มีบัญชีแล้วใช่ไหม
  •   เนื้อหาเฉพาะตัว
  •   ผลิตภัณฑ์และการสนับสนุนของคุณ

ต้องการใช้บัญชีไหม

สร้างบัญชี

Cisco Connect

Deep dive technical workshops

Deep dive technical workshops

Join one of our deep dive technical workshops to get a feel of the technology

Register now

Room 1 (20-30 pax)

Time Topic Speaker Description
1.00PM - 2.00PM Security Everywhere: A Simulation of the Integrated and Multi-layered Approach to Threat Defence Suwitcha Musijaral This session features a scenario-based demonstration that follows a user and security analyst as they fight off a series of targeted malware attacks. See how Cisco Security products interact in a unified fashion to provide a multi-layered ‘Cisco on Cisco’ solution that protects the network against advanced malware threats. Before an attack, Cisco Security products maintain a constant state of network protection, predicting and preventing attacks. During an attack, they integrate to identify, repel and quarantine threats as they happen. Finally, the network analyst can access tools to connect, analyze and understand attacks after they occur, and return the network and users to normal functionality as quickly as possible.
2.00PM - 3.00PM Reap the benefits of SDN with Cisco ACI Virtual Edge Nuttee Jirattivongvibul and Kwai Seng Lai Many customers leverage ACI (Application Centric Infrastucture) as more than just SDN. It enables cloud native applications, threat containment, network analytics, and provides a consistent policy model across multi-cloud platforms. With Cisco ACI Virtual Edge, customers can now leverage ACI's benefits on the existing Nexus or any traditional IP Infrastructure. Find out how Cisco makes it possible.
3.00PM - 4.00PM Building a Container-Ready Infrastructure Nuttee Jirattivongvibul and Kwai Seng Lai Is your infrastructure container-ready? Supporting the container is more than just providing the connectivity and opening up the firewall ports. The infrastructure must be ready to embrace a set of infrastructure policies for dynamic instantiation, de-structuring of microservices and protecting the applications. Join us to find why a different approach is required and how technologies can be leveraged.

This session is for infrastructure and planning teams which desire an understanding of container and infrastructure requirements.
4.00PM - 5.00PM Under the Hood: Next-Gen Cisco SD-WAN (Viptela) Architecture Satit Adirek and Thana This session provides an introduction to the Cisco Next-Gen SD-WAN architecture, highlighting key concepts such as: centralised control plane and orchestration; secure, distributed data plane operation; performance aware delivery of on-premise and cloud delivered applications; policy driven network topology, segmentation and forwarding. This session is for attendees responsible for the design, deployment, and operation of enterprise WAN. Knowledge of enterprise WAN and network fundamentals is recommended.
5.00PM - 5.20PM Wrap up and close

Sorry, no results matched your search criteria(s). Please try again.

Room 2 (20-30 pax)

Time Topic Speaker Description
1.00PM - 2.00PM Advanced Security Analytics and Machine Learning for Network Security Perry Mock Many of the perimeter security tools are insufficient to defend our ever-growing digital network. These tools mostly focus on preventing attacks but often fail to provide the visibility and control which security teams require when cyberattacks occur. Find out how Cisco Stealthwatch prevents breaches using advanced security analytics and machine-learning to identify and mitigate threats, giving visibility on where, how, when, who and what led to the data breach. Automatic threat detection capability reduces cost, time and complexity of the attack surface.
2.00PM - 3.00PM Next Generation Cybersecurity: Accelerating Incident Response Suwitcha Musijaral Your endpoints, PCs, Macs, servers and mobile devices all contain sensitive data, and cybercriminals want it. Unfortunately, many of the endpoint security tools focus on preventing attacks but often fail to provide the visibility and control security teams require when cyberattacks occur. Discover how to prevent breaches, while rapidly and automatically detecting and remediating the most advanced attacks. See where the malware originated, where it’s been and what it’s doing. Dramatically reduce time to detection, provide proactive threat hunting and reduce your attack surface.
3.00PM - 4.00PM Next-Gen Network Performance Management: DNA Analytics & Assurance Tanawin R. and Therdtoon In this session, get an exposure to the new DNA Analytics & Assurance tool. Learn how to monitor trends in your network, anticipate issues before they happen, get intelligent and meaningful messages on the state of your network, your clients and their applications, and easily troubleshoot issues once you identify an unsafe trend. You can even work on what-if scenarios. Attendees are recommended to attend “Solve problems before they become problems with Cisco DNA” prior to this session.
4.00PM - 5.00PM Cisco Spark design (Build a Spark Bot) Anand Hariharan and Vittawat Learn how to get started with building chat Bots for Enterprise use cases. Cisco Spark APIs and SDKs make it really simple to develop Bots. Its so easy, you can do it in less than 60 mins! Build a secure, scalable, stable chat platform for users and bots.

Participant Pre-requisites: Love for Bots, caffeine and everything cool!
5.00PM - 5.20PM Wrap up and close

Sorry, no results matched your search criteria(s). Please try again.