Cisco Intersight Security
Security features of Cisco Intersight and the security process utilized to support Intersight are discussed. Intersight is a new hosted management platform for Cisco UCS and Hyperflex. As complexities of managing compute and HyperConverged infrastructure within and across the data center and remote sites has grown, the limitations of traditional management solutions have pushed additional […]
Cisco Intersight Architecture – Cisco UCS and HyperFlex on a Hosted Management Platform
Cisco Intersight is a new hosted management platform for Cisco UCS and Hyperflex, and in this session we review the architecture behind Intersight. As complexities of managing compute and HyperConverged infrastructure within and across the data center and remote sites has grown, the limitations of traditional management solutions have pushed additional burden on datacenter administrators. […]
Cisco Intersight Overview on Managing UCS and HyperFlex
This quick overview of Cisco Intersight (aka Project Starship) walks through the evolution of UCS Management and how Cisco is taking the next steps in managing UCS.
SNIA Emerald Green Storage Program with Wayne A. Adams
Wayne A. Adams, Green Storage Initiative Chair with SNIA, introduces the project to the delegates. Since 2008, SNIA has been working on energy efficiency in the data center. This includes the development of the SNIA Emerald Specification, which is a building block for both SNIA and other organizations to compare efficiency in a uniform method […]
SNIA Presents the History of the Storage Developer Conference with Mark Carlson
Mark Carlson, Technical Council Co-Chair with SNIA, gives the invited delegates an overview of the history of the Storage Developer Conference, which was created by SNIA in 2005. Mark walks through what makes the conference unique in the storage landscape and what are the emergent topics in 2017.
SNIA Presents at Storage Field Day Exclusive at Storage Developer Conference
Kentik Detect for DDoS and Alerting with Jim Meehan
Jim Meehan, Director of Solutions Engineering at Kentik, reviews Kentik Detect’s alerting capabilities. The solution comes with predefined alert parameters around capacity, general anomalies, and DDoS threats, but these can also be defined per user preference. This can include specific filters and datasets, as well as historical baselines for context.
Kentik Detect for DevOps, NPM, and DNS with Avi Freedman
Avi Freedman, Co-founder and CEO at Kentik, demonstrates Kentik Detect as a plugin for Grafana. This provides a subset of data from the Kentik API that can be used alongside other application metrics in an overall dashboard.
Kentik Detect for Network Peering and Planning with Jim Meehan
Jim Meehan, Director of Solutions Engineering at Kentik, reviews using Kentik Detect for network peering analysis and planning purposes. This can be used by service providers, content source networks, or CDNs. Because Kentik Detect correlates flow data with other variables at full resolution, it gives organizations easily understood information to prioritize traffic for cost or […]
Kentik Data Engine with Avi Freedman
Avi Freedman, Co-founder and CEO at Kentik, gives a technical overview of their Data Engine. This is run in the cloud, and designed by Kentik for the particularly high ingest required to maintain full resolution of all network flow data. KDE allows for realtime stream processing of network traffic for anomaly detection. Avi goes into […]
Kentik Detect SaaS Platform with Jim Meehan
Jim Meehan, Director of Solutions Engineering at Kentik, reviews the UI and functionality of the Kentik Detect SaaS platform. This is designed to keep the full resolution of network flow data, rather than an aggregated ingest. This enables the creation of summary reports, while still allowing for drill down into very narrow pieces of data.
Introduction to Kentik with Avi Freedman
Avi Freedman, Co-founder and CEO at Kentik, introduces the company to the delegates. They offer network traffic analytics, starting with flow information and augment it with routing and other metrics.
Gigamon Integration with Phantom with Robert Truesdell
Robert Truesdell, Senior Director, Product Management and Technology Alliances with Phantom, discusses the security operations center with the delegates. These SOCs are increasingly understaffed and beset by sophisticated actors using automation against them. Robert introduces Phantom as a solution to these issues, and gives an overview of how they integrate with Gigamon’s visibility solutions.
Gigamon Adaptive Response Application with Hamad Altaf
Hamad Altaf, Staff QA Engineer at Gigamon, overviews the specifics of their Adaptive Response application, using Splunk as an example. This talk focuses on the containment part of the Defender Lifecycle, which is then in turn used to feedback to improve the quality of future detection.
Gigamon Using Metedata for Security Analysis with Noam Syrkin
Noam Syrkin, Senior Technical Marketing Engineer with Gigamon, gives an overview of how the company generates metadata, which can serve as the ingest for further tools like Splunk. The focus on metadata allows for greater efficiency due to the small amount of response time between packets, and helps overcome the limited reach of other visibly […]
Gigamon Splunk Overview of Enterprise Security and Adaptive Response Framework with Wissam Ali-Ahmad
Wissam Ali-Ahmad, Technical Lead for Global Strategic Alliances with Splunk, introduces the delegates to their solution. This allows you to take machine data from various sources and make it usable in a unified manner. This visibility gives insight into advanced threats and serves as a nerve center for modern security monitoring. This integrates with Gigamon […]
Gigamon Defender Lifecycle Model with Ananda Rajagopal
Ananda Rajagopal, Vice President, Products at Gigamon, gives an overview of the company’s Defender Lifecycle Model. This platform is based around the idea due to the velocity of traffic, real-time threat protection may not be feasible. This builds on simple principals of prevention, with a focus on detection, prediction, and containment of threats. Gigamon’s Defender […]
Cisco Tetration Analytics Security Model with Tim Garner
Cisco says their customers have used the Cisco Tetration platform to segment and build secure infrastructure for applications. This is designed to remediate the current state of networking, which provides little knowledge of how applications interact, what infrastructure services they depend on, and how to effectively implement segmentation.
Cisco Tetration Analytics Refresher with Tim Garner
Cisco says their Tetration analytics engine gives them visibility into every packet in a network environment via metadata filtering. Tetration is able to intelligently whitelist traffic based on usage, without requiring explicit configuration from a network engineer.
Pluribus Networks Embedded Visibility and Insight Analytics with Steven Shalita
Steven Shalita, Vice President of Marketing with Pluribus Networks, gives a high level overview of their analytics capabilities built into their Adaptive Cloud Fabric architecture. This goes beyond looking at basic network functions by generating metadata from the network itself via performance metrics. By using their fabric based model, Pluribus Networks has built their analytics […]
Pluribus Networks Network Services with Alessandro Barbieri
Alessandro Barbieri, Vice President Product Management at Pluribus Networks, reviews some of the network services available with their Adaptive Cloud Fabric. This includes a deep dive into the architecture behind their automation features, powered by their Pluribus UNUM Fabric Manager.