to hide as a pine tree. But as these RAN networks continue to evolve based on the latest 5G standards, they are being pruned by virtualized (vRAN) and open RAN platforms designed to provide easier management and control. The next step in this process is the use of a RAN intelligent controller (RIC) to provide operators with a way to manage these vRAN and open RAN systems on a per-bit and per-sector basis. The RIC operates in the middle of a RAN deployment as a kind of linkage to the wider network. It allows operators to deploy xApps and rApps that then allow operators to design and control RAN functions, providing administrative RAN sovereignty over functions that are typically implemented as proprietary features on base stations. These “apps” are microservices-based applications operating in near-real time (xApps) and non-real time (rApps) that provide an operator with more control over their open RAN environments. RIC development has steadily gained attention from vendors looking to help operators manage their growing RAN infrastructure. VMware, for instance, recently added Viavi Solutions to its RIC ecosystem, bringing standardized framework and metric testing to its platform. Juniper Networks has also been making progress in the RIC space. Japan's Rakuten Symphony late last year selected the vendor's RIC platform as the sole selection as part of the Rakuten Symworld Platform. The vendor has also conducted a multivendor RIC trial with European telecom giant Vodafone and open RAN provider Parallel Wireless. Jai Thattil, senior director and head of service provider strategic marketing at Juniper Networks, joined us on the latest SDxCentral 7 Layers podcast to provide more details into the vendor's RIC work, what has gone into developing a RIC platform to work across vendors and operators, and challenges still facing the still maturing ecosystem. Learn more about your ad choices. Visit megaphone.fm/adchoices
An interview with Jim Neuens of Viavi Solutions, VP and GM of wireless field instruments, about the actual reality of 5G deployments, as well as issues that have to be addressed in order for mobile network operators to get the most out of these deployments. This is the first of a two-part sponsored podcast series.
With a history that dates back to 1923 (1968 for IFR), VIAVI Solutions' Avionics Test group out of Wichita, Kansas, is a leader in design and manufacture of avionics test equipment. The company provides accurate, reliable and cost-effective test solutions for maintenance needs. One of the company's latest innovations is the AVX-10K for testing navigation, communications and surveillance gear – in and around the aircraft or on the test bench. Learn more from Guy Hill, director of avionics test products at VIAVI Solutions, along with Kerry Crawford, product manager of avionics test products, in this episode of AEA Amplified, sponsored by Genesys Aerosystems, a Moog Company.
Deploying cell sites is complex. Radios, antennas, cables, and power must be installed properly, then tested to verify the site is functioning as designed before the installation crew leaves.Herein lies a problem. Whether testing RF, fiber, PIM or other parameters, test equipment is very sophisticated, and proper testing takes time. Contractors working on tight deployment schedules, may or may not have sufficient training to conduct the required tests.This means tests often are incomplete or conducted improperly. Dispatching another crew to complete the testing just adds time and costs to get cell sites on the air.Kashif Hussain, Solutions Marketing Director at VIAVI Solutions discusses with John Celentano, Inside Towers Business Editor these testing issues and ways to streamline them.Support the show (https://insidetowers.com/subscription/)
Part III of this three part series discusses developing field technician fiber installation and testing skills. Join John Celentano, Inside Towers Business Editor as he continues this informative and in-depth discussion with industry experts Mike Dee, Sr. Field Engineer and Jeff Harmon, Sr. Systems Engineer from Viavi Solutions and Scott Jackson, National Market Manager with Graybar. Hear this and much more on the podcast, available on our website, Amazon Music, Spotify and iTunes.Support the show (https://insidetowers.com/subscription/)
Fiber optics technology is integral to the high-speed operation of modern telecom networks.In an exclusive three-part series, Tower Talks dives into the subject of how, where, and why fiber is deployed in telecom. Part I covered a high-level view of fiber optic technology and fiber terminology, the current market environment and how fiber is adapted for use in different parts of the telecom network. Part II address specific fiber uses in the wireless network.Join John Celentano, Inside Towers Business Editor as he continues this informative and in-depth discussion with industry experts Mike Dee, Sr. Field Engineer and Jeff Harmon, Sr. Systems Engineer from Viavi Solutions and Scott Jackson, National Market Manager with Graybar.Support the show (https://insidetowers.com/subscription/)
“It takes a lot of wires to make wireless work.” Today, that means fiber optic cable.Fiber handles high-speed multimedia traffic over long distances more efficiently and cost-effectively than copper cables.Fiber use in wireless is growing – at cell sites, for backhaul, in data centers and for long-haul transport.Though light weight and easier to handle than copper cable, fiber installation and testing must be precise with skilled technicians using specialized tools and test sets to ensure peak performance.In a special three-part series, Tower Talks discusses fiber in telecom applications, and associated installation and testing practices.PART I – Fiber in Telecom OverviewPART II – Fiber in Wireless ApplicationsPART III – Developing Field Technician Fiber Installation and Testing SkillsJohn Celentano, Inside Towers Business Editor hosts industry experts from Viavi Solutions, Mike Dee, Sr. Field Engineer and Jeff Harmon, Sr. Systems Engineer and from Graybar, Scott Jackson, National Market Manager for an informative, in-depth discussion.Support the show (https://insidetowers.com/subscription/)
This week, Twitter cracks down on 5G, Tycoon Ransomware, Citizen App, CallStranger, and REvil! Matt Allen from VIAVI Solutions joins us for Expert Commentary to talk about Leveraging enriched flow insights to accelerate response and remediation! Show Notes: https://wiki.securityweekly.com/SWNEpisode41 To learn more about VIAVI Solution, visit: https://securityweekly.com/viavi Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, Twitter cracks down on 5G, Tycoon Ransomware, Citizen App, CallStranger, and REvil! Matt Allen from VIAVI Solutions joins us for Expert Commentary to talk about Leveraging enriched flow insights to accelerate response and remediation! Show Notes: https://wiki.securityweekly.com/SWNEpisode41 To learn more about VIAVI Solution, visit: https://securityweekly.com/viavi Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, Twitter cracks down on 5G, Tycoon Ransomware, Citizen App, CallStranger, and REvil! Matt Allen from VIAVI Solutions joins us for Expert Commentary to talk about Leveraging enriched flow insights to accelerate response and remediation! To learn more about VIAVI Solution, visit: https://securityweekly.com/viavi Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://wiki.securityweekly.com/SWNEpisode41
Today's Tech Bytes podcast dives into using enriched flow--that is, flow records enhanced with logs and data from sources such as firewalls and directories--to improve your network performance monitoring and threat management. Our guest is Warren Caron, Sales Engineer at VIAVI Solutions. VIAVI is our sponsor for today's episode.
Today's Tech Bytes podcast dives into using enriched flow--that is, flow records enhanced with logs and data from sources such as firewalls and directories--to improve your network performance monitoring and threat management. Our guest is Warren Caron, Sales Engineer at VIAVI Solutions. VIAVI is our sponsor for today's episode.
Today's Tech Bytes podcast dives into using enriched flow--that is, flow records enhanced with logs and data from sources such as firewalls and directories--to improve your network performance monitoring and threat management. Our guest is Warren Caron, Sales Engineer at VIAVI Solutions. VIAVI is our sponsor for today's episode.
Today's Tech Bytes podcast dives into using enriched flow--that is, flow records enhanced with logs and data from sources such as firewalls and directories--to improve your network performance monitoring and threat management. Our guest is Warren Caron, Sales Engineer at VIAVI Solutions. VIAVI is our sponsor for today's episode. The post Tech Bytes: Improving NPM And Threat Management With Enriched Flow From VIAVI Solutions (Sponsored) appeared first on Packet Pushers.
Today's Tech Bytes podcast dives into using enriched flow--that is, flow records enhanced with logs and data from sources such as firewalls and directories--to improve your network performance monitoring and threat management. Our guest is Warren Caron, Sales Engineer at VIAVI Solutions. VIAVI is our sponsor for today's episode. The post Tech Bytes: Improving NPM And Threat Management With Enriched Flow From VIAVI Solutions (Sponsored) appeared first on Packet Pushers.
Today's Tech Bytes podcast dives into using enriched flow--that is, flow records enhanced with logs and data from sources such as firewalls and directories--to improve your network performance monitoring and threat management. Our guest is Warren Caron, Sales Engineer at VIAVI Solutions. VIAVI is our sponsor for today's episode. The post Tech Bytes: Improving NPM And Threat Management With Enriched Flow From VIAVI Solutions (Sponsored) appeared first on Packet Pushers.
Many companies hire external consultants to conduct incident response and remediation, which can add up quickly in cost. By providing these security consultants with network data in seconds as opposed to hours or days, we can drastically reduce remediation costs and speed breach containment. To learn more about VIAVI Solutions, visit: https://securitweekly.com/viavi Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode183
Many companies hire external consultants to conduct incident response and remediation, which can add up quickly in cost. By providing these security consultants with network data in seconds as opposed to hours or days, we can drastically reduce remediation costs and speed breach containment. To learn more about VIAVI Solutions, visit: https://securitweekly.com/viavi Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode183
This week, we talk Enterprise News, to discuss how GitHub Code Scanning aims to prevent vulnerabilities in open source software, SlashNext Integrates with Palo Alto Networks Cortex XSOAR to Deliver Automated Phishing IR and Threat Hunting, Portshift Announces Extended Kubernetes Cluster Protection, Vigilant Ops InSight Platform V1 automatically generates device software bill of materials, and more! In our second segment, we welcome Georges Bellefontaine, Manager of Vulnerability Management at Toyota Financial, to discuss the approach to vulnerability management and the benefits of a full life-cycle approach to vulnerability management with Qualys' VMDR Solution! In our final segment, we welcome Sid Nanda, Senior Product Marketing Manager at VIAVI Solutions, to talk about Using the Network to Reduce Remediation Costs! Show Notes: https://wiki.securityweekly.com/ESWEpisode183 To learn more about Qualys VMDR, visit: https://securityweekly.com/qualys To learn more about VIAVI Solutions, visit: https://securitweekly.com/viavi Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we talk Enterprise News, to discuss how GitHub Code Scanning aims to prevent vulnerabilities in open source software, SlashNext Integrates with Palo Alto Networks Cortex XSOAR to Deliver Automated Phishing IR and Threat Hunting, Portshift Announces Extended Kubernetes Cluster Protection, Vigilant Ops InSight Platform V1 automatically generates device software bill of materials, and more! In our second segment, we welcome Georges Bellefontaine, Manager of Vulnerability Management at Toyota Financial, to discuss the approach to vulnerability management and the benefits of a full life-cycle approach to vulnerability management with Qualys' VMDR Solution! In our final segment, we welcome Sid Nanda, Senior Product Marketing Manager at VIAVI Solutions, to talk about Using the Network to Reduce Remediation Costs! Show Notes: https://wiki.securityweekly.com/ESWEpisode183 To learn more about Qualys VMDR, visit: https://securityweekly.com/qualys To learn more about VIAVI Solutions, visit: https://securitweekly.com/viavi Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome Matt Allen, Senior Solutions Engineer at VIAVI Solutions, to discuss Collaboration between NetOps and SecOps in today's world! In our second segment, we welcome Lorrie Cranor, Director of CyLab Security and Privacy Institute at Carnegie Mellon University, to discuss Research on Security and Privacy labels for IoT devices! In the Security News, Two Zoom Zero-Day Flaws Uncovered, Millions of routers running OpenWRT vulnerable to attack, Marriott says 5.2 million guest records were stolen in another data breach, PoC Exploits for CVE-2020-0796 (SMBGhost) Privilege Escalation flaw published, and we welcome our very special guest for tonight, Dave Kennedy, who joins us to talk about Video Chat Client Vulnerability History and the recent Zoom Vulnerabilities! Show Notes: https://wiki.securityweekly.com/PSWEpisode645 For more information on VIAVI Solutions, visit: https://securityweekly.com/viavi Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Matt and the Security Weekly crew will discuss how the interaction between network engineers and security operations has changed over the years, as well as the value of the network when identifying security threats and performing remediation. For more information on VIAVI Solutions, visit: https://securityweekly.com/viavi Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/PSWEpisode645
Matt and the Security Weekly crew will discuss how the interaction between network engineers and security operations has changed over the years, as well as the value of the network when identifying security threats and performing remediation. For more information on VIAVI Solutions, visit: https://securityweekly.com/viavi Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/PSWEpisode645
This week, we welcome Matt Allen, Senior Solutions Engineer at VIAVI Solutions, to discuss Collaboration between NetOps and SecOps in today's world! In our second segment, we welcome Lorrie Cranor, Director of CyLab Security and Privacy Institute at Carnegie Mellon University, to discuss Research on Security and Privacy labels for IoT devices! In the Security News, Two Zoom Zero-Day Flaws Uncovered, Millions of routers running OpenWRT vulnerable to attack, Marriott says 5.2 million guest records were stolen in another data breach, PoC Exploits for CVE-2020-0796 (SMBGhost) Privilege Escalation flaw published, and we welcome our very special guest for tonight, Dave Kennedy, who joins us to talk about Video Chat Client Vulnerability History and the recent Zoom Vulnerabilities! Show Notes: https://wiki.securityweekly.com/PSWEpisode645 For more information on VIAVI Solutions, visit: https://securityweekly.com/viavi Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
As more employees work from home, organizations are struggling with the rollout and support of remote work forces. On today's Tech Bytes podcast we walk through the four phases of scaling up remote workers with our sponsor, Viavi Solutions. Viavi provides network performance monitoring and visibility products. Our guest is Bill Proctor, Customer Success Manager at Viavi.
As more employees work from home, organizations are struggling with the rollout and support of remote work forces. On today's Tech Bytes podcast we walk through the four phases of scaling up remote workers with our sponsor, Viavi Solutions. Viavi provides network performance monitoring and visibility products. Our guest is Bill Proctor, Customer Success Manager at Viavi.
As more employees work from home, organizations are struggling with the rollout and support of remote work forces. On today's Tech Bytes podcast we walk through the four phases of scaling up remote workers with our sponsor, Viavi Solutions. Viavi provides network performance monitoring and visibility products. Our guest is Bill Proctor, Customer Success Manager at Viavi.
As more employees work from home, organizations are struggling with the rollout and support of remote work forces. On today's Tech Bytes podcast we walk through the four phases of scaling up remote workers with our sponsor, Viavi Solutions. Viavi provides network performance monitoring and visibility products. Our guest is Bill Proctor, Customer Success Manager at Viavi. The post Tech Bytes: Four Phases Of Scaling Your Remote Workforce With Viavi Solutions (Sponsored) appeared first on Packet Pushers.
As more employees work from home, organizations are struggling with the rollout and support of remote work forces. On today's Tech Bytes podcast we walk through the four phases of scaling up remote workers with our sponsor, Viavi Solutions. Viavi provides network performance monitoring and visibility products. Our guest is Bill Proctor, Customer Success Manager at Viavi. The post Tech Bytes: Four Phases Of Scaling Your Remote Workforce With Viavi Solutions (Sponsored) appeared first on Packet Pushers.
As more employees work from home, organizations are struggling with the rollout and support of remote work forces. On today's Tech Bytes podcast we walk through the four phases of scaling up remote workers with our sponsor, Viavi Solutions. Viavi provides network performance monitoring and visibility products. Our guest is Bill Proctor, Customer Success Manager at Viavi. The post Tech Bytes: Four Phases Of Scaling Your Remote Workforce With Viavi Solutions (Sponsored) appeared first on Packet Pushers.
This week, we welcome Matt Allen from VIAVI Solutions! The SCW crew discusses compliance requirements and SecOps frameworks like NIST - checking boxes rather than a holistic view? The vendor eco-system feeding on checking boxes (of which we are one, we HAVE to be.) RSA s theme this year: the human factor . Are CFOs driving technical decisions that put SecOps teams underwater? Investing in Protect vs. Detect vs. Responding tools/resources. Show Notes: https://wiki.securityweekly.com/SCWEpisode21 To learn more about VIAVI Solutions, visit: https://securityweekly.com/viavi Visit https://www.securityweekly.com/scw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome Matt Allen from VIAVI Solutions! The SCW crew discusses compliance requirements and SecOps frameworks like NIST - checking boxes rather than a holistic view? The vendor eco-system feeding on checking boxes (of which we are one, we HAVE to be.) RSA s theme this year: the human factor . Are CFOs driving technical decisions that put SecOps teams underwater? Investing in Protect vs. Detect vs. Responding tools/resources. Show Notes: https://wiki.securityweekly.com/SCWEpisode21 To learn more about VIAVI Solutions, visit: https://securityweekly.com/viavi Visit https://www.securityweekly.com/scw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week on Enterprise Security Weekly, Paul Asadoorian and Matt Alderman interview Ward Cobleigh about the recent VISA security alerts highlighting the need for ongoing network monitoring and the ability to react quickly to specific indicators of compromise (IOCs). How flow and wire data can flag malicious behaviors and identify breach scope and impact. To find out more about VIAVI Solutions and to download their "Using Wire Data for Security Forensics" White Paper, visit https://securityweekly.com/VIAVI. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode168
This week on Enterprise Security Weekly, Paul Asadoorian and Matt Alderman interview Ward Cobleigh about the recent VISA security alerts highlighting the need for ongoing network monitoring and the ability to react quickly to specific indicators of compromise (IOCs). How flow and wire data can flag malicious behaviors and identify breach scope and impact. To find out more about VIAVI Solutions and to download their "Using Wire Data for Security Forensics" White Paper, visit https://securityweekly.com/VIAVI. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode168
This week, we talk Enterprise News, to talk about How to Create Easy and Open Integrations with VMRays REST API, Zimperium integrates with Microsoft Defender Advanced Threat Protection EDR, PacketViper Deception360 now available for Microsoft Azure, Up Your Vulnerability Prioritization Game with Tenable Lumin for Tenable.sc, and Say Goodbye to Windows Server 2008 and Hello to Azure?! In our second segment, we welcome Mark Orlando, Founder, and CEO of Bionic, to discuss Outdated Defense Approaches and the need to revisit traditional thinking about security operations in the Enterprise! In our final segment, we welcome Ward Cobleigh, Product Line Manager at VIAVI Solutions, to discuss VISA Security Alerts - What we can learn, and what we can do! Show Notes: https://wiki.securityweekly.com/ESWEpisode168 To learn more about VIAVI Solutions, visit: https://securityweekly.com/viavi Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we talk Enterprise News, to talk about How to Create Easy and Open Integrations with VMRays REST API, Zimperium integrates with Microsoft Defender Advanced Threat Protection EDR, PacketViper Deception360 now available for Microsoft Azure, Up Your Vulnerability Prioritization Game with Tenable Lumin for Tenable.sc, and Say Goodbye to Windows Server 2008 and Hello to Azure?! In our second segment, we welcome Mark Orlando, Founder, and CEO of Bionic, to discuss Outdated Defense Approaches and the need to revisit traditional thinking about security operations in the Enterprise! In our final segment, we welcome Ward Cobleigh, Product Line Manager at VIAVI Solutions, to discuss VISA Security Alerts - What we can learn, and what we can do! Show Notes: https://wiki.securityweekly.com/ESWEpisode168 To learn more about VIAVI Solutions, visit: https://securityweekly.com/viavi Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome Ward Cobleigh, Senior Product Manager at VIAVI Solutions! In the Leadership and Communications segment, Companies Need to Rethink What Cybersecurity Leadership Is, What Companies That Are Good at Innovation Get Right, Staff in smaller businesses bogged down by poor communications, Why You Should Be Sending More Video Emails And How To Record Them, Enterprises muddled over cloud security responsibilities, and Top tech conferences to attend in 2020! Show Notes: https://wiki.securityweekly.com/BSWEpisode154 To learn more about VIAVI Solutions, visit: https://securityweekly.com/viavi Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Ward Cobleigh is the Sr. Product Manager at VIAVI Solutions. In a very recent study, 65% of responding organizations reported a shortage of cybersecurity staff, with a lack of skilled or experienced security personnel their number one workplace concern (36%). To help fill this void, there is a very real and still growing need to cross-train existing professionals and teams whenever possible. How achievable is this goal? Can we really take the typical NetOps skillset, combine it with the data sources that are typically available to them, and apply this to the SecOps skills gap? This Business Security Week Podcast will answer these questions and include a demonstration of how a performance analysis platform can be used to quickly and efficiently identify threats. Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/BSWEpisode154
This week, we welcome Ward Cobleigh, Senior Product Manager at VIAVI Solutions! In the Leadership and Communications segment, Companies Need to Rethink What Cybersecurity Leadership Is, What Companies That Are Good at Innovation Get Right, Staff in smaller businesses bogged down by poor communications, Why You Should Be Sending More Video Emails And How To Record Them, Enterprises muddled over cloud security responsibilities, and Top tech conferences to attend in 2020! Show Notes: https://wiki.securityweekly.com/BSWEpisode154 To learn more about VIAVI Solutions, visit: https://securityweekly.com/viavi Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Ward Cobleigh is the Sr. Product Manager at VIAVI Solutions. In a very recent study, 65% of responding organizations reported a shortage of cybersecurity staff, with a lack of skilled or experienced security personnel their number one workplace concern (36%). To help fill this void, there is a very real and still growing need to cross-train existing professionals and teams whenever possible. How achievable is this goal? Can we really take the typical NetOps skillset, combine it with the data sources that are typically available to them, and apply this to the SecOps skills gap? This Business Security Week Podcast will answer these questions and include a demonstration of how a performance analysis platform can be used to quickly and efficiently identify threats. Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/BSWEpisode154
Ward Cobleigh is the Sr. Product Manager at VIAVI Solutions. There's an abundance of potential data sources that can be found within you network. Where should you look? Which data sources offer unique perspectives and value? How can you use these data sources to speed threat identification, understand scope and impact, and aide in remediation steps to minimize impact? This segment will include a brief demonstration of how commonly available data sources can be effectively leveraged by SecOps and NetOps teams. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode161
This week, we talk Enterprise News, discussing how STEALTHbits releases real-time threat detection and response platform StealthDEFEND 2.2, Bitdefender GravityZone enhanced with new endpoint defense capabilities, Tenable to Secure Enterprise Cloud Environments with Microsoft Azure Integration, and Aqua Security buys CloudSploit to expand into cloud security posture management! In our second segment, we welcome Baber Amin, CTO West at Ping Identity, to discuss Zero Trust Architecture! In our final segment, we welcome Ward Cobleigh, Sr. Product Manager at VIAVI Solutions, to discuss Threat Detection: The Network Scavenger Hunt! Show Notes: https://wiki.securityweekly.com/ESWEpisode161 To learn more about VIAVI, visit: https://securityweekly.com/viavi To learn more about Ping Identity, visit: https://securityweekly.com/ping Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Ward Cobleigh is the Sr. Product Manager at VIAVI Solutions. There's an abundance of potential data sources that can be found within you network. Where should you look? Which data sources offer unique perspectives and value? How can you use these data sources to speed threat identification, understand scope and impact, and aide in remediation steps to minimize impact? This segment will include a brief demonstration of how commonly available data sources can be effectively leveraged by SecOps and NetOps teams. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode161
This week, we talk Enterprise News, discussing how STEALTHbits releases real-time threat detection and response platform StealthDEFEND 2.2, Bitdefender GravityZone enhanced with new endpoint defense capabilities, Tenable to Secure Enterprise Cloud Environments with Microsoft Azure Integration, and Aqua Security buys CloudSploit to expand into cloud security posture management! In our second segment, we welcome Baber Amin, CTO West at Ping Identity, to discuss Zero Trust Architecture! In our final segment, we welcome Ward Cobleigh, Sr. Product Manager at VIAVI Solutions, to discuss Threat Detection: The Network Scavenger Hunt! Show Notes: https://wiki.securityweekly.com/ESWEpisode161 To learn more about VIAVI, visit: https://securityweekly.com/viavi To learn more about Ping Identity, visit: https://securityweekly.com/ping Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Charles Thompson, Sr. Director of Product Management at VIAVI Solutions, has a career spanning 20 years in the IT space specializing in using wire-data to assist SecOps and NetOps teams with management, analysis, and protection of critical applications, services, and data. Full Show Notes: https://wiki.securityweekly.com/ES_Episode147 Visit https://www.securityweekly.com/esw for all the latest episodes!
Charles Thompson, Sr. Director of Product Management at VIAVI Solutions, has a career spanning 20 years in the IT space specializing in using wire-data to assist SecOps and NetOps teams with management, analysis, and protection of critical applications, services, and data. Full Show Notes: https://wiki.securityweekly.com/ES_Episode147 Visit https://www.securityweekly.com/esw for all the latest episodes!
This week, Paul, Matt, and John discuss how Microsoft acquires BlueTalon to bolster data governance offerings, Arduino selects Auth0 as standardized login for open source ecosystem, new code-signing solution released by Venafi, and ExtraHop issues warning about phoning home in new security advisory! In our second segment, we talk Evaluating Security Vendors! In our final segment, we welcome Charles Thompson, Senior Director of Product Management at VIAVI Solutions! To learn more about VIAVI Solutions, visit: https://securityweekly.com/viavi Full Show Notes: https://wiki.securityweekly.com/ES_Episode147 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, Paul, Matt, and John discuss how Microsoft acquires BlueTalon to bolster data governance offerings, Arduino selects Auth0 as standardized login for open source ecosystem, new code-signing solution released by Venafi, and ExtraHop issues warning about phoning home in new security advisory! In our second segment, we talk Evaluating Security Vendors! In our final segment, we welcome Charles Thompson, Senior Director of Product Management at VIAVI Solutions! To learn more about VIAVI Solutions, visit: https://securityweekly.com/viavi Full Show Notes: https://wiki.securityweekly.com/ES_Episode147 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Charles Thompson is the Senior Director of Product Management at Viavi. Charles will discuss the importance of response/remediation in a strong security strategy and the role wire-data plays in having the forensic detail needed to identify a breach, understand scope of impact, and confirm restoration of network performance to pre-incident baseline. To learn more about Viavi Solutions, visit: https://securityweekly.com/viavi Full Show Notes: https://wiki.securityweekly.com/ES_Episode140 Visit https://securityweekly.com/esw for all the latest episodes!
This week, Paul is joined by Jeff Man to interview Charles Thompson, Senior Director of Product Management at VIAVI Solution to talk about the importance of response and remediation in a strong security strategy! In our second segment, we talk about Defending Your Environment Against Major Microsoft Vulnerabilities, and four pillars that define a "major" Microsoft vulnerability! In the Enterprise News, Database security for Amazon RDS, Infoblox unveils simplified security platform to detect and stop cyber threats, Palo Alto launches new 'Prisma' cloud security suite, and we have some funding and acquisition updates from Recorded Future, Swinlane, EnSilo, and SentinelOne! To learn more about Viavi Solutions, visit: https://securityweekly.com/viavi Full Show Notes: https://wiki.securityweekly.com/ES_Episode140 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Charles Thompson is the Senior Director of Product Management at Viavi. Charles will discuss the importance of response/remediation in a strong security strategy and the role wire-data plays in having the forensic detail needed to identify a breach, understand scope of impact, and confirm restoration of network performance to pre-incident baseline. To learn more about Viavi Solutions, visit: https://securityweekly.com/viavi Full Show Notes: https://wiki.securityweekly.com/ES_Episode140 Visit https://securityweekly.com/esw for all the latest episodes!
This week, Paul is joined by Jeff Man to interview Charles Thompson, Senior Director of Product Management at VIAVI Solution to talk about the importance of response and remediation in a strong security strategy! In our second segment, we talk about Defending Your Environment Against Major Microsoft Vulnerabilities, and four pillars that define a "major" Microsoft vulnerability! In the Enterprise News, Database security for Amazon RDS, Infoblox unveils simplified security platform to detect and stop cyber threats, Palo Alto launches new 'Prisma' cloud security suite, and we have some funding and acquisition updates from Recorded Future, Swinlane, EnSilo, and SentinelOne! To learn more about Viavi Solutions, visit: https://securityweekly.com/viavi Full Show Notes: https://wiki.securityweekly.com/ES_Episode140 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, Unistellar attackers wiped over 12,000 MongoDB databases, a Slack bug that allows remote file hijacking, Baltimore ransomware nightmare could last weeks more, over 25,000 smart Linksys routers are leaking sensitive data, and Huawei's microchip vulnerability explained! In the expert commentary, we welcome Charles Thompson, Senior Director of Product Management at VIAVI to talk about Security Forensics! To learn more about VIAVI Solutions, visit: https://securityweekly.com/viavi Full Show Notes: https://wiki.securityweekly.com/HNNEpisode219 Visit http://hacknaked.tv to get all the latest episodes!
This week, Unistellar attackers wiped over 12,000 MongoDB databases, a Slack bug that allows remote file hijacking, Baltimore ransomware nightmare could last weeks more, over 25,000 smart Linksys routers are leaking sensitive data, and Huawei's microchip vulnerability explained! In the expert commentary, we welcome Charles Thompson, Senior Director of Product Management at VIAVI to talk about Security Forensics! To learn more about VIAVI Solutions, visit: https://securityweekly.com/viavi Full Show Notes: https://wiki.securityweekly.com/HNNEpisode219 Visit https://www.securityweekly.com/hnn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, Unistellar attackers wiped over 12,000 MongoDB databases, a Slack bug that allows remote file hijacking, Baltimore ransomware nightmare could last weeks more, over 25,000 smart Linksys routers are leaking sensitive data, and Huawei's microchip vulnerability explained! In the expert commentary, we welcome Charles Thompson, Senior Director of Product Management at VIAVI to talk about Security Forensics! To learn more about VIAVI Solutions, visit: https://securityweekly.com/viavi Full Show Notes: https://wiki.securityweekly.com/HNNEpisode219 Visit https://www.securityweekly.com/hnn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
On today's sponsored Heavy Networking, VIAVI Solutions joins the Packet Pushers to discuss the intersection of network performance management (NPM) and security. We discuss how network and security teams can leverage VIAVI's packet capture capabilities, how it enriches flow records with additional data to provide valuable context, and how the concept of end user experience informs VIAVI's approach to NPM. The post Heavy Networking 434: Solving Network Performance And Security Problems With VIAVI Solutions (Sponsored) appeared first on Packet Pushers.
On today's sponsored Heavy Networking, VIAVI Solutions joins the Packet Pushers to discuss the intersection of network performance management (NPM) and security. We discuss how network and security teams can leverage VIAVI's packet capture capabilities, how it enriches flow records with additional data to provide valuable context, and how the concept of end user experience informs VIAVI's approach to NPM. The post Heavy Networking 434: Solving Network Performance And Security Problems With VIAVI Solutions (Sponsored) appeared first on Packet Pushers.
On today's sponsored Heavy Networking, VIAVI Solutions joins the Packet Pushers to discuss the intersection of network performance management (NPM) and security. We discuss how network and security teams can leverage VIAVI's packet capture capabilities, how it enriches flow records with additional data to provide valuable context, and how the concept of end user experience informs VIAVI's approach to NPM. The post Heavy Networking 434: Solving Network Performance And Security Problems With VIAVI Solutions (Sponsored) appeared first on Packet Pushers.
Find out how packet capture and flow data can serve both the network and security teams to solve performance problems and investigate security events in this sponsored Tech Bytes conversation with VIAVI Solutions. Our guest is Charles Thompson, Sr. Director, Product Management at VIAVI. The post Tech Bytes: Leveraging Packets And Flows For NetOps And SecOps With VIAVI Solutions (Sponsored) appeared first on Packet Pushers.
Find out how packet capture and flow data can serve both the network and security teams to solve performance problems and investigate security events in this sponsored Tech Bytes conversation with VIAVI Solutions. Our guest is Charles Thompson, Sr. Director, Product Management at VIAVI. The post Tech Bytes: Leveraging Packets And Flows For NetOps And SecOps With VIAVI Solutions (Sponsored) appeared first on Packet Pushers.
Find out how packet capture and flow data can serve both the network and security teams to solve performance problems and investigate security events in this sponsored Tech Bytes conversation with VIAVI Solutions. Our guest is Charles Thompson, Sr. Director, Product Management at VIAVI. The post Tech Bytes: Leveraging Packets And Flows For NetOps And SecOps With VIAVI Solutions (Sponsored) appeared first on Packet Pushers.
In this Network Collective community roundtable episode, Nick Russo and Jeff Tantsura join us to close out our MPLS series with an episode on Fast Reroute. We would like to thank VIAVI Solutions for sponsoring this episode of Network Collective. VIAVI Solutions is an application and network management industry leader focusing on end-user experience by providing products that optimize performance and speed problem resolution. Helping to ensure delivery of critical applications for businesses worldwide, Viavi offers an integrated line of precision-engineered software and hardware systems for effective network monitoring and analysis. Learn more at www.viavisolutions.com/networkcollective. Nick Russo Guest Jeff Tantsura Guest Jordan Martin Host Russ White Host Outro Music: Danger Storm Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/ The post Episode 40 – MPLS Part 4 – Fast Reroute appeared first on Network Collective.
In this Community Roundtable episode of Network Collective, Roland Dobbins and Nick Buraglio join us to talk about the current state of DDoS on the Internet and some strategies you can use to mitigate these risks on your network. Roland Dobbin's shared folder of DDoS presentations: https://app.box.com/s/4h2l6f4m8is6jnwk28cg Nick Buraglio's post on Black Hole routing: https://www.forwardingplane.net/2011/10/black-hole-routing/ Nick Buraglio's presentation on Best Practices For Securing the Science DMZ: http://www.youtube.com/watch?v=IPh3aZ18IuY We would like to thank VIAVI Solutions for sponsoring this episode of Network Collective. VIAVI Solutions is an application and network management industry leader focusing on end-user experience by providing products that optimize performance and speed problem resolution. Helping to ensure delivery of critical applications for businesses worldwide, Viavi offers an integrated line of precision-engineered software and hardware systems for effective network monitoring and analysis. Learn more at www.viavisolutions.com/networkcollective. Roland Dobbins Guest Nick Buraglio Guest Jordan Martin Host Eyvonne Sharp Host Russ White Host Outro Music: Danger Storm Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/ The post Episode 38 – DDoS Mitigation appeared first on Network Collective.
In this Network Collective Short Take, Bill Proctor from Viavi Solutions joins us to talk about how Viavi is optimizing network and application monitoring with the end result of reducing the amount of time it takes to resolve issues. Adding more metrics isn't the answer. Analyzing and correlating these indicators and turning them into actionable information is the real challenge and Viavi is doing just that. Listen in to see how Viavi is using their innovative technology to empower engineers in resolving even the most challenging of issues. Thank you to Viavi Solutions for sponsoring today's episode and supporting the content we're creating here at Network Collective. If you would like to learn more about Viavi's platform, you can head to http://www.viavisolutions.com/networkcollective for lots of great information and to try the solution out for yourself. Viavi is also giving away four Network Collective community memberships for our listeners. If you've wanted to join our community but haven't made the jump yet, head on over to the link above to register for this fantastic giveaway. Bill Proctor Viavi Solutions - Product Line Manager Jordan Martin Network Collective Host The post [Sponsored] Short Take – Viavi Solutions appeared first on Network Collective.
Join us as we share a peek behind the curtain on some content created exclusively for our Network Collective community members. In this episode, the Network Collective hosts share their thoughts on imposter syndrome and some of the ways they work through this fairly common condition. We would like to thank VIAVI Solutions for sponsoring this episode of Network Collective. VIAVI Solutions is an application and network management industry leader focusing on end-user experience by providing products that optimize performance and speed problem resolution. Helping to ensure delivery of critical applications for businesses worldwide, Viavi offers an integrated line of precision-engineered software and hardware systems for effective network monitoring and analysis. Learn more at www.viavisolutions.com/networkcollective. Jordan Martin Host Eyvonne Sharp Host Russ White Host Outro Music: Danger Storm Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/ The post Episode 37 – Imposter Syndrome appeared first on Network Collective.
The power of an exploit, Carbon Black's open letter to Cylance, Viavi Solutions Introduces Scalable RF Monitoring for Heterogeneous Networks, and 13 AWS IAM Best Practices for Security and Compliance! Full Show Notes: https://wiki.securityweekly.com/ES_Episode47 Visit http://securityweekly.com/esw for all the latest episodes!
The power of an exploit, Carbon Black's open letter to Cylance, Viavi Solutions Introduces Scalable RF Monitoring for Heterogeneous Networks, and 13 AWS IAM Best Practices for Security and Compliance! Full Show Notes: https://wiki.securityweekly.com/ES_Episode47 Visit http://securityweekly.com/esw for all the latest episodes!