Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
More and more IT organisations are facing the challenge of undertaking data center consolidation, transformation and migration due to the pressures from the business to reduce costs and improve agility, along with enabling technologies and solutions such as virtualisation and cloud. But how do we achieve this effectively?
Join Malcolm Orr for a discussion of the ideal strategies and tips, utilising the Rackspace transformation framework, to let you you easily identify the applications that can help start your business transformation and begin your journey to the Hybrid Cloud today!
Cisco introduces VMDC DCI solution which provides validated design to ensure high availability and performance for applications across Metro and Geo data centers. This solution unlocks Business continuity and stateful workload mobility which is top of mind for both public and private cloud providers to connect multiple data centers to support Business Critical operations.
Android smartphones provide amazing connectivity and convenience but this accessibility and customization but can come at the price of personal security. Mobile security software can provide the safeguards you need for your device and information.
March Madness can stress your network and create opportunities for someone to exploit your vulnerabilities. Being aware of the threats can help prepare for them to keep your network sane and secure.
What You Will Learn:
1. you can achieve a deeper level of security by being aware what is happening on your network.
2. be aware of how you access the games, use secure connections
3. Keeping your applications and firewall up to date can help you keep secure.
Erfahren Sie im Rahmen dieses Webcasts, wie Sie den zunehmenden Bedrohungen für die IT-Sicherheit und den Anforderungen Ihres Unternehmens mit den Firewalls der nächsten Generation (NGFW) begegnen können.
Lernen Sie darüber hinaus die McAfee Next Generation Firewall und deren konkurrenzlosen Schutz sowie Herausstellungsmerkmale kennen:
• Vollständiger und einfacher Überblick mithilfe des zentralen Management
• Einsatzszenarien als NGFW, IPS, IDS, L2FW
• Kostensenkung durch Virtualisierung
• Hochverfügbarkeit auf Node- sowie Netzwerkebene
• Sichere Standortvernetzung dank Multi-Link-VPN
ESET security researcher Lysa Myers reports on developments in healthcare IT system security that she observed attending the recent HIMSS conference in Orlando. Find out what is being done to better protect patient data privacy.
Have you ever experienced or known someone who has lost a laptop or a USB drive that contained valuable company IP or customer data? Are you subject to compliance programs, either directly or through partnerships?
Join this webinar on Data Protection and learn about:
•How easy it is to keep your data safe from attacks and theft.
•Encryption performance and why your end-users won’t even notice it’s working
•How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
•How DLP Endpoint can help you protect IP and ensure regulatory compliance
•Use cases on leveraging the synergy between Intel vPro and McAfee Data Protection technologies.
•New Mac OS support.
We invite you to join us on Tuesday, March 4 at 9 a.m. PT for a webcast on the next generation of our OneCore Storage™ Software Development Kit (SDK)! OneCore Storage 5.0 (OCS 5.0) is a comprehensive solution for independent hardware and software vendors to create target side drivers in a custom, high efficiency environment for storage applications that require low latency and high performance. The webcast will focus on how the next generation of the SDK adds new features including support for of the new Emulex OneConnect® OCe14000 family of 10Gb Ethernet (10GbE) Network Adapters and Converged Network Adapters (CNAs)
Sign up for the webcast now for a chance to win Beats Tour In-Ear Headphones!
ICT Enterprise architecture is the backbone of corporate IT systems, the question is are they or can they be sustainable?
Join the MD of Carbon 3IT and Vice chair of the BCS Green IT SG John Booth and his guests Alex Bardell of Deloitte, Richard Lanyon Hogg of IBM, Bob Crookes from DEFRA and Chair of the BCS Green IT SG and IT4s Consultant Gary Thornton as they answer the core questions for sustainable enterprise architecture:
- What is sustainable enterprise architecture?
- Will it require additional skills or money to achieve?
- Will enterprise architecture be superseded by cloud technologies?
The best infrastructure for an app or a service increasingly requires both public and private cloud environments. As enterprise IT teams build private clouds behind their firewall to deploy hybrid IT and leverage the capabilities of elastic public clouds, they will have to contend with profound changes to the network. Innovations promise to make the modern network more automated and dynamic to provide connectivity on-demand in a highly secure fashion.
Today organizations require a flexible IT infrastructure that can spin up resources on demand and securely segment traffic. Virtual private clouds (VPC) allow you to provision a logically isolated section of the public cloud where you can launch resources in a virtual network that you define. The VPC feature set also allows you to easily customize the configuration.
Join Cloudscaling and Juniper to learn from their first hand experience with enterprise customers deploying network virtualization to speed time to market for new apps and services by automating the creation of virtual networks that interconnect private, hybrid and public clouds. They will demonstrate the integrated Cloudscaling OCS and OpenContrail solution that offers a simple to deploy and agile platform based on open source technologies. These experts will also provide insight into:
- Why OpenStack is becoming the de facto cloud open source software for building private and public clouds.
- The importance of orchestration and APIs in the software defined data center
- How virtual networks can seamlessly integrate with physical networks
- How to ease the transition to the private cloud by using service chaining to virtually insert services into the flow of network traffic
Register today and start moving your network into the modern, cloud era.
With SAP HANA, you can do more things that you might not think before. Based on Twitter data, we might be able to find more. Let’s go through this flu prediction example and demonstrate how you can quickly build this type of application on SAP HANA. It will show you the capability of SAP HANA to process the social media data.
In this webinar, we invited Sam Bhat, President and CEO, Rohit Patwardhan, GM & VP of Technology, Rahul Joglekar, Chief Architect from United Software Associates to share their experience of how they built an applications on HANA, they will also share how to build similar applicaiton using HANA platform. From this example, we will explain how SAP Idea Incubator can support you for application development on SAP HANA.
Key points of this webinar:
• Analyze & Predict Health Related Data in real-time using SAP HANA
• Build similar application using SAP HANA as a development platform
• Find solutions to real world problems using the power of SAP HANA
For more information about customer expectations, please visit SAP Idea Incubator website at incubator.saphana.com.
This 30-minute webinar will discuss how the Sayers Cloud can be an off-premise extension of your existing IT infrastructure. Now in its second year, Sayers Cloud has proven success in helping our customers scale IT services flexibly and cost-effectively, whether for production compute, test/dev or disaster recovery needs.
Our State and Local Government and Education markets continually face resource challenges in regards to managing their highly distributed infrastructure. Join us to discuss SDN as a means to lower costs and improve agility for campus and branch operations. We’ll also discuss how Juniper can help you reduce network complexity and help you achieve a flexible, future proof infrastructure. Register now.
•Where are my Virtual Machines, what are they doing and how are they protected?
•How to secure the hypervisor?
•As the data centre has evolved, how have my security solutions changed to reflect this?
Join this webinar on Data Centre Security and find out:
•What are some of the new challenges in securing a modern data centre?
•How can I balance the needs of performance, flexibility and security?
•Hear about how hardware features can be used to detect attacks to hypervisors?
•What new technologies are available to secure a modern data centre?
Jason Brown is an Enterprise Solutions Architect specializing in Endpoint and working within EMEA. He is responsible for ensuring that optimal solutions are provided to customers within the enterprise market segment. Previously, as Principal Sales Engineer, he has assisted in delivering solutions in both a presales and post-sales capacity to many of the FTSE 100 companies and authored best practice white papers. He has created and executed partner training across EMEA and delivered many customer training courses. He has worked within the security industry for the last 15 years. Prior to joining McAfee, Jason worked at a defense contractor after completing a bachelor’s degree in computer modelling for business and master’s degrees in both Operational Research and Finance. He is CISSP certified and a Cisco Certified Network Professional.
The data centre has evolved massively to encompass a complex hybrid environment of virtual endpoints, servers and infrastructure, involving both public and private clouds. Before securing virtual machines, challenges now include locating these transient and often invisible systems and securing the hosts upon which these virtual machines are running. Learn how to evolve your approach to protecting the Data Centre using McAfee solutions.
Se kort introduktions video på Dells nye sammensmeltning af server,storage & netværk. Den er designet til at kører i almindeligt kontormiljø, hvilket betyder den er ekstremt strømsvar og kan drifte ved 35 grader celsius
Are you experiencing users wanting to use devices other than BlackBerry? Is a migration to BES 10 too costly? Are you looking to migrate to iOS or Android but are concerned about security? This webinar will explain how to securely migrate to or add a new platform, and how Cortado Corporate Server can make this transition easy.
Cortado boosts your mobile productivity while keeping your business as secure as when using BlackBerry.
We will also show you the new features and functions Cortado brings to your mobile environment.
You’ve spent a lot of money and time purchasing and implementing software that’s expected to solve critical business problems and make your business more competitive. Make sure you do not lose all that value by being out of compliance or overspent. And no, it’s not easier said than done…
Join this web event to hear how SAP optimizes Software Asset Management with best practices, tools and powerful employee responsibility initiatives. You will learn how SAP rationalized the use of software assets and licenses, reduced expenses and demonstrated to the auditors that their compliance methods are serious and trustworthy. We will also demonstrate the HP Software Asset Management solution.
The rise of cloud computing has lead to many questions about the economic model associated with them. James Staten, VP and principal analyst, and Senior TEI Consultant, Sean Owens from Forrester discuss cloud economics as one of the key concepts within cloud computing. During this webinar, these experts explain the economic considerations companies should take into account when migrating to the cloud. Topics from cloud scaling to cloud optimization are covered and how cloud economics can be used to your organization’s advantage.
This presentation will take a deeper look at the Webroot® Mobile Data Report, released January 2014, and dive into the interesting details including which app categories are most often associated with malicious apps, which malicious apps were most often detected and which families showed the strongest growth. Additionally, the use of device level security features, such as lost device protection, will be evaluated. In addition to analysis of the report’s data, key mobile security events from 2013 will be discussed and analyzed to expose their real impacts to businesses and users alike. Lastly, taking what was learned in 2013, the presentation will leave you with a number of mobile security predictions for the year to come along with mobile security policy suggestions to ensure you’re prepared.
In today’s post-breach world, organizations need technology aligned with new strategies to accelerate and automate incident response and breach investigation workflows to reduce mean time to resolution. In this webcast, we will demonstrate the need for on-demand access to endpoint for the purposes of understanding what happened after the attackers got in, and what — if anything — was taken as a result.
You will learn how together, McAfee and Guidance Software help:
•Reduce time to deploy incident response capabilities
•Streamline the response and investigation process
•Ensure a complete understanding of breach impact
•Manage digital investigations on assets managed by McAfee ePO
When service degradation impacts the bottom line, every application is mission-critical. As a network administrator, it’s your job to find the problem and fix it fast. But how? “Cut Troubleshooting Time in Half,” is designed to help busy network professionals reduce the time it takes to resolve service complaints. The 45 minute webinar features key strategies for overcoming common challenges and choosing the right application monitoring solution, as well as workflow demonstrations, and successful real-world examples. Find out what top teams already know and which solutions get to the source of application problems faster, and more efficiently.
Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data.
Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements. In this session, you'll learn:
*What log data you always need to collect and why
*Best practices for network, perimeter and host monitoring
*Key capabilities to ensure easy, reliable access to logs for incident response efforts
*How to use event correlation to detect threats and add valuable context to your logs
The word cloud is much over used, and the debate continues as to whether it should be cloud, or cloud computing. In either case, the main focus is on how the cloud computing market is evolving and where should enterprise customers invest their money? Ovum has conducted many surveys and the results indicate the move toward hybrid cloud computing is fast becoming the top choice for many enterprise customers.
Join Roy Illsley for this webinar and discover why cloud computing is evolving and how it fits in with a wider IT transformation agenda. Roy will share the results of Ovum's latest global adoption survey and discuss the importance of the findings. The key adjacent technologies and the impact on cloud computing will also be explored. Attend and learn how you can put IT transformation and cloud computing in to context.
Today’s security challenges demand a unique perspective to protection. Zero-day attacks and customized malware are challenging the security industry in ways previously unimaginable.
With current security solution struggling to stay ahead, and the average IT organization inundated with volumes of security alerts, a new approach to security and network protection is needed.
Join this webinar to understand what Signature-less IPS inspection is and how it can benefit you:
•What technologies McAfee uses for signature-less IPS inspection
•How signature-less inspection is transforming IPS security
•How McAfee’s IPS can increase your security posture against Advanced Malware
The Open Data Center Alliance Cloud Maturity Model (CMM) provides an end-to-end visualization for how the use of cloud in the enterprise develops over time (adoption roadmap) and how the enterprise’s ability to adopt cloud-based services within defined governance and control parameters increases.
As it matures, the use of cloud becomes more sophisticated, comprehensive, and optimized. The CMM plots the progression of structured cloud service integration from a baseline of no cloud use through five progressive levels of maturity.
This presentation will walk attendees through the maturity model that the ODCA has developed and how they can apply this model to their organization creating a comprehensive plan to fully integrate cloud into their operations.
Hybrid cloud technologies are transforming the way we deliver applications to customers and employees, but organisations continue to have challenges connecting customers to applications and content. Global customers suffer from network latencies and bottlenecks which impact the user experience. Furthermore, in the race to build out high-performance applications, enterprises often buy more compute capacity than they need, because it is difficult to predict the rate of customer adoption, leading to high costs and inflexible infrastructure.
Join Paul Wallace of Riverbed Technology, and learn how to:
* Right-size your cloud resources and keep control of your costs
* Turn distance and location into a competitive advantage
* Mobilise your cloud with the industry's first ADC-as-a-Service solution
So much focus is given to the enterprise when it comes to Private and Hybrid Cloud but what about SMBs? How they can get the most from the hybrid and private cloud offerings?
Join Rhett Ryder of Zynstra as he provides examples of real world hybrid cloud solutions delivered “hype free” and “as a service.” Rhett will cover a SMB approach to these offerings, what private and on-premise capability should be expected to meet an SMB’s IT requirements, how the cloud is used in this approach, and why it benefits the SMB and their IT suppliers.
IBM® SmartCloud® Orchestrator makes complex cloud services easy to manage. Built on OpenStack, IBM SmartCloud Orchestrator provides common cloud services for multi tier application environments on top of compute, network and storage while supporting multiple hypervisors and multi-vendor platforms. It’s designed to simplify and speed the creation and execution of process workflows that then help shorten deployment and change processes in the cloud. With standardization and automation of cloud services through a flexible orchestration engine, IBM SmartCloud Orchestrator (SCO) provides ongoing service lifecycle management and the flexible platform to automate assets that most organizations are already using.
IT Departments are pressured into using cloud services, but they face challenges in delivering these services, should they move into new build cloud, legacy cloud or internal cloud via a retrofit of their existing facilities?
Join John Booth and guests Bob Crooks of BCS Green IT Special Interest Group, Richard Barrington of ICEOTOPE, Vic Smith of Colt and Gary Thornton of AET4IT for a discussion of the benefits and pitfalls of all 3 and takes a quick peek into the data centre of the 2025.
As organizations move to virtualize their environments they must rethink how the secure their data. Encryption will play a key role in protection of data as perimeter defences become less relevant and traditional security mechanisms struggle to keep threats at bay.
Join your fellow professionals for a best practice session, to first learn the detail on how encryption is expanding as organizations or all shapes and sizes, and from a wide range of industries, migrate to virtual environments. Then discuss several key management best practices to complete "the keychain" for organizations considering a move to the cloud. Finally we look at specific use cases to demonstrate the use of these best practices for encryption and key management in the enterprise.
To address insider security threats, many organizations deploy data loss prevention (DLP) solutions. Often, the scope of the process and policies are overwhelming to accommodate every scenario. Administrators quickly find it impossible to accurately identify every type of sensitive document, as well as predict the behavior of every type of user. As a result, some businesses deploy their DLP systems in “watch-mode”, where they monitor for behavior, but don’t realize the true benefits of actually preventing data loss.
McAfee DLP leverages TITUS Classification metadata to set active DLP policy and improve policy inforcement. Join TITUS and McAfee for a discussion about:
•Why it is crucial to include users as the first line of defense
•How DLP, NDLP, and ESM leverage TITUS
•And the role of TITUS Classification in the DLP architecture
Although NTP reflection/amplification attacks have been observed in the wild for many years, recent high-profile attacks have drawn more attention to them. In this webinar, a member of the Arbor Security Engineering and Response Team (ASERT) will conduct a deep dive into some recent NTP attacks. Network-scalable best practices for detection, classification, trace-back and mitigation of high-impact attacks, ranging from the tens of Mbps up to more than 300 Gbps in size, will be addressed.
Cybercriminals often try to circumvent intrusion prevention systems by obfuscating advanced attacks using complex algorithms designed to evade detection. A tightly integrated intrusion prevention system with sophisticated anti-evasion capabilities with full stack inspection of inbound and outbound application traffic is required to defeat these threats.
Register for this webinar with NSS Labs, the trusted authority in independent product testing, and Dell™ to learn about the requirements for an effective intrusion prevention system. Their findings are based on the NSS Labs 2013 Intrusion Prevention System (IPS) Security Value Map, which maps vendors based on security effectiveness and value (cost per protected Mbps) of tested product configurations. In addition, Dell will summarize key results from the Dell SonicWALL™ SuperMassive™ E10800 IPS Product Analysis Report.
Join us to explore:
•NSS Labs Intrusion Prevention System testing methodology
•Security effectiveness, performance, and total cost of ownership
•Dell SonicWALL SuperMassive E10800 IPS Product Analysis Report results
Your business never stops. Neither should your network. Learn how an always-on, always-available enterprise provides users with complete access to business-critical applications such as unified communications and collaboration (UC&C) anytime, anywhere, from any device.
In fact, UC&C is a key driver of business transformation. As your organization grows, evolves and competes, seamless global communications are a must. In this session, industry experts will reveal what is driving network change and share what’s needed to enable a quality UC&C experience. Learn how Juniper Networks ON Enterprise solutions can keep your business connected and reduce operational complexity while achieving the best ROI for your UC&C investments.
Does your organization have sensitive information to protect? What would happen if an employee clicked on a link within an email, and malware infected one, or many, of your internal systems? Do you have the resources to recover if customer data or intellectual property is stolen? These are all key considerations when building your defence strategy against targeted attacks. This webinar will cover the tactics that can be used to stop targeted attacks before they infiltrate your organization.
Join this webinar on McAfee email Protection as:
•You will learn how to cost-effectively establish front-line defence against targeted attacks
•You will hear about the leading technologies that are becoming instrumental in stopping the most advanced malware
•You will walk away with a blueprint for your business to prepare for and defend against evolving targeted attacks
With both CIOs and CFOs challenged to deliver efficiencies and reduce costs, the quickest routes to results always seems the easiest and trending toward Cloud Services, but few understand how this affects software Governance, Risk and Compliance.
Moving to Hybrid IT environments and the complexities of evolving licensing terms, organisations need to review the basics across the distributed IT landscape: establish Governance, measure Risk and maintain Compliance, in order to keep control of costs and drive vendor performance
Join Martin Prendergast, Chair of the CIF GRC Special Interest Group and CEO of Concorde Solutions for a discussion of the governance, risk and compliance practicalities of moving to a hybrid IT environment in your organisation.
Jayme Williams, Senior Systems Engineer at Tencate is protecting eight environments across the US and Canada – and each site has different storage. Their original BC/DR plan, affectionately named the “Hit by the bus” book due to its volume, was too complex and not able to support their business strategy which was to grow via acquisition. Zerto Virtual Replication is storage agnostic and made it easy to integrate a new site into their disaster recovery plan. The process has been greatly simplified and the service levels they are seeing are outstanding – single digit seconds for their recovery point objectives (RPO).
With Zerto Virtual Replication:
• Manage all sites in one pane of glass with one tool for replication and automation of failover, failback and testing processes
• Hardware agnostic solution does not require a change in the infrastructure reducing costs
• Consistency in the BC/DR solution dramatically reduces operational costs
• Replicates between different types of storage and versions of VMware vSphere making it easy to add new sites to the process
• Point-in-time recovery enables failover to a previous point to recover from any issue – logical corruption, datacenter outage, etc.
With confidential data under attack on many fronts, it is time to look at how encryption can protect data access and what your business could be doing to employ encryption, from servers to endpoints to removable media.
Most companies deploy virtual environments in order to get the most out of their hardware (maximize utilization). Traditional security was designed to be deployed in a one-to-one fashion, relying heavily on existing computing resources (CPU, RAM, Storage) and often taking full advantage of all resources available. In virtual environments with multiple machines and signature based protection, when a scan runs or signatures are updated (typically daily) and simultaneously, it has the potential to consume all resources available, creating what is called an AV storm. This presentation will explore the modern VM security landscape and the introduction of Agentless Security and associated efficacy.
Der technische Support für Microsoft Windows XP läuft offiziell im April 2014 aus und infolgedessen werden auch die Sicherheits-Updates eingestellt. Trotz alledem werden ca. 40 Prozent der weltweiten Unternehmenssysteme weiterhin mit XP betrieben, die eine ernsthafte Sicherheitsgefährdung für diese Unternehmen bedeuten könnte.
Erfahren Sie im Rahmen dieses Webcasts wie Sie den Schutz verbessern, sowie die Sicherheitsrisiken für ungepatchte Windows XP-Systeme reduzieren können.
Data Centers are undergoing major transition to meet higher performance, scalability and resiliency requirement with less resources, smaller foot print and simplified designs . These rigorous requirements coupled with major DC trends like Virtualization, DC Consolidation, SSD and data growth are putting tremendous amount of strain on the existing infrastructure and adding complexity. To design a reliable, scalable and flexible data center requires careful planning.
In this discussion we will highlight some of the unique attributes of MDS 9710 which allow a very flexible and scalable data center design. We will look at some of the DC architecture options with MDS 9710 and review the best practices to improve resiliency and protect against silent failures. We will also discuss how we can design a DC that provides investment protection and agility without making tradeoffs.
What participants will Gain from This Session:
1) How to design a data center to meet application performance needs and achieve predictable throughput
2) How the simplify Data Centers architecture and achieve short term and long term investment protection
3) How to design a scalable and flexible data center
4) Best practices to protect against application brownout
Leading enterprises understand the value of mobility, but are struggling to create secure mobile environments while delivering on the promise of higher productivity that mobile can provide. Add BYOD, contracted workers, and scalability requirements to the mix and your mobility strategy can become highly complex.
Join this webinar to learn how one integrated mobile solution delivers on the promise and power of mobile app management and security.
By attending you will learn:
•The importance of app and data level mobile security
•Use cases for how mobile application management is currently being used by best-in-class mobile enterprises to improve security
•Tips on how to secure, distribute, monitor, and update mobile applications and content with a mobile governance approach
•How the Apperian and McAfee partnership will provide you with integrated management across all endpoints
Learn why benchmarking your current network and server virtualization infrastructure is vital to your organizations long-term Cloud Infrastructure-as-a-Service (IaaS) success. Benchmarking will yield your IT organization the knowledge needed for solid planning, effective execution and post-migration performance validation.
Every day, terabytes of big data traverse your firewall. How do you know it is doing its job intercepting viruses, spyware, intrusions, attacks, and filtering nefarious websites and web applications?
Make your security policies more effective with firewall reporting. Learn how you can:
• Benefit from ways other companies use firewall reporting to be more
• Make sense of the cyber-threats attacking your company with
• Analyze who has been doing what, where, when, and how on your
• Easily create customized firewall reports with intuitive analytics tools
Comment tirer le maximum d'un pare-feu de nouvelle génération ?
Ce webinar présente les tendances du marché et les exigences en perpétuelle évolution qui ont motivé notre entreprise à choisir Stonesoft et ses technologies.
• Qu'est-ce qui distingue un pare-feu traditionnel d'un pare-feu de nouvelle génération (NGFW) ?
• Quels sont les avantages de cette technologie et ses atouts vis-à-vis de la concurrence ?
• Comment optimiser les investissements consentis dans un NGFW ?
Participez à ce webinar pour en savoir plus !
Partie intégrante du cadre d'implémentation McAfee Security Connected, McAfee® Next Generation Firewall s'intègre aux solutions McAfee pour le réseau et les postes clients afin de procurer des performances de pointe et de permettre aux clients de tirer le maximum d'un pare-feu de nouvelle génération à la fois polyvalent et modulaire.