Network Automation Engineer's Summit

Network Automation

Focusing on the role of end-to-end policy, visibility, and control, Jyo and Steve will talk about operations and automation for a multicloud future. They will include how companies ought to be thinking about architecting hybrid data centers, handling policy in a dynamic environment that spans campus to cloud, instrumenting the infrastructure for better visibility, and ensuring that data and infrastructure remain secure for core network services. The summit will be held in Princeton, New Jersey and a WebEx invite is sent to the registered participants.

Date: 09th December 2020

Time: 11 A.M Eastern

Venue: 600 Alexander Road, Princeton, New Jersey

Registration Form Click here to register.

Common challenges for Network Automation in large enterprises.
  • Ease of use for 7x24 network operators and system administrators to add/modify/delete DNS entries.
  • Ability to automate the common DNS tasks such as adding a new host, adding a new alias or defining a DHCP scope.
  • Ability to isolate a data center for a complete disaster recovery test and see no DNS failures.
  • Ability to derive ad-hoc reports via data mining using SQL amalgamated with a modern programming language like Python or Java.
  • Ability to invoke the automation API calls without transmitting credentials over the network in plain text.
  • Ability to enforce REST API as a standard to communicate with the DDI management for all operations.
  • Ability to leverage automation to update KPI metrics to a central capacity management planning platform of the enterprise.
  • Ability to automatically disable terminated employees by integrating with human resources feed.
  • Ability to auto-provision DNS names when AWS EC2 actions take place by seamlessly integrating with AWS CloudWatch and AWS Lambda.
  • Ability to auto-provision DNS names when Azure instances are added or deleted by seamlessly integrating with Azure Monitor and Azure Function.
  • Ability to auto-provision DNS names when Google Virtual Machines are added or deleted by seamlessly integrating with Google Stackdriver and Firebase.
  • Ability to spin up cloud instances, provision the operating system and start cloudwatch monitoring on them when a DNS entry is added.
  • Ability to integrate with Terraform and manage multi-cloud seamlessly.
  • Ability to validate changes on mission-critical networks by communicating with Security Information and Event Management Systems (SIEM).
  • Ability to produce a global threat management report using an API and integrate with product alert lists (PAL) and Vulnerability and Threat Management systems.
  • Ability to take predictive and corrective actions based on application intelligence by enforcing an enterprise-grade blanket surveillance.
  • Ability to recover from oversights performed by an accidental automated job.
  • Ability to schedule workflows based on Events/sequence of planned actions in a single on-premise data center or cloud VPCs.
Exchange of best practices.
  • Common design mistakes made with DNS in enterprises.
  • Designs and configurations with poor security.
  • An overview of DNSSEC and how TCPWave simplifies it.
  • Methods used to prevent cache poisoning.
  • Detection and remediation of DNS attacks of different types.
  • Deep packet inspection techniques used to filter DNS at the transport layer by TCPWave.
  • DNS Firewall to safeguard your network from ransomware, spyware and malware.
  • Importance of using SSL over TCP for management versus using UDP.
  • Ciphers and encryption algorithms, their significance and an overview of what the enterprises should not use.
  • Methods used by TCPWave to learn from threats and scale up by evolving automatically and seamlessly.
  • Best practices for fault management, performance management and configuration assurance.
  • Best practices for performing manual and automatic change reconciliation.
  • Best practices for scaling from an on-premise data center into a hybrid cloud model.
  • Best practices to co-exist with Route 53, Google DNS, Azure DNS etc.
  • Best practices to prevent attacks from trusted partners.
Case Studies with live demonstrations and lot more!
Network Automation