Network infrastructure professionals understand that a reliable and secure infrastructure is crucial to enabling business execution. Join the network infrastructure community to interact with thousands of IT professionals. Browse hundreds of on-demand and live webinars and videos to learn about the latest trends in network computing, SDN, WAN optimization and more.
As organizations embrace cloud infrastructure, DevOps methodologies, PAAS, IoT and mobile workforce, there are new risks coming from a broader attack surface. Vulnerability management designed for traditional assets is not enough. To improve security, you need to rethink how you do things. For example, containers have become the de facto standard in cloud architectures today, which means that security needs to move into developers’ build processes while complementing existing solutions.
Attend this webinar to discover:
•Where vulnerability management for today’s assets needs to start
•What the new faces of attacks and remediation look like
•Why prioritization should not be based on scan results
•Why reports using Excel are no longer the answer
•How DevOps can be part of the solution to incorporate security
Join Tenable and (ISC)² on Jan 24, 2018 (Wed) at 14:00 (Singapore time) to learn how to minimize cyber exposure in a world of cloud, containers and other modern assets.
Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
Moderator: Clayton Jones, Regional Managing Director, APAC, (ISC)²
Webinar topics include:
• Ergonomics 101
How it impacts workplace productivity
• Sitting vs. Standing
The benefits and costs
• Employee Retention
Why comfort makes employees happy
Tom Albin PhD is a licensed professional engineer (PE) and a certified professional ergonomist (CPE). He holds a PhD from the Technical University of Delft in the Netherlands. He is a Fellow of the Human Factors and Ergonomics Society. Tom divides his professional life between the Office Ergonomics Research Committee (www.oerc.org), where he is the Executive Director, and his consulting practice, High Plains Engineering Services. He has extensive experience as a researcher, corporate ergonomist, and product developer. In addition, he has been active in the US and International Standards community. He is accredited as a US expert to several International Standards Organization working groups and is Vice-Convenor of the ISO committee revising the standards for input devices and workstation layout/postures.
Cristina Ainslie brings a wealth of knowledge to her role as Field Sales Director, Furniture as she has been in the industry for over 30 years. Her tenure in the industry ranges from working as Regional Manager for Teknion and as a Principle for a LEED consulting firm. She is passionate about bringing value to your project by putting together a team that is best in class and will ensure your project is planned, design and executed to your specific needs. She was instrumental in helping her teams create furniture programs for Yahoo, Netflix, Cisco Systems, Polo/Ralph Lauren and YouTube. Her experience in sustainability helped her act as an owner’s rep to assist her clients in obtaining LEED Certification for their projects. She assembled project teams that included architects, contractors, MEP and furniture vendors.
Cloud Security has recently filled everyone's network security forecast. Everyone is talking about it, but are they talking about the same thing? Today's webinar puts a framework around a term that has become ever-present in today's conversations even though its definition has not.
Join us as we discuss:
- How cloud security differs from a public cloud, a private cloud or a hybrid cloud
- How cloud technologies impact a company's security options
- How do you defend against attacks of third-party providers of IT services
- How to develop policies and procedures to test and evaluate servers over which you have no physical control
To better understand what cloud security means to you, register now.
The multi-tenant datacenter market in Asia is expected to grow at a 15% CAGR from 2015-2020, and is the fastest-growing region after Latin America. Hong Kong and Singapore continue to be key markets in that region for growth, despite Singapore having a slower year in 2017, when considering new datacenter builds. In this webinar, we will discuss our most recent findings on the major players and trends in these top markets. We will also preview our research plans for 2018, including the new Asian markets we expect to cover.
Pushing Docker-based applications into production radically changes the way you monitor & troubleshoot your environment.
Join Sysdig for a review of the challenges of this new infrastructure and get live examples of monitoring and troubleshooting containers and orchestration systems like Kubernetes for optimal efficiency.
During this webinar you’ll learn:
- How should you monitor services built on top of containers?
- What metrics become more relevant in Docker-based environments?
- How do you construct alerts most effectively?
- How do you troubleshoot containers that are rapidly coming and going?
The webinar will focus on demonstrating open source tools, like Prometheus, and commercial tools, such as Sysdig Monitor, that help you solve these new challenges. You’ll walk away with ideas that you can immediately put to work in any scale environment.
While some hackers crave the attention of a high profile attack or data breach, others prefer to work in shadows either trying to hide their tracks or are indifferent all together.
Regardless, accurately understanding where an attack comes from is very helpful in defending against future attacks. More importantly, when companies and key organizations work together it is possible to tie together a multitude of individual footprints into a single, conclusive trail back to the originator.
This session will focus on the importance of attribution and includes a case study of how a major cyber criminal was taken down, from the lowest foot soldier to the kingpin himself.
In den Webinaren "Data Protector zum Wochenstart" wird Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vorstellen. Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb. Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.
In diesem Webinar wird sich alles um die Neuerungen des Data Protector Version 10.0 drehen. Die neue Konfigurationsoberfläche des Data Protector und ein komplett überholter Scheduler
gestalten die tägliche Arbeit neu. Darüberhinaus werden wir auf weitere neue Features eingehen. Neben einem theoretischen Überblick schließt sich ein praktischer Teil anhand von Demos an.
Die Avi Vantage Plattform bietet Enterprise-class Load Balancing, Web Application Firewall (WAF) und Application Analytics. Dank der Software-definierten Architektur von Avi Vantage ist nicht nur die nahtlose Integration in OpenStack möglich, sondern es können alle Komponenten der Avi Vantage Plattform auch innerhalb von OpenStack, z.B. als virtuelle Maschine oder Container, betrieben werden. Avi Vantage bietet Enterprise-class Load Balancing as a Service (LBaaS) und ermöglicht die automatisierte Bereitstellung innerhalb von OpenStack Umgebungen.
In diesem Webinar zeigt die Firma Avi Networks unter anderem:
- Native Integration mit OpenStack Neutron, Nova, Keystone und Horizon
- Verschiedene Deployment Methoden, z.B. Provider Mode oder Tenant Mode
- Application Analytics und automatische Skalierung auf Basis von Real-Time Performance Daten
- Zentrale Verwaltung von verteilten Load Balancing Services
- Automatische Bereitstellung weiterer Load Balancer mittels Heat, Ansible und Co.
A load balancer lives in a critical position between your applications and your end-users. This placement can deliver incredible value in terms of analytics, performance, and cost savings—but only if your load balancer is architected realize this potential. This live workshop will explore the technology and value behind the Smart Load Balancer. As an attendee, you will:
• Learn differences between Smart Load Balancers and Legacy Load Balancers.
• Understand the value of Smart Load Balancers in traditional and modern use cases.
• See a live demonstration of Avi Networks’ Smart Load Balancer in action.
Do you feel safe from DDoS attacks because you use a content delivery network (CDN)? Join Andy Shoemaker, founder of DDoS testing company NimbusDDOS, to uncover the limitations of this strategy. In this webinar he’ll perform a live DDoS attack to show how attackers bypass CDN defenses to directly target an organization’s critical resources.
In this webinar you will:
· Learn about the benefits and pitfalls of using CDNs as a DDoS protection strategy
· Watch a live DDoS attack from the attacker's perspective
· Participate in a live Q&A with DDoS experts
“Make the trust zones smaller” is the rallying cry behind microsegmentation projects. Break up the network into smaller pieces and put firewalls in between those pieces to ensure attackers can’t get from one part of the network to the next. But making microsegmentation projects work relies on a great deal of knowledge of the network and attack pathways. And it’s an incredibly heavy lift–configuring and deploying a microsegmentation solution takes an immense amount of time and resources. Machine learning can significantly reduce the hurdles by learning the network’s intended state and defining the attack pathways that need to be secured, automating the microsegmentation process.
Edgewise’s Chief Data Scientist John O’Neil will deep-dive into the role of machine learning in microsegmentation and demonstrate how a machine learning driven solution could reduce the time and energy needed to deploy microsegmentation from months to hours.
Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.
This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.
Join us to discover how you can:
· Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention
· Gain enhanced visibility into suspicious activity across your endpoint estate
· Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc
In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.
After 25 years of speaking and writing about the impacts of technologies on “the human in the machine,” Richard Thieme documented the traumatic consequences for security and intelligence professionals of swimming in dark and turbulent waters that challenged our abilities, our ethos, and sometimes our very identity. Who we thought we were came up against what we had to do and the friction threw off sparks.
This webinar goes beyond those stories to explore in particular how what dominant cultures call “minorities” manage their unique challenges. Thieme has uncharacteristically lived as “a minority” in five different ways and the dynamics and resultant strategies he had learned port seamlessly to the experience of others. There’s more to it than “playing through the pain” - there’s real gold in discovering our capacities for the resilience, power, and self-transcendence intrinsic to the human condition.
Beginning with the “real facts” of the matter, Thieme draws on his experience to suggest ways to make this game a long distance run, not a sprint, and not lose our selves along the way.
With the ever increasing number of devices and applications that individuals use and access on a daily basis, the authentication of individuals has become paramount for organizations. It needs to be done faster, seamlessly and have less impact on the user. What can organizations do to meet this challenge? Are behavioral analytics an answer? What role does identity assurance play? What about multi-factor authentication? Biometrics? Join RSA and (ISC)2 on January 18, 2018 at 1:00PM Eastern for a discussion on where ID/Access management and authentication is going and how these future advancements can impact your organization.
We’ve spent years just seeing data as ‘there’; whether it’s a spreadsheet, email or information on a website/social media – data just exists. However, with recent, and massive, growth in stored data its value throughout its lifetime has now changed.
Because of this changing value, data must be secured and protected – kept away from people who might pose a threat to its integrity and value. In this world of instantly available information a news leak informed by real data is something that can quickly reduce the value of a product, or even damage the revenue and reputation of your business.
Endpoint-based technologies can help to prevent an attack, but this is a defensive posture - we need to move and become more proactive. Understanding the data you have makes it easier to know what is ‘normal’, in turn this makes it easier to recognize unusual behavior of devices and data which might indicate a threat has breached the network. The faster you are able to see this, the faster you can react – ensuring maximum time possible to mitigate the potential damage.
Join us on January 18th, 2018 for a lively discussion with Ralf Buchroth, Team Lead in IT Infrastructure and Provider Management at RWE, the second largest utility provider in Germany.
We will discuss RWE’s challenges and success in moving their network operations into the future without compromising security and compliance, including:
• consolidating security and orchestrating connectivity across a hybrid network, including legacy firewalls and routers, next generation firewalls, and the AWS cloud platform
• incorporating a cloud-first strategy and a heavy investment in DevOps to identify and address security violations in AWS, and allow application developers to spin up new applications without knowing IPs, protocols and ports
• reclaiming visibility of their firewall configurations and moving from error-prone manual changes to automating the process
• vastly improving workflows to improve audit preparation from a previously non-auditable change process
Register now to gain amazing insight into how they have found success. We will wrap up with a live Q&A, so have your questions ready!
Like many technologies, artificial intelligence (AI) and machine learning (ML) are "just right" for some types of problems, but are often over-sold for others they are just not well-suited for. This webinar will dive into the characteristics of problems that AI/ML can greatly help enterprise security teams solve, but also contrast those against use cases where AI/ML is a much higher risk for those same resource-strapped teams. In those situations, the technology can actually worsen the skills deficit in the organization, rather than making it better.
Attending this webinar will give you a framework for evaluating AI/ML technologies, including:
- When can AI/ML indeed replace people, and when is it better suited to assist people?
- What types of threats is it best suited for?
- How does AI/ML fit in with other methodologies like security analytics, for threat detection?
- How can AI/ML help with security investigations and incident response?
- How can organizations evaluate vendor claims and ask them the right questions?
2017 was filled with cybersecurity meltdowns. From WannaCry to BadRabbit, the cybersecurity landscape has only become more volatile. With cyber threats on the rise, is your organization’s security posture ready for 2018?
Join LookingGlass’ Vice President of Customer Support, James Carnall and Vice President of Intelligence Operations, Eric Olson as they take a closer look at 2017’s major cyber-related incidents and provide tips and recommendations on how your organization can prepare for 2018. Webinar attendees will learn:
· Major cybersecurity trends from the past year
· Cybersecurity tactics that worked – and didn’t work – in 2017
· How to take a proactive cybersecurity approach to fending off cyber threats
Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?
In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.
We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.
After attending, you will be able to:
- Recognize how AI and Machine Learning are typically used in Cyber Security, and what are the gaps
- Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
- Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks
About our guest speaker:
Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
Presidio is radically simplifying customers datacenter environments with Nutanix. Come hear from Vinu Thomas, Presidio CTO, Raphael Meyerowitz, AVP of Datacenter Solutions, and Mike Berthiaume with Nutanix on how we are making it easier to manage, upgrade and deploy multi-cloud solutions.
Join us—the Verizon Threat Research Advisory Center —for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape. Threats like MeltDown, Spectre and other hot topics will be shared by experts across Verizon and our partners.
Each month, we will have a specific theme to help promote awareness and best practices.
As organizations migrate workloads to cloud computing, they benefit from flexibility and agility, but network security operations grow increasingly difficult.
Gaining visibility into cloud environments, extending existing security operations and workflows, ensuring compliance, and managing shared responsibility create new challenges for security professionals. Add to this the complexity of hybrid and multi-cloud environments — and the loss of control within those environments — and it’s no wonder security leaders are scratching their heads over how to best secure their organization’s journey to the cloud.
This session will look at approaches to addressing the many challenges around cloud security management and best practices for translating on-prem security controls and processes into hybrid and multi-cloud environments.
Join Skybox Security and (ISC)² on Jan 17, 2018 (Wed) at 14:00 Singapore time to learn more about security management in the cloud.
AMAX's [SMART]DC Data Center Manager is the premier out-of-band DCIM solution for the modern heterogeneous data centers, to optimize efficiency and manageability while reducing operational costs and resource underutilization.
This webinar will cover:
•The Next Generation of Data Centers: High Efficiency Meets Scalability
•Streamline Heterogeneous Data Center Management with [SMART]DC
•Incorporate GPU platforms Seamlessly as Your Data Center Upgrades
•Achieve up to 30% in Power Savings for Your Infrastructure
•Minimize Operational Disruptions and Protect Hardware Investment
•How You Can Start Today
With IoT still experiencing growing pains, predicting its future can be guesswork at best. Join us for this January 16 webinar where IoT subject matter experts peer into the crystal ball and expand on some of their IoT visions for the near future.
Moderated by Christina Richards, VP, Global Marketing, Aeris, this webinar will present viewpoints, discuss upcoming IoT directions, innovations, and challenges, and enable audience participation via a Q&A session. All is possible at this future-leaning webinar. Here are a few tidbits.
“SIM providers are going away. It’s just a matter of when.”
—Drew Johnson, VP Engineering & Operations, Aeris
“Automotive transformation via the IoT will become mainstream.”
—Michelle Avary, VP, Automotive Strategy, Aeris
“With more than a billion people in India alone, many below the poverty line, IoT will lead the charge for securing basic needs, such as clean water, healthcare, and education.”
—Dr. Rishi Mohan Bhatnagar, President, Aeris India
“Security will have to up its game as IoT delivers huge volumes of data.”
—Syed “Z” Hosain, Chief Technology Officer, Aeris
My prediction: This will be the only IoT futuristic view you will need to attend this year!
Sign up now for this futuristic view into the future of IoT.
(ISC)² COO Wesley Simpson, shares the association’s experience as (ISC)² transitions to a 100% cloud-based services model. This interactive discussion explores how (ISC)² decided to go all in with cloud, why the cloud was the best option, how the team ensured its cloud strategy mapped to operational needs, and how security is front and center throughout the entire process. Learn how we are doing it and share your cloud migration experiences. This discussion is for anyone thinking about moving to the cloud, already making the transition or even those who completed a cloud migration but still looking for best practices to apply.
Please join Tufin as we brief our customers on the release of Tufin Orchestration Suite™ R17-3, Advancing Our Leadership in Automation: Pioneering the Automation Journey to the SDN and More. We’ll cover the different facets of automation features in the release including automation and provisioning for VMware NSX, support for Check Point Identity Awareness Blade, and end-to-end group modification automation.
Other items covered include:
Policy optimization for Cisco Firepower
Enhancements to topology to further support “what-if” analysis
Policy Browser search enhancements
Changes to cloud license enforcement
In Nov. 2017, MEF released our MEF 3.0 transformational global services framework for defining, delivering, and certifying agile, assured, and orchestrated services across a global ecosystem of automated networks. Dozens of service and technology firms have publicly embraced MEF 3.0 and currently are involved in MEF 3.0 development work.
MEF 3.0 services provide an on-demand, cloud-centric experience with unprecedented user- and application-directed control over network resources and service capabilities.
Over the next several months, MEF will host a series of webinars covering the key pillars of MEF 3.0:
• Standardized, Orchestrated Services
• Open LSO APIs
• Agile Service & Technology Certification
• Community Collaboration
Our first webinar will provide an overview of MEF 3.0, including:
• Explanation of the MEF 3.0 framework
• Comparing MEF 3.0 to CE 2.0
• Latest developments on inter-provider and intra-provider LSO APIs
• An exciting new approach to MEF certifications
• Expanded community collaboration
While there have been many improvements around securing containers, there is still a large gap in monitoring the behavior of containers in production and taking action on any abnormal behavior. That’s why we created Sysdig Falco, the open source behavioral activity monitor for containerized environments.
Sysdig Falco can detect and alert on anomalous behavior at the application, file, system, and network level. In this webinar attendees get a deep dive into Falco and learn:
-How does behavioral security differ from existing security solutions like image scanning?
-How does Falco work?
-What can it detect?
-How to build and customize rules.
-How to extend with alerting options.
Who should attend?
If you're managing containers in production, or just beginning our container exploration, you'll want to attend to understand the security paradigms of containers and how to secure them.
Digitalisierung, Cloud oder DevOps machen auch vor dem Service Management nicht Halt. Die Interaktion zwischen Endanwender und Help Desk soll modern, interaktiv, transparent und mobil sein. Die Anwender wünschen sich ein zentrales, interaktives Portal für alle Anfragen. Transformative Trends wiederum verlangen nach Service Management-Lösungen, die mit ihrer Geschwindigkeit mithalten können. Routinetätigkeiten sollen sukzessive automatisiert werden können und zugleich kosteneffizient sein.
Eine innovative Lösung hierfür ist Service Management Automation-X (SMA-X) von Micro Focus. Sie bietet integrierte virtuelle Agenten mit Chatbots, Social-Collaboration-Funktionen, ein Smart-Ticketing-System und intelligente E-Mail-Programme. All dies sorgt beim Anwender für ein optimiertes Nutzererlebnis. Als erste vollständig containerbasierte und mandantenfähige Plattform für das Service Management bietet SMA-X die größte Bandbreite an Deployment-Optionen. Auch strengste Service Level Agreements können damit kosteneffizient erfüllt werden. Sie verfügen über die Datenhoheit und können so Sicherheit und Speicherort der Daten garantieren sowie Datenschutz- und Compliance-Richtlinien einhalten.
Diese Vorteile von Service Management Automation-X lernen Sie im Webinar kennen:
• Containerbasierte Bereitstellung vom Rechenzentrum bis zur Public Cloud
• Läuft in der Public Cloud mit voller Performance- und Kostenflexibilität
• Code- und versionslose Benutzerführung
• Schlanke und moderne Benutzerführung durch den Einsatz von Big Data Analytics und Automatisierung
• Mandantenfähigkeit durch Containertechnologie
• Zusätzliche Enterprise-Anwendungen
• Verbesserte Smart Ticketing Analytics durch optische Zeichenerkennung und maschinenbasierte Lernsysteme
• Hosting in Deutschland im zertifizierten Rechenzentrum der Materna in Dortmund
Nutzen Sie die Gelegenheit, Ihre Fragen an die Experten zu stellen. Die Teilnahme am Webinar ist für Sie kostenfrei. Wir freuen uns auf Ihre Anmeldung.
Join IBC365 and Tata Communications on Thursday 25 January at 1pm GMT to explore how remote production is changing the way sports broadcasters operate.
Remote production gives broadcasters the ability to produce live broadcasts at a distance from the actual event, by sending raw camera feeds, audio and equipment control over a telecom infrastructure to a central studio facility.
It helps to generate high volume of sports content economically, thereby improving productivity and efficiency for sports broadcasters.
Today, for any live event, about 30-40 people travel to each location with kit and other equipment to produce the broadcast feed at the venue. This is not only expensive but also logistically a nightmare.
By producing feeds remotely at a central location only a handful of camera crew would have to travel while the technical director, commentator and other key crew members can finalise production at a central location.
In this webinar we explore how broadcasters and production companies can overcome any technical and operational challenges to embrace the benefits of remote production.
Jeremy Dujardin, CTO, Media Services, Tata Communications
Dhaval Ponda, Global Sales Head, Media Services, Tata Communications
Josh Liemer, VP Creative Services, VISTA Worldlink
There are quite a few Docker security tools in the ecosystem; how do they compare?
Everyone starts with image vulnerability scanning, but that's just the beginning and usually stops where your CI/CD pipeline ends. That’s why we created this extensive list of 20 container and Docker specific security tools that can help keep containers secure in production. https://sysdig.com/blog/20-docker-security-tools/
We got lots of feedback and questions from many of you, so we decided to pick some of the most popular open source tools and commercial products, look at them in detail, and show them to you live in a webinar.
Join Knox and Jorge from the Sysdig Team, for a 1 hour session to run through:
-How to secure Docker containers and what are the best practices
-Why you need to both static and dynamic (run-time) scanning for your images
-What other container security measures and policies are necessary in production
Demo: Comparing and implementing docker security basics with the most popular container security tools
Data, devices, applications are no longer confined to the traditional perimeter. They now co-exist on-premises and in the cloud, and enterprises are scrambling to secure this new operating environment. Not surprisingly, Symantec’s 2017 Internet Security Threat Report (ISTR) identified that the number of sophisticated attacks targeting enterprises across the network and the cloud is on the rise.
Join us for our webinar “Putting the Power of Proxy to Work” to learn how:
- Enterprises use Secure Web Gateway’s unique proxy capabilities to improve threat prevention and data security as they move to the cloud
- Cloud-delivered security services can protect your remote employees, enabling a secure and compliant “direct-to-net” network architecture when adopting cloud apps like Office 365
- A defense-in-depth approach to combatting malware provides high levels of detection with extremely low false positives, easing the operational burden on your security organization
As the scope for security skill and expertise demanded of organizations extends, CISOs are increasingly turning to security consulting partners for strategic guidance and technical and advisory expertise.
There are a broad range of organizations in today’s market offering security consultancy services based on best practices and standard frameworks. Partnering with one of these firms can provide your organization with the technical expertise to improve network visibility and gain a clearer understanding of your vulnerabilities, provide the strategic and practical guidance that helps you prioritize and build out programs that enable business objectives, as well as advise on how to effectively engage with the C-suite.
What truly sets Secureworks’ information security consulting services apart is how we utilize our Counter Threat Unit™ and knowledge garnered from thousands of client engagements to ensure you are being consulted on the latest industry trends and threats. This way, the outcome is based on real-world scenarios that matter to your organization.
Join consultants across our technical and strategic practices as they share lessons learned from their most challenging engagements and the value that real-time threat intelligence has brought to those engagements.
Key topics discussed include:
• Examples of real-world engagements where the CTU™ and Consulting Practice improved the outcomes for clients
• Tools consultants use to ensure that your outcome is based on real-world scenarios and threats that matter to your organization
• Lessons learned from our most strategic and complex engagements
SAP-Basis im Wandel: Wie kann man hybride SAP-Landschaften automatisiert managen?
30.01.2018 um 10:00 Uhr - Micro Focus & IT-Onlinemagazin
IT-Abteilungen und SAP-Basisadministratoren sind aktuell nicht zu beneiden: Sie stehen im Spannungsfeld hohen Kostendrucks, steigender Heterogenität der IT-Landschaften, dem SAP-Generationswechsel und ganz neuer Anforderungen durch Innovationsthemen.
Welche Antwortmöglichkeiten es für diese Herausforderungen gibt, werden wir in diesem Expert-Talk diskutieren. Wir werden beleuchten, wie man Routineaufgaben in der SAP Basis automatisieren, wie man Self-Services für die Anwender einrichten und wie man die zukünftigen, hybriden Multi-Cloud SAP-Landschaften sinnvoll Ende-zu-Ende orchestrieren und über den gesamten Lebenszyklus hinweg managen kann.
Unser Anliegen ist es, Ihnen Ideen für Veränderungen im SAP Basis Betrieb aufzuzeigen, die Ihnen gleichzeitig Raum für Innovationen schaffen können. Wenn Sie im Vorfeld Fragen haben, senden Sie diese bitte gerne an: firstname.lastname@example.org.
Sandra Apflauer, Pre-Sales Team Lead Innovation Strategies, Micro Focus
Helge Sanden, Chefredakteur, IT-Onlinemagazin
There are many considerations when it comes to choosing your fiber termination method – from the number of connections and the application being supported, to performance and overall required time to go live. While pre-terminated fiber solutions offer significant benefits in terms of factor-terminated performance and ease of deployment, they do require proper planning and predetermining of lengths, as well as longer lead times. Choosing a field termination method like fusion splicing or mechanical splice connectors comes with its own set of additional considerations, including cost, required skill set and labor efficiency. This webinar will examine the various types of fiber termination methods available today, providing pros and cons of each method and basic considerations to help you choose the fiber termination that’s right for your specific fiber deployment, including key questions to ask and termination time comparisons and analysis.
For communication server providers (CSPs), Carrier Ethernet (CE) underpins the vast majority of modern services delivered to enterprise and residential customers. As CSPs seek to expand their service offerings from their networking infrastructure base, they need to leverage their CE access networks to seamlessly connect users to Multi-Access Edge Computing (MEC) applications. The strength of CE service orchestration and service level agreements (SLAs) provides a dynamic, trusted foundation for new revenue generating services. Ethernity Networks’ ACE-NIC 40G Server Adapter integrates field-proven CE services and programmable NFVI acceleration, all optimized to work with Intel servers and DPDK.
Most businesses are rapidly moving to the cloud to be fast and nimble, reduce their cost structure, and reach more customers anywhere, anytime. These new architectures have powerful new capabilities—but also expose businesses to a new universe of risk.
When dealing with outsourced infrastructure like AWS, or a SaaS solution like Office365, it is easy for IT managers to assume that security is out of their hands, for better or worse. But, this assumption may not always be true. Businesses must develop an active cloud security strategy as they pursue their migrations, and become a proactive security partner with their cloud providers—or they will find themselves vulnerable to attack.
In this upcoming webinar, hear from security experts at Arctic Wolf Network (AWN), on:
- The top cybersecurity risks and best practices for securing cloud deployments
- How AWN security monitoring compliments the native security features in AWS and Office365
- The role of AWN cloud security in integrating observations from cloud and on-premise systems
To see how AWN CyberSOC™ can secure your cloud, register now.
About our speakers:
Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with in-depthexpertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.
Louis Evans is a new member of the Arctic Wolf team. He’s passionate about cybersecurity, defeating the next generation of threats, and Alan Turing.
Creating a culture of privacy at work starts with teaching your organization what privacy means. Customers and stakeholders want to understand what personal data is being collected about them, how it will be used and whom it will be shared.
Symantec is proud to support Data Privacy Day, please join Symantec’s Zoltán Précsényi for a webcast on 1/30 to learn how to:
•Articulate what privacy means to your organization and share best practices to achieve and maintain security internally and with third parties.
•Define security measures to protect individuals’ personal information from unauthorized access and use.
•Explore the fundamentals of what personal data means under GDPR
•Communicate your data use practices to your customers’ and explain how you manage their personal information.
This webinar is a chance to learn how the circuit breaker pattern is used in microservices applications. Fundamentally, the circuit breaker pattern in a microservice application is all about managing traffic to the different instances of your services. We utilize active health checks to monitor these instances, to help avoid catastrophic failure.
Join this webinar to learn:
- How the circuit breaker pattern works
- Why the circuit breaker pattern has become popular, especially for microservices apps
- How the circuit breaker pattern is implemented in Microservices Reference Architecture
- Why NGINX is particularly well-suited for supporting microservices apps
Chris Stetson, Chief Architect & Sr. Director, Microservices Engineering
Charles Pretzer, Technical Architect
Floyd Smith, Director, Content Marketing
In this 451 Research webinar, we will discuss our market sizing research on container software revenue and growth, as well as enterprise drivers, challenges and the vendor landscape centered on Docker, Kubernetes and other container software.
The modern Cloud delivers faster time to market, lower IT costs, and greater overall value to the enterprise by allowing companies to focus more on the core business problems rather than the infrastructure used to solve them. But the path to the cloud can be challenging for anyone with an established presence on-premises, or in a private data center.
Dan Taylor from Microsoft’s Cloud & Enterprise division shares with you how large enterprises are tackling this problem and gaining immediate value by leveraging the cloud. You’ll hear how enterprises are managing their migration to the cloud by embracing hybrid patterns, containerizing and migrating applications, using single-pane-of-glass monitoring solutions, and leveraging Azure to tackle data privacy.
Cradlepoint announced a new solution pricing model, the next step in its Elastic Edge strategy for software-driven and cloud-delivered wireless Wide Area Networks (WANs).
The new model is based around a series of NetCloud Solution Packages, which simplify the way customers buy, deploy, manage, and evolve their Cradlepoint network, facilitating rapid deployment, time-to-value, and customer success. Each solution package is tailored to specific market needs and combines NetCloud software and services, fit-for-purpose endpoint hardware, and comprehensive 24x7 support.
The first NetCloud Solution Package to be launched is aimed at branch networks and provides 4G LTE-optimized SD-WAN functionality with extended wireless LAN coverage.
With NetCloud Solution Packages, Cradlepoint becomes a first-mover in transitioning enterprise WANs from a hardware-first approach, which is inflexible and resource-intensive, to a software-first, cloud-delivered solution, reflecting the shift that is underway within IT infrastructure overall. Now customers can buy a complete Cradlepoint network solution and gain the benefits of simplicity, cost-effectiveness, and a shared interest in customer success.
“IT infrastructure is evolving from the buy-it-and-build-it approach, to consume-as-a-service”, said George Mulhern, Cradlepoint CEO. “Cradlepoint NetCloud Solution Packages acknowledge this trend and represent the next step in our Elastic Edge strategy for bringing the simplicity, elasticity, and economic advantages of software and cloud services to wireless wide-area networking — creating customer value across the entire lifecycle.”
Join us for a live webinar to learn more about these solutions. This webinar will focus on the new NetCloud Solution Packages, including the new AER2200 and AP22 Access Points. Learn to implement next-gen branch solutions and the benefits of Cradlepoint.
Containers and microservices are designed to prove a reliable and low-cost way for teams to build and ship distributed applications. However, they also add extra layers of abstraction and orchestration to your environment that hinder your ability to do performance monitoring and security enforcement. Sysdig can help you overcome this challenge by providing full visibility including the ability to monitor and enforce policies at any level of the application stack.
Register for the webinar to learn:
- How to instrument your AWS environment with Sysdig
- Best practices for leveraging orchestration and container metadata to optimize and secure your containers
- How troubleshooting and forensics has changed in containerized environments
- Best practices for alerting and securing ephemeral infrastructure
In the enterprise, block storage typically handles the most critical applications such as database, ERP, product development, and tier-1 virtualization. The dominant connectivity option for this has long been Fibre Channel SAN (FC-SAN), but recently many customers and block storage vendors have turned to iSCSI instead. FC-SAN is known for its reliability, lossless nature, 2x FC speed bumps, and carefully tested interoperability between vendors. iSCSI is known for running on ubiquitous Ethernet networks, 10x Ethernet speed bumps, and supporting commodity networking hardware from many vendors.
Because, FCoE also delivers increasing performance as Ethernet speeds increase – and, Fibre Channel also delivers increasing performance as FC speeds increase. Historically, FC delivered speed bumps at a more rapid interval (2x bumps), while Ethernet delivered their speed bumps at a slower pace (10x bumps), but that has changed recently with Ethernet adding 2.5G, 5G, 25G, 40G, and 50G to the traditional 1G, 10G, 100G timeline.
As the storage world moves to more flash and other non-volatile memory, more cloud, and more virtualization (or more containers), it’s time to revisit one of the great IT debates: Should you deploy Fibre Channel or iSCSI? Attend this SNIA Ethernet Storage Forum webcast to learn:
•Will Fibre Channel or iSCSI deliver faster performance? Does it depend on the workload?
•How is the wire speed race going between FC and iSCSI? Does anyone actually run iSCSI on 100GbE? When will 128Gb Fibre Channel arrive?
•Can any server or storage array actually support more than 32Gb/s or 40Gb/s speeds?
•Do Linux, Windows, or hypervisors have a preference?
•Is one really easier [to install/manage] than the other, or are they just different?
•How does the new NVMe over Fabrics protocol affect this debate?
Join SNIA experts as they compare FC vs. iSCSI and argue in an energetic yet friendly way about their differences and merits of each.
With the global network functions virtualization (NFV) market projected to grow at a compound annual growth rate (CAGR) of 42%, reaching $15.5 billion by 2020, a massive market opportunity exists. To make it easier to design and deploy Network Functions Virtualization Infrastructure (NFVI) optimized systems, Intel has developed the new NFVI Server Block. Optimized to deliver exceptional performance for NFVI workloads, these pre-integrated, fully validated server systems reduce the complexity involved in designing and testing for the unique needs of NFVI.
This webinar will cover the key features and benefits of the NFVI Server Block as well as several other NFVI enablement options from Intel. You’ll walk away with actionable guidance on how Intel can help you harness this growing market opportunity.
Mobile devices have become ubiquitous in business, permeating every aspect of user productivity and customer experience, yet many of these are also personal devices left unprotected against advanced malware and OS vulnerabilities.
Considering the vast amounts of sensitive data that are stored on and communicated through these devices, how do we maintain the essential controls, security and privacy that are essential in the cloud generation?
In this webcast, you will:
- Learn about the various and advanced methods hackers use to attack and compromise mobile devices.
- Understand the importance of being able to Predict, Detect, and Protect against all types of mobile threats.
- Learn specific strategies and technologies that will support the need for visibility and full protection of your mobile infrastructure.
Web application security is complex, difficult, and costly. These issues are well known, but remain prevalent out in the real world. Most development teams do not have the time or resources to sufficiently protect against the myriad of attacks that are relevant to each vector, while the level of expertise required to address these issues are difficult to come by even if your project has the time and budget for it. The good news is that advanced WAF technology is more accessible and affordable than ever before. With the right tools, comprehensive WAF coverage can not only reduce your exposures and give you better control over your applications but also help optimize your resources and reduce overall operating costs. Join F5 and (ISC)2 for Part 1 of a 3 part Security Briefings Series on February 1, 2018 at 1PM Eastern where we’ll discuss the OWASP Top 10, defenses for everything it addresses and how to use WAF to optimize and filter unwanted traffic to cut costs in the cloud.
We've known for a long time that the idea of a fixed perimeter and trusted internal network doesn't work too well, especially since a successful attacker looks exactly like an insider. The concepts variously known as de-perimeterization, zero-trust, software-defined perimeter and BeyondCorp all try to address this, and they represent a fundamental change in how you architect security for your enterprise.
In this presentation, we will talk about what you can do to make your old perimeter less lonely, and most importantly, how to explain this new way of thinking to the rest of the business.
To compete successfully in today’s economy, companies from all industries require the ability to deliver software faster, with higher quality, and reduced risk and costs. This is only possible with a modern software factory that can deliver quality software continuously. Yet for most enterprises, testing has not kept pace with modern development methodologies. A new approach to software testing is required: Continuous Testing.
In the first session in a series, join product management leadership to gain in-depth insights on how by shifting testing left, and automating all aspects of test case generation and execution, continuous testing, it enables you to deliver quality software faster than ever.