Hi [[ session.user.profile.firstName ]]

Next-Generation Firewalls: A New Age of Threat Management

New technologies such as Web 2.0, Social networking, Cloud Computing and mobility have dramatically affected the corporate network and the security challenges surrounding it. New bandwidth–hungry Web 2.0 applications and social media sites are overwhelming networks and First-Generation firewalls are failing to stop the invasion of new and sophisticated threats. Costs are soaring as the need for bandwidth increases – just to maintain the performance of mission critical applications.

Is your firewall capable of handling the growing demands of your business while managing and securing the application-centric network?

Join this web seminar to see how the new SuperMassive Next-Generation Firewall series from SonicWALL is helping IT to understand and control and secure their application-centric networks while at the same time, lowering their costs.
Recorded Feb 24 2011 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Eric Crutchlow, Senior Product Marketing Manager
Presentation preview: Next-Generation Firewalls: A New Age of Threat Management

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Wireless Best Practices for Your Retail Needs Nov 27 2018 4:00 pm UTC 60 mins
    Srudi Dineshan, Product Marketing Manager
    One of the major challenges for retailers is ensuring Payment Card Industry (PCI) compliance and the need to secure customer data. Poorly managed wireless networks are one of the common PCI mistakes. This webinar will walk through some of the wireless best practices to ensure your data remains secure and compliant.

    This webinar will cover the wireless threats faced by retailers and how you can apply best practices to:

    • Protect your retail business in the evolving cyber threat space
    • Secure wireless connectivity
    • Stop known and unknown threats
    • Ensure that your customers and employees are connected securely
  • How to make your move to the cloud faster and safer Recorded: Nov 5 2018 60 mins
    Srudi Dineshan, Product Marketing Manager & Suroop Chandran, Senior Product Manager, SonicWall
    Are you looking to migrate to the cloud? How confident are you that your cloud infrastructure and business applications are secure?

    Join SonicWall experts to learn how to protect your public and private cloud infrastructure from advanced threats. This webinar will include:
    -How to leverage next-gen security for public and private cloud infrastructure and business applications
    -How to gain complete visibility into virtual environment for threat prevention
    -What’s new with NSv and WAF
  • Closing the Backdoor with Endpoint Security Recorded: Oct 22 2018 63 mins
    Brook Chelmo, Senior Product Marketing Manager, SonicWall Migo Kedem, Senior Director of Products & Marketing SentinelOne
    Threat actors leverage malware to create backdoors into systems for a few key reasons. These forms of malware, even when they fail, can create serious vulnerabilities in systems.

    This webcast will cover the threat landscape and discuss new types of attacks. Come for the news but stay for a live hacking demonstration that will install a backdoor on an unprotected endpoint and later, an attempt on a protected one.

    In this webcast you’ll learn:

    •The current threat landscape
    •What backdoors are
    •How to stop backdoors like Calisto
    •How to roll back the damage of an attack like ransomware
  • Visibility, Knowledge and Control of Your Security Ecosystem is Power Recorded: Oct 15 2018 60 mins
    Ken Dang, Sr. Product Marketing Manager
    Managing security and responding to cyber events are major operational challenges. Moreover, insufficient visibility and knowledge of these risks within your network fabric compound the problem. This makes it extremely difficult to detect unsafe network and user activities, and calibrate security policies at the speed and accuracy you need to maintain a robust security posture.

    Making matters worse, you are burdened with operating complex and fragmented security silos. Administrations are cumbersome and labor-intensive. Processes are uncorroborated and non-compliant. This level of technology fragmentation and operation disarray demands an integrated approach for security, management, analytics and real-time threat intelligence.

    Join this webinar to explore how to establish a holistic, connected approach to security orchestration. Learn to take smarter security policy and control actions toward a sharper, safer and compliant network environment. You’ll discover how to:

    • Achieve single sign-on (SSO) access to provision and manage network, endpoint and cloud security services
    • Govern entire security operations and services from one simple, common cloud interface
    • Gain single-pane visibility and situational awareness of the network security
    • Get error-free policy management
    • Deploy and provision firewalls remotely using the cloud
  • How to Secure Mailboxes when Moving to G Suite Recorded: Oct 10 2018 60 mins
    Ganesh Umapathy, PMM & Ed Gradek Email Security Solutions, Architect, SonicWall
    Organizations are increasingly adopting cloud email services such as Gmail, included in G Suite, as part of their cloud strategy.

    Many organizations are also evaluating cloud-based email security solutions to close security gaps and mitigate risks that arise from the migration between on-premise and cloud email services.

    Join this webinar for a live demo and learn how to effectively defend your G Suite with:

    •Superior advanced threat protection against email fraud, business email compromise (BEC) and targeted phishing attacks
    •Data loss prevention (DLP)
    •Email continuity
  • Retail Organizations, PCI Compliance, Security & You Recorded: Oct 1 2018 46 mins
    Brook Chelmo, Sr. Product Marketing Manager for SonicWall
    Accepting payment cards is a given for retailers and hospitality businesses. That means complying with the Payment Card Industry Data Security Standard (PCI).

    High-profile security breaches have become the norm along with laws mandating public disclosure in the event of one happening. Attackers, laws and compliance standards create a stressful environment for anyone who wants to do business with credit cards.

    This webcast will cover the threat landscape and discuss how attackers are trying to get the PII data that you hold. Learn how to better protect against advanced cyberattacks and customized malware from the perimeter to the endpoint.

    In this webcast you’ll learn how to:
    • Protect your retail business in the current threat landscape
    • Stop threats at the perimeter
    • Knock out phishing attacks
    • What steps to take to become PCI compliant
    • Discover and stop unknown forms of cyberattacks
  • Next Generation Firewall (NGFW) 8.0 Group Test Results – SonicWall Recorded: Sep 12 2018 51 mins
    Mike Spanbauer, Vice President, Research Strategy NSS Labs & Lawrence Pingree, Vice President, Product Management, SonicWall
    Firewall technology is one of the largest and most mature security markets, and the next generation firewall (NGFW) is a prime example of how cybersecurity controls continue to evolve in the face of a constantly changing attack surface. These network security products combine firewall capabilities with intrusion prevention system (IPS) functionality, application control, user awareness, and the capability to integrate threat intelligence feeds.

    NSS Labs recently announced the results of our Next Generation Firewall (NGFW) 8.0 Group Test. In this year’s test, products from 10 of the industry’s leading NGFW vendors were examined for security effectiveness, performance, and total cost of ownership (TCO). In this eighth iteration of the NGFW test, evasion testing was expanded to include resiliency against modified exploits, and the test also included secure sockets layer (SSL)/transport layer security (TLS) testing.

    Tune into this webinar to learn how SonicWall performed in NSS Labs' NGFW 8.0 Group Test.
  • Solving Top IT Challenges for K12 Schools, Campuses & Districts Recorded: Jul 24 2018 58 mins
    Brook Chelmo, Scott Grebe
    K12 schools and districts encounter IT issues throughout the school year. But what issues really rank highest according to those affected? Security, wireless connectivity and budgets are causing the most fits for IT administrators. IT administrator should be concerned with keeping students safe and connected, not repairing ransomware-infected devices or a network compromised to power a secret cryptocurrency mining operation.

    Join us for this webcast to learn how K12 schools, campuses and districts can implement cost-effective network security, endpoint protection and wireless solutions. In this webcast, you’ll learn:

    • Trends happening in the threat landscape
    • What other IT administrators are saying
    • How to stop and remediate ransomware
    • New risks of cryptojacking
    • How to stop phishing emails
  • Best Practices for Protecting Against Phishing, Ransomware and Email Fraud Recorded: Jun 26 2018 64 mins
    Ganesh Umapathy, Product Marketing Manager | Michael Osterman, President, Osterman research
    Today, Email is the most common attack vector used by cyber criminals. Join us for this special webinar with guest speaker Michael Osterman to discuss the recently published research on the current state of email threats, best practices you can implement to protect against them, and how SonicWall provides automated threat detection and protection capabilities to stop these threats.
    1.Understand the current threats landscape
    2.Know the best practices to mitigate today’s threats
    3.Gain insights into how SonicWall stops advanced threats
  • Identify and Stop Malware in the Quickest and Most Accurate Way Possible Recorded: May 30 2018 62 mins
    Brook Chelmo, Product Marketing Manager, SonicWall
    Join SonicWall experts for an exclusive webinar, “Identify and Stop Malware in the Quickest and Most Accurate Way Possible.” We will discuss how SonicWall Real-Time Deep Memory Inspection (RTDMI™) technology enables SonicWall Capture Advanced Threat Protection (ATP) to:
    •Catch more malware faster than behavior-based sandboxing methods, with a lower false positive rate
    •Block sophisticated attacks by unpacking compressed code in memory in a secure sandbox environment
    •Stop threats embedded in Microsoft Office and Adobe PDF files
  • Under the Hood: How to Responsibly Decrypt & Inspect Encrypted Traffic Recorded: May 8 2018 64 mins
    Ken Dang
    Encrypted traffic is a key battleground for today’s security-conscious organizations. But how and where to fight is not always clear or easy to execute. Join SonicWall for a “fireside chat” to gain a clear understanding of how to establish a security model that can decrypt and inspect encrypted traffic without degrading performance or damage trust.

    Register now for this informal Q&A session that will provide a platform to answer your most pressing questions regarding encrypted attacks and how to responsibly and efficiently decrypt SSL and TLS traffic. This session will:

    • Outline the benefits of inspecting SSL/TLS traffic
    • Explain how to block encrypted malware downloads, including ransomware and zero-day cyberattacks
    • Demonstrate how to set up a typical next-generation firewall with DPI-SSL capabilities
    • Customize inclusion and exclusion lists for compliance or legal requirements
    • Operate a required system digital certificate store
  • Stop Fileless Malware with SonicWall Capture Client Recorded: Apr 25 2018 62 mins
    Brook Chelmo, SonicWall | Daniel Bernard. SentinelOne | Raj Rajamani SentinelOne
    Over the past few years, hackers are increasingly choosing to utilize fileless malware as a highly effective alternative to malware attached to files. See how you can use modern technology to monitor the behavior of a system for malicious abnormalities and rollback systems to a previous uninfected state.

    Join SonicWall & SentinelOne experts to learn how to stay safe from advanced threats like fileless malware.

    1.Learn how the threat landscape has changed in the past three years.
    2.Learn what fileless malware is and how to stop it.
    3.Discover the difference behavior-based security makes.
  • State of Cyber-Security Arms Race: Preparing for what's coming in 2018 Recorded: Mar 21 2018 61 mins
    Ken Dang
    Examining 2017 to prepare for what's coming in 2018

    The modern cyber war — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. The SonicWall 2018 Cyber Threat Report provides exclusive data that highlights advances by both the security industry and cyber criminals.

    Attend this webinar to gain a better understand the current State of Cyber-Security Arms Race. We’ll share our findings, intelligence, analysis and research to help you improve your security preparations and posture going forward.
  • Technical Deep Dive: Securing Office 365 with SonicWall Email Security Recorded: Mar 14 2018 61 mins
    Ganesh Umapathy & Keith Johnson, SonicWall Security Experts
    Organizations are increasingly adopting Office 365 as part of the “move to the cloud” endeavor. Many organizations are also evaluating a cloud-based email security solution to close security gaps and mitigate risks from migration to the cloud.

    Join this webinar for a live demo on how SonicWall’s Email Security solution secures Office 365. Learn more about:
    •What to consider while securing your Office 365 email service
    •How SonicWall Email Security offers superior, advanced threat protection, data loss prevention and email continuity for Office 365
  • SonicWall Under the Hood - DPI-SSL Certificate Deployment Deep Dive Recorded: Jan 23 2018 62 mins
    Ken Dang & Rob Krug
    Managing certificate deployment and certificate pinning are among the top challenges when implementing deep inspection of SSL and TLS certificates on a next-generation firewall.

    Join us for a technical deep-dive webcast and demo to learn best practices to a successful SonicWall Deep Packet Inspection of SSL (DPI-SSL) service implementation. This in-depth session will:

    • Help size the firewall accurately for DPI-SSL service
    • Provide multiple methods for certificate deployment
    • Offer guidance for certificate-pinning
    • Educate users on the OS certificate store
    • Explain how to establish trust with devices in BYOD environments
  • Untether Your Corporate Network with Secure Wireless and Mobile Access. Recorded: Nov 29 2017 60 mins
    Scott Grebe & Ganesh Umapathy - SonicWall Security Product Marketing Managers
    Join us to find out how you can embrace mobility and provide access to resources over wireless and mobile networks with the same level of security as your wired network.

    Join this webinar to learn about:
    •How to protect data travelling across wireless and mobile networks
    •What components should be part of every mobility solution
  • SonicWall Capture Labs Recorded: Nov 15 2017 5 mins
    On-demand video
    In 2016, the SonicWall Capture Threat Network observed 60 million unique malware samples, 7.9 billion malware attack attempts, 638 million ransomware attacks and showed that 62% of SonicWall customer internet sessions were encrypted using SSL/TLS.
    The SonicWall Capture Labs Threat Research Team:
    •Gathers, analyzes, and vets cross-vector threat information from more than one million sensors around the world,

    • Performs rigorous testing and evaluation,
    • Establishes reputation scores for email senders and content
    • Identifies new threats in real-time.

    Get the most up-to-date protection against new attacks with real-time information from SonicWall Capture Labs.
  • Are You Ready to Do Some Holiday Shopping? The Hackers are Waiting. Recorded: Nov 15 2017 61 mins
    Scott Grebe - SonicWall Security Product Marketing Manager
    [Landing Page]
    Headline:
    Webinar: Are You Ready to Do Some Holiday Shopping? The Hackers are Waiting.

    Body:
    Holiday shopping is back. From Black Friday, Small Business Saturday and Cyber Monday through the end of the year, your employees will shop online in the office. Are you prepared?

    Learn more about the issues you’re up against during the entire holiday shopping season and how to keep your network secure from cyber criminals, keep your employees focused and ensure that internet bandwidth is reserved for essential activities.

    Join this webinar to learn:

    •How online shopping during the holidays impacts employee productivity, bandwidth consumption and network security
    •About the threats that cyber criminals are using to attack your organization
    •What you can do to protect your data and your network from attack during and after the online buying season
  • Don’t Negotiate with Hackers – How to Fight Back Recorded: Nov 8 2017 59 mins
    Brook Chelmo
    When a small business is hit with a critical cyber-attack, one in six have to stop business for more than 25 hours. The National Cyber Security Alliance reports that 60 percent of small companies are unable to stay in business six months after a cyberattack.

    Join SonicWall for this live webinar as we outline how one small business owner fought back, and established a smart, cost-effective security strategy for her company.

    Find out how SonicWall can help:
    •Protect your business against both known and unknown cyber threats
    •Bolster your security posture in cost-effective manner
    •Safeguard sensitive information and data
    •Ensure your business remains operational
    •Add peace of mind
  • Combating Advanced Threats With SonicWall Email Security Recorded: Nov 7 2017 37 mins
    Gus Maldonado, Product Line Manager
    Email continues to be vital to business. However, as the volume of email increases, so too does the amount of ransomware, phishing, business email compromise (BEC), spoofing, spam and virus attacks.

    Spammers falsify email sender addresses to fool recipients and inflict damage to unknowing, legitimate brands. Organizations can benefit from replacing legacy solutions with SonicWall’s easy-to-use, affordable hosted email security solution that defends against the dynamic, evolving email threat landscape.

    In this webinar, gain insights on:
    •Spam protection
    •Avoiding phishing and fraud
    •How SonicWall hosted email security enhances MS Office 365
    •Other benefits of a hosted email security solution
Dynamic Security for the Global Network
SonicWall has been fighting the cyber-criminal industry for over 25 years, defending small, medium-size businesses and enterprises worldwide. Our combination of products and partners has enabled a real-time cyber defense solution tuned to the specific needs of more than 500,000 businesses in over 150 countries, so you can do more business with less fear.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Next-Generation Firewalls: A New Age of Threat Management
  • Live at: Feb 24 2011 4:00 pm
  • Presented by: Eric Crutchlow, Senior Product Marketing Manager
  • From:
Your email has been sent.
or close