Advanced Threat Protection: For all of the Network, All of the Time

Presented by

Patrick Grillo, Senior Director, Security Solutions, Fortinet

About this talk

The headlines are full of claims by security companies having the key to solving the problem of Advanced Persistent Threats (APT). However, on closer inspection it seems that while the technology that they’re touting is interesting, it’s only a partial solution because it only addresses part of the problem. In today’s changing threat horizon, attacks can come from anywhere, at anytime and in any form. An effective Advanced Threat Protection (ATP) capability must be able operate in the same manner - everywhere in the network, with any technology and fully collaborative. This webinar will present and focus on the following: 1.The range of technologies needed 2.How to close off exploitable gaps with common threat intelligence 3.Technology is only part of the final solution

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13395)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more