Nile Proof of Concept: Built from the Ground up to Deliver Secure Wired and Wireless Networking, as a Service

Nile’s NaaS is an innovative network solution that features cutting-edge standardized hardware and software, built on a cloud-native LAN architecture. With NaaS, your organization will enjoy uninterrupted high-speed wired and wireless access, complete with built-in security. Unlike traditional LAN setups, NaaS is turn-key and eliminates complexity. This means that our customers are assured an unparalleled time-to-value. Join us for a live session to discover the finer details of our disruptive technology, and experience our user interface first-hand.

ONUG Training Featuring Alkira – Using Modern Practices and Tools to Operate Networking in the Cloud

As the public cloud continues to gain momentum, the gap broadens between operating traditional networks and cloud networks. A different set of skills and tooling is required to deploy and maintain network infrastructure. In this course, you will gain an understanding of the following: -The value proposition of Infrastructure-as-Code – Building basic AWS networking with HashiCorp’s Terraform –  Expanding the scope to multi-cloud with Network-as-a-Service – Benefits of a standardized toolchain for managing infrastructure

Graphiant Proof of Concept: Connect the Edge with the Graphiant Solution

Graphiant will be showing cloud on-ramp and provide customer with cloud access as-a-service. Graphiant is a Silicon Valley-based provider of next-generation Edge services. Led by Khalid Raza, the co-founder of SD-WAN pioneer Viptela, Graphiant has developed the Graphiant Network Edge. This “as-a-Service” solution provides connectivity between the enterprise WAN, hybrid cloud, network edge, customers, and partners. Graphiant’s Network Edge combines MPLS-like performance (speed, scale, and security) and the as-a-Service agility that enables network architects to build enterprise-grade networks at the speed of business. Graphiant PoC…

Dell Technologies Proof of Concept: Role of SONiC in Workload Characterization

A discussion covering the role SONiC plays in analysis and characterization of workloads. The discussion topic will focus on various methods to extract data to be used to identify workload characteristics..

ONUG Leadership & Community Service Award

Network to Code Proof of Concept: Realizing Network Policy as Code with Nautobot

“Organizations today face a daunting array of challenges in their quest to track and comply with corporate and regulatory policies. This proof of concept Nautobot App, takes aim at the never-ending attestation and reporting associated with this challenge: How do you take plain English written policies (“protect customer data”), make them actionable, and automate the compliance validation? The ability to transform written security and operational guidelines into tangible configuration intent via code would allow organizations the ability to ensure compliance with verifiable enforcement and end-to-end…

Are You Ready for Hyperscale Service Providers?

In this session, we will explore the emergence of hyperscale service providers on the technology industry. Service providers are embracing a network that is programmable, on-demand with a cloud delivery model offering Network as a Service at hyperscale. We will discuss what hyperscale means, how it differs from traditional cloud services and the benefits it can provide for businesses. We will also cover the opportunity companies need to consider when working with hyperscale service providers. Additionally, the session will delve into the future of the…

Alkira Proof of Concept: Multi-Cloud Networking, Made Easy

Cloud networking can be difficult! It is fraught with 1) complexity and limitations of the cloud-native capabilities, 2) high cost and slow provisioning of the hardware-based architecture and 3) additional burden of running and operating agent-based solutions. Stop the do-it-yourself hamster wheel and step into the cloud era where network and network security move at the speed of cloud by being delivered as-a-service. Join this proof-of-concept demonstration to see practical examples of how you can design and deploy enterprise-class multi-cloud networking and network security in…

Getting Started With an SBOM Strategy

The objective of this session is to provide attendees with an understanding of SBOM, including the importance of SBOM for software security and supply chain visibility, the differences in perspectives of software vendors and large enterprise consumers, and the steps for creating an effective SBOM strategy. Agenda: -Introduction to SBOM (Software Bill of Materials) -The importance of SBOM for software security and supply chain visibility -Steps for creating an SBOM strategy -Best practices for maintaining an accurate and up-to-date SBOM -Q&A Target Audience: This session…

DevSecOps Lessons Learned – How to Shift Left & Shift Right?

As organizations adopt DevOps practices, the need for “security as code” becomes paramount. This session will explore the concept of integrating security into the software development process, with a focus on how to automate the protection of networks through code. Attendees will learn about the benefits of implementing security as code, including increased speed and efficiency, as well as improved collaboration between security and development teams. We will discuss different tools and techniques for automating security, such as using infrastructure as code, vulnerability scanning and…