Hi [[ session.user.profile.firstName ]]

sécuriser votre passage au Cloud grâce au nouvel OS 12.0 pour SMA 1000 Series

La croissance exponentielle du BYOD et des applications dans le Cloud, mais aussi le besoin accru de sécuriser les accès posent des exigences plus strictes en matière de sécurité mobile. De plus en plus, la difficulté de connecter différents appareils mobiles à tout type de données empêche les entreprises d’étendre leur accès en toute sécurité. Les appliances SonicWall Secure Mobile Access 1000 Series (anciennement Aventail) fournissent aux clients et partenaires un accès sécurisé extrêmement fiable, sans les risques ni la complexité liés à une migration vers le Cloud.

Le firmware OS 12.0 pour SMA 1000 Series :
•pose de nouvelles références en matière de continuité des activités grâce à la mise en commun dynamique de licences, une formule innovante permettant de fournir un accès sécurisé à tous les types de données, depuis n’importe quel appareil ;
•permet de relever les défis auxquels les entreprises sont confrontées lors d’un passage au Cloud, alliant ressources traditionnelles et applications Cloud sur un seul et même écran de portail ;
•offre une expérience utilisateur intuitive, tout en sécurisant davantage les entreprises grâce à l’intégration dans la plateforme des méthodes d’accès sans client et des codes les plus récents.

Pour en savoir plus, participez à notre webcast !
Recorded Dec 16 2016 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Florian Malecki and Laurent Venet
Presentation preview: sécuriser votre passage au Cloud grâce au nouvel OS 12.0 pour SMA 1000 Series

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Visibilità, conoscenza e controllo per potenziare il tuo ecosistema di sicurezza Dec 14 2018 9:30 am UTC 60 mins
    Luca Pesce
    La gestione della sicurezza e la risposta agli eventi informatici sono tra le principali sfide affrontate dalle aziende. La mancanza di visibilità e conoscenza di questi rischi nel tuo ambiente di rete aggrava ulteriormente il problema.

    Guarda questo webinar per scoprire come adottare un approccio olistico e connesso all'orchestrazione della sicurezza. Scopri come implementare policy e controlli di sicurezza più intelligenti per un ambiente di rete più focalizzato, sicuro e conforme. Argomenti del webinar:

    • Realizzare un accesso Single Sign-On (SSO) per il provisioning e la gestione dei servizi di sicurezza per la rete, gli endpoint e il cloud
    • Gestire tutti i processi e i servizi di sicurezza da un’unica e semplice interfaccia cloud comune
    • Ottenere visibilità e consapevolezza situazionale della sicurezza di rete da un unico pannello
    • Assicurare una gestione delle policy priva di errori
    • Implementare ed eseguire il provisioning dei firewall in remoto attraverso il cloud
  • Visibilidad, conocimiento y control: aproveche su sistema de seguridad al máximo Dec 13 2018 10:00 am UTC 60 mins
    Alex Vazquez
    La gestión de la seguridad y la respuesta a los incidentes cibernéticos constituyen retos operativos importantes. Una visibilidad y un conocimiento insuficientes de estos riesgos que acechan la estructura de su red agravan el problema.

    Vea este seminario virtual y descubra cómo establecer un enfoque holístico y conectado de orquestación de la seguridad. Aprenda a emprender acciones más inteligentes en torno a las políticas de seguridad y al control para disfrutar de un entorno de red más eficaz y seguro y conforme con la normativa. En este seminario virtual, descubrirá como:

    • Disfrutar de un acceso mediante inicio de sesión único para proporcionar y gestionar servicios de seguridad de red, de puntos terminales y de nube.
    • Controlar las operaciones y los servicios de seguridad completos desde una única interfaz de nube sencilla y común
    • Obtener visibilidad desde una única pantalla y conocimiento situacional de la seguridad de la red
    • Gozar de una gestión de políticas libre de errores
    • Implementar y poner a disposición firewalls de forma remota a través de la nube
  • Visibilité, connaissance, contrôle : la maîtrise de votre écosystème de sécurité Dec 12 2018 2:00 pm UTC 60 mins
    Laurent Meimoun
    La gestion de la sécurité et la réponse apportée aux cyber événements constituent des défis majeurs. Une visibilité et une connaissance insuffisantes de ces risques au sein de votre réseau aggravent cette problématique.

    Regardez ce webcast pour découvrir comment établir une approche holistique connectée en matière d’orchestration de la sécurité. Apprenez à mettre en place des règles de sécurité et des actions de contrôle plus intelligentes pour bénéficier d’un environnement réseau plus solide, plus sûr et plus conforme. Vous apprendrez comment :

    • proposer un accès avec signature unique (SSO) afin de dimensionner et gérer les services de sécurité réseau, terminaux et Cloud
    • contrôler l’ensemble des opérations et des services depuis une interface Cloud commune simplifiée
    • bénéficier d’une visibilité centralisée et d’une identification en situation de la sécurité réseau
    • bénéficier d’une gestion des règles sans erreur
    • déployer et dimensionner des pare-feux à distance via le Cloud
  • Transparenz, Wissen und Kontrolle für Ihr Sicherheitsökosystem Dec 12 2018 9:00 am UTC 60 mins
    Silvan Noll
    Die Sicherheit von Unternehmen zu managen und auf Cyber-Ereignisse zu reagieren sind große operative Herausforderungen. Unzureichende Transparenz und mangelndes Wissen über diese Risiken innerhalb der Netzwerk-Fabric verschärfen das Problem noch weiter.

    In diesem Webinar erläutern wir, wie eine ganzheitliche Orchestrierung der Sicherheitsinfrastruktur gelingt. Sie lernen intelligentere Sicherheitsregeln und -kontrollen kennen, um alle Sicherheits-, Compliance- und Verfügbarkeitsanforderungen der Netzwerkumgebung sicherzustellen. Außerdem erfahren Sie, wie Sie:

    • Single Sign-on(SSO)-Zugriff gewährleisten, um Netzwerk-, Endgeräte- und Cloud-Security Services bereitzustellen und zu verwalten.
    • ganze Sicherheitsprozesse und -services von einer einfachen, gemeinsamen Cloud-Benutzeroberfläche aus verwalten.
    • eine zentrale Übersicht und situativ angepasste Informationen zur Sicherheitsumgebung des Netzwerks gewinnen.
    • eine fehlerfreie Regelverwaltung erreichen.
    • Firewalls remote mithilfe der Cloud implementieren und bereitstellen.
  • Visibility, Knowledge and Control of Your Security Ecosystem is Power Dec 6 2018 10:00 am UTC 60 mins
    Bob Honour & John Aarsen
    Managing security and responding to cyber events are major operational challenges. Moreover, insufficient visibility and knowledge of these risks within your network fabric compound the problem.

    View this webinar to explore how to establish a holistic, connected approach to security orchestration. Learn to take smarter security policy and control actions toward a sharper, safer and compliant network environment. You’ll discover how to:

    • Achieve single sign-on (SSO) access to provision and manage network, endpoint and cloud security services
    • Govern entire security operations and services from one simple, common cloud interface
    • Gain single-pane visibility and situational awareness of the network security
    • Get error-free policy management
    • Deploy and provision firewalls remotely using the cloud
  • Come proteggere le caselle di posta quando si passa a G Suite Recorded: Nov 16 2018 64 mins
    Antonio Cancellara
    Guarda questo webinar con una demo live per scoprire come difendere G Suite in modo efficace tramite:

    •Protezione contro minacce avanzate come frodi via e-mail, business email compromise (BEC) e attacchi di phishing mirati
    •Prevenzione della perdita dei dati (DLP)
    •Continuità della posta elettronica
  • Sécuriser votre messagerie lors du passage à G Suite Recorded: Nov 15 2018 54 mins
    Stephane Julhes
    Ce webinaire vous propose une démonstration en direct et vous dit comment assurer efficacement la sécurité de votre G Suite grâce à :

    •Une protection de pointe contre les menaces évoluées – messages frauduleux, Business Email Compromise (BEC) et attaques de phishing ciblées
    •La prévention contre la perte de données (DLP)
    •La continuité de messagerie
  • Wie Sie beim Umstieg auf G Suite Ihre Postfächer schützen können Recorded: Nov 14 2018 58 mins
    Stephan Kaiser
    Sehen Sie sich dieses Webinar an und erfahren Sie in einer Livedemo, wie Sie Ihre G Suite effektiv mit folgenden Mitteln schützen:

    •überragende Advanced-Threat-Protection-Funktionen zum Schutz vor E-Mail-Betrug, Business-E-Mail-Compromise (BEC) und gezielten Phishing-Angriffen
    •Schutz vor Datenverlust
    •E-Mail-Kontinuität
  • Cómo proteger los buzones de correo durante el traslado a G Suite Recorded: Nov 13 2018 73 mins
    Alex Vazquez
    Vea este seminario virtual, en el que le ofreceremos una demostración en directo y le enseñaremos cómo defender su G Suite de forma efectiva con:

    •Protección superior contra amenazas avanzadas, como el fraude de correo electrónico, el compromiso del correo electrónico de negocio (BEC) y los ataques de phishing específicos
    •Prevención de pérdida de datos
    •Continuidad del correo electrónico
  • How to Secure Mailboxes when Moving to G Suite Recorded: Nov 13 2018 67 mins
    Bob Honour - EMEA Marketing Director; John Aarsen - Solutions Architect
    View this webinar for a live demo and to learn how to effectively defend your G Suite with:

    •Superior advanced threat protection against email fraud, business email compromise (BEC) and targeted phishing attacks
    •Data loss prevention (DLP)
    •Email continuity
  • Closing the Backdoor with Endpoint Security Recorded: Oct 22 2018 63 mins
    Brook Chelmo, Senior Product Marketing Manager, SonicWall Migo Kedem, Senior Director of Products & Marketing SentinelOne
    Threat actors leverage malware to create backdoors into systems for a few key reasons. These forms of malware, even when they fail, can create serious vulnerabilities in systems.

    This webcast will cover the threat landscape and discuss new types of attacks. Come for the news but stay for a live hacking demonstration that will install a backdoor on an unprotected endpoint and later, an attempt on a protected one.

    In this webcast you’ll learn:

    •The current threat landscape
    •What backdoors are
    •How to stop backdoors like Calisto
    •How to roll back the damage of an attack like ransomware
  • Retail Organizations, PCI Compliance, Security & You Recorded: Oct 1 2018 46 mins
    Brook Chelmo, Sr. Product Marketing Manager for SonicWall
    Accepting payment cards is a given for retailers and hospitality businesses. That means complying with the Payment Card Industry Data Security Standard (PCI).

    High-profile security breaches have become the norm along with laws mandating public disclosure in the event of one happening. Attackers, laws and compliance standards create a stressful environment for anyone who wants to do business with credit cards.

    This webcast will cover the threat landscape and discuss how attackers are trying to get the PII data that you hold. Learn how to better protect against advanced cyberattacks and customized malware from the perimeter to the endpoint.

    In this webcast you’ll learn how to:
    • Protect your retail business in the current threat landscape
    • Stop threats at the perimeter
    • Knock out phishing attacks
    • What steps to take to become PCI compliant
    • Discover and stop unknown forms of cyberattacks
  • 2018 SonicWall Cyber Threat Report Recorded: Aug 20 2018 1 min
    On-demand video
    SonicWall President and CEO Bill Conner outlines the critical importance of actionable threat intelligence to deliver favorable security outcomes.
  • SonicWall Capture Security Center Video Data Sheet Recorded: Aug 16 2018 3 mins
    On-demand video
    Capture Security Center provides an enterprise-wide view of your security environment and real-time security data, enabling you to create a centralized security governance, compliance and risk-management strategy
  • Multi-User MIMO with SonicWall SonicWave Recorded: Aug 16 2018 2 mins
    On-demand video
    Learn how SonicWave access points use MU-MIMO technology to simultaneously transmit to multiple wireless clients instead of just one.
  • SonicWall: Securing Organizations in the Cyber Arms Race Recorded: Aug 16 2018 2 mins
    On-demand video
    The cyber arms race affects governments, businesses and organizations of all sizes. SonicWall automated breach detection and prevention protects more than 500,000 organizations around the world, so they can do more with less fear.
  • SonicWall Wireless Solutions for Retail Recorded: Aug 16 2018 3 mins
    On-demand video
    SonicWall wireless access points help you ensure PCI compliance while providing a superior end-user experience and comprehensive threat protection
  • Provide anytime, any-device secure access to any application with SonicWall SMA Recorded: Aug 16 2018 3 mins
    On-demand video
    Move to the cloud, and embrace mobility and BYOD, with SonicWall SMA. Consolidate access control for hybrid IT, federate identities for single sign-on and deliver anytime, anywhere, any-device access to network, web or cloud applications.
  • SonicWall Capture Labs Recorded: Aug 16 2018 5 mins
    On-demand video
    In 2016, the SonicWall Capture Threat Network observed 60 million unique malware samples, 7.9 billion malware attack attempts, 638 million ransomware attacks and showed that 62% of SonicWall customer internet sessions were encrypted using SSL/TLS.
    The SonicWall Capture Labs Threat Research Team:
    •Gathers, analyzes, and vets cross-vector threat information from more than one million sensors around the world,

    • Performs rigorous testing and evaluation,
    • Establishes reputation scores for email senders and content
    • Identifies new threats in real-time.

    Get the most up-to-date protection against new attacks with real-time information from SonicWall Capture Labs.
  • Identificare e bloccare il malware nel modo più veloce e accurato possibile Recorded: Jun 27 2018 32 mins
    Claudio Dell'Ali
    Ascolta gli esperti di sicurezza di SonicWall in questo webinar esclusivo dal titolo “Identificare e bloccare il malware nel modo più veloce e accurato possibile”.
    Scopri come la tecnologia Real-Time Deep Memory Inspection (RTDMI™) di SonicWall consente a SonicWall Capture Advanced Threat Protection di:
    •Rilevare più malware in modo più veloce rispetto ai metodi di sandboxing basati sul comportamento, con un tasso più basso di falsi positivi
    •Bloccare gli attacchi sofisticati estraendo il codice compresso nella memoria in un ambiente sandbox sicuro
    •Arrestare velocemente le minacce incorporate in file Microsoft Office e Adobe PDF
Preventing complex network security breaches for more than 25 years
SonicWall has been fighting the cyber-criminal industry for over 25 years defending small, medium-size businesses and enterprises worldwide. Backed by research from SonicWall Capture Labs, our award-winning real-time breach detection and prevention solutions coupled with the formidable resources of over 19,000 loyal channel partners around the globe, are the backbone securing more than a million business and mobile networks and their emails, applications, and data. This combination of products and partners has enabled an automated real-time breach detection and prevention solution tuned to the specific needs of the more than 500,000 organizations in over 150 countries. These businesses can run more effectively and fear less about security. For more information, visit www.sonicwall.com and join SonicWall on Twitter, SonicWall on Facebook and SonicWall on LinkedIn.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: sécuriser votre passage au Cloud grâce au nouvel OS 12.0 pour SMA 1000 Series
  • Live at: Dec 16 2016 10:00 am
  • Presented by: Florian Malecki and Laurent Venet
  • From:
Your email has been sent.
or close