Hi [[ session.user.profile.firstName ]]

ShieldX

  • Date
  • Rating
  • Views
  • What Every Security Professional Should Know About Cloud Hacking
    What Every Security Professional Should Know About Cloud Hacking Manuel Nedbal, ShieldX CTO Recorded: Aug 1 2018 43 mins
    As organizations adopt cloud computing, the perimeter moves into unprotected territory within these new environments. Where IT sees the cloud as an opportunity, security sees a new attack surface. Most companies have heavily invested in traditional multi-layer, security appliances—like firewalls and intrusion prevention systems which help with “north-south” protection. But, these controls are less effective in securing lateral or “east-west” traffic where the new perimeters sit. Worse, they were not designed to handle the sheer volume of cloud traffic--a significant operational hurdle.

    Join this interactive webinar to learn more about:
    - The latest cloud attack methods every security team should understand
    - Anatomy of specific attack types including cross cloud, cross workload, cross data center, cross tenant, as well as, orchestration and serverless attacks
    - Best practices on how to guard your enterprise
  • Cloud Security: Lessons from the Trenches
    Cloud Security: Lessons from the Trenches Brian Talbert, Alaska AIrlines; Enrique Salem, Bain Capital; Ami Hofman, Dimension Data; John Parker, ShieldX Recorded: Jun 19 2018 46 mins
    According to ESG, 25 percent of organizations say maintaining strong and consistent security across their own data center and multiple public cloud environments with a centralized command-and-control a top CISO concern. So how do you do it?

    Join Alaska Airlines Director of Network and Connectivity Solutions Brian Talbert, former Symantec CEO Enrique Salem and ShieldX VP of Products John Parker for a discussion on best practices for secure cloud migration. This panel will discuss:
    - How security can help your company adopt a cloud first strategy
    - Key threats security teams should expect.
    - Why micro-segmentation becomes a critical control when your perimeter defenses are defeated
    - How to gain visibility into your data center and cloud environments
    - Overcoming common objections encountered during migration
  • Episode II: Machine Learning for Effective Micro-Segmentation
    Episode II: Machine Learning for Effective Micro-Segmentation John Parker, VP Products, ShieldX Networks Recorded: Feb 7 2018 30 mins
    According to the Global Information Security Workforce Study from (ISC)2, the worker shortage in cybersecurity will rise to 1.8 million by 2022, increasing by 20% from 2015. But the gap in skilled workers is already evident, with “66% of respondents reported not having enough workers to address current threats."*

    In the second of our micro-segmentation TechTalk series, we’ll explore how this shortage creates a fundamental, operational roadblock for IT organizations implementing micro-segmentation in their highly-virtualized data centers and cloud deployments.

    Simply stated, when moving from a flat to a segmented network - IT organizations want the benefits of micro-segmentation, but are challenged by the manual, resource-intensive, up-front work of documenting security requirements and formulating the sophisticated policies required to implement most solutions available on the market today.

    ShieldX Networks, a 2017 Gartner Cool Vendor in Cloud Security, will take you through the real-world challenges of the implementation process, highlight where automation is needed, provide best practices on achieving automation using machine learning, and offer guidance on how the admin experience may be visualized and optimized to support micro-segmentation projects.

    Overview

     Micro-segmentation deployment requirements – manually defining and assigning policy at scale

     Get automated - applying machine learning for efficiency

     Using it - best practices for visualizing an automatically segmented network

     Q&A


    *International Info System Security Certification Consortium (ISC)2 (2017). Global Cybersecurity Workforce Shortage to Reach 1.8 Million as Threats Loom Larger and Stakes Rise Higher. https://www.isc2.org/en/News-and-Events/Press-Room/Posts/2017/06/07/2017-06-07-Workforce-Shortage.
  • Episode I: Effective Micro-Segmentation for the Multi-Cloud
    Episode I: Effective Micro-Segmentation for the Multi-Cloud John Parker, VP Products, ShieldX Networks Recorded: Jan 10 2018 30 mins
    According to MarketsandMarkets, “more than 75% of businesses are planning to implement multi-cloud architectures within the next 2 years (2018–2019).” And with the rise of multi-cloud architectures, plans and budgets to employ micro-segmentation are on the rise too, to help protect against the lateral movement of an attack, its access to high-value assets, and its subsequent exfiltration of sensitive data.

    But while ESG' research reports that already “68% of enterprise organizations use some type of software-based micro-segmentation technology” today, its implementation still presents challenges and fails to protect against today’s most pervasive assaults.

    Specifically, today’s micro-segmentation solutions offer only simple, ACL-based control, failing to secure all layers of the protocol stack in a way that is also cost-effective and practical to operationalize, especially in newer and elastic, multi-cloud environments.

    ShieldX Networks, a 2017 Gartner Cool Vendor in Cloud Security, will present a brief and instructional overview on the new criteria for effective micro-segmentation, including why micro-segmentation and security controls must work through Layer 7 to protect against advanced attacks, and how to evaluate a solution behind the hype to determine if the micro-segmentation product you plan to deploy will deliver the security you’ve been promised.

    Overview

    •Micro-segmentation state-of-the-union: What is it and how most IT organizations deploy it today

    •Security challenges: What basic micro-segmentation does, and the compromises it misses

    •Blueprint for effective micro-segmentation: Preventing the ‘confused deputy’ and its use in the spread of lateral attacks

    •Best practice takeaways

    •Q&A
  • The Dissolving Perimeter-Security Experts Speak
    The Dissolving Perimeter-Security Experts Speak Patrick Heim, CISO; Hal Lonas, CTO; Dr. Doug Jacobson, University Professor; Dr. Ratinder Ahuja, CEO Recorded: Oct 25 2017 48 mins
    Expert panel discusses challenges and strategies. Attendees can download ESG report. Co-sponsored by Webroot. For more information, visit https://www.shieldx.com/webcast-dissolving-perimeter

Embed in website or blog