Free On-demand Webinars
of our Partners
Many manufacturers NEOX NETWORKS works with offer on-demand webinars. Here is an overview of some free offers:
Charting a Path to Successful SD-WAN Operations
In the latest report from Enterprise Management Associates (EMA), Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic, examines all aspects of SD-WAN projects, from procurement preferences and architectural choices to network operations strategies.
This report delves into enterprises that are transforming their wide-area networks (WANs) to improve security, network visibility, and application performance.
Verify your SD-WAN Policy and Troubleshoot in 3-Clicks
Is hybrid IT ‘clouding’ your visibility?
NetOps teams need the right toolkit to get full visibility, analytics, and insights to get your cloud infrastructure optimized. Traditional on-prem monitoring and security tools lack visibility into cloud environments, creating additional challenges when striving to deliver high-quality digital experiences.
Do you find yourself struggling a regular basis to properly monitor, troubleshoot, and optimize your hybrid IT environment? Join us to learn how you can manage complex on-prem to public cloud networks with unified actionable data.
In our final episode of our 3-part series, we’ll take a deep dive into cloud monitoring with LiveAction CTO, John Smith, while he shares cloud monitoring best practices and tips to optimize cloud performance, from on-premises into the cloud.
Learn how to handle:
– Achieve end-to-end visibility from on-premises environments into the public cloud
– Quickly identify and resolve network and application performance issues wherever they occur
– Continually monitor deployments and optimize performance
Unified Network Visibility for Faster SD-WAN Onboarding
SD-WAN initiatives promise significant savings and increased performance in comparison to traditional WAN technologies. Infrastructure initiatives such as SD-WAN are frequently done as a replacement of existing infrastructure. It is critical to monitor the before, during, and after performance metrics of all the network elements involved to ensure a successful deployment.
Join us for a 3-part SD-WAN webinar series, where we’ll take you through everything you need to know from planning your deployment to troubleshooting and ongoing maintenance.
In this first episode, we’ll share best practices for successful onboarding. Learn how to:
– Gain an exhaustive inventory of every device and interface in the network with automated device discovery
– Simplify application and network performance baselining with real-time capture and analysis of line-rate raw flow data
– Properly define policies that will optimize the performance of each application on the network with real-time visualization of traffic at the application level as well as summary reports
How to Bridge Visibility Gaps
from the Network into the Cloud
Is hybrid IT ‘clouding’ your visibility?
NetOps teams need the right toolkit to get full visibility, analytics, and insights to get your cloud infrastructure optimized. Traditional on-prem monitoring and security tools lack visibility into cloud environments, creating additional challenges when striving to deliver high-quality digital experiences.
Do you find yourself struggling a regular basis to properly monitor, troubleshoot, and optimize your hybrid IT environment? Join us to learn how you can manage complex on-prem to public cloud networks with unified actionable data.
In our final episode of our 3-part series, we’ll take a deep dive into cloud monitoring with LiveAction CTO, John Smith, while he shares cloud monitoring best practices and tips to optimize cloud performance, from on-premises into the cloud.
Learn how to:
– Achieve end-to-end visibility from on-premises environments into the public cloud
– Quickly identify and resolve network and application performance issues wherever they occur
– Continually monitor deployments and optimize performance
Utilize QoS to Improve Application Performance
The first episode in our Summer Hackathon Series demonstrated the ease of VoIP troubleshooting, in our second installment we’ll showcase how network engineers can proactively fix VoIP and other application issues using QoS.
How often do you get alerts about poor application quality? Are you able to quickly find the root cause for complex voice, video, and application issues? Voice conferencing applications are highly sensitive to latency and packet loss causing poor user experience and lengthy troubleshooting sessions. Congestion from delays or drops in data can bring your business to a screeching halt. Deliver a superior user experience by setting up proper policies, tools, and configurations to save your network.
Join our LiveAction experts as they share QoS best practices and tips to deploy and maintain a QoS enabled network, with less time, money and stress.
Learn how to handle:
• QoS monitoring
• QoS marking
• QoS queuing and shaping
• DSCP audit reporting
Optimize Your Network for VoIP and Video
From video calls and conferences to modern communication platforms, VoIP enables workers from around the world to collaborate with ease. Over the past year, the surge of remote workers has forced enterprises to quickly pivot to facilitate teamwork – no matter where they may be working.
However, these business-critical applications are highly sensitive to latency, jitters, and packet loss. An optimized VoIP and Video network can be easily achieved – so you don’t have to keep asking your client “can you hear me now”.
Towards Terabit Ethernet
Ethernet’s top speed is set to double from 400G to 800G to satisfy the ever-increasing need for more bandwidth, especially in data centers. Within a few years we could even be seeing the first networking devices that can handle 1.6 Terabits per second.
What are the commercial factors driving this development? Which are the biggest technical challenges engineers will need to overcome to make it a reality?
Developing the technology for 1.6 Terabit Ethernet
This webinar looks at the key technology decisions that the networking industry needs to consider as it starts developing devices based on PAM4 112Gbps SerDes that can deliver 800G – and later 1.6 Terabit – Ethernet.
Ready for Terabit Ethernet?
We’re Ethernet nerds and fascinated by the “next big thing” – which right now is how to make the jump to 800Gbps / 1.6Tbps.
So we invited David J. Rodgers to lead a discussion on the next hop in speed for Ethernet and what it means for the engineers who need to build the equipment needed to make it a reality.
David has extensive experience defining, designing, and deploying USB, IEEE1394, Storage Area Network, PCIe, and additional serial connectivity solutions across a broad range of products and vertical markets. He is also a Board Member of the Ethernet Alliance and the Fibre Channel Industry Association (FCIA).
How to test Auto-Negotiation & Link Training
in PAM4 Ethernet connections up to 400GE
When implementing the 802.3bs and 802.3cd standards, there are often issues in making auto-negotiation and link training (AN/LT) function run smoothly especially for the high PAM4 speeds like 200GE & 400GE.
View this 1 hour webinar now and learn how to identify and solve these issues using Xena’s Valkyrie traffic generators and Teledyne LeCroy’s protocol analyzer.
From script to CI<br>Automation as a software project
Test automation has evolved far beyond engineers manually running ad-hoc scripts.
Satisfying the requirements of today’s advanced development standards requires automation frameworks that support complex test scenarios run by Continuous Integration (CI) tools over sophisticated setups provided by Lab-as-a-Service (LaaS) engines, producing daily reports.
Achieving this means approaching automation as a full blown software project.
In this presentation Yoram will present actual case studies to explain:
– the difference between “automation scripts” and “automation frameworks”
– why building a framework makes sense
– how to use Xena’s APIs to integrate their chassis into an automation framework
Network Impairment Emulation & Chimera
Network Impairment Emulation Webinar
Sign up for this on-demand webinar to learn how Chimera – the new 100Gbps high-port density network impairment emulator from Xena – can help you:
1. Test the performance of advanced 5G wireless applications to make sure your fronthaul configurations are flexible enough to balance the levels of latency, throughput and reliability needed to satisfy customers.
2. Use Circuit Emulation to help migrate from TDM to connectionless Ethernet networks while testing the accuracy and robustness of IEEE 1588 PTP and Y.1731.
Protecting Against Ransomware
What are the lessons learned from the biggest ransomware attacks to date (Wannacry, NotPetya)? How are organizations preparing against the next big attack?
Join top security experts for this interactive Q&A discussion on:
– Trends in ransomware attacks
– Backups, patches and other ways to protect your data
– How to bolster your organization’s security culture
– Other threats on the horizon
ESG and ExtraHop - Cloud Security:
Eliminate Coverage Gaps & Friction
with a Network-based Approach
Protecting your resources in the cloud is critical to achieving business goals, but many organizations leave themselves vulnerable by relying almost exclusively on logs or agent-based data. While those tools belong in anyone’s cloud security suite, they also create visibility and coverage gaps, introduce complexity and friction, and reduce security effectiveness.
To overcome those challenges, many organizations are turning to network data, an often untapped resource for cloud security. Every workload uses the network to communicate, making network data the foundational input for improving visibility, threat detection, and response without slowing down DevOps workflows.
In this webinar, experts from ESG and ExtraHop will show you:
• How taking a network-based approach to cloud security fills visibility and coverage gaps while removing friction and reducing complexity.
• Compare network detection and response (NDR) to cloud workload protection platforms (CWPP)
• Capabilities of ExtraHop Reveal(x) 360, a SaaS-based NDR platform for cloud and hybrid security.
Targeting Microsoft:
Ransomware Techniques and How to Spot Them
Microsoft Active Directory (AD) is a target-rich environment for malicious actors. Attackers hone in on it because it’s widely used and remains backward compatible with many versions of Microsoft Windows and Server environments.
This webcast explores the specific techniques they use (DoublePulsar, for example) and how to defend against it via a layered detection approach that evaluates traffic using rules, statistical analysis, and AI to detect malicious activity.
Part 1: Five Ways Attackers Leave Themselves
Vulnerable to Detection
Enterprise ransomware has evolved. Ransomware-as-a-service and simple-to-use intruder tools like Cobalt Strike give greedy attackers both the motivation and the playbook to search for the data they need to ensure that you will pay.
Time may not be on your side, but every action an attacker takes leaves a trail for defenders to follow. This is where you regain the advantage—if you know what to look for. Intrusions are a terrifying thing to consider, but they don’t spell doom: Visibility and response inside the perimeter are your best hope against the enterprise ransomware menace.
In this demo-filled webinar, an expert threat hunter will share techniques for eradicating the extortion adversary at each critical phase before encryption begins. Join ExtraHop and (ISC)2 for the first part of a three part series where we’ll look at the indicators that leave attackers open, such as:
o Scanning and enumerating your environment
o Moving laterally toward your valuables
o Domain escalation attempts from owned assets
o Staging data exfiltration for second-phase extortion
o Preparing to write over DB and file systems
Part 2: Take the Fight Against Ransomware to the Cloud
Ransomware is on the rise, with almost 69% of organizations falling victim to a successful attack according to the 2021 Cyberthreat Defense Report. Those attacks are increasingly shifting to the cloud, either through starting in those environments or moving there from infected on-premises assets.
It’s time to take a cloud-based approach to defending against ransomware. In this webinar, the ExtraHop team will show you how analysts and incident responders can use cloud-native network detection and response (NDR) to:
o Detect early indicators of compromise, data staging, and exfiltration
o Speed investigation to get to ground truth faster
o Respond quickly to stop the attack before it gets out of control