It’s been more than 20 years since Cisco first introduced NetFlow as a scalable way to track network activity without collecting raw packets. To this day, network operators who use NetFlow and other types of flow data for network management still report the benefits, which include a lightweight monitoring footprint, faster troubleshooting, more effective planning, and automated security. However, when any technology survives for two decades, it raises the question: Is NetFlow outdated? Are there other data sources and technologies that are newer, faster, and more detailed for achieving network visibility? In this webinar, Kentik’s Jim Meehan, head of product marketing, will advise on why NetFlow is better than ever and remains an invaluable source of truth for network operators looking to get immediate answers to network questions. Meehan will answer: What’s new with NetFlow? Why is NetFlow more useful than ever before? What are the new native fields in NetFlow that extend visibility to/from firewalls, load balancers, and MPLS? And how can you achieve enrichment by adding data that’s not within flow records? Webinar Speaker: Jim Meehan is a long-time network enthusiast, founding one of Chicago's first dial-up ISPs in the early 1990s. His career includes stints in network operations and vendor pre-sales engineering, including 10+ years at Arbor Networks. Currently he leads the Product Marketing team at Kentik.

Hora

17:00 - 18:00 hs GMT+1

Organizador

Capacity Media
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2020 813 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 01 de Junio de 2020
Mar 02 de Junio de 2020
Mié 03 de Junio de 2020
Jue 04 de Junio de 2020
Vie 05 de Junio de 2020
Sáb 06 de Junio de 2020
Dom 07 de Junio de 2020
Lun 08 de Junio de 2020
Mar 09 de Junio de 2020
Mié 10 de Junio de 2020
Jue 11 de Junio de 2020
Vie 12 de Junio de 2020
Sáb 13 de Junio de 2020
Dom 14 de Junio de 2020
Lun 15 de Junio de 2020
  • 5 Steps to Security Validation

    20:00 - 21:00 hs GMT+1

    Fecha
    Lun 15-Jun-2020, 20:00 - 21:00 hs GMT+1
    Descripción
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we (...)
    Cerrar
Mar 16 de Junio de 2020
Mié 17 de Junio de 2020