Hi [[ session.user.profile.firstName ]]

Securit-E - The Security Channel by Geek Day

  • Date
  • Rating
  • Views
  • Mobile Device Application Vulnerabilities
    Mobile Device Application Vulnerabilities
    Aamir Lakhani, Senior Technical Solutions Architect, WWT Recorded: Feb 7 2013 41 mins
    The presentation will take a look at current mobile device vulnerabilities as well as how applications and data can be exploited from mobile devices. We will look at tools and techniques that have been traditionally used for network vulnerabilities and see how they are being modified to attack mobile users. Lastly, we will briefly explore some techniques large corporations are using to mitigate these types of attacks.
  • Identity Services Engine - An Independent Look
    Identity Services Engine - An Independent Look
    Aman Diwakar, Security Solutions Architect, World Wide Technology Recorded: Nov 9 2012 45 mins
    Join WWT's Aman Diwakar, Security Solutions Architect, for this in-depth review of Cisco's Identity Services Engine (ISE).

    • ISE Features
    oTrustsec Overview
    oFeatures and Benefits
    Consolidated Services/Software Packages
    Session Directory
    Flexible Service Deployment
    Policy Extensibility
    Manage Security Group Access
    System-wide monitoring and troubleshooting
    • Design
    oPersonas and Architecture
    oDeployment Models
    oSizing/Design Guidance
    oTips and Caveats
    • Licensing
    oLicensing and Packaging
    oHardware/Software SKUs
    oUpgrades and Migration
    • Roadmap
    oFuture services
  • WWT is Master Certified in Security and Unified Communications
    WWT is Master Certified in Security and Unified Communications
    Jim Kavanaugh, Don Seiler and Ladi Adefala Recorded: Oct 24 2012 5 mins
    Jim Kavanaugh, Don Seiler and Ladi Adefala talk about what it means to our customers that WWT is Cisco Master certified in Security and Unified Communications.
  • Already in the Cloud? It Isn’t Too Late to Secure It
    Already in the Cloud? It Isn’t Too Late to Secure It
    Erik Vesneski, Technical Solutions Architect, WWT & Tim Adams, Technical Solutions Architect, WWT Recorded: Oct 18 2012 49 mins
    Review the approach and considerations required to secure your enterprise cloud as experienced by two of WWT’s brightest Technical Solutions Architects faced with solving Cloud and Security challenges across their Fortune 500 clients and the Federal government.
  • Maintaining Compliance in Your Public, Private or Hybrid Cloud
    Maintaining Compliance in Your Public, Private or Hybrid Cloud
    Erik Vesneski, Technical Solutions Architect, WWT & Tim Adams National Technical Solutions Architect, WWT Recorded: Oct 17 2012 49 mins
    Join World Wide Technology’s National Technical Solutions Architects, Tim Adams and Erik Vesneski, as they address the considerations to mitigate risks and meet compliance standards in a cloud environment.
  • Bring Your Own Destruction
    Bring Your Own Destruction
    Aamir Lakhani, Senior Solutions Technical Global Architect, World Wide Technology Recorded: Aug 21 2012 30 mins
    BYOD is the word of the day. Everyone is jumping at the chance to buy a solution that solves the BYOD issues. However, enabling BYOD for an organization is much more than picking a single vendor solution. It is about understanding mobile risks and building a mobile secure ecosystem. This talk will examine how to build a complete BYOD solution taking into account multiple attack vectors and ways to solve the issue.

Embed in website or blog