Keysight #2 - Six Steps to Optimize Defensive Security

Logo
Presented by

Keith Bromley, Sr. Mgr, Solution & Product Mktg., Keysight; Brandon Dunlap, Moderator

About this talk

The number of exposed consumer records more than doubled in 2018 from 2017, according to the Identity Theft Resource Center, but enterprises don’t have to be a victim. Most attacks can be prevented by deploying the right mixture of products and processes. The primary goal is to coordinate and optimize your security defenses. A simple, but coordinated, security defense strategy allows you to: • Validate equipment readiness • Prevent access from bad IP addresses • Decrypt malicious traffic • Analyze traffic in real-time • Perform advanced data analytics • Enable DPI In this webcast, Keysight and (ISC)2 will explore an overview of defensive security, a six step approach to defensive security and examples of visibility and security solutions that make this approach work.
Related topics:

More from this channel

Upcoming talks (13)
On-demand talks (446)
Subscribers (138935)
ISC2 Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.