Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Safeguard Your Cloud Environment and Invest Confidently with Virtual FireWalls Sam Conway, Sr. Consultant, Forrester | Navneet Singh, VP Marketing, Firewalls & Cloud-Delivered Security, Palo Alto Networks Justify your cloud security investment, VM-Series virtual NGFWs, with a 115% ROI, pay for themselves in 6 months. Forrester details its TEI study of V... May 26, 2022 4:00pm Safeguard Your Cloud Environment and Invest Confidently with Virtual FireWalls Sam Conway, Sr. Consultant, Forrester | Navneet Singh, VP Marketing, Firewalls & Cloud-Delivered Security, Palo Alto Networks Justify your cloud security investment, VM-Series virtual NGFWs, with a 115% ROI, pay for themselves in 6 months. Forrester details its TEI study of V... 1 month ago | 29 mins Multi-Cloud Networking and Security with the Modern Network Venky D. - Director of Product Management VMware, Ben F. - Lead Architect William Hill, Ranga. - VP Chief Architect VMware Application environments today, in public and private clouds, aim to improve end-user experience, developer agility and IT service delivery. However, ... 1 month ago | 25 mins 5 Best Practices: Reduce Arista, Cisco, SONiC, Juniper DC Deployment to Days Jeff Doyle is a prolific author for CCIEs, routing, OSPF, Switching TCP/IP. etc and is a member of technical staff at Juniper Do you need to deploy new data center switches quickly? Find out how you can reduce your data center deployment from months to days with a tool that a... 12 hours ago | 61 mins Learn How to Find Security Threats Before Hackers Find Them For You Keith Bromley, Keysight Technologies | Scott Register, Keysight Technologies | David Batty, Trellix Please join us for a replay of this webinar. Every network has a security vulnerability. Vulnerabilities obviously lead to threats. Do you know where... 4 hours ago | 62 mins Faster Breach Detection Ron Stein, CPacket Networks Breaches happen by clever and well-armed cybercriminals who use many tactics, techniques, and procedures to infiltrate IT infrastructure, implant malw... 22 hours ago | 48 mins ThreatINSIGHT - Eliminating Adversaries’ Dwell Time Advantage Gigamon ThreatINSIGHT Team For the past decade, we’ve all seen reports that show adversary dwell time exceeding well beyond acceptable ranges (280 days, as reported by IBM). Thi... May 19, 2022 5:00pm Securing Cloud Environments Chris Borales, Sr. Product Marketing Manager - Gigamon Originally aired on an ActualTech Media webcast. It's getting harder to distinguish the cloud from the edge and from the data center as technologies ... 19 hours ago | 29 mins Leveraging traffic shaping and monitoring to optimise network performance Ian Turkington, TM Forum, Ankush Saikia, OSS Strategy & Architecture Manager, Three, Gethin Owen, Gigamon The Covid-19 pandemic has forced communications service providers (CSPs) to alter how they operate their networks and deliver solutions to their custo... May 24, 2022 8:00am Xcel Energy Automates PKI and Certificate Lifecycle Management with AppViewX Murali Palanisamy, Chief Solutions Officer & Jeff Hagen, Lead PKI Security Engineer AppViewX's PKI Panel is a series of virtual panel discussions where we talk to leaders in the cyber-security, network management, and PKI space about ... 1 day ago | 58 mins Load more