Hi [[ session.user.profile.firstName ]]

Create Your Next-Gen Network with Citrix NetScaler

For this webcast, we’re taking an inside look at the latest networking, application access, and security features baked into the 2012 Citrix NetScaler 10 technology. Join IT Weapons and Senior Citrix Sales Engineer, David Cooper, for this technical tour of the industry’s most advanced cloud network
For this webcast, we’re taking an inside look at the latest networking, application access, and security features baked into the 2012 Citrix NetScaler 10 technology. Join IT Weapons and Senior Citrix Sales Engineer, David Cooper, for this technical tour of the industry’s most advanced cloud network platform; Citrix NetScaler.

Citrix NetScaler 10 enables the data centre network to become an end-to-end service delivery fabric to optimize the delivery of all web applications, cloud-based services, virtual desktops, enterprise business apps and mobile services. It ensures the performance, availability and security SLAs for any service to any user, anywhere.

During our webcast we’ll explore the following NetScaler 10 features:
• Advanced load balancing for high availability
• Citrix TriScale technology
• Application visibility and simple policy management
• Enhanced security features
Recorded Jun 12 2012 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mark DeFreitas, Principal Networking Consultant at IT Weapons & David Cooper, Senior Citrix Sales Engineer at Citrix Systems
Presentation preview: Create Your Next-Gen Network with Citrix NetScaler
Recommended for you:
  • Date
  • Rating
  • Views
  • How do you reveal unknown risks on your network and enforce your security and compliance policies? What’s required to reduce your attack surface, detect and block advanced threats and rapidly respond to security breaches? Good Questions!

    Join us and learn the answers to these real-world problems and discover how ForeScout and FireEye’s joint solution reduces the threat landscape and automates security management and response, allowing you to:
    · Identify devices—including Internet of Things endpoints—the instant they connect to your network
    · Quickly detect advanced threats
    · Scan for indicators of compromise (IOCs)
    · Contain infected endpoints and automate threat response
    · Limit malware propagation and break the cyber kill chain

    Register today and learn to improve your company’s defenses against advanced threats and automate threat response!

    ---
    Speakers:
    Michael Resong, FireEye Director, Technology Alliances
    Michael has been with FireEye since April 2013. Before joining Technology Alliances, he led various systems engineering and architect teams at FireEye. Prior to FireEye, Micheal performed numerous systems engineering and management functions at McAfee, Secure Computing, Network Appliance and other leading technology companies.

    Amy De Salvatore, ForeScout Senior Director, Strategic Alliances
    Amy currently manages a team focused on a discreet portfolio of technology and go-to-market partners. As one of ForeScout’s top strategic partner liaisons, Amy manages the FireEye alliance, and is responsible for all development, marketing, engagement and delivery aspects of the relationship.
  • SentinelOne CEO and Co-Founder, Tomer Weingarten, discusses the challenges organizations face when trying to protect their endpoints, and why today's common defense systems are not working. Learn how SentinelOne's approach protects against all types of attacks, including exploits, without hogging valuable system resources.
  • Josh Downs, BrightTALK's Information Security Community Manager breaks down 3 must-watch webinars from February's Data-driven Security Summit:

    3. Business-lead and Threat-Focused Cyber Risk Management - Chris Verdonck, Global Cyber Strategy & Peter Wirnsperger, Cyber Risk Services, Deloitte

    2. Making Vulnerability Management Sexy, Again! - Amar Singh, Chair of ISACA's UK Security Advisory Group

    1. (mis)Adventures in Data-driven Security: How to Avoid Tragedy & Engineer Success - Nik Whitfield, CEO, Panaseer

    To attend any of the above, see the URLs in the attachments.

    For more insights, follow Josh on @BrightTALK_Josh
  • Josh Downs, BrightTALK's Information Security Community Manager breaks down 3 must-watch webinars from February's Data-driven Security Summit:

    3. Business-lead and Threat-Focused Cyber Risk Management - Chris Verdonck, Global Cyber Strategy & Peter Wirnsperger, Cyber Risk Services, Deloitte

    2. Making Vulnerability Management Sexy, Again! - Amar Singh, Chair of ISACA's UK Security Advisory Group

    1. (mis)Adventures in Data-driven Security: How to Avoid Tragedy & Engineer Success - Nik Whitfield, CEO, Panaseer

    To attend any of the above, see the URLs in the attachments.

    For more insights, follow Josh on @BrightTALK_Josh
  • Josh Downs, BrightTALK's Information Security Community Manager breaks down 3 must-watch webinars from February's Data-driven Security Summit:

    3. Business-lead and Threat-Focused Cyber Risk Management - Chris Verdonck, Global Cyber Strategy & Peter Wirnsperger, Cyber Risk Services, Deloitte

    2. Making Vulnerability Management Sexy, Again! - Amar Singh, Chair of ISACA's UK Security Advisory Group

    1. (mis)Adventures in Data-driven Security: How to Avoid Tragedy & Engineer Success - Nik Whitfield, CEO, Panaseer

    To attend any of the above, see the URLs in the attachments.

    For more insights, follow Josh on @BrightTALK_Josh
  • Josh Downs, BrightTALK's Information Security Community Manager breaks down 3 must-watch webinars from February's Data-driven Security Summit:

    3. Business-lead and Threat-Focused Cyber Risk Management - Chris Verdonck, Global Cyber Strategy & Peter Wirnsperger, Cyber Risk Services, Deloitte

    2. Making Vulnerability Management Sexy, Again! - Amar Singh, Chair of ISACA's UK Security Advisory Group

    1. (mis)Adventures in Data-driven Security: How to Avoid Tragedy & Engineer Success - Nik Whitfield, CEO, Panaseer

    To attend any of the above, see the URLs in the attachments.

    For more insights, follow Josh on @BrightTALK_Josh
  • Rejoignez ce webcast pour découvrir comment anticiper les nouveautés de l’accès mobile et les défis de sécurité avec le nouveau firmware Secure Mobile Access 11.3.

    Nouvelles fonctions :

    •Intégration Dell EMM/DMM : SSO avec conteneur Dell Mobile Workspace (iOS et Android pris en charge)
    •Nouvelle console CMS (Console Management System)
    •Délégation Kerberos contrainte (délégation KCD)
    •Accès sans client à SharePoint
    •Prise en charge de Chrome OS
    •Plus de clients HTML 5 pris en charge
    •Contrôle amélioré des protocoles SSL et Ciphers
  • BYOD poses a curious challenge for security teams – how can you secure enterprise data on a device that you don’t own? And how can you provide the necessary security while still respecting the user’s expectations for privacy? These issues aren’t easily addressed with traditional technology, leading many organizations to a frustrating problem for securing BYOD.

    Join Palo Alto Networks and VMware AirWatch in this special webinar to learn:

    · The security challenges with BYOD
    · The issues and limitations with traditional security architectures in a mobile world
    · Advice on delivering the appropriate security measures to make BYOD safe
  • The Pentagon reports 10 million cyberattacks daily. Federal, state and local government agencies need to safeguard information and maintain control when addressing internal mandates for cloud migration. Do you know how many attacks you are experiencing on a daily basis? Do you know where those attacks are coming from? How long they have been in your environment?

    While there is no silver bullet to combating either external or internal cyberattacks, there are steps you can take to build a defense strategy to protect your agency. Beyond just detecting attacks, you need to build up your defenses and take the necessary steps to protect your data and applications.

    In this session, we will discuss how you can leverage the Microsoft Enterprise Mobility Suite to help:
    1. Monitor behavior on your internal network and detect abnormal behavior
    2. Identify authentication irregularities from your users
    3. Protect applications using two-factor authentication
    4. Restrict access to confidential data
  • The Pentagon reports 10 million cyberattacks daily. Federal, state and local government agencies need to safeguard information and maintain control when addressing internal mandates for cloud migration. Do you know how many attacks you are experiencing on a daily basis? Do you know where those attacks are coming from? How long they have been in your environment?

    While there is no silver bullet to combating either external or internal cyberattacks, there are steps you can take to build a defense strategy to protect your agency. Beyond just detecting attacks, you need to build up your defenses and take the necessary steps to protect your data and applications.

    In this session, we will discuss how you can leverage the Microsoft Enterprise Mobility Suite to help:
    1. Monitor behavior on your internal network and detect abnormal behavior
    2. Identify authentication irregularities from your users
    3. Protect applications using two-factor authentication
    4. Restrict access to confidential data

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Create Your Next-Gen Network with Citrix NetScaler
  • Live at: Jun 12 2012 3:00 pm
  • Presented by: Mark DeFreitas, Principal Networking Consultant at IT Weapons & David Cooper, Senior Citrix Sales Engineer at Citrix Systems
  • From:
Your email has been sent.
or close
You must be logged in to email this