Hi [[ session.user.profile.firstName ]]
Sort by:
    • (UK) Defending Your Workloads with a Distributed Web Application Firewall (WAF)
      (UK) Defending Your Workloads with a Distributed Web Application Firewall (WAF) Christian Treutler Recorded: Nov 24 2017 3:00 pm UTC 52 mins
    • Avi Networks has launched a new intelligent web application firewall (iWAF) that performs 50X faster than legacy appliances, processing hundreds of Gbps of throughput and over a million transactions per second. As a software-only solution, iWAF operates as a centrally managed fabric across data centers, private clouds, and public clouds. Register for this webinar to learn about the unique capabilities of Avi Networks’ iWAF include:

      Highest-performance web application security
      ● Elastic, automatic scale-out across data centers and clouds
      ● Scalable per-application deployments allow each mission-critical app to get its own WAF

      Analytics-driven, accurate security policies
      ● Real-time security insights eliminate false positives
      ● Visual policy checks prior to enforcement

      Central, simplified policy management
      ● Central management and automation of all distributed iWAF instances
      ● Point-and-click policy configurations, with pre-defined templates for OWASP Core Rule Set

      Read more >
    • The Impact Of Enterprise Web Application Trends Going Mainstream
      The Impact Of Enterprise Web Application Trends Going Mainstream Saikrishna “Sai” Chavali, CA Veracode Product Manager Recorded: Oct 26 2017 4:00 pm UTC 46 mins
    • Software is increasingly the lifeblood of every organization. We are faced with managing the rapid proliferation of web applications and services on which they rely to run their business. The mainstream nature of APIs, standalone and behind web apps, and DevSecOps practices are dramatically changing the potential attack surface for hackers and other threats.

      Watch this webinar to hear more about these trends and assess how you need to work within your organization to ensure the security of your application. Specific topics to be discussed include:
      •Single Page App-ish (SPA) Architecture to rule enterprise web apps
      •Rise of DevSecOps and how its practices demand even faster performance and security testing cycles
      •Standalone APIs are valuable attack surface for hackers

      Read more >
    • The Future of COBOL Applications
      The Future of COBOL Applications Ed Airey, Solutions Marketing Director for COBOL Solutions & Scot Nielsen, COBOL Portfolio Director Recorded: Jan 22 2018 10:30 am UTC 60 mins
    • Digital is driving faster change across every aspect of IT and business. But what does this mean for the future of your COBOL applications? We asked and you answered.
      Join COBOL experts, Ed Airey and Scot Nielsen, to see the future of COBOL applications as they unveil and discuss highlights from the 2017 COBOL market survey.
       
      Learn how...
      ·         The latest technologies are inspiring COBOL innovation
      ·         COBOL is connected to core business strategy
      ·         The top priorities for application development and modernization are evolving
      ·         To plan your future application road map
       
      Hear how your peers are responding to digital transformation across their COBOL systems. Join us for a first look at the next generation of COBOL applications and see how your COBOL systems can take full advantage of this new digital opportunity.

      Read more >
    • Defending Your Workloads with a Distributed Web Application Firewall (WAF)
      Defending Your Workloads with a Distributed Web Application Firewall (WAF) Guru Chahal Recorded: Oct 19 2017 5:10 pm UTC 57 mins
    • Avi Networks has launched a new intelligent web application firewall (iWAF) that performs 50X faster than legacy appliances, processing hundreds of Gbps of throughput and over a million transactions per second. As a software-only solution, iWAF operates as a centrally managed fabric across data centers, private clouds, and public clouds. Register for this webinar to learn about the unique capabilities of Avi Networks’ iWAF include:

      Highest-performance web application security
      ● Elastic, automatic scale-out across data centers and clouds
      ● Scalable per-application deployments allow each mission-critical app to get its own WAF

      Analytics-driven, accurate security policies
      ● Real-time security insights eliminate false positives
      ● Visual policy checks prior to enforcement

      Central, simplified policy management
      ● Central management and automation of all distributed iWAF instances
      ● Point-and-click policy configurations, with pre-defined templates for OWASP Core Rule Set

      Read more >
    • Application Security in an Open Source World
      Application Security in an Open Source World Kunal Anand, Prevoty | Rob McCurdy, MSU | Nate Smolenski, New York Life | Andy Wickersham, Fortune 100 | Sean Martin, ITSP Recorded: Oct 4 2017 5:00 pm UTC 63 mins
    • Thanks for your interest in our webcast where we will be discussing how to secure applications that rely on third-party and open source software.

      Aside from the data they collect, create, and store, applications can oftentimes be an organization's greatest digital asset. Building custom applications to match the customer and market demands mapped to revenue objectives and available resources can be tremendously rewarding, but also a potentially-huge undertaking.

      Ultimately, time to market is always a factor ... a requirement that almost always wins out over security. One way to tackle the time and effort to deliver more quickly is to leverage third party and open source components. But, do these elements save you in the long run - or do they introduce more risk in the form of potential vulnerabilities that are either not easily uncovered (at best) or not easily patched (if patchable at all)?

      To answer these questions and more, we've pulled together a group of experts that deal with these challenges on a daily basis. During their conversation, webinar attendees will learn:

      - What the value of open source software (OSS) is
      - What are some common cases where open source software is utilized in today's applications
      - What are the security risks and pitfalls when using OSS
      - A view into a few case studies for companies that have fallen victim to the risks of using OSS
      - How have companies identified and mitigated the risks associates with the OSS component, Struts
      - How to tune the secure software development lifecycle (SSDLC) to account for the use of open source software

      Remember, when you register for this expert webcast you will also receive a download link for a new white paper titled "Application Security in an Open Source World."

      Your Moderator:
      Sean Martin, Editor-in-Chief, ITSPmagazine

      Expert Panelists:
      Kunal Anand, Co-Founder and CTO, Prevoty
      Rob McCurdy, CIO, MSU
      Nate Smolenski, CVP, New York Life
      Andy Wickersham, AppSec Leader, Fortune 100 Co.

      Read more >
    • Modernizing Legacy Applications
      Modernizing Legacy Applications Zohaib Khan, Red Hat Modern Application Development Practice Lead, Chris Shelderfer, Red Hat Sr. Middleware Solutions Sales Recorded: Nov 1 2017 3:00 pm UTC 50 mins
    • Over time, every IT portfolio gets bogged down in the chaos of servers, platforms and software built on disparate architectures and aging technology not designed for cloud-native development. Legacy systems slowly eat away at returns, reduce the ability to respond to shifting demands, and limit how quickly companies can scale to meet new market opportunities.

      By modernizing the IT landscape you already have you can reboot your portfolio for greater agility, reduced costs and operational excellence, freeing up your time and money to focus on innovation and not implementation.

      You will learn how to:
      -Proactively increase IT infrastructure performance and agility to meet scaling demands
      -Eliminate reliance on legacy systems and associated risks
      -Significantly reduce operational cost of IT infrastructure
      -Improve enterprise governance and compliance by implementing business rules.
      -"Future proof” your applications by incorporating business rules as a microservice.

      Read more >
    • Five Risks That Could Jeopardize Your Application Security Strategy
      Five Risks That Could Jeopardize Your Application Security Strategy Arxan: Dustin Anders | 451: Scott Crawford Recorded: Dec 5 2017 9:00 pm UTC 39 mins
    • Applications are ubiquitous and essential to the operation and growth of business in today's digital enterprise. Applications are a treasure trove of customer information, intellectual property, and confidential data. They often contain critical IP, application functionality, data, and keys for accessing back-end corporate systems.

      Many enterprises believe the measures they have taken to protect their networks and endpoints and to develop more secure applications are sufficient to mitigate these risks. But many of these measures only build better fences around applications. Organizations that develop applications, meanwhile, may believe that the measures invested in application security testing and operational defense can mitigate at least the most significant exposures. But when an adversary has the ability to analyze applications closely, organizations may be surprised to discover that the security of sensitive data, their competitive advantage, and keys to accessing critical back-end systems, can be laid bare more easily than they think.

      Compromises to an organization’s applications can create enormous risks that company leaders may rarely consider fully. Breaches to an application can quickly lead to a loss of IP, damage an organization’s brand, violate compliance and regulatory requirements, and even lead to customer harm – consequences abundantly evident in recent high-profile breaches.

      Join us to learn more about the 5 critical areas where application risk management falls short.

      Read more >
    • Rethinking Application Delivery in the Cloud Era
      Rethinking Application Delivery in the Cloud Era Brad Casemore, Research Director, Datacenter Networks, IDC & George McGregor, Senior Director, Product Marketing, Citrix Recorded: Nov 30 2017 3:30 pm UTC 38 mins
    • Today, multi-cloud is the new norm for cloud adopting organizations. The organizations that thrive will be those that can adapt their multi-cloud and hybrid-cloud architecture to simply and reliably deliver applications. According to IDC, 94% of organizations are already reassessing, modifying, or overhauling their network to facilitate app delivery for a cloud-first world. Wanting to dive deeper, Citrix commissioned IDC to conduct a custom survey of 900 organizations to uncover how enterprises were meeting the network requirements for cloud adaptation.

      Join guest speaker Brad Casemore, IDC’s Research Director, Datacenter Networks and George McGregor, Citrix Senior Director of Product Marketing, as we present the results of this unique survey, which delves into the infrastructure required to deliver applications and what changes are needed from the traditional datacenter approach as apps move to the cloud.

      Attend this on-demand webinar and discover: 

      •How your peers adapt application delivery network and infrastructure for cloud
      •Data to support what’s working and not working
      •The top concerns preventing successful cloud adoption

      Read more >
    • How To Transform Your Applications Experience with Applied Innovation
      How To Transform Your Applications Experience with Applied Innovation Brendan Crowe - Moderator; Rod Fontecilla, VP Application Modernization; Darren McGrath, Global Director-Mobility Solutions Recorded: Sep 10 2014 5:00 pm UTC 47 mins
    • The rapidly changing technology landscape is creating a paradigm shift in the way end-users access, experience and consume enterprise applications. This change is being driven by a number of elements that merge together in creating an applications estate that is characterized by its moving pieces. Mobility, Big Data and the Cloud have significant ramifications for Enterprise Applications that need to be addressed in order to create a dynamic, scalable and future ready experience for your end-users.

      Doing that requires you to answer some very important questions:
      How do you offer the most relevant applications and cater to the unique role requirements of your users?
      What are the applications from your portfolio that can be most effectively transitioned to the Cloud?

      How insights into your end-users behavior, accepted response times and commonly used devices and platforms can help in creating the most optimized experience?
      How can insights into your end-users behavior, accepted response times and commonly used devices and platforms can help in creating the most optimized experience?

      Join Brendan Crowe, Global Solutions Director, Application Managed Services at Unisys as he hosts a discussion between Rod Fontecilla, Vice President of Application Modernization for Unisys Federal Systems and Darren McGrath, Unisys Global Director, Mobility Solutions on how Mobility, Cloud and Big Data are driving rapid changes in your Applications Environment and what you can do to stay one step ahead.

      Read more >
    • Application Services for Container and Microservices (German)
      Application Services for Container and Microservices (German) Tim Arenz Recorded: Oct 27 2017 2:05 pm UTC 53 mins
    • Die Avi Vantage Plattform integriert sich nahtlos in Container-basierte Umgebungen und ermöglicht die flexible Bereitstellung von Load Balancing, Service Discovery, Service Proxy, Application Mapping und Auto-scaling Funktionalitäten in Mesos, Docker, Kubernetes, OpenShift und weiteren Container Plattformen. Dank der integrierten Analytics Engine ist es endlich möglich End-to-End Visibility und Performance Monitoring für Microservices darzustellen. Auf Basis des Real-Time Traffics und der Applikations-Performance können Anwendungen automatisch skaliert werden um der wachsenden Popularität der Anwendungen, ohne Einbruch der Performance, gerecht zu werden.

      In diesem Webinar zeigt die Firma Avi Networks unter anderem:
      - Hoch integriertes, Enterprise-class Load Balancing für aktuelle Container Plattformen
      - Application Analytics, welche das Troubleshooting komplexer Microservices vereinfacht
      - Micro-Segmentation, DDoS Protection, Web Application Firewall für Microservices
      - Automatische Skalierung von Anwendungen auf Basis von Real-Time Performancedaten

      Read more >
    • Veracode Web Application Scanning: Discover, test, & monitor web applications
      Veracode Web Application Scanning: Discover, test, & monitor web applications Glenn Whittemore, Solution Architect, CA Veracode Recorded: Aug 23 2017 4:00 pm UTC 22 mins
    • Looking for a consolidated solution to find, secure, and monitor all of your web applications?

      Join this 20 minute webinar to see how Veracode can help you easily track and inventory all of your external web applications with the ability to scan and scale on thousands of sites in parallel to find critical vulnerabilities and prioritize your biggest risks.

      Learn how to leverage technologies such as Veracode Web Application Scanning which enable teams to discover and address vulnerabilities during the production and pre-production phases of the software development lifecycle (SDLC). As one of the multiple scanning technologies Veracode offers on a single platform, your organization can systematically reduce risk while continuously monitoring your security posture.

      Read more >