Catch up on Interop 2016 with these videos

Interviews with leading experts in the field of networking and security

Last week, the Network World and IDG.TV video crew was out in Las Vegas gathering interviews at the Interop 2016 event. We tallied up 10 interviews at the show, ranging in topics from networking to security to Wi-Fi. If you missed the show and want to get a sense of some of the companies and issues discussed, take a look below:

Cisco: How the Digital Network Architecture can help the network
Cisco had a big presence at Interop (it was the first booth you saw when you entered the expo hall). We got a chance to speak with Jeff Reed, a Cisco SVP and one of the Internet keynoters. In the video, he explains a little bit more about what its Digital Network Architecture (DNA) can do for the future of the enterprise network.

Physical security and the Internet of Things
At the Axis Communications booth, we caught up with Vince Ricco, who talked about how the Internet of Things trend will affect security devices (such as IP video cameras and sensors), as well as the network managing these devices (not much more bandwidth, but more management/tracking).

How to work with rogue users
This was a fun interview - we spoke with John Hurley from SmartFile about some of the issues surrounding “rogue” users, also known as “Shadow IT”. Hurley’s company is in the middle of the issue, as it has seen lots of users installing its software on company networks, and now it wants to bridge the gap by working more with enterprise IT to make sure those apps are secure.

Wi-Fi’s next step: High-density scenarios
At the Extreme Networks booth, we chatted with Mike Leibovitz, who told us about the company’s high-density deployments (they’ve covered 10 NFL stadiums with Wi-Fi coverage), and the challenge of doing such deployments (including covering classrooms and healthcare facilities).

Why ransomware works so well
This was another fun interview - John Pironti from IP Architects LLC was another Interop speaker, and he gave us a boatload of information around the issues of ransomware, and why it’s one of the biggest growth areas in computer security. Pretty scary stuff.

Early warning signs of a DDoS attack
Avi Freedman of Kentik was one of the first interviews we did at the show - we chatted about why Distributed Denial of Service attacks are still very popular with hackers (despite a seemingly low financial benefit), and how you can look for some early signs that your site may be hit with one.

Why passwords fail end users
This was more of a product demonstration, but talking with Robert Guccione from Keeper Security, we learned about the biggest reasons that regular passwords don’t work, and why it’s more important for companies to invest in password management systems (or apps like Keeper Security!).

Methods hackers use to attack DNS
Angela Knox from Cloudmark was an Interop speaker who gave us a rundown of the different methods that hackers use to go after Domain Name Service servers. If you’ve ever wondered what DNS cache poisoning is, check out the video.

Ethernet’s future goes fast and slow
We had a repeat video interviewee in David Chalupsky from the Ethernet Alliance (we chatted with him in 2015). David gave us a rundown of the 2016 Ethernet Roadmap, which includes six new data rates - but not just faster ones, but slower ones that can handle specific applications. Find out why slow is good in the video.

Protecting devices at the edge of the network
Finally, we hear from Brian Ballard of APC by Schneider Electric, who gave us a quick update and reminder that the Internet of Things isn’t just about getting data from sensors, cameras and other devices on the network’s edge.

Join the CSO newsletter!

Error: Please check your email address.

More about AxisAxis CommunicationsCiscoCloudmarkExtreme NetworksIDGInteropSchneider Electric

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Keith Shaw

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place