Featured

Demo Tuesday - Isolating a Compromised Host in Seconds
Mike Lossmann, Technical Marketing Manager
In this session, Mike shows how easy it is to determine the blast radius of a compromised host and isolate it even while on vacation. (Because that's what we all want to do on vacation right?)
All episodes
-
See how a Digital Twin makes ensuring a hybrid network child's play
Mike Lossman, Technical Marketing Manager
In this Demo Tuesday session, Mike will show you how the data delivered by Forward Enterprise helps Cloud Ops and SecOps teams protect their network and ensure it stays in compliance. In this session, Mike demonstrates how to:
1. Provide a cloud security posture breakdown.
2. Identify config-based vulnerabilities in devices.
3. Determine the potential impact of a security breach on a specific host.
4. Integrate with vulnerability scanners like Rapid 7 and Tenable.
5. Offer asset inventory features and network query language (NQE) for deeper network insights. -
Learn how digital twin technology can quickly resolve network issues.
Mike Lossman, Technical Marketing Manager
In this demo Mike will show how Forward Networks' digital twi can:
- Help network teams to quickly verify conditions in the network and resolve issues, reducing the need for senior team members to be constantly involved.
- identify issues such as an open port that shouldn't be, and identify the likely cause of the issue.
- Forward's alert the team when the intent of the network changes, such as when a port that should not be open is detected.
- provide a history of collections, showing whether each one passed or failed, and why, aiding in troubleshooting. -
Learn To Troubleshoot Complex Network Issues in Seconds With Forward Enterprise
Mike Lossman, Technical Marketing Manager
Join technical product marketing manager Michael Lossman, for a hands-on demo of Forward Enterprise. Learn how to
Search your network like Google to reduce the time it takes to identify and resolve network issues.
View the complete journey of a path in a hybrid multi-cloud environment to speed up troubleshooting.
Streamline decommissioning efforts and prevent unintended consequences by providing actionable access to critical data.
-
Demo Tuesday - Isolating a Compromised Host in Seconds
Mike Lossmann, Technical Marketing Manager
In this session, Mike shows how easy it is to determine the blast radius of a compromised host and isolate it even while on vacation. (Because that's what we all want to do on vacation right?)