Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date VMware NSX Advanced Threat Prevention (Technology Overview) Frederick Verduyckt, Helena Goodfellow Modern attacks require modern solutions. Leverage multiple detection engines in the distributed IDS/IPS, NTA, and sandbox to block advanced threats fr... 1 month ago | 49 mins VMware Advanced Threat Prevention (Practical Application to VDI) Frederick Verduyckt, Helena Goodfellow Modern attacks require modern solutions. Leverage multiple detection engines in the distributed IDS/IPS, NTA, and sandbox to block advanced threats fr... 1 month ago | 61 mins Overview of NSX Distributed IDS/IPS VMware NSX In this overview video you'll learn about IDS/IPS benefits, use cases, and how NSX Distributed IDS/IPS is different from traditional appliance-based I... 3 years ago | 12 mins Preparing for the Next Evolution of DDoS Attacks Nishit Sawhney, Director, Product Management, Verisign Distributed Denial of Service (DDoS) Attacks are a real threat for today’s organizations. Current trends indicate that these attacks are becoming incr... 7 years ago | 41 mins The Modern DDoS Attack: Learn How Companies are Responding Dave Shackleford, IANS Lead Faculty and JP Blaho, Senior Product Marketing Manager Arbor Networks In today’s online enterprise, a single second in website response time can affect revenue conversion and customer satisfaction. Often, distributed den... 8 years ago | 60 mins Staying Ahead of the Next Generation of DDoS Attacks Patton Adams, Director of Cyber Threat Analysis and Reconnaissance Join Patton Adams, experienced network defender and Verisign iDefense Director of Cyber Threat Analysis and Reconnaissance as he presents Verisign’s u... 7 years ago | 36 mins Blockchain For Identity Authentication Infrastructure Professor Michael Mainelli, FCCA FCSI FBCS (Z/Yen Group Limited) Mutual distributed ledger (MDL) identity schemes could empower people with personal data storage and management, permission frameworks for access by t... 6 years ago | 49 mins Storms on the Horizon: Why are Cloud Services Targets of Availability Attacks? Rakesh Shah, Senior Director, Product Marketing & Strategy, Arbor Networks As more services move to the cloud, the accessibility of these services becomes absolutely critical. This movement has also attracted the attention o... 8 years ago | 45 mins When Things Misbehave: How to Mitigate Massive DDOS Attacks Moshe Elias, Director of Product Marketing and Scott Poretsky, AVP Solutions Architect The Distributed Denial of Service (DDoS) attack launched Friday, October 21, against Dyn - one of the largest managed DNS infrastructure providers - w... 6 years ago | 45 mins Knowledge of Natural Sciences Applied to Cybersecurity Luis Bernardi, Director at IT Scientia Ltd The use of the knowledge and understanding of natural sciences, in particular the human body, applied to computer security is an appealing concept for... 6 years ago | 45 mins