Network infrastructure professionals understand that a reliable and secure infrastructure is crucial to enabling business execution. Join the network infrastructure community to interact with thousands of IT professionals. Browse hundreds of on-demand and live webinars and videos to learn about the latest trends in network computing, SDN, WAN optimization and more.
The Digital Workplace is quickly becoming a critical initiative for today’s modern enterprise. To keep pace IT and business leaders must not only stay ahead of the competition but must now reassess how their greatest assets - their employees, work and collaborate.
Watch our OnDemand webinar and discover how smart, modern workspaces can bridge the physical and digital environment with actionable intelligence to further improve team productivity and effectiveness while boosting resource efficiency, productivity and reducing costs.
Topics
- Overview of current trends in the workspace
- Challenges faced by employers and employees
- Aruba Intelligent Edge solutions
- Analytics and how to improve workspace utilisation
Как просто работать с нарастающими объёмами фаловых данных? Присоединяйтесь к обзору новой платформы Isilon Gen6. Вебинар проводится при поддержке компании Intel®
Microservices aren’t for every organization, but if you know what to expect and prepare accordingly—and if you pair them with Docker containers—they can bring unprecedented agility and scalability to application development and deployment, especially in large, complex projects where speed is crucial and small errors can be disastrous.
In this high-level presentation geared toward executives and other decision-makers, Parminder Kocher, author of the newly published book, Microservices and Containers, will break down these potentially game-changing technologies. First, are they right for you? Making the switch to microservices is a large undertaking with a steep learning curve, both operationally and culturally, so it's crucial to assess the risks before taking the plunge. Second, what should you expect if and when you decide to move forward with the shift? Kocher draws from his own personal experience to help you with the transition. By the end of the presentation, you should have a good idea how microservices—especially when paired with Docker containers—can bring unprecedented agility and scalability to application development and deployment, especially in large, complex projects where time to market and scalability are paramount.
About the presenter:
As the Engineering Director for the Cisco Networking Academy, Parminder currently leads the team responsible for developing the Academy’s platform, which is accessed by 1.5 million students in 180 countries. In addition to bachelor’s and master’s degrees in computer science, Kocher has an executive MBA from Baylor’s Hankamer School of Business, an executive certificate in strategy and innovation from MIT’s Sloan School of Management, and a certificate in Professional Coaching from iPEC, an International Coach Federation (ICF)-accredited coaching training program. His first book, Microservices and Containers, was published by Addison-Wesley earlier this month.
This webinar demonstrates Verizon Virtual Network Services (VNS) end to end automated provisioning process. Based on a recording conducted in our Tulsa lab environment, two virtual services (routing and security) are provisioned in around five minutes on to a white box uCPE device, giving an overview of the available tools, the user experience, and some highlights and benefits of the VNS product offering.
The SNIA Swordfish™ specification helps to provide a unified approach for the management of storage and servers in hyperscale and cloud infrastructure environments, making it easier for IT administrators to integrate scalable solutions into their data centers. Swordfish builds on the Distributed Management Task Force’s (DMTF’s) Redfish® specification using the same easy-to-use RESTful methods and lightweight JavaScript Object Notation (JSON) formatting. Join this session to receive an overview of Swordfish including the new functionality added in version 1.0.6 released in March, 2018.
As Enterprises transition to online data-driven transactional business models, the need to support more customers and users at scale, typically means massive investments for Oracle database licenses and the supporting data infrastructure. But most enterprise infrastructure is not optimized to maximize the performance of CPUs in their database servers resulting in wasted resources and poor utilization of these expensive Oracle licenses. Are the bottlenecks in their current infrastructure well understood? With a plethora of solid state storage options available, do infrastructure architects know how to effectively evaluate and select the best storage platform to reduce Oracle TCO?
The key to optimizing your Oracle infrastructure spend is the focus of this webinar where Vexata solution architects will address some of the common misconceptions related to scaling Oracle ecosystems using case studies and best practices to deliver massive performance improvements and realize significant cost savings.
You will learn about:
•When and how to tune various infrastructure options available to an Oracle DBA
•How to maximize database performance including how to optimize CPU cores based on deploying solid-state storage systems.
•Best practices for Oracle evaluation and benchmarking tools including SLOB2, IO Calibration, and Orion
Looking for more cost-effective ways to implement fibre channel cabling? Learn why proper cabling is important and how it fits into data center designs. Join this webcast to hear FCIA experts discuss:
- Cable and connector types, cassettes, patch panels and other cabling products
- Variables in Fiber Optic and Copper Cables: Reflectance, Insertion Loss,
Crosstalk, Speed/Length Limitations and more
- Different variations of Structured Cabling in an environment with FC
- Helpful tips when planning and implementing a cabling infrastructure within a SAN
To simplify the development process, microservice development is increasingly being conducted using containers. However, the picture is not always rosy, especially in an enterprise environment where both old and new processes must be managed simultaneously and elegantly in order to avoid chaos.
This session will review the top issues that must be addressed when making this transition--including development, operations, and even the finance department--with a focus on microservice development in hybrid cloud environments.
About the presenter:
Robert Starmer is a cloud advisor and the founder of Kumulus Technologies. At Kumulus, Robert and his team provide infrastructure-focused DevOps, systems reliability engineering, and cloud computing consulting, enabling companies at all levels to optimize their cloud usage. He also uses his more than 20 years of experience in cloud, SRE, and DevOps to educate the industry through articles, presentations, and curriculum development. Robert is a Certified OpenStack Administrator (COA) and a graduate of the Rochester Institute of Technology.
Your IT department has its hands full keeping your day-to-day operations in check while working on new projects. They don’t have the time or often the expertise to integrate a new acquisition into your current IT environment. Ask yourself – could your company’s IT department completely integrate a new acquisition in less than 30 days?
In this quick 30-minute webinar, you’ll learn Accudata’s proven formula for success – and understand how IT can enable your M&A business goals. We will cover:
• Why IT departments struggle with business acquisitions
• How to prioritize IT integration tasks
• Accudata’s five-step proven process to make M&A less complicated
• Review a customer example that includes integrating 35 new sites and 600+ users into an existing organization in less than 30 days
Technology innovations, the intensifying march of digitization, the laws of accelerating growth are redefining economics across all industries. Artificial intelligence, cybersecurity, IoT, and 5G hold the key to adapting service provider networks to the digital ecosystem of the future. Creating business value is a key metric to digital transformation strategy and execution.
Join Red Hat and Intel to learn how Communication Service Providers’ are leveraging open source technologies in their open telco transformation journey.
In 1997, the world was introduced to 802.11 “WiFi” and within a couple of years, it became a business networking staple. At the time, few would have foreseen that WiFi would become the dominant way we connect at home, work, and play today. As more of what businesses connect to is in the cloud, and more of what they are connecting is outside the office, 4G LTE is quickly becoming the next wireless revolution for connecting people, places, and things. This time, the revolution is in the WAN.
Just like the evolution of the 802.11 WiFi standard, which is on the cusp of 802.11ax, the world of LTE has evolved significantly since it was first deployed less than a decade ago. Today, cellular providers are already rolling out Gigabit LTE with plans to launch 5G in several other U.S. cities mid-year. Any business contemplating a refresh of their WAN in support of cloud and digital transformation initiatives needs to be thinking about the role of 4G LTE and 5G services. If history is our guide, your future WAN will be wireless.
Challenges driving next-gen WAN requirements:
• Branch continuity as more traffic is cloud and Internet bound
• Combined wired and wireless connectivity to accommodate growing
bandwidth requirements
• Accommodating the growing number of WAN endpoints outside the
branch
• Edge security and overall management implications
Cradlepoint is an industry leader in edge solutions for 4G LTE and 5G enabled networks. With the help of Spiceworks, Cradlepoint conducted a survey of over a hundred enterprise IT decision-makers in North America to assess the pervasiveness of 4G LTE within enterprise WANs today and uncover some misconceptions.
Join Todd Krautkremer, CMO at Cradlepoint, for a live webinar on April 19th, 2018 at 9:00 am PT to learn about how organizations are leveraging 4G LTE within the enterprise, WANs today, and the role advanced 4G and 5G wireless services will play in next-gen, software-defined WAN strategies.
Areas of Focus to Create a Successful SACM Practice
For Citizens Bank, major difficulties were encountered not just in implementing software itself, but in creating a sustainable and successful Service Asset and Configuration Management (SACM) practice. Come and learn 3 key areas to focus on to create and sustain a successful SACM process in order to:
- Provide robust reporting for audit and regulations
- Promote and maintain confidence in the quality of CMS data
- Provide ITSM users with the information they need, when they need it
Join us for the next upcoming SIG Talk on Tuesday, May 17, 2018: http://www.vivit-worldwide.org/events/EventDetails.aspx?id=1089263&group=.
Leading The Intelligent Operations with Micro Focus Operations Bridge (OpsBridge)
The management of IT Operations in a dynamic and highly scalable MSP environment can be difficult. With the right partner and strong expertise, you can be helped to lead in the “New”. Join Kulvinder Singh from Accenture as he discusses the deployment of OpsBridge as standard within their MSP Platform. Learn the objectives, scope, methodology, and results of their deployment, as Accenture continues to scale and mature this capability with the increasing number of their clients.
Join us for the next upcoming SIG Talk on Tuesday, May 17, 2018: http://www.vivit-worldwide.org/events/EventDetails.aspx?id=1089263&group=.
This Vivit SIG Talk session will feature 2 speakers who will share their vast knowledge and experience on SACM Practice and Micro Focus Operations Bridge. Vivit is excited to present this informative SIG Talk on these important topics.
Shown below is an outline of the agenda and topics:
Speaker: Bill Curran
Areas of Focus to Create a Successful SACM Practice: For Citizens Bank, major difficulties were encountered not just in implementing software itself, but in creating a sustainable and successful Service Asset and Configuration Management (SACM) practice. Come and learn 3 key areas to focus on to create and sustain a successful SACM process in order to:
- Provide robust reporting for audit and regulations
- Promote and maintain confidence in the quality of CMS data
- Provide ITSM users with the information they need, when they
need it
Speaker: Kulvinder Singh
Leading The Intelligent Operations with Micro Focus Operations Bridge (OpsBridge): The management of IT Operations in a dynamic and highly scalable MSP environment can be difficult. With the right partner and strong expertise, you can be helped to lead in the “New”. Join Kulvinder Singh from Accenture as he discusses the deployment of OpsBridge as standard within their MSP Platform. Learn the objectives, scope, methodology, and results of their deployment, as Accenture continues to scale and mature this capability with the increasing number of their clients.
Join us for the next upcoming SIG Talk on Tuesday, May 17, 2018: http://www.vivit-worldwide.org/events/EventDetails.aspx?id=1089263&group=.
Software drives the technology that enables communication, information, and automation in virtually every part of our personal and professional lives. Software also enables hardware technology companies to adapt their offerings to meet the evolving needs of the digital market.
Being able to offer flexible payment models, manage entitlements, control use, as well as track and aggregate product-usage data are just some of the top software licensing challenges affecting hardware technology companies today.
Gemalto took a closer look at how companies are or have integrated a software monetization strategy into their business processes. Using data we gathered from surveying 300 business decision makers in hardware technology companies, across five major global markets to highlight global trends and regional differences. In this webinar we share our findings.
SD-WAN is all the rage in enterprise networking these days. IT teams are excited about the opportunities SD-WAN creates to transform their WAN to become simple and agile, while improving security, and reducing costs.
As you review and look at your WAN challenges, we would like to share insights and takeaways, following hundreds of SD-WAN customer deployments worldwide, to better aid and inform your enterprise network decisions.
Form3 Chief Platform Architect, Edward Wilde, shares his experience of building a pure microservices architecture for real-time payment processing. Architecture includes Terraform, Docker, Vault, Consul, Linkerd and AWS: SQS, SNS, EC2, RDS.
Essentially these technologies enable high levels of availability, processing performance and continuous product deployment, all at a fraction of the cost of legacy software deployed in proprietary data centers. Even the most sophisticated challenger bank and Fintech’s have said this is a technology stack that they really want to have in the future!
About the presenter:
Edward Wilde is the Platform Architect at Form3, leading the development of a novel distributed payment system allowing connectivity, payment processing, clearing and settlement services for a wide range of regulated financial institutions, including leading banks and fintechs.
This is a CPE credit session in partnership with ITSPmagazine and (ISC)². Tune in for an in-depth look into the evolving cyber threat landscape with CISOs and top security experts. The panel will examine the latest cyber attack trends and provide recommendations for defending enterprises and SMBs.
Join top cyber security experts for an interactive Q&A roundtable discussion on the biggest threats targeting organizations in 2018:
- Lessons from recent cyber attacks and breaches
- What keeps CISOs up at night
- Biggest cyber security challenges and how to overcome them
Speakers:
- Chris Roberts, Chief Security Architect, Acalvio
- Nick Bilogorskiy, Cybersecurity Strategist, Juniper Networks
- Dan Lohrmann, Chief Strategist & Chief Security Officer, Security Mentor
- Joseph Carson, Chief Security Scientist, Thycotic
The session is being brought to you in partnership with ITSPmagazine and will be streamed LIVE from San Francisco during RSAC week.
In today's landscape, it seems businesses of every size and stripe are at risk of becoming targets of cyberattacks. From government agencies to hospitals, these businesses are increasingly victimized by ransomware attacks and data breaches. So, how do you defend yourself? What do you do when your IT staff lacks the expertise to investigate growing security threats and respond to them in a timely manner? How do you get help from security experts to prevent suffering a future breach?
Join the City of Sparks (NV) IT decision maker, Steve Davidek, to discover the security challenges faced by most governments and business organizations. Learn how an industry-leading security operations center (SOC)-as-a-service–the AWN CyberSOC–helped the City of Sparks vastly improve its threat detection and response.
In this webinar, we will explore:
- Key security challenges that plagued the City of Sparks
- Reasons why Sparks’ IT team chose our SOC-as-a-service solution instead of building one in-house
- How AWN CyberSOC™ with Hybrid AI improved Sparks’ threat detection and response by 10X
Don’t let your organization become a prime target. Register today!
About our key speaker:
Steve Davidek has worked in the IT division at the City of Sparks starting as a Computer Operator in 1984 and working in IT Operations for the next 30 years. He was appointed IT Manager in March of 2014.
Steve’s division is responsible for all Technology projects and budgeting. His team of 8 manages everything from Desktop support, Server Management, Networking, Security, and Systems. Development and Management for all departments at the city including Police, Fire, Public Works, Finance, Planning, City Management, Municipal Court and Recreation.
Great microservices applications are backed by strong APIs. But APIs are complex, and management solutions are expensive.
Here’s what you really need to know about routing microservices traffic, including:
-What is an API gateway?
-Where does your API management tool live in your stack?
-What new security concerns are being introduced by APIs and microservices?
-What problems can an API gateway solve on your journey from monolith to microservices?
Join this webcast with Charles Pretzer, Technical Architect, and Floyd Smith, Director of Content Marketing at NGINX as they answer these questions and more for migrating to a microservices architecture.
Eine vollkommen dem Corporate Layout und den individuellen Managementwünschen angepasste Echtzeitdarstellung von IT und non-IT KPIs – das bietet das Business Value Dashboard (BVD) als Bestandteil der Micro Focus Operations Bridge Suite.
Wir zeigen Ihnen in diesem Webinar an einigen Beispielen, wie solche BVDs erstellt und mit Datenkanälen zum Leben erweckt werden.
Do you have a burning question you’d like to ask about the GDPR? Now you have a chance to get an answer – straight from the experts. We’ll be hosting a live Q&A with a panel of GDPR experts. And with the clock ticking down to the May 25th deadline, this is a perfect opportunity to get the answers you need.
The discussion will enable you to successfully prepare for the GDPR by:
• Understanding its full implications for your organisation
• Identifying and tracking personal data, wherever it may be
• Implementing cyber security to protect your data systems
• Detecting and responding effectively to security breaches
• Building a GDPR compliance program for the long term
Get all your questions answered and ensure you’re ready for May 25th by joining our Q&A.
With exponential growth in ransomware during the last two years, we're all asking how to stay safe. In this presentation you will learn more about the different types of attack which are used to extort money, along with guidance on how to avoid them.
Join us for a 1 hour use-case driven training session on container forensics, postmortem analysis and error troubleshooting with the Sysdig open source tool, Sysdig Inspect.
In this session, we'll demo:
-How to troubleshoot a 502 Bad Gateway error on HAproxy
- A postmortem analysis to understand how a hacker broke into your containerized app
- How to do deep forensic analysis and understand how your system was breached and what data was taken
Veuillez nous rejoindre afin que l'expert sécurité de Gigamon, Pascal Beurel, vous révèle la raison pour laquelle les métadonnées réseau constituent un outil ultime ! Alors que les entreprises s'efforcent de suivre le rythme de la croissance du trafic en augmentant la vitesse des réseaux, elles sont en voie de perdre le combat face au cybercrime. Pourquoi ? La raison en est que les outils sont limités quant au volume de trafic qu'ils peuvent traiter de façon intelligente, tout en étant en charge de fonctions de plus en plus sophistiquées pour combattre des cyber-attaques toujours plus avancées et persistantes.
En conséquence, de nombreuses applications de sécurité s'avèreront inefficaces dans un avenir proche.
Entrez dans le monde des métadonnées, le nouveau super-pouvoir en matière de sécurité. En fournissant aux outils de sécurité des aperçus synthétiques des données circulant à travers les réseaux, ils peuvent devenir un outil puissant pour les entreprises cherchant à séparer les signaux utiles du bruit, à réduire le délai de détection des menaces, tout en améliorant l'efficacité générale de la sécurité.
Les participants apprendront :
- Comment la sécurité réseau s'appuie de façon croissante sur le contexte et l'intention.
- La raison pour laquelle les métadonnées réseau deviendront l'approche la plus simple et la plus compréhensible pour les analyses de sécurité.
- Comment la visibilité réseau sert de source unique d'informations concernant les applications, les utilisateurs et les terminaux.
Si la visibilité réseau et la sécurité sont importantes pour vous, vous ne voudrez pas manquer ce webcast !
Intel has been working with partners and with open source communities to address barriers to commercial containers-networking adoption and to deliver consumable capabilities concerning configuration, manageability, performance, service-assurance, and resilience. The container bare metal experience kits are a set of collateral introducing the newly developed open sourced consumable capabilities. The collection of all the container bare metal experience kits creates a library of best practice guidelines to address containers-bare-metal networking development and deploy-ability gaps. It includes a variety of documents and demonstrations targeting developers, product leads, and a sales and marketing audience.
In this talk, you will learn about the networking technologies delivered by Intel and partners, the experience kits that support these technologies and where you can go to download the collateral to support you.
May 25th, 2018 marks the date on which organizations must have identified and applied the required changes to meet the mandates of GDPR. Organizations must also update their networking and security processes to ensure that new violations are not introduced even after compliance is achieved. Regulatory compliance is no longer considered a snapshot of the network, but rather an ongoing processes that maintains continuous compliance and controls new risks.
This webinar offers insight from multiple interviews with data privacy attorneys and CISOs on how they are approaching GDPR beyond the immediate compliance deadline.
This webinar is part of BrightTALK's Founders Spotlight Series, where each week we feature inspiring founders and entrepreneurs from across industries.
In this episode, Doug Marschke will share his insight and expertise into the software-defined networking industry: what it means to found and run a consulting and managed services company, where the network industry is headed in the age of software-defined everything, and how to scale and grow a services organization in the hi-tech industry.
Join us for this live AMA where the audience will be encouraged to ask questions and engage directly with the panelists.
With more companies moving their data and apps to the cloud, do you know what security approaches your peers are taking? You know the threat landscape is constantly evolving, but do you know how your current cyber security defensive posture stacks up against those of your peers? In this live webinar, CyberEdge and Imperva will discuss the extent cybersecurity solutions are deployed in the cloud, on-premises or hybrid and other key insights from the 2018 Cyberthreat Defense Report.
Attend this webinar and learn answers to your most pressing questions:
•Do we have gaps in our cyberthreat defenses?
•How are my peers thinking differently about cyberthreats and the options for defending against them?
•How does our security spend compare to other organizations?
•Which security technologies should we be investing in next?
On March 21, the IETF approved the TLS 1.3 standard, which requires forward secrecy. This poses a problem for passive monitoring solutions because they will not be able to decrypt the traffic. In this webinar, you will learn about TLS 1.3's implications for enterprise performance and security monitoring, and how ExtraHop offers a novel method of decrypting traffic using ephemeral session keys without an inline deployment.
IT leaders agree that performance monitoring is absolutely critical to their success, yet the design and execution of a monitoring strategy can often be an afterthought. During this webinar, LogicMonitor and AWS will present the key components of a world-class performance monitoring strategy, along with a framework to improve monitoring effectiveness.
We'll cover best practices for:
Achieving visibility into the performance, availability, and cost of your cloud environment, and visualizing this alongside the rest of your hybrid IT infrastructure
Alerting on monitored data, and routing alerts to ensure that the right people are notified of issues
Leveraging dashboards and performance insights in order to reduce time spent troubleshooting
Over the past few years, hackers are increasingly choosing to utilize fileless malware as a highly effective alternative to malware attached to files. See how you can use modern technology to monitor the behavior of a system for malicious abnormalities and rollback systems to a previous uninfected state.
Join SonicWall & SentinelOne experts to learn how to stay safe from advanced threats like fileless malware.
1.Learn how the threat landscape has changed in the past three years.
2.Learn what fileless malware is and how to stop it.
3.Discover the difference behavior-based security makes.
Veränderungen in einem Rechenzentrum, wie z. B. ein geplanter Umzug, eine Umorganisation oder eine Migration aus anderen Gründen, sind für jedes Unternehmen eine Herausforderung. In der Regel sind Migrationsvorhaben zeitintensiv, riskant und fehleranfällig. In diesem Webinar zeigen wir Ihnen, wie Sie Data Center Transformationen, Serverkonsolidierungen und Servermigrationen sehr schnell bei minimalen Ausfallzeiten und maximaler Automatisierung abschließen.
Erfahren Sie, wie Sie
•mithilfe sicherer Datentransfers, Live-Transfers und Live-Tests das Risiko minimieren
•Workloads effizient und kostengünstig über teure oder langsame WANs migrieren
•durch die Micro Focus PlateSpin Multi-Plattform die Komplexität reduzieren
•Mehrarbeit abends und an Wochenenden vermeiden, indem Sie den Migrationsprozess automatisieren
Inkl. Live Demo: automatische Migration in eine virtuelle Umgebung.
Die richtige Verschlüsselungsmethodik ist kriegsentscheidend bei der Umsetzung der Verordnung. Auch im Micro Focus Service Manager werden personenbezogene Daten durch definierte Eingabefelder generiert.
Wie schützen Sie eines der wichtigsten Schätze Ihres Unternehmens – Ihre Kundendaten?
Nutzen Sie die EU-DSGVO zu Ihrem Vorteil durch den Einsatz der richtigen Werkzeuge und die rechtzeitige Umsetzung.
Zusammen mit unserem langjährigem Partner bizcon haben wir eine Lösung entwickelt, die Ihnen eine nahtlose Integration in Ihren Service Manager erlaubt – und dies unabhängig von Ihrer IT Infrastruktur und Applikationslandschaft.
A common approach for addressing a security initiative is to make assumptions about the underlying problem that needs to be solved. Too often, those assumptions are incorrect. In those cases, security practitioners end up wasting resources with little to show for it.
Join Fernando Montenegro, Senior Analyst at 451 Research, as he presents an alternative framework for evaluating the fundamental issues that may hinder an initiative’s progress in a specific scenario. This framework allows practitioners to consider whether the issue is driven by incentives, information, investment, or irrationality which will help determine the appropriate path for addressing them in the context of security. With this knowledge, the security practitioner can tackle the problems with confidence and make real progress in their environment.
Heutige Geschäftsprozesse zeigen eine drastisch wachsende Zahl von Anwendungen inklusive einer gestiegenen Frequenz von Softwarereleases. Angriffe auf Anwendungen sind nach wie vor der Hauptvektor für Datenschutzverletzungen. Dies macht das Absichern von Applikationen zum wichtigsten Punkt. Das Sicherstellen Ihrer Anwendungen muss nicht die Produktivität Ihrer Entwickler und Ihre Innovationen verlangsamen. Erfahren Sie, wie Sie Ihre Anwendungen auf eine sichere Weise entwickeln können indem das Thema Anwendungssicherheit von Anfang an, basierend auf verschiedenen Lösungsansätzen von statischen zu dynamischen Testverfahren bis hin zu einem Schutz während der Laufzeit, berücksichtigt wird. Alle Teilnehmer erhalten einen kostenlosen Guide zum Thema Anwendungssicherheit.
Are you using automation from Tufin yet? Are you still wondering how automation can make your life easier?
Join Hadas Lahav, Product Management lead for automation, and Maya Malevich, Director Product Marketing, to learn about the latest and greatest in Tufin Orchestration Suite R18-1:
•Automated process for rule recertification
•End-to-end change automation for Cisco Firepower (and a new migration solution)
•New automation triggers for advanced customizations
•And much more…
The May deadline for GDPR is approaching fast – and companies that don’t have a solution will face stiff fines. Businesses need to understand the different categories of data, how data is stored, how it moves throughout an organization, and what technical measures they need to take to ensure they are compliant.
In this 30-minute webinar, GDPR-certified expert Paul Kendall will explain:
- Critical steps to achieve compliance
- What companies need to protect
- How to protect data that lives inside the EU and how to access that data outside the EU
- Why Forcepoint's GDPR solution is unique
- What different data breaches mean for GDPR fine activity and how to minimize your chances of losing data
Modern architectures and design patterns challenge developers, security, and operations in a whole new way. Instead of developers building and handing to security for testing, today’s developers are a key part of the security team - and vice versa.
In this Modern Security Series episode, we look at how security:
* Shifts left - earlier into the development cycle
* Shifts right - integrating with operations
* Adapts to enable app and service owners to respond faster to threats
Inline security tools operate by actively preventing threats in your network, but deploying and optimizing these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade. The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges. Join Gigamon and (ISC)2 on April 26, 2018 at 1:00PM Eastern for Part One of a Security Briefings series where we will examine how inline bypass can overcome physical deployment obstacles, maximize network availability, increase the scale of inspection and reduce the impact to network performance.
Cybercrime’s threat to small and medium enterprises (SMEs) continues to grow, and legacy security solutions no longer deliver adequate protection. This environment is pushing an increasing number of companies to explore advanced threat detection and response strategies, including in-house Security Operations Centers (SOCs). However, the budgeting stage of SOC planning often delivers a nasty case of sticker shock—and companies that push through find that SOC costs can exceed even pessimistic projections.
In this webinar we’ll explore the factors that drive surprising SOC costs:
- Cybersecurity skills shortage
- Staffing for risk
- Hidden product requirements and pricing
To see how a new category of SOCaaS solutions can help businesses control these costs while achieving advanced cybersecurity, register now!
If you expect to keep up with the rate of change that new app development practices demand, you’ll need to automate your critical application security and delivery services. Naturally, there is more than one way to automate your app services and choosing the right option can be challenging. In this webinar, we will look at three ways of automating application delivery services and discuss which to use when. At the end of this webinar you will have gained the knowledge to help you chose the right automation solution for your business.
Goulston & Storrs, an AmLaw 200 law firm based in Boston, has enhanced the security of their critical applications and of client data by adopting the zero trust model.
Senior Infrastructure Manager Matt Finnigan will speak about how Goulston & Storrs has used Edgewise Networks to gain visibility into their application topology, bring protection closer to the workload, and simplify policy building with machine learning.