Network infrastructure professionals understand that a reliable and secure infrastructure is crucial to enabling business execution. Join the network infrastructure community to interact with thousands of IT professionals. Browse hundreds of on-demand and live webinars and videos to learn about the latest trends in network computing, SDN, WAN optimization and more.
In the early days of aviation, flight instrumentation made it safer to fly in bad weather. Today, cloud computing is taking off and revolutionizing how applications are built and delivered. But while these technologies offer new possibilities, they also can obscure visibility and make it much more difficult for IT Operations teams to detect security threats and diagnose the root cause of performance issues.
There is hope: the network remains the common denominator for all applications and provides a source of real-time insight across hybrid, multi-cloud environments.
In this webinar, IDC Research Director Brad Casemore and ExtraHop’s Director of Solutions Architecture, Eric Thomas, discuss how organizations can tap into network communications and maintain visibility for security and performance.
When you employ Citrix® application and desktop virtualization solutions, end users rely on these solutions constantly to get their work done.* However, while ensuring these Citrix deployments deliver optimal service levels is critical, it’s also challenging as many components and complex interrelationships have to be tracked and managed. Join us for this demo to see how you can leverage CA Unified Infrastructure Management to get comprehensive visibility into Citrix solutions and underlying environments.
The CA Technologies Level Up Your Infrastructure Experience Demo Series Giveaway is a random drawing contest is open from November 28, 2017 to February 16, 2018 at 11:59pm EST. Please read the Official Rules in entirety at http://transform.ca.com/rs/117-QWV-692/images/CA%20UIM%20--%20Level%20Up%20Demo%20Rules%20.pdf.
Public cloud services are being adopted by organizations of all sizes. To maximize the value of cloud computing, you need to go beyond the simple metrics provided by public cloud service providers and monitor it in the context of its on-premises infrastructure. Join us for this demo to see how you can improve performance, utilization and adoption of public cloud services such as Amazon Web Services and Microsoft Azure with CA Unified Infrastructure Management (CA UIM).
With major breaches exposing the personal information of hundreds of millions of Americans and disruptive ransomware attacks shaking the world in 2017, we'll examine the lessons learned from these events as a guide to shape CISO strategy for 2018.
This interactive Q&A panel with security industry experts will explore:
- The biggest threats on the horizon
- Key vulnerabilities and how to protect against them
- Measures for breach prevention, detection and response
- Which areas to focus on in 2018
- Recommendations for CISOs
- Diana Kelley, Cybersecurity Field CTO, Microsoft
- David McGuire, CEO, SpecterOps
- Ashton Mozano, CTO, Circadence
- Mark Weatherford, Chief Cybersecurity Strategist, vArmour
- Jon Green, VP and Chief Technologist for Security at Aruba, a Hewlett Packard Enterprise Company
Public clouds provided by services like AWS and Azure continue to surge in popularity with organizations small and large. However, the security of these services and how the responsibility for it is shared can be murky. Organizations want to assure that the public cloud is being used properly by everyone in the enterprise and to run mission-critical applications while meeting compliance and security controls. Join Gigamon and (ISC)2 on Thursday, December 14, 2017 at 1:00PM Eastern for a roundtable discussion on public clouds and the shared responsibility model and how that can help to secure and protect your organization.
In the DevOps-era, security looks different. Hear from security experts Alex Rice, Co-founder and CTO at HackerOne, and Zane Lackey, Co-founder and CSO at Signal Sciences as they explore how security has changed in today's environments of fast, continuous development and regularly shifting business requirements.
Responding to the need for an application delivery controller to be fully dynamic, HAProxy Technologies invested a lot of resources into developing HAProxy’s Runtime API and the LB-update module. In this webinar, we will demonstrate the abilities of the Runtime API which enables you to change the behavior of your application delivery controller on-the-fly.
What you'll learn:
How to dynamically scale your server farms
How to perform maintenance on your servers
How to change routing policies
How the LB-update module can be used to dynamically update ACLs and maps by pulling a file from one central place
With SD-WAN, you can focus on your applications and not your network. With integrated visibility and simple centralized policy definitions, NetScaler SD-WAN provides a secure and reliable network for a hybrid and multi-cloud world, enabling a simple and systematic transition of applications to the cloud.
What you will learn:
• How to use SD-WAN to connect securely to Azure and AWS directly from branches and retail locations
• How to secure data in transmit across the virtualized WAN using IPsec data encryption
• What management tools are available to provide visibility and control of the network and applications
• How NetScaler SD-WAN is paired with XenApp and XenDesktop to provide optimal performance and visibility
• Easily roll-out SD-WAN to all locations with zero touch deployment service
2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.
Join us for our webinar on Dec. 14, 11am GMT, as Jens Monrad, Senior Intelligence Account Analyst with FireEye, discusses various aspects about the cyber threat landscape in the EMEA region in 2018, including:
•Continued political tension in the region
•Mixed security maturity
•The effect of new compliance and data protection laws
Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
Digital transformation is changing the business world. Your customers expect a seamless application experience and the cloud is a key component in your ability to meet their expectations.
Are you an F5 customer that has an upcoming refresh? Are you convinced that expensive proprietary hardware is your only choice? Are your developers employing load balancers in the cloud, decreasing the need for hardware? Are you struggling to balance how much hardware you should buy now to minimize obsolescence as you move workloads to the cloud?
If you answered yes to any of these questions, then this webinar is for you!
Join this webinar and learn:
• Why customers are not convinced that F5 is the right choice for them
• Common enterprise application delivery use cases
• Why Citrix NetScaler is gaining popularity amongst former F5 customers
As more organizations move to public cloud service providers, they expect the same level of automation and self-service from their data centers. Ranging from network configuration and provisioning virtual network resources to self-healing networks, network automation is fast becoming a top priority for efficiency and productivity for many organizations.
In this webinar, we’ll offer a framework that shows how network automation can change the way you do business. Using TripleO to deploy an OpenStack® lab environment and Ansible to manage the cloud resources, you’ll learn how to:
- Develop an automation strategy that includes network discovery and configuration auditing.
- Adopt a holistic approach to configuration and workload management.
- Automate new network device provisioning.
- Integrate existing orchestration tools and systems with Red Hat® Ansible Tower.
- Provide a better way for teams to deploy and manage their own workloads.
A site reliability team investigates why they were blacklisted from a Google API. Misconfig? DDoS? Turns out it was an accident caused by the team's engineering interns, who wrote a bad script. Another team quickly located and eradicated spambots lurking in their infrastructure cloud -- after months of the bots evading basic detection methods. How did these teams make these discoveries? Flow data.
Flow data is now often paired with many other data sets, including BGP, geolocation, and business metadata, for network and security intelligence. The availability of open source and commercial big data technology and scale-out computing clusters makes it possible to realize the value that flow data has always promised, but never delivered in the past -- with use cases across sophisticated, accurate, and useful anomaly detection and alerting, as well as ad-hoc, exploratory analyses. In this webinar, Kentik's Jim Meehan, head of product marketing, will discuss real-world examples of network performance, anomaly detection, and forensic mysteries that were quickly solved via flow data. He will also cover current best practices for leveraging flow data.
The healthcare industry is experiencing a surge in transformative new technologies, and introducing telemedicine, more networked devices (Internet of Medical Things), and increases in protected EMR transmissions over Wi-Fi to enable better treatment, productivity, and communication within healthcare facilities. While they contribute to better overall outcomes - they can also open the door to new cyber security risks that need to be addressed with comprehensive security measures.
Join Director of Product Marketing, Tracy Hillstrom, and Director of Product Management, Ryan Orsi, as they review the risks and the strategies to protect privileged information and support your compliance activities in Healthcare. You'll learn how medical providers can defend against malware with a cyber security “Rx” that supports a healthy technology adoption plan for every healthcare organization.
It’s no secret that IT compliance management requirements are on an upward spiral. From growing and ever-changing external regulatory policies to tightening internal requirements, getting a complete view across the infrastructure is a major challenge, let alone proving it’s in a compliant state. Micro Focus Data Center Automation addresses these obstacles, providing a single solution for internal and regulatory compliance across heterogeneous servers, database, and middleware.
Join us to see:
Product in action including the new simplified portal for compliance use cases
New risk and security dashboards that give you ultimate visibility into the state of compliance across the entire data center
With offices in 30+ countries, a de-centralized network infrastructure, and a company-wide migration to cloud applications, the existing mix of MPLS and internet across sites was hugely limiting to Stolt-Nielsen’s future growth strategies.
Of major importance was moving to a platform that connected Stolt-Nielsen’s entire network to the same applications no matter where offices were located, guaranteeing that those applications were always accessible, and provided a high-quality experience for all users.
Stolt-Nielsen was using Office365, Skype for Business, and file replication across the entire organization and wanted every user to have the same experience regardless of location. Stolt-Nielsen turned to VeloCloud Managed Service Provider, Videns, to re-think its network strategy and transform the WAN.
In this webinar, Stolt-Nielsen and Videns discuss the benefits they were looking to achieve, what the alternative solution evaluation process looked like, and the results attained with a new infrastructure.
First in the Industry to deliver Deception, Mobile Threat Defense, and Endpoint Detection and Response (EDR) in a Single-Agent Architecture. Join us to learn the latest Evolution of Endpoint Security & Data Protection:
•Defend against ransomware with multi-layered protection
•Gain enhanced visibility into suspicious files via tunable protection to make better policy decisions
•Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
•Extend advanced security to mobile devices
•Use deception techniques to expose hidden adversaries and determine their intent to improve security posture
•Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
New Integrations Extend Data Protection Beyond Traditional DLP
Powered by the industry’s leading data loss prevention technology, to give you greater visibility and control over your confidential data.
•Expanded Information Centric (ICE) Encryption integration
•Enhanced data classification integration
•Sensitive Image Recognition
•Stronger endpoint controls
•Enhanced data at rest discovery
•Improved cloud app policy and incident management
•Flexibility on cloud deployment
•And More …
Join Symantec and (ISC)² on Dec 13 at 14:00 (Hong Kong time) and learn about the latest Evolution of Endpoint Security & Data Protection.
In this last of a 3 part webinar series presented by Greenlight, Micro Focus Product Management and Greenlight group will provide an overview of the current state of IT Operations Management technologies running on enterprise grade cloud native technology stacks. Join us, and come up to speed as the experts provide a high level overview of Network Operations, Hybrid Cloud, and Datacenter Automation suites from the Micro Focus ITOM portfolio running in a Docker & Kubernetes orchestrated environment.
Securing your healthcare organization goes beyond investing in technology to secure your devices, data, and applications. In today's complex digital healthcare environment, your healthcare workflows broaden your risk exposure by interacting with multiple apps, devices, and users spread across multiple geographies. Securing these interactions and all of the components within these workflows requires investing in a comprehensive cybersecurity ecosystem that is more focused on business objectives and less focused on securing individual applications and devices.
This webinar will discuss the pieces of a cybersecurity ecosystem model, and how this type of model requires policies, processes, and technologies that allow your healthcare organization to take a more proactive approach to risk management and security.
Organizations in most any industry are feeling increasing pressure to move fast. But at what cost? Some have learned the hard way that skipping crucial processes, like testing, damages performance and impacts customer sentiments on your brand. In this case, the fast time to market becomes meaningless.
Smart businesses are adapting to a shift left strategy. These teams are learning how to incorporate testing early and often in the release cycle, supporting business requirements to move fast while ensuring high-performing products and quality. But getting there isn’t easy. In this webinar, we’ll cover:
•Testing tools: tool choice is important. Not all tools have been designed to support this new paradigm.
•Integrations: to be effective, testing tools must integrate easily with the tools and processes modern teams use, including CI/CD and APM products. Further, these tools must be very easy to use, specifically for developers.
•Organizational models: shifting left requires changes to traditional organizations and culture. We’ll share insight into the successful models we’ve seen.
Network Operations and Analytics from CA Technologies and Netrounds Active Testing and Monitoring wins EMA 2017 Networking Innovator Award
Join EMA Senior Analyst, Shamus McGillicuddy and a panel of Predictive Network Analytics experts from CA and Netrounds as we discuss:
• Why predictive network monitoring is needed now more than ever when considering network transformations to compete in the digital age.
• Gained insights from active testing and monitoring with the operational insights provided by CA to predict network performance in SDx environments.
• Solve the enterprise network operations blind spots caused by hybrid cloud environments for proactive problem resolution and enhanced issue isolation.
• Leverage automated service validation and active ongoing monitoring to maximize the customer experience and end-to-end service quality.
On May 12 2017, a new variant of the WannaCry ransomware (Ransom.Wannacry) suddenly appeared, infecting thousands of computers worldwide within a matter of hours.
It was a new and particularly dangerous form of threat because of its ability to self-propagate and spread itself across an organization’s network and on to other organizations via the Internet.
The ransomware landscape has shifted dramatically in 2017 and organizations bore the brunt of the damage caused by new, self-propagating threats such as WannaCry and Petya. These outbreaks caused global panic and caught many organizations off-guard, with infections spreading rapidly across corporate networks.
The impact of these incidents will not go unnoticed on the cyber crime underground and it’s likely that other groups may attempt similar tactics. Because of the nature of these attacks, organizations are particularly at risk. Businesses need to educate themselves about this new avenue of attack and ensure they have defenses in place.
Symantec experts recommend adopting a multilayered approach to minimize chances of infection. This strategy includes protecting against ransomware in three stages:
1. Prevent – Preventing infection is by far the best outcome so it pays to pay attention to how infection can be prevented.
2. Contain – In the event of a payload arriving on a computer, a critical step is to limit the spread of the attack.
3. Respond – Contact Incident Response experts, back up important data, and never pay the ransom.
Join us for a discussion about the current state of ransomware and learn the strategies and the technologies for effective protection against ransomware and unknown threats.
Transformational. Impactful. Defining. All of these words have been used to describe service virtualization – a technology so powerful that software engineering teams across the globe rely upon it to help protect their brand and their business.
At 10 years old, service virtualization is now an established technology that has proven its value by:
•Giving software engineering teams unrestricted access to incomplete or unavailable services to complete their tasks in the software lifecycle
•Reducing defect reproduction time
•Reducing the number of defects and increasing test coverage.
Join Theresa Lanowitz, founder of industry analyst firm voke and author of the leading research on service virtualization and its impact in the enterprise, and Nate Lee Director of Product Management for Service Virtualization at CA Technologies to learn about why service virtualization is an absolute must for any organization that wants to compete in the digital landscape and about what service virtualization can do for software engineering teams in the future.
Deliver Production-like Environments Early in the Dev/Test Lifecycle
As a growing number of financial enterprises look into adopting Cloud and DevOps, environment complexity is often cited as one of the top barriers for such initiatives. Focusing on a Shift Left philosophy to deliver production-like environment access early on in the dev/test lifecycle can tremendously increase quality, cut down the cost to fix issues and, more importantly, increase innovation speed. This webinar will cover an example of using cloud sandboxes for allowing access to authentic replicas of production environments, allowing financial firms to focus on release software faster without sacrificing security and compliance.
Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2014.
APT34 are involved in long-term cyber espionage operations largely focused on the Middle East. This threat group has conducted broad targeting across a variety of industries, including financial, government, energy, chemical, and telecommunications.
Join us in a live webinar as we discuss this threat group whom we assess to be working on behalf of the Iranian Government, with a mission that would benefit nation-state geopolitical and economic needs. APT34 uses a mix of public and non-public tools, often conducting spear phishing operations using compromised accounts from trusted third parties, sometimes coupled with social engineering tactics.
Register today to gain deeper insights into this threat group!
Cybersecurity disasters dominated the news in 2017. WannaCry alone bashed hundreds of thousands of targets. Now is the time for CIOs and CSOs to scrutinize multiple components of their security because, let’s face it, attackers are busy working up new creative ways to hijack your data in 2018.
Attend this webinar to learn what it takes to build an in-depth defense. This straightforward presentation will cover:
• Security KPIs with risky validation processes (far more common than you think)
• A checklist of security points that need tight inspection (and where to drill down)
• New security services that streamline the process
This talk will explore the evolution of multimode fiber from inception to current time against the historical transceiver roadmap. We will explore various transceiver form-factors with respect to capability, technology risk, density and cost vs. fiber types that have been deployed (and those yet to be widely deployed). Both transceivers and supported fibers will also be discussed with respect to the evolution of standards that support them.
Attendees will earn 1 BICSI CEC.
Organizations continue to rapidly move their workloads to the cloud as they benefit from the flexibility and agility this can provide. However, many security processes become increasingly difficult to manage in a Shared Responsibility model. Top among these is vulnerability management which is the key to visibility into virtual and multi-cloud networks. Join Skybox and (ISC)2 on December 19, 2017 at 1:00PM Eastern for our final ThinkTank of the year where we will discuss how to better prioritize and manage vulnerabilities and the best way to provide visibility (and thus, context) into the physical, virtual and multi-cloud environments all organizations find themselves dealing with now.
Imagine you have been asked to design and operationalize a new data center network in two weeks. Previously, such a project would have taken six months. With AOS, you can comfortably complete all phases of this project on time without human errors:
• Design in minutes, using industry best-practice reference architecture
• Build configs in minutes
• Deploy configs in minutes
• Validate network state continuously
• Operate with closed-loop telemetry
The rapid, ongoing growth of IoT is opening exciting new opportunities for seeing, measuring, controlling, and profiting from actions that take place within enterprises. In fact, 69 percent of organizations have adopted, or plan to adopt, IoT solutions within the next year, according to Cradlepoint’s new State of IoT 2018 report.
That said, there’s a vast divide in the world of enterprise IoT between what businesses say they believe and how they plan to act.
Join Ken Hosac, VP of business development at Cradlepoint, for a live webinar on Dec. 20, 2017, at 8am PT, to explore brand-new data from the State of IoT 2018 report.
Webinar attendees will gain knowledge about:
— IoT perceptions & infrastructure preferences
— IoT adoption & implementation trends
— Solutions & best practices
This session will discuss the ongoing problem of identifying attackers who have successfully evaded prevention technologies such as firewalls, IPS and antivirus, otherwise known as prevention failure detection. It will focus on deception technology and its practical approaches to quickly detecting attackers already inside your network. Special attention will be given to working with SIEMs to validate alerts, as well as incident response and forensic procedures.
There are many considerations when it comes to choosing your fiber termination method – from the number of connections and the application being supported, to performance and overall required time to go live. While pre-terminated fiber solutions offer significant benefits in terms of factor-terminated performance and ease of deployment, they do require proper planning and predetermining of lengths, as well as longer lead times. Choosing a field termination method like fusion splicing or mechanical splice connectors comes with its own set of additional considerations, including cost, required skill set and labor efficiency. This webinar will examine the various types of fiber termination methods available today, providing pros and cons of each method and basic considerations to help you choose the fiber termination that’s right for your specific fiber deployment, including key questions to ask and termination time comparisons and analysis.
빠르게 진화하는 사이버 위협에 대해 보다 신속·효율적인 보호와 대응을 위해서는 IT 인프라 전반에서 가시성을 확보하고, 보안 사고를 탐지·조사·대응할 수 있어야 합니다. 현재 국내외 다양한 통합로그 분석 및 보안관제 솔루션이 존재하며, 이를 보통 가트너에서 정의한 SIEM(Security Information and Event Management)이라는 명칭으로 불리우고 있습니다. 본 웨비나를 통해서 국내/외 대형 보안관제센터에서 사용 중인 솔루션의 특징 및 고려사항 등을 파악한 후, 향후 관련 솔루션 도입을 검토하신다면 많은 시행착오를 줄일 수 있을 것으로 생각됩니다.
According to MarketsandMarkets, “more than 75% of businesses are planning to implement multi-cloud architectures within the next 2 years (2018–2019).” And with the rise of multi-cloud architectures, plans and budgets to employ micro-segmentation are on the rise too, to help protect against the lateral movement of an attack, its access to high-value assets, and its subsequent exfiltration of sensitive data.
But while ESG' research reports that already “68% of enterprise organizations use some type of software-based micro-segmentation technology” today, its implementation still presents challenges and fails to protect against today’s most pervasive assaults.
Specifically, today’s micro-segmentation solutions offer only simple, ACL-based control, failing to secure all layers of the protocol stack in a way that is also cost-effective and practical to operationalize, especially in newer and elastic, multi-cloud environments.
ShieldX Networks, a 2017 Gartner Cool Vendor in Cloud Security, will present a brief and instructional overview on the new criteria for effective micro-segmentation, including why micro-segmentation and security controls must work through Layer 7 to protect against advanced attacks, and how to evaluate a solution behind the hype to determine if the micro-segmentation product you plan to deploy will deliver the security you’ve been promised.
•Micro-segmentation state-of-the-union: What is it and how most IT organizations deploy it today
•Security challenges: What basic micro-segmentation does, and the compromises it misses
•Blueprint for effective micro-segmentation: Preventing the ‘confused deputy’ and its use in the spread of lateral attacks
Die Verlagerung von Testumgebungen in die Cloud bedeutet neue Chancen für Softwarequalitätssicherung und Entwicklungsabteilungen. Durch die deutlich verkürzten Bereitstellungszeiten können Softwaretests in kürzerer Zeit und damit termintreuer, aber dennoch mit höherer Testabdeckung durchgeführt werden. Die Nutzung der Cloud-Technologie für die Testautomatisierung stellt nicht nur eine Alternative zu Hosting und Virtualisierung dar, vielmehr bringt sie einen Quantensprung in Sachen Qualität und Zuverlässigkeit der ausgelieferten Anwendungen mit sich. Tests, die bisher selten durchgeführt wurden, weil sie zu aufwändig oder zu teuer in der Umsetzung waren, können in der Cloud nun mit deutlich weniger Aufwand und Kosten realisiert werden.
Mit StormRunner Functional (SRF) hat Micro Focus genau hierfür eine innovative Lösung auf den Markt gebracht, mit der funktionale Tests für Web-, mobile sowie SAP-Anwendungen einfach aus der Cloud heraus durchgeführt werden können. Die Vorteile auf einen Blick:
- EINE cloudbasierte Plattform für das manuelle, explorative und automatisierte Testen.
- Unterstützt agile Verfahren und Continuous Integration-/Testing-Initiativen.
- Sehr einfache und übersichtliche Bedienung – auch für Business- und Fachabteilungen.
- Keine Installation notwendig, SRF wird rein über den Browser aufgerufen.
- "Out-of-the-Box"-Bereitstellung von Testumgebungen unter Berücksichtigung der verschiedensten Kombinationen hinsichtlich Betriebssysteme, Browsertypen sowie deren Versionen.
- Nuzung von vorhandenen Skripten (UFT, UFT Pro (LeanFT), Selenium).
- Möglichkeit zur Erstellung und Verwaltung von automatisierten Testfällen direkt in der Cloud.
- Integration in agile Projekte über gängige CI/CD-Engines.
Erfahren Sie im Live Webinar am 11. Januar 2018 anhand von ausgewählten Use Cases und einer spannenden Live Demo alles über StormRunner Functional.
Seien Sie dabei und nutzen Sie die Gelegenheit, Ihre Fragen an unseren Experten zu stellen.
Security is a gating factor to cloud adoption that continues to hinder a businesses’ ability to maintain control and visibility across cloud applications. With increased compliance regulations such as PCI, HIPAA, and GDPR, is it truly possible to maintain compliance in the cloud?
Symantec is offering an opportunity to hear first-hand the challenges businesses face when adopting the cloud and adhering to compliance regulations.
Join us to learn how to enable safe cloud adoption while maintaining compliance.
• How to address security and compliance challenges when migrating to the cloud
• How to support GDPR compliance in the cloud
• Leverage a single data protection solution for email, storage, network, endpoints, and cloud
With the ever growing cyber threats organizations are facing and the rising adoption of traffic encryption - providing efficient and cost-effective protection is becoming a daunting task. Join us to learn about how you can better protect your organization’s assets throughout trending datacenter evolution.
In this webinar we will learn about:
i. Why SSL visibility is important
ii. What new challenges are we facing in SSL
iii. The importance of performance
iv. SSL in the age of virtualization
v. The impact of the evolving datacenter landscape on SSL requirements
AMAX's [SMART]DC Data Center Manager is the premier out-of-band DCIM solution for the modern heterogeneous data centers, to optimize efficiency and manageability while reducing operational costs and resource underutilization.
This webinar will cover:
•The Next Generation of Data Centers: High Efficiency Meets Scalability
•Streamline Heterogeneous Data Center Management with [SMART]DC
•Incorporate GPU platforms Seamlessly as Your Data Center Upgrades
•Achieve up to 30% in Power Savings for Your Infrastructure
•Minimize Operational Disruptions and Protect Hardware Investment
•How You Can Start Today
As organizations migrate workloads to cloud computing, they benefit from flexibility and agility, but network security operations grow increasingly difficult.
Gaining visibility into cloud environments, extending existing security operations and workflows, ensuring compliance, and managing shared responsibility create new challenges for security professionals. Add to this the complexity of hybrid and multi-cloud environments — and the loss of control within those environments — and it’s no wonder security leaders are scratching their heads over how to best secure their organization’s journey to the cloud.
This session will look at approaches to addressing the many challenges around cloud security management and best practices for translating on-prem security controls and processes into hybrid and multi-cloud environments.
Join Skybox Security and (ISC)² on Jan 17, 2018 (Wed) at 14:00 Singapore time to learn more about security management in the cloud.
2017 was filled with cybersecurity meltdowns. From WannaCry to BadRabbit, the cybersecurity landscape has only become more volatile. With cyber threats on the rise, is your organization’s security posture ready for 2018?
Join LookingGlass’ Vice President of Customer Support, James Carnall and Vice President of Intelligence Operations, Eric Olson as they take a closer look at 2017’s major cyber-related incidents and provide tips and recommendations on how your organization can prepare for 2018. Webinar attendees will learn:
· Major cybersecurity trends from the past year
· Cybersecurity tactics that worked – and didn’t work – in 2017
· How to take a proactive cybersecurity approach to fending off cyber threats
Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?
In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.
We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.
After attending, you will be able to:
- Recognize how AI and Machine Learning are typically used in Cyber Security, and what are the gaps
- Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
- Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks
About our guest speaker:
Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
With the ever increasing number of devices and applications that individuals use and access on a daily basis, the authentication of individuals has become paramount for organizations. It needs to be done faster, seamlessly and have less impact on the user. What can organizations do to meet this challenge? Are behavioral analytics an answer? What role does identity assurance play? What about multi-factor authentication? Biometrics? Join RSA and (ISC)2 on January 18, 2018 at 1:00PM Eastern for a discussion on where ID/Access management and authentication is going and how these future advancements can impact your organization.
Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.
This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.
Join us to discover how you can:
· Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention
· Gain enhanced visibility into suspicious activity across your endpoint estate
· Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc
In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.
In den Webinaren "Data Protector zum Wochenstart" wird Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vorstellen. Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb. Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.
In diesem Webinar wird sich alles um die Neuerungen des Data Protector Version 10.0 drehen. Die neue Konfigurationsoberfläche des Data Protector und ein komplett überholter Scheduler
gestalten die tägliche Arbeit neu. Darüberhinaus werden wir auf weitere neue Features eingehen. Neben einem theoretischen Überblick schließt sich ein praktischer Teil anhand von Demos an.
Cloud Security has recently filled everyone's network security forecast. Everyone is talking about it, but are they talking about the same thing? Today's webinar puts a framework around a term that has become ever-present in today's conversations even though its definition has not.
Join us as we discuss:
- How cloud security differs from a public cloud, a private cloud or a hybrid cloud
- How cloud technologies impact a company's security options
- How do you defend against attacks of third-party providers of IT services
- How to develop policies and procedures to test and evaluate servers over which you have no physical control
To better understand what cloud security means to you, register now.