Real-Life SDN Case Studies — Service Insertion

NEC

With increasing numbers of enterprises and service providers looking to deploy SDN, we’ve been inundated with requests from our readers for more use cases to help them understand and evaluate SDN. We heard you, and we are gearing up to send them your way. To start, SDNCentral is bringing you a series of free on-demand webinars from NEC featuring noted network experts Ivan Pepelnjak of ipSpace.net and NEC Network Architect Samrat Ganguly. The webinar series covers typical OpenFlow-based SDN use cases using NEC’s ProgrammableFlow, the first production-grade commercial implementation of OpenFlow controllers and data center switches, introduced in 2011.
Watch Now

Spotlight

Enterprise Chief Security Officers (CSOs) will have a big say in 5G investment decisions. Unless security options are diverse, customizable, open and transparent, CSOs won’t sign-off on new 5G use cases on the scale that telcos are hoping for. Key aspects of 5G security that enterprises will scrutinize include virtualization security, network slicing, edge use cases and endpoint security. Telcos and their 5G ecosystem partners have to get these right.


OTHER ON-DEMAND WEBINARS

Securing Wi-Fi Networks - A System Approach

Xirrus

Wi-Fi security attacks, hacking, stolen mobile devices – are these keeping you awake at nights? Are you surprised that Wi-Fi networks can be more secure than your wired networks? Wireless LAN has come a long way from the days of its inception with inadequate security.Contrary to common belief, security is not a single protocol or an appliance or an encryption. It is a system of different components working together to ensure your Wi-Fi network is secure and your confidential information is protected.
Watch Now

Game Over for Gameover ZeuS

secureworks.com

On June 2, 2014, Operation Tovar was announced, a multi-national initiative to disrupt the Gameover Zeus botnet and seize infrastructure supporting Cryptolocker ransomware. This initiative was, in part aided by security experts from the Dell SecureWorks® Counter Threat Unit™ (CTU) security intelligence team. Gameover ZeuS and Cryptolocker were part of a larger cybercriminal ecosystem representative of threats faced by many organizations today.
Watch Now

Insight Infinera 2016 Live Webcast - Transforming Optical Networking

Infinera

Watch the replay of Insight Infinera 2016, featuring Infinera executives and leading network operators sharing their insight on the technologies and solutions that are transforming the business of optical networking. Individually selectable presentations include:Transforming to Layer T: Tom Fallon, CEO,Delivering Layer T at Cloud Scale: Dr. Dave Welch, Co-founder and PresidentTrends in Service Provider Networking: Customer panel hosted by Mike Capuano, VP Marketing, featuring Mattias Fridström, Chief Evangelist at Telia Carrier, and Chris Aspell, Director of Strategy & Engineering at Liberty GlobalFinancial Update: Brad Feller, CFO.
Watch Now

Securing Compromised Endpoints in Minutes with Check Point and Bradford Networks

Bradford Networks

Cyber threats are targeted, difficult to detect, and require significant manual intervention and expertise to contain. Because they traverse different domains of IT management, it creates a cross-functional challenge to trace and find the threat’s electronic foothold. Silos of security information require manual correlation to bridge the gap between security event alerts and endpoints infected with zero-day malware. Moreover, the increasing volume of security events that need to be triaged makes it impractical to respond and remediate threats manually.
Watch Now

Spotlight

Enterprise Chief Security Officers (CSOs) will have a big say in 5G investment decisions. Unless security options are diverse, customizable, open and transparent, CSOs won’t sign-off on new 5G use cases on the scale that telcos are hoping for. Key aspects of 5G security that enterprises will scrutinize include virtualization security, network slicing, edge use cases and endpoint security. Telcos and their 5G ecosystem partners have to get these right.

resources