Next-Gen Firewalls for Federal Agencies:Enabling App Intelligence

Jacob Bardin, Federal Territory Manager
Web-based applications and social media have become key contributors to the success of many Federal agencies – driving collaboration, improving productivity and reducing costs. However, along with the benefits come significant risks: drained bandwidth, sophisticated application-layer threats and wasted employee time.

Should agencies attempt to utilize coarse control functionality currently at their disposal, blocking ports or entire protocols just to eliminate access to a handful of known bad applications? Or do they take a more permissive course, allowing access to every application the organization deems necessary or useful?

With Next-Generation Firewalls featuring Application Intelligence, Control and Visualization agencies do not have to choose between these extreme approaches. Organizations can implement and enforce granular policies governing application access and bandwidth prioritization while helping prevent application-layer threats and unwanted exposure of sensitive data.

Join this 30-minute Web seminar to learn how SonicWALL® Application Intelligence and Control provides unprecedented visibility into your network activity.
Jun 29 2011
32 mins
Next-Gen Firewalls for Federal Agencies:Enabling App Intelligence
Join us for this summit:
More from this community:

IT Security

Webinars and videos

  • Live and recorded (4539)
  • Upcoming (145)
  • Date
  • Rating
  • Views
  • Successful organizations run on key metrics and IT security should be no different. But which security metrics should operations, management and the boardroom be focused on? Factories focus on “days without an accident” Is the cyber parallel “days without a breach?”
    What to measure, how to measure, and how to communicate performance is key to improving the security team’s effectiveness and standing within the organization. Information like:
    - Which departments have access to which servers?
    - Who are the privileged users and when are they most active?
    - Where are the assets with vulnerabilities that can be reached from outside?
    - When are security defenses like firewalls likely to maxout?
    Join Dr. Larry Ponemon, Chairman & Founder of the Ponemon Institute, for key results of a new research study on security metrics and change management, and Jody Brazil, Founder, President and CTO of FireMon, for a pragmatic perspective on generating actionable metrics from your network security infrastructure and reducing the risks of relentless change.
  • Successful organizations run on key metrics and IT security should be no different. But which security metrics should operations, management and the boardroom be focused on? Factories focus on “days without an accident” Is the cyber parallel “days without a breach?”
    What to measure, how to measure, and how to communicate performance is key to improving the security team’s effectiveness and standing within the organization. Information like:
    - Which departments have access to which servers?
    - Who are the privileged users and when are they most active?
    - Where are the assets with vulnerabilities that can be reached from outside?
    - When are security defenses like firewalls likely to maxout?
    Join Dr. Larry Ponemon, Chairman & Founder of the Ponemon Institute, for key results of a new research study on security metrics and change management, and Jody Brazil, Founder, President and CTO of FireMon, for a pragmatic perspective on generating actionable metrics from your network security infrastructure and reducing the risks of relentless change.
  • You are invited to register for our upcoming COSO webinar, COSO 2013: Mapping Controls to Principles. Transitioning to the New COSO Framework is top of mind for many organizations. How do you get started? How do you map controls to principles or vice versa? What are some of the preliminary findings organizations are seeing as they head down the path to implement the framework?

    Please submit top-of-mind questions during the webinar registration process.

    CPE credits will be provided to qualifying attendees.
  • *On this webcast we're giving away a pass to our partner event: the Chicago Cyber Incident Response Summit, between June 21-23, 2014*

    Let’s face it, there’s unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is ‘How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?’ With the advanced threats that are pervasive today, it’s becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

    In this webinar, William Stewart, Senior Vice President of Booz Allen Hamilton and Jeff Lunglhofer, Principal of Booz Allen Hamilton–a leading management technology and consulting firm driving strategic innovation for clients–will discuss the top trends in cyber threat mitigation, data privacy, data governance, and data security, with Mark Bower, VP Product Management and Solutions Architecture at Voltage Security.

    Attend this webinar to learn more about how to:
    •Increase responsiveness and security in your IT environment and architecture
    •Fight pervasive threats from inside and outside attack with data-centric technologies
    •Raise your organization’s overall data privacy, compliance, and security profile
    •Implement a new data de-identification framework across production, test & dev, and analytics use cases
    •Proactively enable critical business initiatives
    --Can't attend live? Register below to receive a link to the recorded webcast.
  • The future of work sees changes to how employees work, how managers lead, and how organizations are structured. However, technology still remains the central nervous system of organizations and things like enables flexible work, collaboration, communication, and BYOD. In short, IT helps organizations be competitive. But how is IT changing in the context of new work behaviors and expectations, a multi-generational workforce, the cloud, globalization, and many of the other trends that are shaping the world of work? Join us in this session as a panel of experts debates and explores how IT is changing and what the future of IT looks like.
  • Malware today is very different from just a few years ago. Traditional AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks and micro variant financial threats are just some examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • Malware today is very different from just a few years ago. Traditional AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks and micro variant financial threats are just some examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • Join us to hear from product expert Rob Singh to learn more about Mocana Atlas Certificate Enrollment
  • Collaboration is crucial when it comes to your marketing team. No matter if you're based locally or globally, the concept of work and the way we interact is completely changing. With smartphones and tablets taking over our lives, efficient collaboration, coordination, and consistency around marketing campaigns and messaging can be challenging when running a marketing organization.

    Join this webinar to discover:

    - The latest and greatest in marketing automation and file sharing platforms
    - Content collaboration tools that save time and keep branding consistent between teams
    - How centralizing assets can ease global content translation and localization
    - Real-time content and campaign sharing that can spark new ideas and educate your organization
  • Organizations of all sizes face a number of industry and regulatory compliance mandates. Whether its PCI DSS, SOX, HIPPA or FISMA, these regulations are changing to accommodate the ever-growing threat to sensitive data.

    Join Dave Shackleford, IT security consultant and founder of Voodoo Security, as he breaks down these updated requirements and how to remain current while securing your business.

    Attend this webcast and learn:
    - Best practices for protecting data in today’s complex security landscape

    - Latest updates to compliance mandates pertaining to data encryption

    - What these updates mean to your security teams.
  • Channel
  • Channel profile
Up Down
  • Improving Network Efficiencies with Dell SonicWALL WAN Acceleration May 13 2014 4:00 pm UTC 45 mins
    Learn how Dell SonicWALL WAN Acceleration technology can help you decrease WAN bandwidth usage and improve response times for SharePoint, AutoCad, Web and other collaboration applications. Additional benefits include web (HTTP) caching and application bandwidth control through the managing firewall. This 30-minute webinar will cover basic WAN Acceleration technologies, customer deployments and bandwidth savings.
  • Mobile security; Protecting corporate apps and data Apr 30 2014 9:00 am UTC 60 mins
    Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Sécurité mobile - Protéger les applications et les données de l’entreprise Apr 29 2014 9:00 am UTC 60 mins
    De plus en plus, les utilisateurs mobiles ont besoin d’avoir accès à des données et applications stratégiques depuis leurs smartphones, tablettes et ordinateurs portables personnels. Toutefois, la cohabitation de données et applications personnelles et professionnelles sur des appareils mobiles risque d’entraîner une perte de données pour l’entreprise ainsi que l’apparition de programmes malveillants.
    Quels sont les risques et quelles technologies les entreprises peuvent-elles déployer pour garantir la productivité tout en se protégeant de telles menaces ?

    •Découvrez les risques liés à la cohabitation de données et applications personnelles et professionnelles sur des appareils mobiles.
    •Découvrez les technologies existantes et à venir permettant de faire face à ces risques.

    Grâce à Dell, apprenez à connaître les risques liés à la cohabitation de données personnelles et professionnelles sur des appareils mobiles et découvrez les technologies permettant de protéger les données de l’entreprise.
  • Mobile Sicherheit – wie Sie Unternehmensanwendungen und -daten schützen können Apr 29 2014 8:00 am UTC 45 mins
    Immer mehr mobile Mitarbeiter möchten heute von ihren privaten Smartphones, Tablets und Laptops auf geschäftskritische Daten und Anwendungen zugreifen. Dieser Trend birgt erhebliche Risiken: Werden geschäftliche und private Daten und Anwendungen auf dem gleichen mobilen Gerät genutzt, droht der Verlust von Unternehmensdaten und die Infizierung mit Malware. Doch wo genau liegen die Risiken? Und welche Technologien können Unternehmen einsetzen, um die Produktivität zu gewährleisten und gleichzeitig diese Bedrohungen abzuwehren?

    • Erfahren Sie, welche Gefahren lauern, wenn private und geschäftliche Daten und Anwendungen auf demselben mobilen Gerät genutzt werden.
    • Erfahren Sie, mit welchen Technologien und Trends Sie diesen Risiken entgegenwirken können.

    Wir sagen Ihnen, welche Gefahren bestehen, wenn private und geschäftliche Daten und Anwendungen auf demselben mobilen Gerät genutzt werden, und mit welchen Technologien sich Unternehmensdaten schützen lassen.
  • Securing information in higher education organisations Apr 24 2014 10:00 am UTC 60 mins
    Information technology in education environments is constantly evolving: social media are transforming the learning experience, cloud computing has seen the education industry at the forefront of public cloud-based email, content and office tool adoption, the consumerization of mobile tools has increased student demands to bring their own devices & applications and big data is already making an impact at the higher-education level for academic research.
    However, these untapped opportunities, also bring about plenty of interoperability, scalability and, most importantly, security challenges.

    Join this webinar to learn from Simon Mortimore from Exeter College, Oxford and Dell Security on how next-generation network security solutions can protect your network and assets.
  • Mobile security; Protecting corporate apps and data Recorded: Apr 22 2014 32 mins
    Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Network Security and Application Control with Dell Next Generation Firewalls Recorded: Mar 28 2014 49 mins
    Traditional firewalls have always focused on offering port specific protection (i.e., stateful firewalling). Current day threats are web-based, and often are malicious applications that pass through traditional ports.

    Discover how you can overcome the limitations of traditional stateful firewalls with the comprehensive deep security of Dell SonicWALL next-generation firewalls. See why it is essential for your network protection and increased productivity to have application intelligence and control—one of the key features of our next-generation firewalls.

    This webcast will show you how to:
    •Gain true network protection with deep network security
    •Effectively manage network bandwidth using application intelligence and control
    •Provide granular application control: e.g., allow Facebook, but block Facebook Apps
  • Les principales tendances de 2014 en matière de sécurité informatique Recorded: Mar 28 2014 51 mins
    L’année 2014 réserve de grands changements pour les réseaux informatiques. A la multiplication des utilisateurs et des terminaux s’ajoutent une prolifération et une sophistication croissantes des menaces visant les systèmes et les données. Autant dire que les entreprises doivent se préparer à ce qui les attend.
    Inscrivez-vous pour assister au webinaire sur « Les Principales tendances 2014 en matière de sécurité informatique » afin de découvrir ce que ces tendances signifient pour votre réseau et ce que vous pouvez faire pour garder une longueur d’avance.

    Assistez au webinare et découvrez :

    •Quel genre d’attaques attendre d’une nouvelle génération de menaces ;
    •Comment les opérateurs de botnets masquent leurs opérations de commande et contrôle ;
    •Quels types d’entreprises et de plates-formes seront ciblées par les ransomwares ;
    •Pourquoi les fonctionnalités de communication en champ proche ouvrent la porte à de nouvelles menaces ;
    •Pourquoi les méthodes de sécurisation classiques ne sont plus efficaces face à la sophistication des nouvelles menaces.
  • Die wichtigsten Trends in der IT-Sicherheit 2014 Recorded: Mar 27 2014 56 mins
    das Jahr 2014 bringt viele neue Herausforderungen für IT-Netzwerke. Nicht nur die Anzahl an Benutzern und Endpunktgeräten steigt konstant, auch die möglichen Einfallstore für immer raffiniertere Bedrohungen nehmen zu. Kleine wie große Unternehmen tun gut daran, sich auf dieses neue Szenario vorzubereiten.
    Melden Sie sich für das Webinar „Die wichtigsten Trends in der IT-Sicherheit 2014“ an und erfahren Sie, was diese Entwicklung für Sie bedeutet und was Sie tun können, um den neuen Bedrohungen immer einen Schritt voraus zu sein.
    Erfahren Sie:
    •Wie gefährlich die neue Generation von Exploits ist und mit welchen Angriffsarten Sie rechnen müssen
    •Welche Strategien Botnet-Betreiber heute einsetzen, um Rechner unerkannt unter ihre Kontrolle zu bringen
    •Welche Organisationen und Plattformen speziell im Fadenkreuz von Ransomware stehen
    •Warum NFC-Funktionen ein ideales Einfallstor für neue Exploits sind
    •Warum herkömmliche Sicherheitslösungen keinen Schutz mehr vor neuen, komplexen Bedrohungen bieten
  • Top trends driving IT security in 2014 Recorded: Mar 26 2014 51 mins
    IT networks are staged for massive changes in 2014. With users and endpoint devices proliferating and with threats to systems and data becoming more sophisticated and pervasive, organizations of all sizes must be prepared for what lies ahead.
    Register to attend the “Top Trends Driving IT Security in 2014” webinar to find out what these trends mean for your IT network, and what you can do to stay ahead of the game.
    You’ll learn:
    •What kinds of attacks to expect from a new generation of exploits
    •How botnet operators now cloak their command and control operations
    •What types of organizations and platforms will be targeted by ransomware
    •Why Near Field Communication capabilities open the door to new exploits
    •Why traditional security is no longer effective against new, sophisticated threats
  • Simplify Secure Email Exchange with Dell SonicWALL Email Security release 8.0 Recorded: Mar 25 2014 46 mins
    Dell SonicWALL Email Security provides superior protection from threats and compliance violations. Multiple proven, patented threat detection techniques deliver real-time protection from spam, phishing attacks and viruses. Compliance scanning and management prevent confidential data leaks and regulatory violations.

    New with release 8.0, an integrated email encryption cloud service ensures mobile-ready secure email exchange. Also, advanced email anti-spoofing and anti-phishing protection is now available with support for SPF, DKIM and DMARC email authentication capability
  • Visualizing and Quantifying Cybersecurity Threats through Firewall Reporting Recorded: Mar 24 2014 49 mins
    Every day, terabytes of big data traverse your firewall. How do you know it is doing its job intercepting viruses, spyware, intrusions, attacks, and filtering nefarious websites and web applications?

    Make your security policies more effective with firewall reporting. Learn how you can:

    • Benefit from ways other companies use firewall reporting to be more
    secure
    • Make sense of the cyber-threats attacking your company with
    firewall analytics
    • Analyze who has been doing what, where, when, and how on your
    firewall
    • Easily create customized firewall reports with intuitive analytics tools
  • Definition of an Effective Intrusion Prevention System Recorded: Mar 18 2014 40 mins
    Cybercriminals often try to circumvent intrusion prevention systems by obfuscating advanced attacks using complex algorithms designed to evade detection. A tightly integrated intrusion prevention system with sophisticated anti-evasion capabilities with full stack inspection of inbound and outbound application traffic is required to defeat these threats.
    Register for this webinar with NSS Labs, the trusted authority in independent product testing, and Dell™ to learn about the requirements for an effective intrusion prevention system. Their findings are based on the NSS Labs 2013 Intrusion Prevention System (IPS) Security Value Map, which maps vendors based on security effectiveness and value (cost per protected Mbps) of tested product configurations. In addition, Dell will summarize key results from the Dell SonicWALL™ SuperMassive™ E10800 IPS Product Analysis Report.

    Join us to explore:
    •NSS Labs Intrusion Prevention System testing methodology
    •Security effectiveness, performance, and total cost of ownership
    •Dell SonicWALL SuperMassive E10800 IPS Product Analysis Report results
  • 2014 Top IT Security Trends Recorded: Mar 12 2014 37 mins
    IT networks are staged for massive changes in 2014. With users and endpoint devices proliferating and with threats to systems and data becoming more sophisticated and pervasive, organizations of all sizes must be prepared for what lies ahead.
     
    Attend our  “Top Trends Driving IT Security in 2014” webinar to find out what these trends mean for your IT network, and what you can do to stay ahead of the game.
     
    You’ll learn:
    •What kinds of attacks to expect from a new generation of exploits
    •How botnet operators now cloak their command and control operations
    •What types of organizations and platforms will be targeted by ransomware
    •Why Near Field Communication capabilities open the door to new exploits
    Why traditional security is no longer effective against new, sophisticated threats
  • March Madness and network sanity Recorded: Mar 6 2014 32 mins
    March Madness can stress your network and create opportunities for someone to exploit your vulnerabilities. Being aware of the threats can help prepare for them to keep your network sane and secure.

    What You Will Learn:

    1. you can achieve a deeper level of security by being aware what is happening on your network.
    2. be aware of how you access the games, use secure connections
    3. Keeping your applications and firewall up to date can help you keep secure.
  • 2014 Top IT Security Trends Recorded: Jan 28 2014 52 mins
    Join Dell SonicWALL for this one hour session as we examine the top 10 IT security trends expected in 2014.
  • Mobile security; the risks of co-mingling personal and business Recorded: Jan 15 2014 60 mins
    Employees and especially mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices can create risk of business data loss and introduction of malware.
  • Assurez-vous de la sécurité de votre entreprise pendant les fêtes. Recorded: Dec 13 2013 37 mins
    La saison des achats de fêtes de fin d'année a commencé avec pour conséquence un nombre record d’acheteurs en ligne, dont vos employés. Cette année, veillez à ce que votre réseau soit protégé et que vos employés soient autant productifs pendant les fêtes que toute l’année.
  • Connected Security: Respond to 2014's Challenges Recorded: Dec 5 2013 48 mins
    We will look at major trends driving business decisions and then talk about how you can ensure that your IT security efforts can be a business enabler to support innovation and ultimately success in today’s demanding marketplace.

    Join us to learn how to:

    • Respond quickly to security threats and problems before they negatively impact the business.

    • Protect every part of the infrastructure – inside and outside the network – reducing the number of vendors and disparate solutions and gaining efficiencies by reducing costs.

    • Provide common-sense reporting that spans across areas of the network and infrastructure, helping to reduce the risk of errors from missed problems or threats, and saving time.

    • Unify the patchwork of processes, reducing the complexity of meeting security and compliance objectives
  • The holiday online shopping season is here. Are you prepared? Recorded: Nov 28 2013 54 mins
    The holiday buying season is upon us, and that means record numbers of online shoppers, including your employees. This year, make sure your network is protected and your employees remain productive before Christmas and all through the New Year by joining our webinar, Protection and Productivity during the Holiday Season.
Dynamic Security for the Global Network
Dell(TM)SonicWALL(TM) provides intelligent network security and data protection solutions that enable customers and partners to dynamically secure, control, and scale their global networks. Using input from millions of shared touch points in the SonicWALL Global Response Intelligent Defense (GRID) Network, the SonicWALL Threat Center provides continuous communication, feedback, and analysis on the nature and changing behavior of threats.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Next-Gen Firewalls for Federal Agencies:Enabling App Intelligence
  • Live at: Jun 29 2011 6:00 pm
  • Presented by: Jacob Bardin, Federal Territory Manager
  • From:
Your email has been sent.
or close
You must be logged in to email this