Join SDxCentral and Ixia for an analyst on-demand webinar on Creating Better Network Visibility and Maximizing Your Security Resilience.
Network security is top-of-mind for enterprises and service providers. Only with network visibility across both the physical and virtual networks, can a network manager effectively make the right decisions about the network. For service providers, having network visibility can lead to lower operating costs and being the first to market with a new service. For enterprises, network visibility means stronger infrastructure, robust applications, tighter security and higher return on IT investment.
View this on-demand webinar from Ixia to learn about Ixia’s portfolio of security products including Ixia ThreatARMOR and Vision ONE that will help you manage next-generation firewalls and other appliances and maximize your security resilience.
- What are the current security tool deployment practices?
- How can I improve my inline security tool deployments?
- What is a bypass switch?
- What is a network packet broker (NPB)?
- How can Ixia help me do more to reduce risk—without creating new security problems?
Your webinar host, Phil Trainor, has worked in the network security industry for 14 years holding senior level engineering roles at California-based startups. He was recently a guest lecturer at the 2016 RSA Conference in Marina Bay Sands discussing ‘Advanced Persistent Threats’ and has also lectured at Blackhat, DefCon, ToorCon, and at many other prestigious security events.
Phil is backed by Ixia‘s technology expertise and unique experience in the Asia Pacific. Ixia has extensive experience working with state governments in making critical infrastructure stronger and building a nation’s cybersecurity capabilities. Whether the Smart Nation initiative in Singapore, Japan’s 2020 5G vision, India’s – Digital India or securing enterprises and combating ransomware, Ixia has leveraged its technology and products to help Asia-Pacific enterprises, carriers and nations protect and secure their critical infrastructure.
By clicking the links above, I consent to share my contact information with the sponsor(s) of this content.