Hi [[ session.user.profile.firstName ]]
Sort by:
    • Virtualized Network Services: Cyber Security on Your Terms
      Virtualized Network Services: Cyber Security on Your Terms Marcelo Lima, Global Channel Sales - Technical Lead, Palo Alto Networks and Anuj Dutia, Product Marketing Director, Verizon Recorded: Nov 8 2016 5:00 pm UTC 56 mins
    • How do you balance protecting your company and keeping IT costs low? Join Verizon and Palo Alto Networks and learn about our new virtualized network security solution. This Security as a Service offering provides a best-in-class prevention-focused network platform in simplified service tiers. It offers subscribers flexible purchasing and service delivery models without sacrificing advanced threat protection.

      Join this webinar to learn how to:
      · Strengthen your network defenses while simplifying management.
      · Get the security your network needs with flexible, cost-effective options.
      · Give yourself time to focus on your business.

      Additionally, we will explore Palo Alto Networks’ Security Lifecycle Review, a free tool that helps you understand the business and security risks your organization faces, providing an opportunity to review the findings and take action. The review looks into known and unknown threats and integrates existing Application Visibility Report data with WildFire™ cloud-based threat analysis service, SaaS-based application visibility, and more.

      Read more >
    • The Advantages of User ID/Awareness in Public Sector Network Security
      The Advantages of User ID/Awareness in Public Sector Network Security Neil Mantle - Systems Engineer - Palo Alto Networks Recorded: Mar 21 2017 6:05 pm UTC 32 mins
    • To serve their citizens, federal/national, state and local governments must gather, create, or process sensitive information. As various high-profile breaches have demonstrated, this data is not sufficiently protected, particularly from the insiders whose actions are responsible for the majority of public sector security incidents. Traditional network security focuses on detecting outsiders attempting to steal data or disrupt network operations, but does little to monitor or limit the actions of legitimate users that make mistakes or deliberately misuse data. User and directory controls verify legitimate users, but they won't prevent accidental disclosure of sensitive data, exfiltration of sensitive data by legitimate users, or insiders with stolen credentials from accessing data. Preventing security incidents and protecting government information requires a comprehensive, organization-wide access approach that can accommodate the context of individual users, the data they need access to, and the limits on what they can do with that data.

      The Palo Alto Networks Next-Generation Security Platform prevents security incidents while fully enabling user productivity by granting access contextually to those who need it, and denying it to all others. This, coupled with denying all applications that are not needed by the organization, immediately reduces a government organization’s threat posture. Join us to learn more.

      Read more >
    • Network Access Control 101: Securing the Critical Edge of Your Network
      Network Access Control 101: Securing the Critical Edge of Your Network Tom Murphy, CMO, Bradford Networks Recorded: Oct 7 2014 3:00 pm UTC 31 mins
    • As the volume and diversity of mobile devices on your network continue to rise, so does the need to ensure that every device is safe. Cybercriminals leverage vulnerable endpoints as backdoors to the network and according to Gartner "by 2017, the focus of mobile breaches will shift to tablets and smartphones from workstations."

      As the attack surface of your network continues to multiply with each new device, network access control is essential to securing your assets and critical infrastructure.

      Attend this webinar to get a complete understanding of NAC functionality and how you can leverage visibility, policies, and automation to secure the critical edge of your network, including:

      - Safe Onboarding – Allow users to self-register their devices securely, to reduce the burden on IT Staff
      - Device Profiling – Identifies and classifies every device on the network to provide greater visibility
      - Endpoint Compliance – Ensure every device is safe enough to join the network, to reduce risk
      - Network Automation – Dynamically provision network access based on policies that leverage user, device, and location
      - Security Automation – Capture and automatically execute complex investigative workflows that are time consuming and error prone
      - Rapid Threat Response – Dramatically reduce the time required to contain compromised or infected devices

      Read more >
    • The Evolution of VMware’s Private Cloud Network Using NSX
      The Evolution of VMware’s Private Cloud Network Using NSX John Tompkins, OneCloud Network Architect, VMware Recorded: Oct 27 2016 3:00 pm UTC 46 mins
    • VMware’s Private Cloud network relies heavily on the Software Defined Networking features provided by NSX today: however; it all started with a very traditional network topology. In this session we will discuss the evolution of VMware’s Private Cloud Network and how it evolved into one of the world’s biggest NSX for vSphere deployments. We will discuss design considerations and challenges, how we were able to achieve a scalable, multi-tenant security model and the technical and operational benefits that VMware’s Private Cloud team has garnered from adopting NSX.
      •Design considerations for large-scale, multi-tenant NSX environments
      •Overcoming technical and operational challenges with VMware’s Private Cloud and NSX
      •Benefits of transforming your traditional network to a software-defined one

      Read more >
    • How to Integrate your Software-Defined Network and Cloud Communications
      How to Integrate your Software-Defined Network and Cloud Communications Fan Gu, Sr. Product Manager, VeloCloud Networks Recorded: Mar 16 2017 5:00 pm UTC 24 mins
    • Voice quality monitoring is essential for anyone, whether Service Provider or Enterprise, with voice deployed in their network. It is an indispensable capability – from either a business or operational viewpoint – in the network infrastructure, and is often costly and complex. VeloCloud VQM allows you to monitor, diagnose and proactively troubleshoot network issues before they impact business-critical voice communications.

      This webinar discusses:

      - The tangible benefits of the VeloCloud VQM solution
      - Explains how VeloCloud integrates VQM with SD-WAN architecture
      - Provides details on the licensing models to enable VeloCloud VQM in your network
      - Diagnosing and solving your voice quality challenges with VeloCloud VQM

      Read more >
    • How High-Performing IT Teams Tame Network Complexity
      How High-Performing IT Teams Tame Network Complexity Shamus McGillicuddy, Sr. Network Mgmt Analyst, Enterprise Management Assoc; Mark Towler, Sr. Product Marketing Manager Recorded: Jun 15 2016 6:00 pm UTC 41 mins
    • IT Teams are being overwhelmed by the increasing complexity of the networks they’re required to manage. Not only do they have too much to do, they paradoxically also have too many tools with which to try to do it! Yet there are a number of clear similarities found amongst the IT teams that are most productive and most effective. Ipswitch and Enterprise Management Associates both surveyed IT teams worldwide to find out how the best IT teams were able to cope.

      The webinar will present our findings and answer key questions such as:

      •What are the emerging challenges facing IT professionals?
      •How are these challenges impacting their business and their end-users?
      •How do the most productive IT teams address increasingly complex networks?
      •Why are additional management tools and outsourced management counterproductive?

      Data shows that increasing network complexity doesn’t have to degrade the effectiveness of IT teams or the businesses they support. Join this webinar to find out how the high-performing IT professionals manage this – and learn what not to do as well!

      This session will be presented by Shamus McGillicuddy, Senior Network Management Analyst for Enterprise Management Associates as well as Mark Towler, Senior Product Marketing Manager for Ipswitch.

      Read more >
    • The Role of Internal Network Traffic Analysis in Cybersecurity
      The Role of Internal Network Traffic Analysis in Cybersecurity Rob Westervelt, Research Manager, IDC Security + Arabella Hallawell, Sr. Director ADVT Product Marketing, Arbor Networks Recorded: Dec 8 2016 5:00 pm UTC 61 mins
    • This joint webinar between IDC and Arbor Networks will discuss how the threat landscape is rapidly evolving with financially motivated attackers, nation-states, and hacktivists out to disrupt business operations, steal data, or conduct corporate or cyberespionage.

      IDC analyst Rob Westervelt will examine an emerging category of solutions called Internal Network Traffic Analysis, which provide innovative approaches to attack detection and prevention. A comprehensive approach for data protection has network monitoring and traffic inspection at its core. Network traffic analysis is an essential element of most threat prevention and data protection strategies. He will explore why these solutions are a requirement and describes the most critical components necessary to identify and contain attacker movement before critical network resources and servers containing sensitive data are exposed.

      Arbor’s Arabella Hallawell, herself a former industry analyst with Gartner, will discuss the role of Arbor Networks solutions in addressing the challenges described above.

      Read more >
    • CTO PoV: Enterprise Networks (Part 2)
      CTO PoV: Enterprise Networks (Part 2) Khalid Raza, CTO & Co-Founder, Viptela & Danny Johnson, Director, Product Marketing: Network Services, Verizon Recorded: Mar 16 2017 5:00 pm UTC 45 mins
    • In Part 2, the CTO PoV will focus on Security for IoT and Cloud in Enterprise Networks.

      IoT, Cloud and Mobile devices are stretching the traditional limits of IT security. As enterprise applications change and technology advances, the fundamental network infrastructure needs to support a robust security framework.

      Khalid Raza (CTO, Viptela) & Danny Johnson (Director, Verizon) share their Point of View on why current WAN infrastructures are not designed to support new enterprise traffic patterns, and how emerging security approaches designed around segmentation and policy can help organizations adapt to these changes. Enterprises can protect their Cloud and enterprise against attacks and data leaks while migrating to a cost-effective Hybrid architecture.

      In this webinar, we will cover:

      - The security threats around Cloud and IoT
      - Applications that are stressing enterprise network security requirements

      View Part 1 On-Demand: https://www.brighttalk.com/webcast/14779/247749

      Read more >
    • Hidden Benefits of OneTouch AT Network Tester
      Hidden Benefits of OneTouch AT Network Tester Mike Pennacchi, Network Protocol Specialists Recorded: Dec 13 2016 2:01 am UTC 48 mins
    • There is no doubt that when it comes to network validation, the NETSCOUT OneTouch AT is the best tool. However, this highly portable network troubleshooting tool has many features to offer, beyond just network validation. In this webcast, we will cover a number of tools built into the OneTouch AT that will help you quickly get to the root of your networking problems.
      In this webcast, we will look at:
      •How to trace a path through the network at layer 2 and layer 3
      •Using the built-in web browser and SSH client to configure devices
      •Inspect fiber end faces, using the optional Fiber Inspector
      •Locate wireless interference sources
      •Remotely control the OneTouch AT via the cloud based web interface
      •Automatically upload test results to the cloud
      •Control the OneTouch AT via the management interface
      •Perform in-line packet capture
      •Export test results to XML files, so they can be opened in MS Excel

      Read more >
    • Hidden Features of the OneTouch AT Network Tester
      Hidden Features of the OneTouch AT Network Tester Mike Pennacchi, Network Protocol Specialists Recorded: Dec 14 2016 6:00 pm UTC 76 mins
    • There is no doubt that when it comes to network validation, the NETSCOUT OneTouch AT is the best tool. However, this highly portable network troubleshooting tool has many features to offer, beyond just network validation. In this webcast, we will cover a number of tools built into the OneTouch AT that will help you quickly get to the root of your networking problems.

      In this webcast, we will look at:

      • How to trace a path through the network at layer 2 and layer 3
      • Using the built-in web browser and SSH client to configure devices
      • Inspect fiber end faces, using the optional Fiber Inspector
      • Locate wireless interference sources
      • Remotely control the OneTouch AT via the cloud based web interface
      • Automatically upload test results to the cloud
      • Control the OneTouch AT via the management interface
      • Perform in-line packet capture
      • Export test results to XML files, so they can be opened in MS Excel

      Live Event Bonus: Two attendees of the live event will each receive a NETSCOUT cell phone power charger.

      Read more >
    • Keeping the lights on | the real cyber security risks for ICS networks
      Keeping the lights on | the real cyber security risks for ICS networks Andrew Barrett, Head of Utilities EMEA at Palo Alto Networks Recorded: Apr 21 2016 9:00 am UTC 42 mins
    • It has been well known for some time now that cyber threats to critical national infrastructure has been escalating with attacks like Stuxnet (2010), Night Dragon (2011) Shamoon (2012) and the recent attack on a Ukraine Power Station all making headline news.

      Of course, normal information assurance approaches used in the corporate environment may not be suitable for ICS. Challenges such patching or providing software updates onto a live system within an ICS network can leave some systems vulnerable to attack from malicious software.

      Add to this the risk of third parties (such as support organisations and other entities in the supply chain) being given connectivity via remote access, the chance of new threats being introduced from outside of the organisation increases significantly.

      Please join Palo Alto Networks for a live webinar to discuss how the threat landscape to ICS has meant that legacy technologies are no longer effective in stopping the different types of Cyber threats whilst achieving the all important goal of keeping the process protected yet uninterrupted.

      Read more >
    • The Easy Way to Validate 10G Network Connectivity
      The Easy Way to Validate 10G Network Connectivity Mike Pennacchi, Network Protocol Specialists Recorded: Nov 16 2016 9:00 pm UTC 60 mins
    • “I don’t always validate network connectivity… but when I do, it’s an enormous time sink.” -The Most Interesting IT Pro in the World
      If this sounds familiar, we have good news. You can now drastically reduce the time spent on network analysis and validation with the right tools and know-how.
      Join us for a guided walkthrough of the validation process and learn about:
      Understanding and navigating the Open Systems Interconnection model (OSI model)
      Troubleshooting connectivity vs. network performance
      Determining availability of services
      Live Event Bonus: Two attendees of the live event will each receive a NETSCOUT cell phone power charger.

      Read more >