Evolution of Security in 5G Networks

As communications service providers (CSPs) upgrade their networks to support new 5G and IoT applications, new security considerations will come into play. Beyond just scaling up traditional protection again DDoS and improving SGi/GiLAN firewalls, CSPs need to take a more comprehensive view of mobile security. This joint analyst webinar between SDxCentral and A10 Networks will highlight new security concerns and architectural considerations that CSPs need to understand in light of new business and consumer applications.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

VPP DPI Engine for Network Traffic Visibility in the Cloud

With the rise of 5G standalone deployments network operators face the challenge of serving a high-throughput, low-latency and cost-efficient user-plane between radio and internet. Adding full application and service-awareness via deep packet inspection is paramount for precise accounting and managing QoE of certain service-categories, policy enforcement, and rerouting.
Watch Now

Amazon Web Services Networking

ipSpace

Traditional networking engineers entering the world of Amazon Web Services for the first time often feel like Alice in Wonderland. Everything looks and sounds familiar, and yet it all feels a bit different – ACLs sit in front of servers instead of on a router, there is no router, NAT happens somewhere behind the scenes, each subnet has its own routing table.
Watch Now

Introduction to Programmable Data Infrastructure

To achieve Internet and cloud speed and scale, enterprises must adopt solutions that are programmable and API-driven. And while storage, compute, and code have all been automated, data remains a rigid part of the stack that’s managed via slow and manual processes— bottlenecking everything from application development to cloud adoption.
Watch Now

Webinar: 7 Strategies for Planning your Successful VPN Replacement

Strategies and best practices on how to decommission your remote access VPN infrastructure In order to successfully retire legacy remote access VPN, organisations should include implementing a zero trust strategy for remote access, one best served by a Zero Trust Network Access (ZTNA) solution. Join Netskope's Product Marketing
Watch Now

Spotlight

resources