Browse communities
Browse communities
Presenting a webinar?

Changing the network security game

Ari Vänttinen, VP Stonesoft Corp.
The industry’s first transformable security engine is here!
The Stonesoft Security Engine changes how network security is delivered. Unlike traditional security products, the Security Engine is one solution that delivers the adaptability, agility and scalability of a service.

The Stonesoft Security Engine is the industry’s first transformable security engine delivered in a single, highly adaptable solution. The Stonesoft Security Engine is a first-of-its-kind security solution that, depending on the user’s preference, can be configured to act as one or several different product modes simultaneously – including a traditional and/or next generation firewall (NGFW), traditional and/or next generation intrusion prevention systems (IPS/NGIPS), layer-2 firewall, VPN or UTM product.

All needed security capabilities and performance improvements are made available and integrated in the Security Engine. That means that not only are you always up to date and protected, you don’t have to buy new products when business needs or the threat environment changes.

•No more fixed and siloed products based on fixed needs
•No more following the latest security hype that only leads to complexity and increased CAPEX/OPEX
•No more paying for every single product improvement
•No more security investment merry-go-round
•No more negative ROI

Instead, you decide, define, choose and configure your own security model – and can change it at any given moment.
Mar 19 2012
46 mins
Changing the network security game
More from this community:

IT Governance, Risk and Compliance

  • Live and recorded (3365)
  • Upcoming (67)
  • Date
  • Rating
  • Views
  • You’ve heard the Buzz about Business rules. now, learn what they can do for your business. Learn how Progress® Corticon® can help developers and business users collaborate to handle the complex, rapidly changing regulatory requirements and business logic changes that company strategies and policies demand.

    Achieve significant impact to your top and bottom line to boost ROI and reduce time-to-market.

    Watch this webinar series to learn:
    * What exactly is a business rules engine, and why should your business use it?
    * How can Progress Corticon deliver the high-performance, automated decisions businesses need to compete.
    * How using a rules engine can speed deployment at a fraction of the time and cost by avoiding the need for “hard coding”
  • An overview of how businesses can gain visibility into B2B transactions to speed decision-making, respond to changing customer and market demands, and optimize business processes.
  • On January 26, 2015, Sylvia Burwell, US Secretary of Health and Human Services, announced the agency's goal of tying 85% of fee for service payments to quality or value by 2016 and 90% by 2018. Is your organization ready?

    In this webinar, we will discuss:
    •A data-centric model to integrate data regardless of source, volume, and variation
    •How to effectively measure your clinical care delivery process and outcomes
    •Learn about real examples of different types of organizations winning the race to value-based care

    Join Liaison and Clinigence to learn how three very different organizations are crossing the clinical quality chasm and winning the race to value-based care.
  • Preparing your organization for the inevitable cyber attack could be the difference between serious business disruption and minor inconvenience. This webinar will focus on what organizations need to consider in advance of an attack to ensure that risks are mitigated. Dow Jones’ own Head of Cyber Content and Data, Rob Sloan, will be joined by two specialists who will share their experience and expertise.
  • Wie Sie in drei Schritten ein klares IT-Configuration Management aufsetzen

    Als Verantwortlicher für IT-Security sind Sie konstant mit möglichen Angriffszenarien und deren Abwehr beschäftigt. Ein Großteil der Angriffe sind nur deshalb erfolgreich, weil Komponenten in Ihrem Netzwerk unzureichend konfiguriert sind.
    Die Herausforderung ist, genau diese Maschinen zu identifizieren und sicher zu stellen, dass sie korrekt konfiguriert werden und dies auch bleiben.
    Lernen Sie in unserm Webcast wie Qualys Policy Compliance Ihr IT-Configuration-Management verbessern kann und damit Ihre Basis-Security stärkt und das Ganze voll automatisiert.
    Erfahren Sie:
    • Etablieren und Umsetzung von Security Configurations
    • Automatisierung und Durchführung von regelmäßigen Configuration Assessments
    • Priorisierung und Umsetzung von Remedation Workflows
  • Vous souhaitez en finir avec l’information dispersée à travers des centaines de répertoires partagés, espaces personnels, et disques durs locaux ?

    Vous êtes à la recherche d’une plateforme collaborative tout-en-un ?

    Vous êtes certainement déjà familier avec Microsoft SharePoint, mais êtes-vous sur de connaître l’étendue de son périmètre fonctionnel ?

    Car si SharePoint reste une excellente plate-forme intranet, de portail web, de collaboration et de partage documentaire, SharePoint va bien au-delà de ces fonctions avec le réseau social (RSE), les outils de développement, et la gestion documentaire (de type GED).

    Participez à notre webinar pour mieux comprendre la richesse de la plateforme et ses bénéfices : une collaboration unifiée et des gains de productivité à chaque niveau de l’entreprise (utilisateurs métiers, DSI, direction).

    Nous aborderons également les modèles de déploiement de SharePoint (100 % cloud, hybride ou on-premises) ainsi que les limites et bénéfices de chaque configuration.

    Dans un second temps, nous nous pencherons sur les questions de déploiement de SharePoint et nous découvrirons comment AvePoint, avec sa solution de migration pour SharePoint 2013 & Office 365, vous permet d’accélérer la mise en place de votre plateforme.

    Nous ferons un tour d’horizon des problèmes les plus communément rencontrés pendant les projets de migration, et nous verrons en 3 points comment AvePoint vous permet notamment de les adresser :

    • Optimisation des ressources dédiées à la migration en automatisant la suppression du contenu obsolète

    • Réduction de la perturbation des activités pendant le processus de migration grâce à une planification personnalisée.

    • Maintien de l’ensemble du contenu, des permissions et des métadonnées jugés pertinents par vos équipes.
  • DNS security breaches are more common than you think. From hijacking of a DNS record at the registrar to cache poisoning to data exfiltration through DNS, they can cause significant damage in terms of direct revenue loss, theft of sensitive information, and brand damage. Because DNS is rarely monitored closely, malicious actors use it to avoid detection and slip under the radar. Early detection is key to minimizing damage and disrupting the cyber-kill chain at the DNS level. Join this webinar to learn the different breach tactics, the impact a security breach can have, and best practices and mitigation techniques. Keeping your DNS secure means keeping your data secure.
  • DNS security breaches are more common than you think. From hijacking of a DNS record at the registrar to cache poisoning to data exfiltration through DNS, they can cause significant damage in terms of direct revenue loss, theft of sensitive information, and brand damage. Because DNS is rarely monitored closely, malicious actors use it to avoid detection and slip under the radar. Early detection is key to minimizing damage and disrupting the cyber-kill chain at the DNS level. Join this webinar to learn the different breach tactics, the impact a security breach can have, and best practices and mitigation techniques. Keeping your DNS secure means keeping your data secure.
  • DNS security breaches are more common than you think. From hijacking of a DNS record at the registrar to cache poisoning to data exfiltration through DNS, they can cause significant damage in terms of direct revenue loss, theft of sensitive information, and brand damage. Because DNS is rarely monitored closely, malicious actors use it to avoid detection and slip under the radar. Early detection is key to minimizing damage and disrupting the cyber-kill chain at the DNS level. Join this webinar to learn the different breach tactics, the impact a security breach can have, and best practices and mitigation techniques. Keeping your DNS secure means keeping your data secure.
  • As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation.
  • Channel
  • Channel profile
  • Stonesoft's Fast, Secure and Easy Access to Cloud: "7 Ways to Love a2cloud" Recorded: Apr 19 2012 31 mins
    Marco Rottigni, A2Cloud Product Manager
    Cloud computing is here. Companies are increasingly using various cloud services to make everyday activities easier and more efficient. These advantages don’t however come without downsides – the real price for flexibility is lack of control, increased risks of human error and technological complexity due to various outsourced authentication methods and practices.

    Stonesoft a2cloud is designed to remove these downsides and make the life truly easier and more secure. In short, Stonesoft a2cloud revolutionizes how companies access the cloud. It is a perfect answer to the security needs of organizations using any cloud. Just say no to expensive authentication gadgets or hard tokens.

    We are very happy to invite you to join Stonesoft’s brief webcast to learn how to Stonesoft a2cloud allows you authenticate to any cloud faster, easier and in total security with Single Sign-On.
  • Changing the network security game Recorded: Mar 19 2012 46 mins
    Ari Vänttinen, VP Stonesoft Corp.
    The industry’s first transformable security engine is here!
    The Stonesoft Security Engine changes how network security is delivered. Unlike traditional security products, the Security Engine is one solution that delivers the adaptability, agility and scalability of a service.

    The Stonesoft Security Engine is the industry’s first transformable security engine delivered in a single, highly adaptable solution. The Stonesoft Security Engine is a first-of-its-kind security solution that, depending on the user’s preference, can be configured to act as one or several different product modes simultaneously – including a traditional and/or next generation firewall (NGFW), traditional and/or next generation intrusion prevention systems (IPS/NGIPS), layer-2 firewall, VPN or UTM product.

    All needed security capabilities and performance improvements are made available and integrated in the Security Engine. That means that not only are you always up to date and protected, you don’t have to buy new products when business needs or the threat environment changes.

    •No more fixed and siloed products based on fixed needs
    •No more following the latest security hype that only leads to complexity and increased CAPEX/OPEX
    •No more paying for every single product improvement
    •No more security investment merry-go-round
    •No more negative ROI

    Instead, you decide, define, choose and configure your own security model – and can change it at any given moment.
  • Changing the Network Security Game Recorded: Mar 16 2012 49 mins
    Ari Vänttinen, VP Stonesoft Corp.
    The industry’s first transformable security engine is here!
    The Stonesoft Security Engine changes how network security is delivered. Unlike traditional security products, the Security Engine is one solution that delivers the adaptability, agility and scalability of a service.

    The Stonesoft Security Engine is the industry’s first transformable security engine delivered in a single, highly adaptable solution. The Stonesoft Security Engine is a first-of-its-kind security solution that, depending on the user’s preference, can be configured to act as one or several different product modes simultaneously – including a traditional and/or next generation firewall (NGFW), traditional and/or next generation intrusion prevention systems (IPS/NGIPS), layer-2 firewall, VPN or UTM product.

    All needed security capabilities and performance improvements are made available and integrated in the Security Engine. That means that not only are you always up to date and protected, you don’t have to buy new products when business needs or the threat environment changes.

    •No more fixed and siloed products based on fixed needs
    •No more following the latest security hype that only leads to complexity and increased CAPEX/OPEX
    •No more paying for every single product improvement
    •No more security investment merry-go-round
    •No more negative ROI

    Instead, you decide, define, choose and configure your own security model – and can change it at any given moment.
  • Changing the Network Security Game Recorded: Mar 13 2012 50 mins
    Ari Vänttinen, VP Marketing, Stonesoft
    The industry’s first transformable security engine is here!
    The Stonesoft Security Engine changes how network security is delivered. Unlike traditional security products, the Security Engine is one solution that delivers the adaptability, agility and scalability of a service.

    The Stonesoft Security Engine is the industry’s first transformable security engine delivered in a single, highly adaptable solution. The Stonesoft Security Engine is a first-of-its-kind security solution that, depending on the user’s preference, can be configured to act as one or several different product modes simultaneously – including a traditional and/or next generation firewall (NGFW), traditional and/or next generation intrusion prevention systems (IPS/NGIPS), layer-2 firewall, VPN or UTM product.

    All needed security capabilities and performance improvements are made available and integrated in the Security Engine. That means that not only are you always up to date and protected, you don’t have to buy new products when business needs or the threat environment changes.

    •No more fixed and siloed products based on fixed needs
    •No more following the latest security hype that only leads to complexity and increased CAPEX/OPEX
    •No more paying for every single product improvement
    •No more security investment merry-go-round
    •No more negative ROI

    Instead, you decide, define, choose and configure your own security model – and can change it at any given moment.
  • Deploy Thousands of Security Devices in Seconds Recorded: Nov 2 2011 29 mins
    Matt McKinley
    A Quicker, Error Free Approach to Deploying, Maintaining and the Upkeep Security Across Multi-Location Businesses

    Whether you’re facing new threats or tuning your entire network of business locations, there is a new approach that makes updating and maintaining security fast. In a matter of seconds, new security rules, updates and upkeep tasks can be pushed to all locations remotely. Automated updates and upgrades ensure the highest level of protection. They also reduce the potential for human errors — the biggest security threat of all. From delivery to full operation, this new approach can do in 84 seconds what takes traditional security deployments 16 days to complete.
  • Deploy Thousands of Security Devices in Seconds Recorded: Nov 2 2011 39 mins
    Matt McKinley
    A Quicker, Error Free Approach to Deploying, Maintaining and the Upkeep Security Across Multi-Location Businesses

    Whether you’re facing new threats or tuning your entire network of business locations, there is a new approach that makes updating and maintaining security fast. In a matter of seconds, new security rules, updates and upkeep tasks can be pushed to all locations remotely. Automated updates and upgrades ensure the highest level of protection. They also reduce the potential for human errors — the biggest security threat of all. From delivery to full operation, this new approach can do in 84 seconds what takes traditional security deployments 16 days to complete.
  • Secure Connectivity for Multi-Location Businesses Recorded: Oct 27 2011 47 mins
    Mr Matt McKInley, Director of US Product Management
    Looking for a more economical, faster and easier approach to network security?

    Securing an entire network of locations can be costly, burden IT staff and open the doors to evolving and advanced threats. Attend this webinar for a discussion of the latest trends in next generation security infrastructure, learn a new approach to securing your entire network of business locations as well as gain insights for reducing management costs.

    If any of the below describes your security situation, register now to attend!

    Is your business geographically distributed?
    Is secure and resilient connectivity a must?
    Is the low cost alternative preferred?
    Is ease of management essential?
  • Secure Connectivity for Multi-location Businesses Recorded: Oct 25 2011 45 mins
    Mr Matt McKInley, Director of US Product Management
    Looking for a more economical, faster and easier approach to network security?

    Securing an entire network of locations can be costly, burden IT staff and open the doors to evolving and advanced threats. Attend this webinar for a discussion of the latest trends in next generation security infrastructure, learn a new approach to securing your entire network of business locations as well as gain insights for reducing management costs.

    If any of the below describes your security situation, register now to attend!

    •Is your business geographically distributed?
    •Is secure and resilient connectivity a must?
    •Is the low cost alternative preferred?
    •Is ease of management essential?
Regular and themed network security webcasts
Meet the network security experts, organizations and industry thought Leaders to hear the latest insights, research and solutions of Network security. These Webcasts introduce very practical ideas, thoughts and advice how to overcome network security challenges.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Changing the network security game
  • Live at: Mar 19 2012 12:00 pm
  • Presented by: Ari Vänttinen, VP Stonesoft Corp.
  • From:
Your email has been sent.
or close
You must be logged in to email this