Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Security Hotspots – From Enterprise to Consumerization
    Security Hotspots – From Enterprise to Consumerization Mark Bouchard , VP of Research, Cyber-Edge Group & Kurt Roemer, Cheif Security Strategist, Citrix Recorded: Sep 15 2015 46 mins
    Which “hotspots” require greater attention by today’s IT security leaders? What options does IT have for mitigating these hotspots in the era of high-mobility, BYO and Cloud?

    CyberEdge Group’s annual Cyberthreat Defense Report (CDR) is designed to complement Verizon’s annual Data Breach Investigations Report, providing a penetrating look at how IT security professionals perceive different types of cyberthreats - and plan to defend against them.

    This webinar will explore key findings from the recently released 2015 edition of the CDR, paying particular attention to identified “hotspots” requiring greater attention by today’s IT security teams – including enterprise web properties, mobile devices and occasionally careless employees.

    Attend this insightful session to learn:
    •Which types of cyberthreats concern IT security professionals the most
    •What parts of the computing infrastructure they consider to be most exposed
    •Which security defenses are already present or planned for acquisition
    •How virtualization and containerization technologies can address IT Security’s “weakest link”
    •Other strategies and solutions for future-proofing your organization’s defenses
  • For Security Sake: Consolidate Your Secure Remote Access Infrastructure
    For Security Sake: Consolidate Your Secure Remote Access Infrastructure Akhilesh Dhawan, Principal Product Marketing Manager, Citrix Recorded: Jul 14 2015 36 mins
    Securely managing a cohesive network infrastructure of essential enterprise apps and data has never been more challenging. In this webinar, we will cover day-in-the-life scenarios, highlighting challenges faced by IT teams in providing secure remote access to support mobility and security via centrally hosted applications, data and systems. We will then discuss how consolidating multiple access gateways, including mobile-specific gateways and classic SSL VPNs, with Citrix NetScaler with Unified Gateway helps provide One URL for secure remote access while reducing TCO, simplifying IT, strengthening security and ensuring a high-definition experience for both mobile and traditional application users.
  • Modernize Your Enterprise WAN Strategy
    Modernize Your Enterprise WAN Strategy Karl Brown, Sr. Director of Product Marketing, Cloud Networking Group, Citrix Systems Recorded: Apr 29 2015 44 mins
    With cloud and mobility changing the technology landscape, the enterprise WAN space has evolved. Technology advancements are enabling IT managers to rethink their enterprise WAN strategy beyond the traditional path of WAN optimization. Whether it’s called next-generation WAN, SD-WAN, hybrid WAN or WAN virtualization, the WAN conversation is back in style. In this session, you will learn how the modern approach to enterprise WAN can help increase application reliability and scale bandwidth while lowering costs.
  • Managing the unmanageable: The network security perspective
    Managing the unmanageable: The network security perspective Kurt Roemer, Chief Security Strategist, Citrix; Rick Davis, Senior Sales Engineer, Citrix Recorded: Apr 28 2015 47 mins
    This webinar will provide strategies and best practices to secure your network and apps against threats while optimizing availability and performance.

    Computing has extended beyond the exclusive domain of the IT department - a fact that has significantly complicated security, privacy and has put tremendous pressure on today’s networks. IT managers are tasked to automate networking polices, protect against an ever growing and changing number of attacks and keep users happy with the highest level of performance.

    Attend this webinar to learn:

    - How to protect web applications with an integrated Web Application Firewall solution
    - Defend against DDoS and specific application layer attacks
    - Simplify access with SSO and securely authenticate to external applications
    - Encrypt all traffic while ensuring compliance visibility

Embed in website or blog