Explore a novel architecture for advanced cyber defense in hybrid environments, focusing on the unified management of security across various domains. It integrates eBPF technology and AI-driven automation to enforce consistent policies and enhance operational efficiency. We will cover architecture, and the two main use cases: exploit protection and segmentation.
With the release of OpenAI’s ChatGPT, many enterprises are exploring the potential value of integrating generative AI into their products and applications. In this Triple-T session, “Network AI for NetOps Automation”, we show how your networking teams can easily benefit from a Generative AI LLM to boost operational efficiency by using simple natural language interactions that help improve the human operator experience. You’ll learn how this AI assistant can assist your teams through several practical examples such as: query documentation, check device and network state,…
Meter, designed by network engineers for network engineers, introduces a streamlined approach for IT teams to gain excellent visibility and control over their networks without the usual hassle. While SaaS, IaaS, and PaaS have become standard in the IT landscape, traditional network management still prevails in many enterprises. Meter disrupts this norm by providing NaaS, empowering IT teams with cloud-like services while retaining oversight and customization. For over a decade, Meter has perfected NaaS, offering end-to-end solutions for network infrastructure. Our monthly subscription model eliminates…
SONiC is widely deployed in data center networks worldwide. Increasingly, enterprises want to take advantage of the proven benefits of disaggregated networking hardware and open-source software for campus edge, aggregation, and core networks. This session will highlight how the community is evolving SONiC to support enterprise features and how vendors are bringing to market cost-effective hardware that is purpose-built for SONiC.
This session aims to propose an approach that will help evolve Security Operations from a reactive and human-first approach – that cannot scale to keep up with ever-increasing threats – towards the vision of an AI-Driven, Automation-first SOC. In addition to processing information at machine speed, the modern SOC embeds automation and advanced analytics wherever possible to reduce SOC costs, increase efficiency and efficacy, as well as make processes self-sustainable We will explore the key tenets and expected outcomes of a modern SOC: Simplify Security Operation through platform convergence…
We found that the overwhelming majority of CISOs (70%) believe that generative AI will create an asymmetrical battlefield that will inevitably be tipped in favor of cyber adversaries. We are more optimistic than that, though. We know 35% of CISOs are already using AI for positive security applications, and 61% will likely use it in the next 12 months. At Splunk, we are helping customers navigate AI with a many pronged approach. Our AI powered guided assistive workflows and integrated AI Assistants help teams use…
WWT will share current customer successes in using WWT AI to detect and respond to cybersecurity threats. WWT will also introduce the WWT CyberRange which is the technology driving the ONUG Capture the Flag event. A splendid time is guaranteed for all.
Solution Architect Justin Jeffery will demonstrate the capabilities of IP Fabric and use the data collected to create simple test cases in Python. The results of the tests will be transformed into a report giving your team a list of actionable items to remediate to ensure compliance in your networks.
In this talk we will be discussing the transformational impact of GenAI on IT infrastructure, marking a shift from academic exploration to essential product innovation within the tech industry. Highlighting the current necessity for organizations to integrate AI, it underscores the automation of repetitive tasks, the potential for balancing innovation and maintenance budgets, and the inevitable adoption of AI for a competitive edge. The talk will detail the crucial features for enterprise-ready AI systems, including open-source models, customization, cost-effectiveness, and vendor agnosticism, alongside exploring the…
The landscape of digital transformation, cloud adoption, and remote work has fundamentally changed the requirements for security and network architectures. Simply enhancing or adding to existing tools is insufficient in embracing Zero Trust and SASE. Instead, a holistic modernization of infrastructure security and optimization is essential. Only the right mix of security cloud infrastructure and digital experience management help deliver the fastest, safest, and most reliable user experience for the hybrid enterprise while reducing management overhead. Join us for an interactive session where you will…