GTRI and Cisco discuss how using the internet to run branch network traffic provides a better user experience and reduces costs. You’ll learn the basics of Software-Defined WAN (SD-WAN) and the benefits, including:
- Reduced costs
- Reliability and security
- Flexibility to choose service providers
- Optimized traffic flows
Presented by Mani Ganesan of Cisco and Michael Edwards of GTRI (http://www.gtri.com) in a webinar on August 10, 2016. Webinar recording at https://youtu.be/08_QpBT07pU.
Learn how you can streamline your migration to Cisco Intelligent WAN (IWAN) with lab-tested deployment best practices from Verizon Managed Services. Profit from the real-world expertise and valuable insights of this leading WAN solutions provider.
Miss the webcast? Register to view replay here: http://cs.co/9008BPw6A
Deploying new WAN services can take a long time and require a significant up-front capital investment. The software-defined nature of SD-WAN enables service agility, rapid rollout, and instant-on WAN that the Service Provider can immediately benefit from. This accelerates the time to market and time to revenue.
Tech Talk by Tim Van Herck: SDN & NFV for WANnvirters
Extending SDN & NFV to WAN
This session will walk through the evolution in branch networking and how SDN & NFV principles can be applied to the enterprise WAN to achieve increased reliability and flexibility. It will also cover how to lower the associated operational expense of running a classic enterprise WAN and what industry trends are pressuring changes on the design of such networks.When applying SDN & NFV principles to the WAN, there will be a natural reduction in complexity of managing services and guaranteeing uptime of network connectivity.
About Tim Van Herck
Tim is the Director of Technology and founding member at VeloCloud Networks.He is responsible for building out a global network of Points of Presence to deliver virtual last mile service to enterprise branches. Prior to joining VeloCloud, Tim was a founding member of Aryaka Networks, which offers WAN Optimization as a service. Tim has been passionately following the leading edge of network virtualization and security solutions for the past 15 years. He holds a master's degree in Industrial Engineering from the University of Antwerp, and is based in VeloCloud's headquarters in Los Altos, CA
More info @ http://meetup.com/openvswitch
Follow us on twitter @nvirters
Build the SD-WAN business case for your whole company and identify the hidden benefits for everyone involved. Persona content and technical diagrams presented.
FatPipe®, the inventor and multiple patents holder of software-defined wide area networking (SD-WAN), reliability, security, and WAN Optimization products, specializes in providing solutions that transcend Wide Area Network (WAN) failures to maintain business continuity for thousands of customers including numerous Fortune 1000 customers over the last 12 years, and has the largest installed base of customers in software-defined network WANs.
Silver Peak & Innovation Network Technologies (InNet)
Evolve IT: Why Performance Matters When Building Your New SD-WAN, Not all SD-WAN is Created Equal eBook
The Cisco IWAN Application simplifies WAN deployments by providing highly intuitive, policy-based automation. It enables you to realize the benefits of SD-WAN: lower costs, simplified IT, increased security, and optimized application performance.
View the Webcast: http://cs.co/9007BKlEc
Learn how you can streamline your migration to Cisco Intelligent WAN (IWAN) with lab-tested deployment best practices from Verizon Managed Services. Profit from the real-world expertise and valuable insights of this leading WAN solutions provider.
Miss the webcast? Register to view replay here: http://cs.co/9008BPw6A
Deploying new WAN services can take a long time and require a significant up-front capital investment. The software-defined nature of SD-WAN enables service agility, rapid rollout, and instant-on WAN that the Service Provider can immediately benefit from. This accelerates the time to market and time to revenue.
Tech Talk by Tim Van Herck: SDN & NFV for WANnvirters
Extending SDN & NFV to WAN
This session will walk through the evolution in branch networking and how SDN & NFV principles can be applied to the enterprise WAN to achieve increased reliability and flexibility. It will also cover how to lower the associated operational expense of running a classic enterprise WAN and what industry trends are pressuring changes on the design of such networks.When applying SDN & NFV principles to the WAN, there will be a natural reduction in complexity of managing services and guaranteeing uptime of network connectivity.
About Tim Van Herck
Tim is the Director of Technology and founding member at VeloCloud Networks.He is responsible for building out a global network of Points of Presence to deliver virtual last mile service to enterprise branches. Prior to joining VeloCloud, Tim was a founding member of Aryaka Networks, which offers WAN Optimization as a service. Tim has been passionately following the leading edge of network virtualization and security solutions for the past 15 years. He holds a master's degree in Industrial Engineering from the University of Antwerp, and is based in VeloCloud's headquarters in Los Altos, CA
More info @ http://meetup.com/openvswitch
Follow us on twitter @nvirters
Build the SD-WAN business case for your whole company and identify the hidden benefits for everyone involved. Persona content and technical diagrams presented.
FatPipe®, the inventor and multiple patents holder of software-defined wide area networking (SD-WAN), reliability, security, and WAN Optimization products, specializes in providing solutions that transcend Wide Area Network (WAN) failures to maintain business continuity for thousands of customers including numerous Fortune 1000 customers over the last 12 years, and has the largest installed base of customers in software-defined network WANs.
Silver Peak & Innovation Network Technologies (InNet)
Evolve IT: Why Performance Matters When Building Your New SD-WAN, Not all SD-WAN is Created Equal eBook
The Cisco IWAN Application simplifies WAN deployments by providing highly intuitive, policy-based automation. It enables you to realize the benefits of SD-WAN: lower costs, simplified IT, increased security, and optimized application performance.
View the Webcast: http://cs.co/9007BKlEc
China Telecom Americas: SD-WAN OverviewVlad Sinayuk
China Telecom Americas has the only fully licensed SD-WAN service to connect between mainland China, North America, Europe, Asia Pacific, and elsewhere in the world.
Security continues to be top of mind as enterprises and service providers work to implement Software-Defined WAN (SD-WAN). Security is a critical requirement for enterprises as they rely more on the Internet for wide area networking, leverage the cloud for applications and services, and adopt new SD-WAN and NFV technologies for increased agility.
SD-WAN architectures are different and Cloud-Delivered SD-WAN offers a unique multi-pronged approach to accommodate the needs of all sizes of enterprises including the largest, as well as the service providers that serve them. Join this webinar to learn about new approaches with SD-WAN that both strengthen and simplify your security posture.
Most enterprises deploy both private MPLS and public broadband Internet to some or all of their branch offices. The right SD-WAN solution will dramatically improve the utilization, performance and ease of management of the these hybrid deployments.
Review this presentation for a detailed understanding of the architectural details of Cloud-Delivered SD-WAN for hybrid WAN deployments. You’ll leave with a clear understanding of how hybrid deployments can be designed, implemented and maintained for a secure, optimal and high quality wide area network.
Review of the key financial benefits of Software-Defined WAN.
Enterprises are seeking to understand the financial benefits of SD-WAN as this new technology continues to grow. Dan Conde, industry analyst at ESG Research, has spent several months researching how SD-WAN is modernizing wide area networks while delivering substantial cost savings.
Join Dan Conde in this webinar to gain a better understanding of the key elements of SD-WAN that deliver performance, simplicity, and optimal access to on-premise applications and cloud services. Dan will examine the components of SD-WAN and provide a review of the key financial benefits, basic cost savings and the hidden operational benefits that SD-WAN brings to businesses.
Enterprises continue to implement or evaluate shifting services which were typically hosted in the branch into the cloud. The reasons include creating a leaner branch, taking advantage of increases in broadband Internet bandwidth and reduced complexity and cost.
This presentation takes a deep dive into the Cloud-Delivered SD-WAN architecture for service chaining. You’ll understanding the architectural differentiation and benefits of this approach and why it offers a superior model for delivering secure, reliable, and high performance service chaining.
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
Many organizations anticipate significant growth in WAN bandwidth and Public Cloud usage. Leveraging the Internet to provide extra WAN bandwidth and to offload Public Cloud traffic is compelling, however network reliability, application performance and security are the primary roadblocks. Cisco IWAN transport solution is the most full featured architecture to support the Software Defined Wide Area Network (SD-WAN) requirements that are emerging in standards bodies like the Open Networking User Group (ONUG) to address these issues. Many enterprises are looking for the benefits these technologies deliver, but without the costs associated with owning and operating those technologies. Here is where VMS for IWAN meets market need. Cisco VMS is a full featured management platform for both virtual and physical devices. This session will cover a full description of the VMS platform and how it can be used to deliver exceptional customer experience when supporting a managed offering of IWAN. The roles of Customer and Resource Facing Services will be covered, along with integration between the IWAN service and SP operations. This session will also cover the topic of how Virtual Network Functions (VNFs) can be placed optimally in the network from the CPE to SP datacenter, along with a demo of the end user and operator experience.
Learn how you can use the CoSN SEND II Decision Tree for Education Technology to make sure that your K–12 technology initiatives create a more engaging learning experience that empowers students, teachers, and administrators alike.
View the Webcast: http://cs.co/9004B80G0
IT organizations have long been challenged by the cost and complexity of managing the enterprise wide area network (WAN), and the demands keep growing. Software-defined WAN (SD-WAN) technology has emerged to reduce that cost and complexity, all while improving performance. With so many SD-WAN architectures to consider, how do you determine which is right for your organization?
Review this presentation and you will:
- Assess your organization's WAN growth requirements
- Understand the impact of various SD-WAN architecture on your WAN deployment
- Compare SD-WAN vendors to determine the best fit for your enterprise
- Learn how rethinking the WAN can deliver agility, simplicity, improved quality of experience, and better cloud performance
- Discover the different architectures on the market, along with their benefits and drawbacks
Modern business runs in the cloud, however traditional WAN routers weren't made for that. Silver Peak Unity EdgeConnect is primed for the cloud. In fact it is the industry leading SD-WAN solution that is freeing businesses from their dependency on routers
Presentation from the July 22, 2015 Webcast: Software-Defined WAN - A Real World Success Story.
See how MWH Global, a worldwide construction management company, improved its network service and reduced its IT management burdens by deploying a Glue Networks Gluworks software-defined WAN software solution over its existing Cisco Integrated Services Routers (ISRs).
Miss the webcast? View the replay here: https://grs.cisco.com/grsx/cust/grsEventSite.html?EventCode=12200&LanguageId=1&KeyCode=000833700
China Telecom Americas: SD-WAN OverviewVlad Sinayuk
China Telecom Americas has the only fully licensed SD-WAN service to connect between mainland China, North America, Europe, Asia Pacific, and elsewhere in the world.
Security continues to be top of mind as enterprises and service providers work to implement Software-Defined WAN (SD-WAN). Security is a critical requirement for enterprises as they rely more on the Internet for wide area networking, leverage the cloud for applications and services, and adopt new SD-WAN and NFV technologies for increased agility.
SD-WAN architectures are different and Cloud-Delivered SD-WAN offers a unique multi-pronged approach to accommodate the needs of all sizes of enterprises including the largest, as well as the service providers that serve them. Join this webinar to learn about new approaches with SD-WAN that both strengthen and simplify your security posture.
Most enterprises deploy both private MPLS and public broadband Internet to some or all of their branch offices. The right SD-WAN solution will dramatically improve the utilization, performance and ease of management of the these hybrid deployments.
Review this presentation for a detailed understanding of the architectural details of Cloud-Delivered SD-WAN for hybrid WAN deployments. You’ll leave with a clear understanding of how hybrid deployments can be designed, implemented and maintained for a secure, optimal and high quality wide area network.
Review of the key financial benefits of Software-Defined WAN.
Enterprises are seeking to understand the financial benefits of SD-WAN as this new technology continues to grow. Dan Conde, industry analyst at ESG Research, has spent several months researching how SD-WAN is modernizing wide area networks while delivering substantial cost savings.
Join Dan Conde in this webinar to gain a better understanding of the key elements of SD-WAN that deliver performance, simplicity, and optimal access to on-premise applications and cloud services. Dan will examine the components of SD-WAN and provide a review of the key financial benefits, basic cost savings and the hidden operational benefits that SD-WAN brings to businesses.
Enterprises continue to implement or evaluate shifting services which were typically hosted in the branch into the cloud. The reasons include creating a leaner branch, taking advantage of increases in broadband Internet bandwidth and reduced complexity and cost.
This presentation takes a deep dive into the Cloud-Delivered SD-WAN architecture for service chaining. You’ll understanding the architectural differentiation and benefits of this approach and why it offers a superior model for delivering secure, reliable, and high performance service chaining.
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
Many organizations anticipate significant growth in WAN bandwidth and Public Cloud usage. Leveraging the Internet to provide extra WAN bandwidth and to offload Public Cloud traffic is compelling, however network reliability, application performance and security are the primary roadblocks. Cisco IWAN transport solution is the most full featured architecture to support the Software Defined Wide Area Network (SD-WAN) requirements that are emerging in standards bodies like the Open Networking User Group (ONUG) to address these issues. Many enterprises are looking for the benefits these technologies deliver, but without the costs associated with owning and operating those technologies. Here is where VMS for IWAN meets market need. Cisco VMS is a full featured management platform for both virtual and physical devices. This session will cover a full description of the VMS platform and how it can be used to deliver exceptional customer experience when supporting a managed offering of IWAN. The roles of Customer and Resource Facing Services will be covered, along with integration between the IWAN service and SP operations. This session will also cover the topic of how Virtual Network Functions (VNFs) can be placed optimally in the network from the CPE to SP datacenter, along with a demo of the end user and operator experience.
Learn how you can use the CoSN SEND II Decision Tree for Education Technology to make sure that your K–12 technology initiatives create a more engaging learning experience that empowers students, teachers, and administrators alike.
View the Webcast: http://cs.co/9004B80G0
IT organizations have long been challenged by the cost and complexity of managing the enterprise wide area network (WAN), and the demands keep growing. Software-defined WAN (SD-WAN) technology has emerged to reduce that cost and complexity, all while improving performance. With so many SD-WAN architectures to consider, how do you determine which is right for your organization?
Review this presentation and you will:
- Assess your organization's WAN growth requirements
- Understand the impact of various SD-WAN architecture on your WAN deployment
- Compare SD-WAN vendors to determine the best fit for your enterprise
- Learn how rethinking the WAN can deliver agility, simplicity, improved quality of experience, and better cloud performance
- Discover the different architectures on the market, along with their benefits and drawbacks
Modern business runs in the cloud, however traditional WAN routers weren't made for that. Silver Peak Unity EdgeConnect is primed for the cloud. In fact it is the industry leading SD-WAN solution that is freeing businesses from their dependency on routers
Presentation from the July 22, 2015 Webcast: Software-Defined WAN - A Real World Success Story.
See how MWH Global, a worldwide construction management company, improved its network service and reduced its IT management burdens by deploying a Glue Networks Gluworks software-defined WAN software solution over its existing Cisco Integrated Services Routers (ISRs).
Miss the webcast? View the replay here: https://grs.cisco.com/grsx/cust/grsEventSite.html?EventCode=12200&LanguageId=1&KeyCode=000833700
An overview of GTRI's system integrator practice, with a focus on Splunk. Presented at GTRI's Splunk Tech Day, December 8, 2015.
Visit http://www.gtri.com/ for more information.
Cisco Intelligent Branch - Enabling the Next Generation BranchCisco Canada
This session introduces the Cisco Intelligent WAN (IWAN) solution for providing highly available Enterprise WAN connectivity using less expensive Internet circuits. As the volume of content and applications traveling across networks grows exponentially, organizations must optimize their WAN investments. Cisco Intelligent WAN (IWAN) helps you do just that. IT can use investments in Cisco ISR 4000 Series and ASR 1000 Series Routers to scale to the growing demands of branch-office users by providing an optimal experience over any connection at lower cost. And you can do this without compromising performance, reliability, or security.</p>
During this session, we will explain how IWAN, will allow customers to quickly roll out bandwidth-intensive applications, such as video, virtual desktop infrastructure (VDI), and guest Wi-Fi services. And it doesn’t matter which transport model you prefer, whether MPLS, the Internet, cellular, or a hybrid WAN access model. The savings from IWAN often pay for the branch infrastructure investments, and may also free up resources for new, innovative business services.
Presentation from 9/24/15 webcast presented by WWT Mobility and Access Lead Neil Anderson, on how deploying a Cisco Intelligent WAN (IWAN) strategy will be critical to meet the demands on your business. Bill Thompson and Laks Vijayarajan, technical solutions architects in WWT’s Advanced Technology Center (ATC), covered technical best practices to ensure a successful IWAN deployment.
Exinda is a proven global supplier of Traffic Shaping & WAN Optimization products. Exinda provides users with the best application experience possible by maximizing the speed and efficiency of the wide area network.
Visualizing Application & Delivery Flows to Make Data-Driven DecisionsCA Technologies
Even the most intelligent network needs management to visualize application traffic flows at the network level and know how well application service levels are being met. The CA Application Performance Management solution leverages key performance indicators from Cisco’s Intelligent WAN solutions, which add value to your network through application visibility and control, application acceleration (WAN optimization) and intelligent path selection. By enabling you to gain visibility into application performance from a network perspective, you can make proactive, data-driven decisions regarding network capacity, QoS policies, infrastructure investments and planned application rollouts.
For more information on DevOps solutions from CA Technologies, please visit: http://bit.ly/1wbjjqX
This session provides an overview of HPE's Software Defined Networking (SDN) feature set and will review the benefits of following SDN apps for network operations and IT security teams: HPE Network Protector, HP Network Optimizer, and HP Visualizer.
The value proposition of enabling IP data networks with intelligent unified solutions. ICC Networking as the best software-driven solution to drive down the cost of connectivity while increasing network elasticity and performance.
IT investments, by their nature, must be adjusted over time to fit ever-changing business requirements. If you’ve been tasked with ‘right-sizing’ your Citrix environment – or want to show value by getting ahead of that request – join Craig Jeske, Director of Engineering at GTRI, for a rundown of Citrix optimization techniques and tasks.
The interactive discussion will cover topics including:
- Auditing and assessment frameworks
- Use case development
- Security and access concerns & controls
- Hosting strategies
- User experience & feedback
View the webinar here:
https://youtu.be/SV9N-6bwbSY
On-Prem vs. Cloud Collaboration ShowdownZivaro Inc
When it comes to collaboration deployments, many organizations struggle to decide between on-premise or cloud deployments. It’s critical to understand the benefits and drawbacks of each option before moving forward.
This webinar from Global Technology Resources, Inc. (GTRI) and Cisco includes collaboration considerations such as:
- Costs, including CapEx vs. OpEx considerations and TCO
- Resources, including outsourced on in-house expertise
- Migration strategies and risk assessments
- Disaster recovery
View the webinar here: https://youtu.be/QA8R39rDc7Y
Big Data Workshop: Splunk and Dell EMC...Better TogetherZivaro Inc
Discover the power of big data analytics and how to effectively make machine data accessible, usable and valuable to your organization. Topics include Splunk Enterprise 6.5 and how to choose the right storage solution for Splunk. This Big Data Workshop was presented by GTRI and Dell EMC on October 27, 2016. For more information, visit http://www.gtri.com/.
Organizational Change Management (OCM) is a strategic framework on how to manage change. Discover the challenges companies experience during business transformations and get tips and advice for how to successfully execute an initiative. Learn how to effectively drive change within your organization and how changes in technologies, structure, processes and culture should be managed and prepared for ahead of a major transformation initiative. Presented during a GTRI webinar on October 13, 2016.
Insider threats come in a variety of forms and may be malicious or simply the result of negligence. Insider attacks can cause more damage than outsider threats, so it is important that organizations understand how to protect against and remedy insider threats. Learn more about insider threats and GTRI's Insider Threat Security Solution in this presentation. (Source: GTRI)
This presentation includes information about Cisco Stealthwatch, which goes beyond conventional threat detection and harnesses the power of NetFlow. With it, you get advanced network visibility, analytics, and protection. You see everything happening across your network and data center. And you can uncover attacks that bypass the perimeter and infiltrate your internal environment. (Source: Cisco)
SDN Security: Two Sides of the Same CoinZivaro Inc
When it comes to Software Defined Networking (SDN) Security there are two sides of the story. This webinar addresses both sides – what security vulnerabilities exist in modern SDN technologies and how SDN technologies can create new security protections. Also included are use cases that SDN solutions can provide and the new applications of SDN that can secure modern enterprise and data center environments.
Presented by GTRI CTO, Scott Hogg, in a webinar on June 9, 2016. For more information, visit http://www.gtri.com/.
Many companies have discovered that there is “gold” in their server log files and machine data. Closely monitoring this data can improve security, help prevent costly outages and reduce the time it takes to recover from a problem. In this presentation, GTRI’s Micah Montgomery explains how operational intelligence can be gained from machine data, and how Splunk Enterprise can turn this data into actionable insights. Also presenting was NetApp’s Steve Fritzinger, who discussed how to manage the challenges of capturing and storing a flood of data without breaking the bank.
Presented at "Denver Big Data Analytics Day" on May 18, 2016 at GTRI.
Support Software Defined Networking with Dynamic Network ArchitectureZivaro Inc
You know the value of SDN, but do you know what architecture best supports an SDN system? This presentation explains the importance of best in-class virtualized networking solutions and how those tools integrate with leading SDN systems. You’ll learn how SDN architecture components, such as Citrix Netscaler, help to converge the management of network and application services into a centralized, extensible orchestration platform. You'll also discover how to automate provisioning and configuration of the entire infrastructure to deliver new applications and services in minutes. This presentation is from a webinar presented by Michael Edwards, Principal Architect GTRI, and Jacob Rutski, Citrix, on May 12, 2016.
Cisco ACI: A New Approach to Software Defined NetworkingZivaro Inc
Cisco ACI: A New Approach to Software Defined Networking, presented by Michael Edwards from GTRI. Learn more about Cisco's Application Centric Infrastructure (ACI). As a policy-based automation solution, Cisco ACI is a different approach to Software Defined Networking (SDN). This presentation uncovers what makes it simple, agile and application centric, and how it can reduce errors and accelerate application deployment from weeks to minutes.
Webinar can be found here: https://youtu.be/WFY3kUwTAw4
Have questions? Contact GTRI, 1.877.603.1984.
Software Defined Networking (SDN) Technology BriefZivaro Inc
An overview of Software-Defined Networking (SDN) and the key benefits of moving to a virtualized network, including:
- Improved time to market through automation
- Optimal trafficking with a global view of the network
- Quicker enablement of new services
- Reduced operating costs
- Improved management and visibility
- Simplified operation of network devices
From "Introduction to Software Defined Networking" webinar presented by GTRI CTO Scott Hogg on March 10, 2016. Webinar recording: https://youtu.be/gRXnctYDBjE
Software Defined Networking (SDN) with VMware NSXZivaro Inc
Combining SDN with VMware’s NSX can accelerate application deployment and delivery in a secure and virtualized network. No longer will your network create a bottleneck when trying to administer new applications. Key topics include:
- How SDN allows for innovative ways to use a virtualized network
- Why SDN creates greater span of control, network analytics and response
- What intelligence can be gained from a global view of the network
- How SDN and NSX together allow IT to treat their physical network as a pool of transport capacity that can be consumed and repurposed on demand
From: "Software Defined Networking for NSX" webinar presented by Scott Hogg of GTRI and Hunter Hansen of VMware on February 3, 2016. Webinar recording: https://youtu.be/t_3DpN3nIXQ
An overview of Splunk Enterprise 6.3. Presented by Splunk's Jim Viegas at GTRI's Splunk Tech Day, December 8, 2015.
Visit http://www.gtri.com/ for more information.
Splunk Fundamentals provides a basic understanding of the components in a Splunk implementation and how they scale. Presented at GTRI's Splunk Tech Day, December 8, 2015.
Visit http://www.gtri.com/ for more information.
GTRI Splunk Case Studies - Splunk Tech DayZivaro Inc
Use cases of GTRI clients who use Splunk Enterprise. Presented at GTRI's Splunk Tech Day, December 8, 2015.
Visit http://www.gtri.com/ for more information.
As with any new technology, IPv6 requires a learning curve for network managers and IT administration and operations personnel. This presentation covers many of the current best practices for approaching and progressing with an IPv6 deployment.
GTRI's CTO, Scott Hogg, presented at NANOG (North American Network Operators Group) on the topic of deploying IPv6, including pitfalls to be aware of, addressing challenges, routing, dual-protocol applications, troubleshooting and training.
Presented by Scott Hogg, CTO GTRI, at NANOG On The Road 5, Orlando, FL, February 24, 2015.
Using Big Data to Counteract Advanced ThreatsZivaro Inc
"Good Guys versus Bad Guys: Using Big Data to Counteract Advanced Threats" was presented with permission at the Rocky Mountain Information Security Conference (RMISC) in May 2014 by Kelly Feagans (Splunk) and Dave Herrald (GTRI).
Most organizations collect heaps of machine-generated operational data, but making sense of it and understanding what role it can play in a security program can be overwhelming. This session will help you understand how Splunk can take data from a variety of sources and transform it into meaningful information that you can use to yield greater visibility into your security posture, identify unknown threats and streamline security operations.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
2. Agenda
• What is SD-WAN ?
• IWAN Architecture Overview
• Transport Independence
• Intelligent Path Control
• Application Optimization
• Secure Connectivity
• Orchestration & Automation
• Closing
2
3. Digital Innovation Overwhelming the Branch
3
BRANCH
OS
Updates
HD
Video
Mobile
Apps
Online
Training
Social
Media
Guest
Wi-Fi
MORE
USERS
MORE
APPS
MORE
THREATS
80%
Of employee and
customers are served
in branch offices*
20-50%
Increase in enterprise
bandwidth per year
through 2018**
30%
Of advanced threats will
target branch offices by
2016 (up from 5%) ***
Omnichannel
Apps
SaaS Enterprise
Apps
Digital
Displays
* Tech Target, Branch Office Growth Demands
New Devices., 2013
** Gartner, Forecast Analysis: Worldwide
Enterprise Network Services, Q2 2015 Update
*** Gartner: “Bring Branch Office Network Security
Up to the Enterprise Standard, Jeremy
D’Hoinne, 26 April. 2013.
4. 58% OF IT BUDGETS SPENT
ON WAN CONNECTIVITY
4
Source: IDG
5. What If Your WAN Can…
5
Hours Minutes
Pinpoint Application Issues Instantly
Improve Your Application Performance
1x 2x -20x
Increase WAN Utilization
Deliver More Bandwidth for Lower Cost
Backhaul
Local &
Cloud
Consistent Security Policies
Ensure Security Over Any Connection
By Device System
Simplify Operations
Reduce Network Complexity
6. Internet as an Extension of Enterprise WAN
6
Commodity Transports Viable Now
Dramatic Bandwidth, Price Performance Benefits
Higher Network Availability
Improved Internet Performance
7. ONUG - Software Defined-WAN Requirements
Branch
Private
Cloud
Virtual
Private
Cloud
Public
Cloud
MPLS (IP-VPN)
Internet
CSR1000-AX
1) Physical or Virtual* devices
2) Zero Touch Deployment
7) L2/3 Interoperability
8) Management Dashboard
9) Open North-bound API
3) Dynamic Traffic Engineering
5) HA and Resilient WAN
6) App Visibility, Prioritization and
Steering
4) Active-Active Architecture
APIC
Prime
10) FIPS 140-2 w/ Cert Management
Optimized
Secure Transport
Direct
Internet
Access
9. SD-WAN and Beyond with Cisco Intelligent WAN
ApplicationsUsers/Devices
Private
(MPLS)
Public
(Internet/4G LTE)
Hybrid
(MPLS, Internet)
SMART
• Intelligent Path Control
• Application Optimization
• Advanced Content Caching
SECURE
• Secure Direct Internet Access
• Advanced Threat Defense
• Robust Data Encryption
SIMPLE
• SD-WAN Policy Management
• Deployment Automation
• Open APIs
Transport
Independence
Application
Optimization
Secure
Connectivity
Intelligent
Path Control
Technology Blocks
10. Intelligent WAN: Leveraging the Internet
Secure WAN Transport and Cloud Access
10
Optimized
Secure Transport
Branch
Direct Cloud
Access
Private
Cloud
Virtual
Private
Cloud
Public
Cloud
1. IWAN Secure transport for private
and virtual private cloud access
2. Leverage local Internet path for
public cloud and Internet access
Increase WAN transport capacity and
app performance cost effectively!
Improve application performance
(right flows to right places)
MPLS (IP-VPN)
Internet
11. Intelligent WAN (IWAN) Architecture
Enterprise
11
MPLS
Unified
Branch
3G/4G-LTE
Internet
Private
Cloud
Virtual
Private
Cloud
Public
Cloud
Application
Optimization
Enhanced Application
Visibility and Performance
Secure
Connectivity
Comprehensive
Threat Defense
Intelligent
Path Control
Application
Aware Routing
Transport
Independence
Simplified
Hybrid WAN
Management Automation
14. Simplifies WAN Design
Dynamic Full-Meshed
Connectivity
Proven Robust Security
Flexible Secure IWAN Over Any Transport
SecureFlexible
• Easy multi-homing with several
providers
• Single routing control plane over
the top of provider networks
• Consistent design over all
WAN transport types
• Scalable Hub-n-spoke with
dynamic full mesh topology
• Industry Certified security
compliance
• Scalable high-performance
cryptography in hardware
ISR
WAN
Internet
MPLS
ASR 1000
ASR 1000
Transport-Independent
Data CenterBranch
14
15. IWAN Transport Independence
Consistent deployment models simplify operations
Internet MPLS
Branch
DMVPN DMVPN
IWAN HYBRID
Data Center
ISR
ASR 1000 ASR 1000
ISP A SP B
4G/LTE
Branch
DMVPN
IWAN HYBRID/LTE
Data Center
ISP C SP B
ASR 1000
MPLS
Branch
MPLS
DMVPN
IWAN Dual MPLS
Data Center
ISR
ASR 1000 ASR 1000
SP A SP B
DMVPN
MPLS
DMVPN
ISR
ASR 1000
15
17. Getting the Most Out of Your WAN Investment
Benefits of Intelligent Path Control
Data Center
Branch
ASR 1000
ASR 1000
ISR
MPLS
Internet
Enabling
Hybrid WANs
Efficient Distribution of
Traffic Based Upon Load
or Path Preference
Application Best Path
Based on Quality
Protection From
Carrier Black Holes
and Brownouts
Lower
WAN Costs
Full Utilization
of WAN Bandwidth
Improved
Application
Performance
Higher Application
Availability
24
18. Intelligent Path Control with PfR
Voice and Video Use-Case
Branch
MPLS
Internet
Virtual Private
Cloud
Private Cloud
• PfR monitors network performance and routes applications
based on policy
• PfR load balances traffic based upon link utilization levels
to efficiently utilize all available WAN bandwidth
Other traffic is load
balanced to maximize
bandwidth Voice/Video will be rerouted if
the current path degrades
below policy thresholds
Voice/Video take the best
delay, jitter, and/or loss path
25
19. SP1 (MPLS) ISP (FTTH)
• Protect voice and
video quality
Latency < 150 ms
Jitter < 20 ms
• Protect Email applications
from WAN congestion
Loss < 5%
• Voice and video preferred
path SP1
• Email preferred path ISP
• Increase utilization
by load sharing
Multimedia and Critical Data Policy
Business App
Best-Effort Traffic
High Delay
Detected
SP1 (MPLS) ISP (DSL)
Voice and Video
High Jitter
Detected
Email
Best-Effort Traffic
Protecting Critical Applications While Increasing Link Efficiency
• Protect transactional
business app from brownouts
delay < 250ms
• Preferred path SP1 (MPLS)
• Increase WAN bandwidth
efficiency by load-sharing
traffic over all WAN paths,
MPLS + Internet
Business App and Load-Balancing Policy
27
20. Load Balancing
Maximizing Link Utilization to Increase Available Bandwidth
• Traffic distributed across all paths to efficiently use all WAN bandwidth
• Load Balancing based upon link utilization levels
• External links can have different bandwidth capacities
MPLS = 1.5Mbps
Internet = 15Mbps
ISR
WAN
Internet
MPLS
ASR 1000
ASR 1000
Data Center
50% T1 = 750kbps
50% 15Mbps = 7.5Mbps
28
22. Today’s Network is an IT Blind Spot
• Static port classification is no
longer enough
• More and more apps are opaque
• Increasing use of encryption
and obfuscation
• Application consists of multiple
sessions (video, voice, data)
• What if user experience is not
meeting business needs?
33
23. Branch
Private
Cloud
Make Your IWAN Application Aware
Application Visibility and Control (AVC)
DC/Headquarters
Public
Cloud
Cisco AVC
Application Performance
Visibility
• Application inspection with
existing routers
• Rich data collection using
NetFlow v9/IPFIX
• Easy to integrate into many
reporting tools
Smart Capacity
Planning
• Better use of costly
bandwidth
• Per-branch and per-
application level reporting
Business Objective
Enforcement
• Service Level monitoring per
application
• Better Analytics to adjust
network policies to maintain
compliance
AVC
AVC
34
24. What applications, how much bandwidth, flow direction?
(NBAR2 and Flexible Netflow)
Basic Monitoring
Performance Collection & Exporting
Integrated performance monitoring and advanced metrics for different type of applications and use cases
HTTP HTTP
Voice and Video Performance
(Media Monitoring)
Unified
Monitoring
30% of traffic is
voice and video
Critical Applications Performance
(Application Response Time)
40% of traffic is
critical applications
AVC
35
25. Private
Cloud
Add WAN Optimization with WAAS + Akamai
Speed and Bandwidth Benefits on Top of the IWAN
Branch DC/POP
Application
Optimization
• Improved Application
performance, delay mitigation,
less bandwidth
• Twice as many Citrix users over
same WAN, 70% faster
• Typical ROI in less than one year,
65% BW cost savings
Content Caching
& Prepositioning
Simple and Scalable
• Works with existing branch
routers
• Scale out optimizations
resources with AppNav
• Native HA resiliency
vWAAS
AppNav-XE
Controller
CSR
WAVE,
vWAAS
WAN
Improving Application Performance
• Reduces WAN bandwidth
usage, while accelerating
applications
• Intelligent caching of internal
and Internet content
• Prepositioning of data and rich
media before it is needed
37
26. WAAS and Akamai Connect Synergy
AKAMAI Connect
Transparent
Cache
Dynamic URL Cache
Akamai
Connected Cache
Content
Pre-positioning
CISCO WAAS
LZ
Compression
TCP
Optimization
Data
De-duplication
Application Specific
Acceleration
38
28. Intelligent WAN: Secure Connectivity
Securing the network and users
Secure WAN
Transport
Branch
MPLS (IP-VPN)
Internet
Secure
Internet
Access
Private
Cloud
Virtual
Private
Cloud
Public
Cloud
Two areas of concern
1. Protecting the network from outside threats with data privacy over provider networks
2. Protecting user access to Public Cloud and Internet services; malware, privacy, phishing,…
46
29. Securing the IWAN Transport
IPSec VPN and Access Control
• Step 1: Authenticate hardware and software
Trust Anchor Module verification
• Step 2: Secure Transport
Proven IPsec VPN overlay
Strong Cryptography: IKEv2 + AES-GCM 256
F-VRF to isolate provider networks
• Step 3: Access Control
IOS Zone-based Firewall or ACLs protection
Role based access to router w/ logging
Minimize exposure
Provider assigned addressing to hide routers
Don’t put tunnel addresses into DNS
MPLS Internet
Branch
ASR 1000 ASR 1000
ISP A ISP C
Data Center
47
30. * RFC 6379 Suite B ** Not supported on older RP1 based ASR 1000s
Cisco Router Security Certifications
FIPS Common Criteria NG Strong Crypto
140-2, Level 2 EAL4 AES-GCM-256*
Cisco ISR 890 Series
Cisco ISR 1900 Series
Cisco ISR 2900 Series
Cisco ISR 3900 Series
Cisco ISR 4000 Series
Cisco ASR 1000 Series **
48
31. MPLS Internet
Branch
ASR 1000 ASR 1000
ISP A ISP C
Data Center
Add Network Integrated Threat Defense
IOS Zone-Based Firewall
• Control the Perimeter:
• External and internal protection: internal network is no longer trusted
• Protocol anomaly detection and stateful inspection
• Communicate Securely:
• Call flow awareness (SIP, SCCP, H323)
• Prevent DoS attacks
• Flexible:
• Split Tunnel-Branch direct Internet access
• Internal FW— addresses regulatory compliances
• Integrated:
• No need for additional devices, expenses and power
• Works with other IWAN Services: CWS, WAAS, UCS -E,…
• Manageable:
• APIC-EM, Prime, CLI, SNMP, CCP, and CSM
51
32. Intelligent WAN—Direct Cloud Access
Branch
MPLS (IP-VPN)
Internet
Direct
Internet
Access
Private
Cloud
Virtual
Private
Cloud
Public
Cloud
• Leverage Local Internet path for Public Cloud and Internet access
• Improve application performance (right flows to right places)
Solutions
On Premise – Zone Based Firewall
Cloud Based – Cloud Web Security
CWS
ISR-AX
ZBFW
55
33. Secure Internet Access with Cisco
Cloud Web Security (CWS) with ISR-4000 and ISR-G2 Series Routers
Secure Public
Cloud and Internet
Access
ISR Connector to
CWS Firewall towers
Web Filtering,
Access Policy,
Malware Detect
WAN1
(IP-VPN)
CWS
Private
Cloud
Public
Cloud
Branch
WAN2
(Internet)
IWAN IPsec VPN
for Private Cloud
TrafficIOS Firewall to
protect Internet
Edge
Internet
60
35. Network-Wide Abstractions Simplify the Network
Applications
SecurityOrchestration Automation Collaboration
SOUTHBOUND ABSTRACTION LAYER
REST API
CATALYST® CISCO NEXUS® ASRISR WIRELESSASA OTHER
SDN Ideal:
Controller as the
Application Platform
The SDN
Ideal:
Controller as
the Application
Platform
Virtualization
64
36. IWAN SD-WAN Automation with APIC-EM
`
Cisco® APIC-EM centralized policy expression
and distribution
Distributed policy enforcement
Automated application and topology discovery
Application and network performance monitoring
Adaptive path selection and QoS to sustain policy
Performance analytics collected network-wide
and reported centrally
MC
Branch
MC
Large Site
MC
Campus
Data Center
or POP
4G
LTE
Internet
Data Center
or POP #2...n
MPLS
(IP-VPN)
IWAN Domain
ControllerPolicy Rendering
Policy Distribution
and Domain Control
Distributed Policy
Enforcement
IWAN APP
Policy Expression
66
37. Cisco IWAN Management Portfolio
Covering a broad range of requirements and preferences
• Customer wants advanced
provisioning, life cycle
management, and
customized policies
• System-wide network
consistency assurance
• Lean IT OR IT Network team
Cisco
Prime
Infrastructure
• Customer needs
customizable IWAN with
end-to-end monitoring
• One Assurance across
Cisco portfolio from Branch
to Datacenter
• IT Network team
Enterprise Network
Mgmt and Monitoring
Ecosystem Partners
IWAN App
• Customer wants
considerable automation
and operational simplicity
• Requirements consistent
with prescriptive IWAN
Validated Design
• Lean IT organization
Prescriptive
Policy Automation
• Customer looking for
advanced monitoring and
visualization
• QoS/ PfR/ AVC configuration,
Real-time analytics and
network troubleshooting
• IT Network team
Application Aware
Performance Mgmt
Advanced
Orchestration
67
40. FREE SDN Technology Review
• We are offering a FREE 3-hour (~1/2 day) SDN technology review
for your company
• Bring your networking, security, DevOps, and other technology
teams together
• Review SDN capabilities within your existing networked systems
• Discuss SDN architecture and design options
• Review network automation and network programmability potential
• Engage in conversation on securely deploying IPv6 and using SDN for
security