Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • The New Edge: Powered by HPE and Pensando
    The New Edge: Powered by HPE and Pensando
    Milo Sanchez, Trace3 Practice Director, Network BU with HPE Pensando Panel Recorded: May 28 2020 56 mins
    Hewlett Packard Enterprise and Pensando have come together to help envision and realize the future of Hybrid and Hyperscale technology, and the establishment of the new Edge.

    BENEFITS:
    •Improved security posture through distributed network protection and east-west security
    •Achieve deep visibility into network behavior with ‘Always-On’ telemetry
    •Save server CPU resources by offloading networking and security functions at wire speed
    •Eliminate complexity and latency associated with “tromboning” through multiple appliances
    •Scales to 100k firewall rules and >1M routes
    •Solution works seamlessly with virtualized, bare metal and containerized workloads

    FEATURES:
    •Integrated security, networking and compute functions in a single device
    •Host agents are eliminated with the incorporation of both the data plane and control plane is a single device
    •Simplified configuration and management for large scale deployments
    •Centralized management system securely manages policy and provides network visibility and troubleshooting

    The first 100 Trace3 customers who attend this webinar will receive a complimentary gift of choice from Snappy. Gift selections include a Echo Dot, Fire 7 Tablet, Apple Charging Station, Gaming Sound Bar, any many more choices!
  • Deploying Production Applications from Kubernetes –the Good,the Bad and the Ugly
    Deploying Production Applications from Kubernetes –the Good,the Bad and the Ugly
    Nicolas Menant, Director Product Mgmt, F5 | Owen Garrett, Sr. Director Product Mgmt, F5 Recorded: May 28 2020 26 mins
    Kubernetes-based applications need help too, and it’s hard to deliver the performance and SLA that your users are accustomed to. 

    In this session, we’ll cover the critical application services needed to support your production applications, and how to provide these from a Kubernetes-centric platform. We’ll share a methodology you can use to determine the most appropriate way to host the services you need, with validated designs for WAF and API management, and we’ll briefly look forwards to future integrations and innovations from F5 and NGINX
  • Adopting Zero Trust with Presidio and Okta
    Adopting Zero Trust with Presidio and Okta
    Brock Dooling, Okta, Partner Engineer Recorded: May 28 2020 44 mins
    Zero Trust is quickly becoming the dominant security model for the cloud, shifting the perimeter from the network to the people and devices that make up a modern workforce. As a model with many moving parts, the immediate question is where to start? Join Presidio & Okta experts to learn:
    · The full Zero Trust reference architecture and steps to get there
    · Why Identity is the foundational layer to build contextual access controls from
  • Federal Webinar:Next-Gen, Cloud-Native Switching from Edge Access to Data Center
    Federal Webinar:Next-Gen, Cloud-Native Switching from Edge Access to Data Center
    Jason Diaz, Aruba Territory Account Manager and Milton Denson, Aruba Consulting Systems Engineer Recorded: May 28 2020 44 mins
    Federal agencies embracing digital transformation will need the latest in switching solutions. A next-gen infrastructure built on cloud-native principles that delivers performance, automation and analytics is required to support newer technologies and future business needs.

    View this webinar to get insights on Aruba’s switching portfolio benefits, such as:

    •Simplified operations with a single operating model & secure and easy enforcement of unified policies
    •Time savings via smart automation & proactive troubleshooting and resolution
    •Reliable, always-on networking which creates a world class user experience
  • Why is Security so Important for SD-WAN Deployments?
    Why is Security so Important for SD-WAN Deployments?
    Kumar Mehta, Founder and Chief Development Office with Versa Networks Recorded: May 28 2020 61 mins
    SD-WAN planning, designs, and deployments are occurring at an increasing pace. There are also Enterprises who deployed first generation SD-WAN solutions who are decommissioning them for newer implementations. There are many drivers for deploying SD-WAN such as digital transformation, reliable access to cloud services, remote access for teleworkers, and business resilience. One common requirement across every requirement is the absolute need for security in these SD-WAN implementations.

    Join Kumar Mehta, Founder and Chief Development Office with Versa Networks as he outlines the security challenges that exist when implementing SD-WAN, why security is so important for SD-WAN, and solutions that squarely address the security challenges when deploying SD-WAN.

    In this webinar you’ll learn about
    +Top security threats that SD-WAN implementations face
    +What addressing these security issues is so critical
    +What you can do to mitigate these vulnerabilities
  • Automation or Hesitation?
    Automation or Hesitation?
    Dave Pack, SVP, Customer Exp, Swimlane; Alan Rynarzewski, Faculty, Purdue Global Uni.; Kristy Westphal, VP, MUFG Union Bank Recorded: May 28 2020 58 mins
    Many organizations are leaning into automation of key security processes such as threat detection, response speed and supplementing the human workforce. But is automation the panacea and the right fit for your environment?Planning for the introduction of automation into the security infrastructure needs to be considered carefully. For example, you don’t want to automate a broken process. You don’t want your automation to be redundant with duties that are already being done (and done effectively). Join Swimlane and (ISC)2 on May 28, 2020 at 1:00PM Eastern for a discussion on security orchestration,automation and response, what the “low hanging fruit” may be to target for automation and how to make sure the introduction of automation goes smoothly at your organization.
  • The State of PKI & IoT Security: Your Questions Answered by PKI Experts
    The State of PKI & IoT Security: Your Questions Answered by PKI Experts
    Ted Shorter, CTO, Gorav Arora, Office of CTO, and Keao Caindec, Principal Analyst Recorded: May 28 2020 33 mins
    As product innovators bring connected devices to market, the risk of device hacks and data theft continues to rise. Faster product development and feature delivery often take priority, leading to increased security risks. Modern public key infrastructure (PKI) has emerged as an efficient and cost-effective way to secure embedded devices at scale, but only when it’s done right.

    Join Keyfactor, Thales, and Farallon Technology Group for a LIVE Q&A with CTO, Ted Shorter, Director of Technology, Gorav Arora, and Keao Caindec, Principal Analyst, as we take your questions and provide practical advice on the state of IoT security today and best practices for securing the entire IoT ecosystem and product lifecycle using modern PKI.
  • Idaptive: Knock-knock. Who’s there?
    Idaptive: Knock-knock. Who’s there?
    Eddie Welch, Idaptive, Senior Solutions Engineer Recorded: May 28 2020 64 mins
    When someone tells that corny old “Knock! Knock!” joke, the answer is always a silly one. In the context of your business, however, it’s extremely important that the person “knocking” on the door to applications and resources be the right person with valid access rights.

    The recent shift to an almost all-remote workforce has maxed out the IT and Security teams that were already busy managing digital transformation and the shift to the cloud. Now, they are also challenged to understand the who/what/where/when/how of their remote workers.

    Join experts from Presidio and Idaptive as they discuss what identity means today in the new age of remote work. They’ll share best practices and stories from real-life identity and access management (IAM) customer implementations, focusing on the business and security benefits of IAM to organizations of all sizes.
  • The Journey to AIOps
    The Journey to AIOps
    Tanner Bechtel, WWT AIOps & APM, Gregg Ostrowski, AppDynamics & JF Huard, AppDynamics Recorded: May 28 2020 45 mins
    In 2017 Gartner coined the term AIOps; giving much needed structure and definition as to how AIOps platforms utilize big data, machine learning and other advanced analytics technologies.

    WWT and AppDynamics will cover the following during this talk:
    • Get you up-to-speed on the rise of AIOps and its current state
    • Show you how AIOps can deliver the better outcomes for your business
    • Give you real-world examples of how AIOps is being used every day
  • Get the Most from Your APIs with Microservices-Friendly API Management
    Get the Most from Your APIs with Microservices-Friendly API Management
    Alessandro Fael Garcia, Technical Manager, F5 Networks Recorded: May 28 2020 38 mins
    APIs are at the core of modern applications. The pressure to remain competitive often requires real-time API connectivity for your customers, as well as among all your apps. Properly securing, controlling, and monitoring all this API traffic is critical, but so is maximizing the benefit from your APIs as soon as they’re published. This live webinar will cover how F5 and NGINX enable organizations to get the most out of their API ecosystem.

    Key topics include:

    · Growing your app at scale while maintaining API delivery speed requires both an API gateway that responds to API requests in real time and an API management solution to properly secure, control, and monitor your APIs.

    · NGINX Plus is one of the fastest API gateways in the industry, as we demonstrate in a live test of latency in processing API calls.

    · With its intuitive GUI, the NGINX Controller API Management Module centrally manages all of your NGINX Plus instances deployed as API gateways, plus the security access policies and monitoring options that apply to them. We'll demonstrate how easy it is to seamlessly publish and update your API gateway configuration.
  • Modern Uses of Thermal Imaging and Computer Vision Technologies
    Modern Uses of Thermal Imaging and Computer Vision Technologies
    Michael Knight, Global CTO, Safety and Security – Industry Edge, Dell Technologies Recorded: May 28 2020 31 mins
    Welcome back to Dell Technologies Innovation Webinar Series. In this conversation we will explore and focus on the “Modern Uses of Thermal Imaging and Computer Vision Technologies”. The next generation of safety and security solutions such as thermal imaging and computer vision are being used in novel ways in today’s world, and we believe this is only the beginning.
  • FBI Fireside Chat with Presidio and Cisco
    FBI Fireside Chat with Presidio and Cisco
    Scott Augenbaum, Retired FBI Cyber Division; Chris Leach, Sr. CISO Adviser, Cisco ; Dave Trader & Matt Bossom Cyber, Presidio Recorded: May 28 2020 62 mins
    Join the Presidio CyberSecurity Team for a Fireside Chat with Retired FBI Cyber Division Supervisory Special Agent Scott Augenbaum and Chris Leach, Sr. CISO Adviser at Cisco
  • Business Continuity in the face of crisis
    Business Continuity in the face of crisis
    Pascal Geenens Recorded: May 28 2020 6 mins
    How do you ensure business continuity and close all the security gaps in your multi-cloud architecture and critical applications during times of crisis?
  • Enterprise networking just got easier. Want to know why?
    Enterprise networking just got easier. Want to know why?
    Mattias Fridström, Chief Evangelist at Telia Carrier Recorded: May 28 2020 40 mins
    Your business is changing. So is the world of networking. In this webinar we will go through the new truths of enterprise connectivity and what you need to know to use them to your advantage. We will discuss common statements, such as:
    •“The Internet is the only network you need”. But how does your traffic really flow? How do you build a robust underlay on a global scale? How can you tell one ISP from the next?
    •“Now that the Cloud is everywhere, you don’t need a WAN”. But how does your traffic reach the Cloud? How do you ensure globally consistent performance? And how do you build a network as flexible as the Cloud?
    •“Zero touch’ and self-serve revolutionizes customer experience”. What is hype versus reality? What should you look for in a provider?
  • Rethinking Infosec
    Rethinking Infosec
    Greg van der Gaast Recorded: May 28 2020 51 mins
    Thoughts on why today’s Information Security doesn't work and how we can do better.

    Greg will be covering:
    Shifting from reactive to proactive.
    Debunking the skills gap.
    Stopping breaches, wasteful spending, and frustration.
    Creating value.
  • What is the right Managed SD-WAN Service for you?
    What is the right Managed SD-WAN Service for you?
    Roy Chua - Founder and principal of AvidThink Recorded: May 28 2020 48 mins
    There is an industry-wide agreement that SD-WAN is a great technology for delivering a fast and reliable enterprise network, but what the best way for you to buy, deploy and use SD-WAN?

    You can manage the network yourself, or hand it over to a telco or a service provider. You can use appliance-based architecture you will own and maintain or a cloud-based one where the provider maintained the service, and you control policy and configuration. There are so many options to choose from.

    To find out which option is the right one for your enterprise, join us on our next webinar as we speak with Roy Chua, principle at AvidThink.

    Roy will share findings from his recently completed report on SD-WAN and network as an overlay “Network as an OTT Service – A New Enterprise Option” with Cato’s Senior Director of Product Marketing and Business Development, Eyal Webber-Zvik, and Technology Evangelist, Dave Greenfield. Together they'll explore the need for CNPs and how they address the challenges enterprises face today.
    Join the webinar and learn:

    -What Managed SD-WAN models are available to enterprises today?
    -How the choice of management model impacts network costs, agility, and flexibility?
    -How emerging managed SD-WAN offerings differ from legacy managed network services?
    -How Cato provides a cloud-native SD-WAN with built-in security and a flexible management model
  • Endpoint & Network: una visibilità completa in continua evoluzione
    Endpoint & Network: una visibilità completa in continua evoluzione
    Gabriele Zanoni, Solution Architect, EMEA, FireEye Recorded: May 28 2020 64 mins
    FireEye Endpoint & Network: una visibilità completa per architetture in continua evoluzione. Scopri la tecnologia premiata dai test del MITRE.

    Il Webinar “FireEye Endpoint & Network: una visibilità completa per architetture in continua evoluzione” fa parte di una serie di incontri settimanali intitolati: #FireEyeCyberTalks. Si terranno ogni giovedì, dal 21 maggio al 18 giugno, e ti offriranno contenuti stimolanti e approfondimenti da parte dei nostri esperti.

    Avere la possibilità di individuare i movimenti di un aggressore nel minor tempo possibile è la chiave per minimizzare gli impatti di un possibile incidente informatico. Le soluzioni di FireEye Endpoint & Network security integrano nativamente un sistema di condivisione degli Indicatori di Compromissione che permette di massimizzare la visibilità degli attacchi.
    Ad esempio, i Movimenti Laterali spesso compiuti tramite programmi di “Shadow IT” possono essere una delle ragioni a causa delle quali il tempo di identificazione di un attacco - il così detto Dwell Time - risulti particolarmente elevato: FireEye permette di ottenere una piena visibilità di tutte le fasi di un attacco, compresa appunto la fase dei Movimenti Laterali - sicuramente una delle più complesse da identificare. Inoltre, le informazioni di Threat Intelligence, integrate nelle soluzioni FireEye, permettono di capire rapidamente quali sono quegli incidenti a cui è assolutamente necessario dare seguito in tempi brevi. I test del MITRE, condotti simulando una compromissione Nation-State con le Tecniche Tattiche e Procedure (TTP) del gruppo APT29, hanno recentemente assegnato a FireEye il livello di punteggio più alto in termini di identificazione rispetto a tutti i gli atri competitor.
    In questo Webinar vedremo come i sistemi Endpoint e Network di FireEye possano mettere in sicurezza le più diverse architetture e sistemi.

    Prenota il tuo posto oggi #FireEyeCyberTalks
  • The Buyer's guide for DDos Protection
    The Buyer's guide for DDos Protection
    Eyal Arzai Recorded: May 28 2020 58 mins
    Signing-up for a DDoS protection service is more than just paying for technology. To be effective, a service must bundle innovative technology with a robust cloud network and expert service with the staff, skill, and know-how of how to protect against today’s largest and most sophisticated DDoS attacks. Making an informed decision is crucial to making sure you are fully protected.

    Join us for a webinar on the criteria for evaluating and choosing a DDoS vendor.

    In this webinar you will learn:

    What are the 3 elements to consider when evaluating a DDoS protection service
    What KPIs you should use to measure your DDoS protection vendor
    What are the key trends in the DDoS threat landscape, and what you should protect against?
  • Get the Most from Your APIs with Microservices-Friendly API Management [EMEA]
    Get the Most from Your APIs with Microservices-Friendly API Management [EMEA]
    Alessandro Fael Garcia, Technical Manager, F5 Networks Recorded: May 28 2020 38 mins
    APIs are at the core of modern applications. The pressure to remain competitive often requires real-time API connectivity for your customers, as well as among all your apps. Properly securing, controlling, and monitoring all this API traffic is critical, but so is maximizing the benefit from your APIs as soon as they’re published. This live webinar will cover how F5 and NGINX enable organizations to get the most out of their API ecosystem.

    Key topics include:

    · Growing your app at scale while maintaining API delivery speed requires both an API gateway that responds to API requests in real time and an API management solution to properly secure, control, and monitor your APIs.

    · NGINX Plus is one of the fastest API gateways in the industry, as we demonstrate in a live test of latency in processing API calls.

    · With its intuitive GUI, the NGINX Controller API Management Module centrally manages all of your NGINX Plus instances deployed as API gateways, plus the security access policies and monitoring options that apply to them. We'll demonstrate how easy it is to seamlessly publish and update your API gateway configuration.
  • Cloud Managed Networks – the smartest way to simplify network operation
    Cloud Managed Networks – the smartest way to simplify network operation
    Guido Kragten, Category Lead, Aruba Cloud platforms, EMEA, Aruba, a Hewlett Packard Enterprise company Recorded: May 28 2020 36 mins
    Networks and IT are impacted by the ever-changing dynamics. The impact of the network could be caused by external or organizational factors.
    Organizational factors could have an impact on the network like new business needs or budget cuts. For IT they need to have the flexibility, agility, and tools to embrace these changes and stay in control of the network. How do you do this today, how many tools are you using, how long does it take to make changes and can you plan these? Just a view questions you could have today and during this session, we will show how Aruba Cloud Managed Networks can help to manage your network.
  • När Nätverket Möter Den Nya Morgondagen! 2, Centraliserad Dekryptering
    När Nätverket Möter Den Nya Morgondagen! 2, Centraliserad Dekryptering
    Robert Klasson Gigamon SE Nordic and Baltic, John Svensson Gigamon Sales Director Nordic and Baltic Recorded: May 28 2020 19 mins
    Får dina säkerhetslösningar rätt data? Minska falska larm med 70%
    Har du access till ditt nät? Får befintliga säkerhetslösning all data.
    Centraliserad Dekryptering
    Enskilda verktyg och säkerhetslösningar används idag för att dekryptera krypterad trafik, att använda en centraliserad lösning istället för att dekryptera och inspektera krypterad trafik är ofta den mest effektiva lösningen.

    Centralisering av dekryptering gör att trafik kan dekrypteras och inspekteras en gång innan den delas över flera verktyg.
    Möjligheten att undersöka krypterad trafik till och från applikationer kan vara viktig för att se om applikation och datatillgång är legitim eller olaglig. Eftersom applikationskapaciteten ökas dynamiskt, applikationer återkallas snabbt och nya applikationer implementeras.

    Använd metadata för att öka effektiviteten av era SIEM verktyg
    Företag och organisationer använder lösningar som Splunk eller andra SIEM för aktiv säkerhetsövervakning och matar både system- och applikationsmetadata till dessa, det kan vara ett kraftfullt sätt att säkerställa funktionen samtidigt som nya applikationer och kapacitet kommer online.

    Organisationer bör sträva efter att säkerställa det är exakt och relevant metadata som skickas till dessa verktyg för att maximera resultatet samtidigt som du minimerar mängden data som skickas till dem. Detta är särskilt viktigt med SIEM verktyg där faktureringsmodellen är baserad på volymen data som bearbetas eller lagras.
    ”Threat detektion och Respons”
    Med attackytor och sårbarheter som ökar till följd av övergången till WFH, med snabbt expanderad VPN-arkitektur är det absolut nödvändigt att organisationer har kraftfulla verktyg för att upptäcka och svara på dessa nya hot.
    Till exempel ger pekverktyg på ingress/egress-länkar och bakom VPN-koncentratorer en riktad strategi för att minska potentiella risker.
  • La ansatte jobbe hjemmefra etter Gartners SASE modell
    La ansatte jobbe hjemmefra etter Gartners SASE modell
    Hans Thore Rafoss, Regional Sales Manager & Ole Kjos, Sales Engineer at Zscaler Recorded: May 28 2020 61 mins
    I 2019 definerte Gartner SASE, og hvordan fremtidens nettverkssikkerhet ligger i skyen. Lær hvordan Zscalers SASE løsning gir ansatte en sikker og effektiv hverdag fra hjemmekontor.

    Å jobbe hjemmefra er ikke nytt, og mange organisasjoner har hatt løsninger for dette i årevis. Omfanget av arbeid hjemmefra har imidlertid økt kraftig på grunn av den siste tids utvikling. Dette medfører nye utfordringer. Hvordan lar du ansatte jobbe hjemmefra uten å redusere produktiviteten eller utsette bedriften for unødvendig risiko? Bli med på vårt webinar, 28. mai, for å lære mer om dette.

    Agenda:
    I dette webinaret vil Ole Andreas Kjos, Sr. Sales Engineer, hos Zscaler, samt Hans Thore Rafoss, Regional Sales Manager, hos Zscaler, se på fire utfordringer for bedrifter med ansatte som jobber hjemmefra. Vi dekker blant annet:
    - Hvordan gi ansatte effektiv og trygg tilgang til internett, samt alle forretningsapplikasjoner, SaaS tjenester, applikasjoner i det interne nettverket og interne applikasjoner i public og private cloud
    - Hvordan gi ansatte muligheten til å jobbe fra hvor som helst, og fra hvilken som helst enhet
    - Hvordan sikre en god brukeropplevelse
    - Hvordan minimere angrepsflaten for interne applikasjoner

    Vil du vite hvordan de ansatte kan jobbe effektivt og trygt hjemmefra? Ønsker du å lære mer om Zscalers skybaserte Zero Trust løsning jobber sammen med Zscaler Internet Access som i 9 år på rad er lederen hos analyseselskapet Gartner for Secure Web Gateway? Da er du velkommen til å melde deg på dette webinaret for mer informasjon og faglig påfyll.

    Vel møtt.
  • SSCPオンラインチャレンジセミナー
    SSCPオンラインチャレンジセミナー
    小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan & 安田良明, CISSP, SSCP, (ISC)² 認定講師 Recorded: May 28 2020 123 mins
    CISO や CSIRT の設置により、情報セキュリティ体制を強化している組織が増えてきている中、情報セキュリティやリスクマネジメントを実践しているが情報セキュリティが一向に向上しないのはなぜだろうか、現場の情報システム・情報セキュリティ実務者を育成しているが、情報セキュリティの運用がうまくいかないのはなぜだろうかなど課題を抱えている組織が多いのが現状です。

    現場の実務を支える実務者の育成は耳ざわりがよい知識と技術を身に着ければよいというわけではなく、「組織」という観点を理解し、情報セキュリティ専門家や経営陣とコミュニケーションを図れる人材でなければなりません。そのため、IT全体にわたる知識とスキルがあり、ネットワークやシステムの開発・運用などに従事する人に必要な知識に加え、確実なセキュリティ対策を実装・維持できる技術的な観点だけではなく「組織」という観点から情報セキュリティを理解している必要があります。

    SSCPの7ドメインは、情報セキュリティの運用から基本的な情報セキュリティの実務に必要な知識を取り扱い、情報セキュリティを専業としていない実務経験年数が少ない方にとっても、より実践に近い内容をグローバルの標準に則って理解することが期待できます。今回のオンラインセミナーでは、「現場の情報セキュリティ担当者に必要な情報セキュリティの知識と考え方」として、IT全般のエンジニアやサポート技術者、アナリスト担当者が知っておくべき情報セキュリティの知識をわかりやすくお教えします。

    SSCPを受験させてみたいけど、どのような内容になっているのかわからないというユーザー企業の管理職の皆さんにも理解しやすい内容で提供させていただきます。

    システム開発や情報システム担当者の皆さんにも効果的な内容となっています。

    Speaker: 小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan
    Instructor: 安田良明, CISSP, SSCP, (ISC)² 認定講師
  • Singtel x AWS: Future-proof your business with a virtual contact centre
    Singtel x AWS: Future-proof your business with a virtual contact centre
    Tony Cadelina, Director, Digital Transformation Lead, Singtel and Simon Burke, Partner Segment Lead, Amazon Connect, ASEAN Recorded: May 28 2020 41 mins
    As professionals, we strive to future-proof our organisations to work more efficiently and productively. In particular, remote workplaces are jumping out as the modern workplaces of the future, with 74%* of CFOs reported to have the intention to make the big switch.

    Customer-centric business can greatly benefit from shifting its legacy structure to a virtual contact centre. On top of being operationally ready ‘virtually’ anywhere, it boasts as a solution to meet organisational and consumer needs – here’s why you need to get in on this:

    • Simple set up, ready within minutes
    • Cost-efficient with a pay-as-you-go model
    • Greater scalability, flexibility and agility to meet with demands

    Singtel has partnered with AWS to help you securely achieve a fully operational virtual contact centre within minutes, bringing you a productive and efficient workplace of the future.

    *Gartner, Press Release, CFO Survey, Arlington, VA, April 2, 2020
  • SailPoint’s Predictive Identity
    SailPoint’s Predictive Identity
    Brent McCormick, SailPoint, Partner Engineer May 28 2020 8:00 pm UTC 60 mins
    Data Privacy & Compliance Can Be Daunting. More users, apps and data to manage and protect. New data privacy and compliance requirements to meet. Securing AWS, Azure, and Google Cloud Platforms All with limited IT staff and security talent Take on Digital Transformation with Ease and Confidence with SailPoint Predictive Identity. Organizations Face New Challenges. With the power of SailPoint Predictive Identity you can see more, do more and secure more….It’s time to rethink identity.
  • Have no Fear, Security Automation is Here
    Have no Fear, Security Automation is Here
    Sydney Coffaro, InsightConnect Product Specialist May 28 2020 9:00 pm UTC 25 mins
    Security automation is a hot topic today, as security teams are looking to effectively leverage technology to make their security operations run more smoothly. With automation all the rage, comments like “we should be automating more” are becoming an ongoing theme. Dedicating time and resources to implement automation is often viewed as a huge level of effort, but adding automation to your most time-intensive security processes doesn’t have to be an intimidating undertaking. Did you know that with a small investment, you can realize tremendous ROI and value from automation, faster than ever before?

    In this demo of InsightConnect, you will learn about:
    1. Overview of automation workflow building blocks
    2. Real use cases teams struggle with today, including phishing, SIEM investigation and response, patching, and more
    3. How you can integrate security automation and orchestration into your existing SecOps programs
    4. How automation will improve efficiency across the processes and tools you’re executing manually today
  • Get the Most from Your APIs with Microservices-Friendly API Management [APAC]
    Get the Most from Your APIs with Microservices-Friendly API Management [APAC]
    Alessandro Fael Garcia, Technical Manager, F5 Networks May 29 2020 12:00 am UTC 60 mins
    APIs are at the core of modern applications. The pressure to remain competitive often requires real-time API connectivity for your customers, as well as among all your apps. Properly securing, controlling, and monitoring all this API traffic is critical, but so is maximizing the benefit from your APIs as soon as they’re published. This live webinar will cover how F5 and NGINX enable organizations to get the most out of their API ecosystem.

    Key topics include:

    · Growing your app at scale while maintaining API delivery speed requires both an API gateway that responds to API requests in real time and an API management solution to properly secure, control, and monitor your APIs.

    · NGINX Plus is one of the fastest API gateways in the industry, as we demonstrate in a live test of latency in processing API calls.

    · With its intuitive GUI, the NGINX Controller API Management Module centrally manages all of your NGINX Plus instances deployed as API gateways, plus the security access policies and monitoring options that apply to them. We'll demonstrate how easy it is to seamlessly publish and update your API gateway configuration.
  • Webinar: What’s New in Tufin Orchestration Suite R20-1
    Webinar: What’s New in Tufin Orchestration Suite R20-1
    Hadas Lahav & Roi Alon Product Management, Tufin May 29 2020 6:00 am UTC 60 mins
    Looking for the fastest, easiest way to block suspicious traffic? Search and modify specific service throughout the rule base? Or maybe implement rule changes using IPv6 addresses? All of these changes (and more!) can now be managed with the new capabilities in Tufin Orchestration Suite (TOS) R20-1.

    Join us for a short and super informative webinar on Friday, May 29th at 2pm SGT to learn how you can use Tufin’s newest security automation features to:

    Respond quickly to suspicious network activity by blocking a high-risk service (Remember WannaCry TCP 445…?)
    Manage changes that include IPv6 (and IPv4) addresses for fast implementation
    Control and automate changes in NGFW (Palo Alto Networks Panorama and Cisco Firepower) based on accurate traffic/usage analysis

    Save your seat. Register today! 


    If you're unable to attend the live webinar, sign up here and we’ll send you the recording.
  • Can we manage mental well being in the digital workspace?
    Can we manage mental well being in the digital workspace?
    Neil Shah May 29 2020 9:00 am UTC 63 mins
    In this Excelling Under Pressure workshop, you will learn what stress is, how it affects your daily life, when it is beneficial and when it is harmful. We will also explore some of the flawed strategies that people commonly use to deal with stress and provide some resources designed to help you de-stress.
  • Mobile Endpoint Security - Understand mobile risk and how to protect cloud data
    Mobile Endpoint Security - Understand mobile risk and how to protect cloud data
    Marius Rohart May 29 2020 11:00 am UTC 29 mins
    Join Core to Cloud and Lookout for this 30-minute webinar where we will cover:

    - The mobile threat landscape
    - How to protect cloud data from phishing and social engineering attacks
    - How Lookout provides visibility into mobile threats
  • Data Access Governance Solution Overview
    Data Access Governance Solution Overview
    Ralph Martino May 29 2020 2:00 pm UTC 58 mins
    Data Access Governance is about making access to data exclusive. It’s about limiting the number of people who have access to data – and their permissions to data – to the lowest levels possible.

    Stealthbits’ Data Access Governance solution discovers where your data lives and then classifies, monitors, and remediates the conditions that make managing data access so difficult in the first place. The result is effective governance that promotes security, compliance, and operational efficiency.
  • S2:E5 The Value of an Interconnected Ecosystem: Data Center Migration
    S2:E5 The Value of an Interconnected Ecosystem: Data Center Migration
    Steve Smith, CoreSite CRO | Kevin Sanders, EYPMCF Principal Consultant May 29 2020 3:00 pm UTC 45 mins
    2020 has brought a number of new challenges to the business IT landscape. Everything from business continuity plans, daily operating strategies and IT infrastructure management have changed as more people including IT and data center staff, are forced to work remotely. Many organizations are struggling to re-engineer their data center and infrastructure plans to account for increases in remote access of systems, demands for better performance and need for additional system resources.
    EYP Mission Critical Facilities, one of CoreSite’s valued solution partners, offers a complete portfolio of consulting and engineering services to lead you through the strategy, design, integration, and operational efficiency of your data center deployments. They have a history developing new and innovative planning tools, design concepts and operations methodologies, and understanding what others have developed through working in thousands of data centers across the globe. EYP is well positioned to create flexible environments that can easily adapt to changes and disruptions in the business/data center operations -- while eliminating risks and creating efficiencies

    Trending Topics:
    - Understanding the impact of the current 2020 landscape on data center management strategies
    - Determining what factors and resources are frequently missed during migration efforts
    - Learning how to ensure operational consistency and excellence during data center migrations and daily IT infrastructure management
  • Securing Remote Work Force
    Securing Remote Work Force
    Kevin Kennedy May 29 2020 3:00 pm UTC 43 mins
    The sudden shift to remote working has caused an equally rapid change as security teams adapt to the explosion in VPN usage and an increase in unmanaged devices remotely accessing systems. At the same time cloud deployed VDI usage is climbing whilst SaaS collaboration and file sharing apps—especially Office 365—become even more critical.

    Join this webcast to examine five areas that attackers will target and your best practices to re-gain visibility and control across your remote worker attack surface:

    Remote access tools
    File sharing tools
    SaaS tools
    Connections from unmanaged systems
    DNS and split VPNs
  • Maximise your security posture on Microsoft Azure
    Maximise your security posture on Microsoft Azure
    Aydin Aslaner, Microsoft, Chris Hill, Barracuda Newtorks, Gemma Allen, Barracuda Networks Jun 1 2020 10:00 am UTC 60 mins
    Do you have a comprehensive security plan for your cloud infrastructure?

    This eye-opening webinar will help you to combat ever-expanding business challenges and threats by strengthening your security posture.

    Join us for this webinar co-presented by Microsoft and Barracuda and discover:

    • How to secure your applications and data in Microsoft Azure
    • How to secure remote access tailored to your needs
    • How to easily protect your Office 365 data with advanced backup and recovery
    • How to automate public-cloud security compliance and remediation

    Plus, get answers to all your questions in the interactive Q&A session following the presentation.

    Let us secure your cloud journey.
  • Gaining Momentum at the Edge
    Gaining Momentum at the Edge
    Mark Marquez, Executive Vice President of Technology, Momentum Telecom Ritesh Mukherjee, Vice President – Product Management, Jun 1 2020 5:00 pm UTC 60 mins
    Any WAN edge infrastructure plans today are based on vCPE and SD-WAN. Momentum Telecom has an innovative offering to enable this trend while making it flexible for customers to choose the functionality they want. Powered by 128 Technology’s Session Smart™ routers, Momentum Telecom has a game-changing solution with unprecedented flexibility, visibility, and reliability. In this webinar we talk to Momentum Telecom to gain an insight into this new offering that redefines the edge, brings differentiated services to the marketplace, and presents superior services to the customer.
  • The New Normal & How This is Impacting Cybersecurity When Building Your Business
    The New Normal & How This is Impacting Cybersecurity When Building Your Business
    Glenn Maiden - Director of Threat Intelligence, Corne Mare Director Security Solutions Jun 2 2020 1:00 am UTC 45 mins
    With recent events, everyone is talking about remote access and working remotely. Some businesses are looking at this as potentially the new norm that is changing how we are connecting with the business world and each other. Business are looking to have security embedded in their strategy and solutions, in order to minimize their exposure to risk as much as possible.

    In this webinar, Fortinet will be reviewing some of these new business challenges, as well as some strategies for every cybersecurity leader to consider when building a secure remote connectivity solution that can scale.
  • What really matters to security teams?
    What really matters to security teams?
    Dave Gruber Jun 2 2020 9:00 am UTC 58 mins
    A business may have sound security measures in place to protect the normal course of business, but they cannot simply be “cut and pasted” and applied to an increasingly remote workforce.

    Telecommuting presents its own unique set of security challenges, including a number of environmental changes and increased reliance on the digital world, all of which must come into consideration.

    What devices will employees be using, and where will they be using them? Could others have easy access to information that is proprietary, either in physical proximity or through a shared WiFi connection?
    How will we share information with each other, and is that source being proactively secured?

    Join this webinar to learn why Cybereason are on our radar because of the holistic nature of their offering.
  • MINDHUNTER #1 - Social Engineering: The Threat Is Coming From Inside The House
    MINDHUNTER #1 - Social Engineering: The Threat Is Coming From Inside The House
    John Aarsen, SE - Benelux and Nordics, SonicWall Jun 2 2020 9:00 am UTC 60 mins
    Join SonicWall expert John Aarsen as he goes through the anatomy of social engineering attacks to demonstrate how people are manipulated into performing actions or divulging confidential information. These attacks have become more frequent and aggressive as attackers attempt to exploit the circumstances surrounding COVID-19. In the case of both users and organizations, overconfidence can lead to complacency, allowing such attacks to succeed. That’s why it’s crucial that you consider social engineering as your company builds its boundless cybersecurity strategy.
  • How to maintain cyber hygiene - from root cause to solution
    How to maintain cyber hygiene - from root cause to solution
    David Grout, CTO, EMEA, FireEye Jun 2 2020 9:00 am UTC 45 mins
    In today's ever-changing threat landscape, it is more important than ever to use a cyber hygiene routine to help prevent hackers, intelligent malware, and advanced viruses from accessing and corrupting your company's data.

    How do validate that your cyber strategy is as watertight as it could be. In this webinar you will learn about FireEye Mandiant solutions to efficiently help you maintain an on-going process to combat configuration drift, effective control, rationalisation and optimisation.
  • Transform your data centre: Technology & Trends impacting data centre strategy
    Transform your data centre: Technology & Trends impacting data centre strategy
    Ciaran Forde | EATON Data Centre & ICT Market Leader | EMEA Region Jun 2 2020 9:00 am UTC 60 mins
    Transform your data centre with optimisation across both the data (or IT network) and the electrical domain.

    Join Ciaran Forde in the first of our “Eaton Data Centre Webinar Series” to learn how you can Transform Your Data Centre.

    Key topics:
    • Data centre Technology & Trends
    • Data centre design & strategy
    • Make your data centre ready for Energy Transition
    • How to make your data centre function as a system
    • Importance of cybersecurity in data centres
  • Achieving Secure Autentication and Zero-Trust Security
    Achieving Secure Autentication and Zero-Trust Security
    Hed Kovetz Jun 2 2020 10:00 am UTC 59 mins
    In the new perimeter-less world, with countless users, devices and systems communicating with each other across on-premises and cloud environments, it is paramount to enforce secure authentication. But how do you achieve that? Most Multi-Factor Authentication (MFA) solutions rely on agents or proxies to monitor and control authentication and access. But proxies are only deployed between environments, without protecting access inside each environment, and deploying agents on servers or integrating with each application is an endless task – in some cases, impossible.

    Silverfort enables organizations to enforce secure authentication – including MFA, adaptive authentication and zero-trust – without deploying software agents or proxies, and without requiring changes to existing networks.

    Watch this webinar to learn:

    How to seamlessly extend MFA (including your existing MFA product) to any system, no matter where it is, or what it is – including homegrown/legacy apps, IT infrastructure, dynamic cloud environments, IoT devices and more.

    How to secure user-to-machine and machine-to-machine access (e.g. service accounts), as well as any administrative access
    Why traditional MFA won’t cope with Zero Trust requirements.
  • The Importance of IT in Merger/Acquisition Strategies
    The Importance of IT in Merger/Acquisition Strategies
    Ivan Rogissart - Sr. Manager, Sales Engineering, Zscaler Jun 2 2020 1:00 pm UTC 45 mins
    Mergers and acquisitions create a lot of business challenges, but this webinar will show you how to position the IT department as a strategic business partner during the integrations.

    As more businesses adopt Digital Transformation strategies, M&A synergies are more and more related to IT. According to McKinsey, IT could represent up to 60% of the total M&A synergies (including direct IT ones and IT-enabled ones).

    Cloud Applications (SaaS, PaaS and IaaS) are often perceived as a way to accelerate the IT integration. Adopting a Secure Access Service Edge architecture will also add a lot of flexibility and agility to match the "100 Day" milestone.

    In this webinar, we will explain how SASE solutions can help enterprises execute their M&A strategy in a more secure, reliable and faster way.
  • Demystifying Zero Trust
    Demystifying Zero Trust
    Greg Iddon Jun 2 2020 2:00 pm UTC 25 mins
    Everyone seems to be talking about Zero Trust these days and how it's the future of cybersecurity but what even is Zero Trust and how does it work?

    Join us on the interactive webinar as Sophos expert Greg Iddon cuts through the jargon and marketing to explain what Zero Trust is, in a nutshell, and how to start your own journey towards a Zero Trust architected network.
  • How to Transform Your Wide Area Network with SD-WAN
    How to Transform Your Wide Area Network with SD-WAN
    Shamus McGillicuddy, Research Director, EMA Jun 2 2020 2:00 pm UTC 59 mins
    What are the considerations, trade-offs, and keys to maximizing the impact of your WAN transformation project?
  • Intelligent Traffic Management with 5G leveraging OpenNESS
    Intelligent Traffic Management with 5G leveraging OpenNESS
    Chelladurai Adisesh, 5G Architect and Shailesh Prabhu, Senior 5G Developer at Wipro Limited Jun 2 2020 3:00 pm UTC 60 mins
    The webinar discusses detection of traffic rules violation using the Edge capabilities of the OpenNESS platform.

    There are a variety of possibilities emerging from the edge automation platform, and so this concept has been developed leveraging the OpenNESS platform.

    The enables simplification of application lifecycle in 5G-MEC node with OpenNESS - Intelligent Traffic Management.
  • Going Remote: Innovations for a productive workforce
    Going Remote: Innovations for a productive workforce
    Meghana Patwardhan, Vice President and General Manager, Dell Latitude and Education, Commercial Client Solutions Jun 2 2020 3:00 pm UTC 29 mins
    As companies around the world have expanded remote work policies, the devices being used at home are even more important. In this webinar, find out about innovations from Dell Technologies that enhance collaboration and help workers stay productive. From the smallest, lightest and most intelligent business PCs to expansive displays – everything you need to keep remote employees productive.
  • A successful CMDB deployment in five essential steps (Part 1 in CMDB series)
    A successful CMDB deployment in five essential steps (Part 1 in CMDB series)
    Steve Emerson, Jason Miles, and Lisa Wolfe of ServiceNow Jun 2 2020 3:00 pm UTC 58 mins
    Join Part One in our three-part series on keeping your CMDB healthy. You’ll learn:

    The five steps to deploying a CMDB successfully
    Why AIOps is an ally in preventing business service issues
    How to master the CI identification process
  • Arm Mini Webinar Series: A Deployer's Route to IoT at Hyperscale
    Arm Mini Webinar Series: A Deployer's Route to IoT at Hyperscale
    Phil Skipper, Brian Russell, Avishay Shraga, Hima Mukkamala, Pete Swabey & Bob O'Donnell Jun 2 2020 4:00 pm UTC 60 mins
    Webinar 2: From Complicated and Costly to Out-of-the-Box and Easy
    Join experts from Vodafone, Flex, Atos, Cypress (An Infineon Technologies Company), Altair Semiconductor, Arm and The Economist to learn more.

    The current crisis is showing us the importance of precise and reliable data. It has highlighted how thinking it's obvious what's in a box marked 'PPE' and being certain of its contents can be at odds. How vital it is to track production line operations in real-time when stoppages cannot be tolerated, and how data-driven processes across any system can be fine-tuned when every element of the system is connected and manageable. It's not a test anyone wanted to see but we are now seeing the true potential of a global IoT, and the data-driven insight and actions it can enable.

    But driving a pervasive IoT to take connected industries, businesses and people to the next level of value and control is not simply a case of deploying more devices. Considerations such as clearly defined objectives, security, component interoperability, speed to market and turnkey vs tailored solutions are all areas that must be tackled before embarking on a commercial IoT journey.

    Join two webinars with industry experts at the cutting edge of IoT evolution debating what they think happens next. How they imagine the vision of a Hyperscale IoT can become a reality.

    Hear how costs are being driven out of IoT deployments with new connectivity tools and ways to speed time to market while reducing materials bills. How IoT can become an affordable and easy option for all.

    Panelists:

    Mobile Network Operator Vodafone's Head of IoT Strategy, Phil Skipper

    IoT system integrators Atos's IoT Solution Architect Brian Russell

    Semiconductor company Altair's Head of Security Technology Avishay Shraga

    Arm's General Manager of its Pelion IoT Platform Hima Mukkamala

    The Economist Intelligence Unit's Editorial Director Pete Swabey

    With panel moderator Bob O'Donnell from analyst firm TECHnalysis
  • Operationalizing Network Security with NSX Intelligence
    Operationalizing Network Security with NSX Intelligence
    Ray Budavari, Sr Staff Technical Product Manager Jun 2 2020 5:00 pm UTC 55 mins
    VMware NSX is our software based networking and security platform that is built on several core principles including:

    - Distribution of services as close as possible to the workload
    - Centralized Management with all services from L2-L7 provided though a consistent UI/API
    - Rich workload context that extends beyond 5-tuple flow information and into application, user and process awareness.

    Now with NSX Intelligence we are delivering a new distributed analytics engine that builds upon these foundations in NSX. NSX Intelligence uses a lightweight architecture that enables the rich context to be stored in a Data Platform for retention and historical analysis. This allows us to provide deep visibility into traffic flow and security posture of your workloads across the entire environment. In addition NSX Intelligence uses analytics to provide automated security policy recommendations for rules, groups and services.

    This webinar will show how NSX Intelligence makes it easy to implement granular micro-segmentation making the Zero Trust security model a reality. We will also cover how NSX Intelligence will work together with vRealize Network Insight.