Hi [[ session.user.profile.firstName ]]
Sort by:
    • “Cloud-First” Ransomware: A Technical Analysis
      “Cloud-First” Ransomware: A Technical Analysis Netskope chief scientist Krishna Narayanaswamy and Director of Netskope Threat Research Labs Ravi Balupari Recorded: Apr 3 2017 5:55 pm UTC 44 mins
    • Get a technical analyses of recent malware campaigns discovered or documented by Netskope Threat Research Labs and learn how to defend against them.

      Cloud services have emerged as the preferred attack vector of some of the most dangerous and innovative cloud malware exploits of the past six months. Why? Because many organizations don't inspect their cloud SSL traffic for a malware and the same functionalities of the cloud dramatically increase productivity (sync, share, collaborate, etc) also provide ransomware developers with a perfect medium for faster delivery of malware payloads to more targets.

      Join Netskope chief scientist Krishna Narayanaswamy and Director of Netskope Threat Research Labs Ravi Balupari for a fascinating look at how malicious actors now design ransomware to make best use of popular cloud services to hide in plain sight, and do more damage in less time.

      Krishna and Ravi will provide technical analyses of recent malware campaigns discovered or documented by Netskope Threat Research Labs.

      These include:

      - Virlock, which encrypts files and also infects them, making it a polymorphic file infector
      - CloudFanta, which uses the SugarSync cloud storage app to deliver malware capable of stealing user credentials and monitoring online banking activities
      - CloudSquirrel, which takes advantage of multiple cloud apps throughout the ransomware kill chain with the intent to steal and exfiltrate user data
      - The Zepto variant of Locky ransomware, now distributed both by popular cloud storage apps and via DLL

      Read more >
    • 3 Things to Know When Securing Mixed, Multi-Cloud Environments
      3 Things to Know When Securing Mixed, Multi-Cloud Environments David Gold of ProtectWise and Scott Register of Ixia Recorded: Jul 21 2017 7:00 pm UTC 57 mins
    • Enterprises cannot move to the cloud quickly enough. In fact, Gartner estimates that by 2020, “cloud-first” and “cloud-only” will be standard corporate policies rather than exceptions.
      That’s a big problem for traditional security infrastructures. There’s a hodgepodge of disparate, disconnected security products that were not made to secure the cloud. Some vendors have “cloud-washed” their products, but these deliver questionable value. In real-world situations, these products perform poorly, lack critical functionality, and cannot provide the visibility time-strapped security teams require to be effective.

      ProtectWise and Ixia make it easy to secure workloads in the cloud, including multi-cloud environments, in addition to traditional on-premises networks. Running entirely from the cloud, the ProtectWise Grid delivers pervasive visibility via automatic real-time and retrospective threat detection, long-term retention of full-fidelity packet capture (PCAP) and unlimited forensic exploration. Ixia CloudLens™ simplifies capture of network traffic from public cloud, virtual, or physical environments and delivers it to The ProtectWise Grid seamlessly. Through this integration, ProtectWise and Ixia give security teams a single solution for end-to-end visibility across heterogenous public cloud, enterprise, and hybrid environments.

      Attend this webinar and learn how easy it is to secure the cloud with the joint ProtectWise-Ixia solution and:
      Why security in mixed- and multi-cloud environments can be difficult
      How moving to the cloud limits visibility for legacy security solutions
      How a modern approach to security provides pervasive visibility

      Read more >
    • Virtualization & Cloud Review: Cloud Killed the Firewall
      Virtualization & Cloud Review: Cloud Killed the Firewall Michael Beesley and Dan Backman Recorded: Aug 15 2017 9:00 pm UTC 62 mins
    • Cloud and DevOps changed everything. Existing DMZ and network perimeter architectures are not built to properly secure new cloud-connected applications now dominating the hybrid enterprise. Likewise, as DevOps and cloud drive faster application deployment, legacy DMZ architectures are simply too slow and complex to accommodate the highly agile cloud-connected enterprise.

      In this webinar you will learn:

      - Why existing firewall and DMZ architectures are not suited for securing cloud applications

      - How “Cloud-Aware” security policy can secure your cloud-connected applications

      - How to make your enterprise “Cloud-Ready”, and fix your aging DMZ architecture

      - … and how to transform your enterprise and become a Cloud Enabler

      Read more >
    • Building & Scaling a 100% Cloud & Mobile IT Organization
      Building & Scaling a 100% Cloud & Mobile IT Organization Daniel Lu, Product Marketing Manager, Okta Recorded: Apr 17 2017 7:55 pm UTC 57 mins
    • Today’s modern IT departments have fully adopted the cloud company-wide. Many organizations are being built 100% in the cloud with services like Google, but are beginning to see challenges staying 100% in the cloud as they continue to scale. At the same time, existing organizations with on-prem resources are actively perusing a “cloud and mobile first” strategy and are looking at initiatives such as migrating off AD and enabling a BYOD environment.

      In this webinar, we’ll talk about the key players that help organizations both large and small build out a 100% cloud and mobile IT strategy. Whether you started in the cloud and want to stay there or you are developing your “cloud-first” strategy, you will learn about the key decisions and challenges of achieving a 100% cloud and mobile IT environment.

      You'll learn:
      - How to scale while staying 100% in the cloud
      - Strategies for moving on-prem resources to the Cloud
      - Key decisions and challenges of achieving 100% cloud and mobile IT

      Read more >
    • Building the Digital Government of the Future in a Secure Cloud
      Building the Digital Government of the Future in a Secure Cloud eSignLive | Nintex | Drawloop Recorded: Mar 2 2017 7:00 pm UTC 59 mins
    • In this webcast, our panel of experts will discuss the benefits of using a secure FedRAMP compliant cloud and how to fulfill the government’s paperless and “cloud-first” mandate securely and with confidence – while giving your employees and citizens the digital government they want.

      We will cover:
      • The top digital use cases in government for integrated workflow and e-signatures
      • How FedRAMP compliance provides a standardized security approach for cloud services and benefits of using FedRAMP compliant solutions together to offer next-generation solutions
      • Demonstration of digital HR Recruiting application using CRM, Workflow and e-signature FEDRAMP technologies
      • Best Practices/Considerations for getting started

      Read more >
    • Cloud First: A New Competitive Advantage for Modern Enterprises
      Cloud First: A New Competitive Advantage for Modern Enterprises Todd Bernhard, Product Marketing Manager, CloudCheckr Recorded: May 23 2017 5:00 pm UTC 19 mins
    • The cloud has the potential to eliminate overhead, waste, security risks, and human error, without the hassles of running a traditional data center. Savvy enterprises are taking a “Cloud First” approach to computing resources as a major competitive advantage, enabling organizations to stay lean and increase operational efficiencies, mitigate risks, and save money as they grow.

      During this webcast, CloudCheckr Product Marketing Manager Todd Bernhard will uncover why and how modern enterprises are transitioning to a Cloud First approach, including:

      - Going all-in with the cloud as a major competitive advantage

      - Understanding the differences between on-prem vs. operating in the cloud

      - Choosing the right cloud management tools to gain complete visibility

      Read more >
    • Balancing Security & Usability with Cloud Identity & Access Management Solutions
      Balancing Security & Usability with Cloud Identity & Access Management Solutions Joe Diamond, Director, Security Product Marketing Management Okta Recorded: May 9 2017 7:00 pm UTC 41 mins
    • As financial services firms warm up to the idea of being “cloud first” by deploying applications in a private or public cloud, the challenges of managing identities become increasingly complex.
      With each solution generally coming to the table with its own authentication paradigm and notion of user management, it’s easy for a user to have excessive user names and passwords that often go unmanaged.

      Join this session to hear about how next-generation identity solutions can drastically improve your security posture, while also enhancing end user experience through seamless access to business applications.

      During this webinar, you will learn about:

      • Centralized identity and access control for cloud, mobile and legacy on-prem applications
      • Guaranteeing strong authentication across all services, everywhere
      • Attacking surface reduction through automated provisioning and de-provisioning
      • Using authentication threat insights to identify and response to compromise

      Read more >
    • Windows IT Pro: Beyond Hyperconverged
      Windows IT Pro: Beyond Hyperconverged Michael Beesley and Dan Backman Recorded: Jun 28 2017 10:45 pm UTC 55 mins
    • Your data center isn’t done evolving. The software-defined data center solved the problem of converging the silos that builtyesterday’s enterprise, but this only solves yesterday’s problem of managing data center resources. A modern cloud-ready enterprise infrastructure must deliver the same user experience as cloud services.

      After using public cloud services like Amazon AWS, Microsoft Azure and Google Compute Engine, your users learned that deploying applications should be a self-service exercise. This means deploying apps with no trouble tickets, no conference calls and no project managers. The cloud-ready data center can deploy and connect hybrid cloud applications with no compromise on agility or security.

      Learn how you can:

      · Upgrade your infrastructure beyond hyperconverged, and deliver a “cloud experience” for your users

      · Increase both the agility and security of your on-premises compute

      · Waste less time on care and feeding of your infrastructure

      Evolve beyond hyperconverged: become a cloud enabler.

      Read more >
    • Straight Talk on Business Critical Applications in the Cloud
      Straight Talk on Business Critical Applications in the Cloud Jim Hannan, Principal Architect; House of Brick Technologies Upcoming: Oct 17 2017 5:00 pm UTC 60 mins
    • As much as the term Cloud Computing gets tossed around these days you would think everyone’s using it. But do cloud predictions really match real world use? If you aren’t “in the cloud” are you already behind the competition?

      During this presentation, we will discuss the pros and cons of moving applications to the cloud, with a particular focus on business critical applications. We will share our experiences working with clients to determine if their applications are “cloud ready” through a review of availability, costs, and operational impacts. Examples of successful use cases in the public cloud will be explored including emerging technologies, DRaaS, new applications, older applications running on older hardware, and startups.

      You’ll leave with a better understanding of the types of applications that are best suited for the cloud, a list of questions you should be asking when considering moving to the cloud, and a checklist you can use to evaluate your application’s cloud readiness.

      Read more >
    • Delivering Applications in Hybrid and Multi-Cloud Environments
      Delivering Applications in Hybrid and Multi-Cloud Environments Ashish Shah Recorded: Nov 17 2016 5:00 pm UTC 37 mins
    • Enterprises are increasingly adopting hybrid and multi-cloud computing strategies to speed up application rollouts, gain operational and cost benefits, and improve business agility. According to RightScale’s “Cloud Computing Trends: 2016 State of the Cloud” survey and report, hybrid cloud adoption increased from 58% to 77% year-over-year. 17% of enterprises now have more than 1000 VMs in the public cloud, up from 13% in 2015. This of course means that businesses need to consider application services that work across data centers and multiple cloud environments.

      Join Avi Networks for a webinar to learn how to:

      -Deliver consistent load balancing and application services across cloud environments
      -Leverage the power of hybrid clouds, elastic on-demand scaling, and cloud bursting
      -Troubleshoot application issues in mere minutes with pinpoint analytics
      -Reduce the risk of cloud vendor lock in

      In just 40 minutes, you will learn how next-gen load balancing architectures can play an expanded role in delivering and scaling your applications across clouds, providing performance insights, and automating application services.

      Read more >