Next-Generation Firewall for Federal: Enabling Application Control

Jacob Bardin, Federal Territory Manager, SonicWALL
Upwards of 50% of your network traffic is flowing on general Internet ports. In this webinar SonicWALL will discuss:
-How do I identify the applications and users who are consuming my network bandwidth
-How do I indentify the applications that are an attack vector for malware in my network
-How can I manage/inspect SSL encrypted traffic, so that it does not become an attack vector.
Feb 16 2012
40 mins
Next-Generation Firewall for Federal: Enabling Application Control
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live 1 and recorded (2836)
  • Upcoming (85)
  • Date
  • Rating
  • Views
  • Are attacks on your network and users still occurring, despite continuing efforts to stay on top of security? What impact would malware have on your business if it was able to gain internal access and steal sensitive information?

    Without solutions that can disrupt the chain of events that occur during an advanced attack, many businesses are still being infiltrated and losing data every day. This webinar will cover the best practices in disrupting attacks with content security solutions - connected to optimize protection.
    Join this webinar as:
    •You will learn the tactics used by attackers today to infiltrate businesses
    •You will hear about the leading technologies available to disrupt advanced attacks
    •You will walk away with the knowledge to assess your own environment, and optimize your security
    Businesses today face more advanced attacks than we’ve ever seen in the past – and defending against them takes a connected approach which can disrupt the multiple points of infiltration and exfiltration used in the process of a breach. With most attacks seen in the wild using phishing emails to reach their target, a web link or malicious file to deliver a payload, and an outbound stream of communication to exfiltrate data – implementing a Secure Email Gateway, Secure Web Gateway, and Data Loss Prevention technology together will provide a barrier difficult for even the most advanced attacks to overcome.

    Don’t miss this webinar if you have a stake in the security of your most valuable information, or are directly responsible for the implementation of security solutions to protect it. Register now for this 30 minute webinar.
  • As most IT Pros are aware, as of April 8th, 2014, Microsoft will stop releasing security patches for Windows XP. Unfortunately, most folks will not be able to migrate all Windows XP machines by that deadline. How will you limit the security risks posed by these now vulnerable assets? Join us for this webinar outlining practical strategies to help you cover your assets.
    In this session we'll cover:
    The primary attack vectors you need to consider
    Immediate actions you can take to limit the exposure of your XP assets
    Warning signs to watch out for that could signal an attack
    How to closely monitor your vulnerable assets with AlienVault USM
  • MDM implementations begin by solving the most pressing business problem in a single hub, mostly on-premise. They then expand to another use case, domain, or region, and might evolve to another MDM hub on cloud or in a different country. Whatever the journey might be, how do you tie the different hubs together in a hybrid or federated hub-of-hubs MDM architecture? Come to this session to learn how certain leading companies are solving this conundrum!

    In this webinar, you will learn:
    -What are the initial use cases that dictate MDM
    -How to determine if you should use the same MDM instance or a different one when expanding your use case
    -When to use on-premise versus cloud MDM

    In addition, we will explore examples of companies using hybrid MDM to manage multiple MDM hubs as well as evolving to the holy-grail of MDM architecture: Hub-of-hubs or federated MDM.
  • Cyberspace is typically the prime mechanism for conducting business. It also plays a key role in the socio-cultural lives of staff, customers and suppliers. By the end of 2013, revelations about how governments had been surrendering commercial and personal privacy in the name of national security left trust very badly shaken. And the timing couldn’t be much worse: many CEOs are ramping up their demands to take even greater advantage of cyberspace. So if this is where things are now, how will all of this look by 2016? How will new threats hurtling over the horizon complicate matters even further? Just what will organisations be able to rely on? And most importantly, are they powerless or can they do something now? This webcast spotlights the threats we'll be dealing with over the coming 24 months along with advice on the best ways of handling them.
  • As more and more companies look to take advantage of all of the benefits afforded with cloud-based infrastructures, the discussion often quickly turns to “How do we get there?” For some companies, this single migration question can create an insurmountable roadblock that either keeps them from moving to the cloud or severely delays their migration. Join Michael McCracken, HOSTING’s Director of Professional Services, as he explores different cloud migration strategies along with the benefits and risks associated with each of those strategies.
  • Anti-virus is not enough. McAfee Complete Endpoint Protection add defense in depth against the full threat spectrum from zero-day exploits to hacker attacks, as well as mobile devices such and tablets.
  • Protiviti has conducted the second-annual Executive Perspectives on Top Risks Survey. We obtained the views of more than 370 board members and C-suite executives about risks that are likely to affect their organisation in 2014.

    Join Managing Director, Mike Purvis and Director, Dirk Verwohlt for a discussion of the report findings.
  • With the release of PCI-DSS version 3.0 many organizations that are already PCI compliant or are working towards becoming PCI compliant are wondering what these changes will mean to their organization. In this webinar we will take a look at what has changed (and what hasn’t) and the impact this will have on how organizations approach PCI compliance.
  • As we continue to explore the ERP implementation process, we’re going to dive deeper into one technology solution you might consider for a successful ERP implementation. Join us as we discuss Oracle eBusiness Suite Release 12. You’ll want to join us if you’re:
    • Thinking about upgrading to release 12
    • On R12.1 and considering moving to R12.2
    • Just looking for a little ‘positive sell’ to add to that budget request so you can fund your upgrade

    Oracle eBusiness Suite Release 12 was defined as “The Global Business Release”. This doesn’t encompass just its geographic reach…the Suite is a comprehensive tool whose breadth and depth across industries and business functions is compelling for customers around the world.

    During this session, participants will learn about:
    • The changes to R12.2 including the foundational architecture improvements and financial enhancements
    • How the strength of Financials Release 12 allows businesses to work globally - across applications, divisions and regions and the tools necessary to achieve that.
    • Integration, data management and reporting

    Oracle eBusiness Suite Release 12 makes it easier and less expensive for customers to implement, manage and scale global applications - ultimately improving the overall ownership experience.
  • Big data has gone beyond a buzzword for businesses and is rapidly becoming embedded in the way organisations operate and make decisions. Highlighted as one of the key areas for attention in the latest ISF Threat Horizon 2016 report, Big data analytics can also mislead when decisions are based on faulty, skewed, incomplete or poorly analysed data sets, resulting in missed opportunities as organisations enter the wrong markets, or enter the right markets with the wrong products. It’s also possible that the same data sets can lead to different conclusions in different parts of the world as a result of cultural bias. Further complicating matters, attackers will target data analytics tools to ensure decisions are skewed.

    This webcast will look at the implied threats to Big Data and offer ways of communicating the challenge of effective Big Data analysis and decision making to senior management.
  • Channel
  • Channel profile
Up Down
  • Improving Network Efficiencies with Dell SonicWALL WAN Acceleration May 13 2014 4:00 pm UTC 45 mins
    Learn how Dell SonicWALL WAN Acceleration technology can help you decrease WAN bandwidth usage and improve response times for SharePoint, AutoCad, Web and other collaboration applications. Additional benefits include web (HTTP) caching and application bandwidth control through the managing firewall. This 30-minute webinar will cover basic WAN Acceleration technologies, customer deployments and bandwidth savings.
  • Securing information in higher education organisations Apr 24 2014 10:00 am UTC 60 mins
    Information technology in education environments is constantly evolving: social media are transforming the learning experience, cloud computing has seen the education industry at the forefront of public cloud-based email, content and office tool adoption, the consumerization of mobile tools has increased student demands to bring their own devices & applications and big data is already making an impact at the higher-education level for academic research.
    However, these untapped opportunities, also bring about plenty of interoperability, scalability and, most importantly, security challenges.

    Join this webinar to learn from Simon Mortimore from Exeter College, Oxford and Dell Security on how next-generation network security solutions can protect your network and assets.
  • Mobile security; Protecting corporate apps and data Apr 22 2014 4:00 pm UTC 60 mins
    Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Network Security and Application Control with Dell Next Generation Firewalls Recorded: Mar 28 2014 49 mins
    Traditional firewalls have always focused on offering port specific protection (i.e., stateful firewalling). Current day threats are web-based, and often are malicious applications that pass through traditional ports.

    Discover how you can overcome the limitations of traditional stateful firewalls with the comprehensive deep security of Dell SonicWALL next-generation firewalls. See why it is essential for your network protection and increased productivity to have application intelligence and control—one of the key features of our next-generation firewalls.

    This webcast will show you how to:
    •Gain true network protection with deep network security
    •Effectively manage network bandwidth using application intelligence and control
    •Provide granular application control: e.g., allow Facebook, but block Facebook Apps
  • Les principales tendances de 2014 en matière de sécurité informatique Recorded: Mar 28 2014 51 mins
    L’année 2014 réserve de grands changements pour les réseaux informatiques. A la multiplication des utilisateurs et des terminaux s’ajoutent une prolifération et une sophistication croissantes des menaces visant les systèmes et les données. Autant dire que les entreprises doivent se préparer à ce qui les attend.
    Inscrivez-vous pour assister au webinaire sur « Les Principales tendances 2014 en matière de sécurité informatique » afin de découvrir ce que ces tendances signifient pour votre réseau et ce que vous pouvez faire pour garder une longueur d’avance.

    Assistez au webinare et découvrez :

    •Quel genre d’attaques attendre d’une nouvelle génération de menaces ;
    •Comment les opérateurs de botnets masquent leurs opérations de commande et contrôle ;
    •Quels types d’entreprises et de plates-formes seront ciblées par les ransomwares ;
    •Pourquoi les fonctionnalités de communication en champ proche ouvrent la porte à de nouvelles menaces ;
    •Pourquoi les méthodes de sécurisation classiques ne sont plus efficaces face à la sophistication des nouvelles menaces.
  • Die wichtigsten Trends in der IT-Sicherheit 2014 Recorded: Mar 27 2014 56 mins
    das Jahr 2014 bringt viele neue Herausforderungen für IT-Netzwerke. Nicht nur die Anzahl an Benutzern und Endpunktgeräten steigt konstant, auch die möglichen Einfallstore für immer raffiniertere Bedrohungen nehmen zu. Kleine wie große Unternehmen tun gut daran, sich auf dieses neue Szenario vorzubereiten.
    Melden Sie sich für das Webinar „Die wichtigsten Trends in der IT-Sicherheit 2014“ an und erfahren Sie, was diese Entwicklung für Sie bedeutet und was Sie tun können, um den neuen Bedrohungen immer einen Schritt voraus zu sein.
    Erfahren Sie:
    •Wie gefährlich die neue Generation von Exploits ist und mit welchen Angriffsarten Sie rechnen müssen
    •Welche Strategien Botnet-Betreiber heute einsetzen, um Rechner unerkannt unter ihre Kontrolle zu bringen
    •Welche Organisationen und Plattformen speziell im Fadenkreuz von Ransomware stehen
    •Warum NFC-Funktionen ein ideales Einfallstor für neue Exploits sind
    •Warum herkömmliche Sicherheitslösungen keinen Schutz mehr vor neuen, komplexen Bedrohungen bieten
  • Top trends driving IT security in 2014 Recorded: Mar 26 2014 51 mins
    IT networks are staged for massive changes in 2014. With users and endpoint devices proliferating and with threats to systems and data becoming more sophisticated and pervasive, organizations of all sizes must be prepared for what lies ahead.
    Register to attend the “Top Trends Driving IT Security in 2014” webinar to find out what these trends mean for your IT network, and what you can do to stay ahead of the game.
    You’ll learn:
    •What kinds of attacks to expect from a new generation of exploits
    •How botnet operators now cloak their command and control operations
    •What types of organizations and platforms will be targeted by ransomware
    •Why Near Field Communication capabilities open the door to new exploits
    •Why traditional security is no longer effective against new, sophisticated threats
  • Simplify Secure Email Exchange with Dell SonicWALL Email Security release 8.0 Recorded: Mar 25 2014 46 mins
    Dell SonicWALL Email Security provides superior protection from threats and compliance violations. Multiple proven, patented threat detection techniques deliver real-time protection from spam, phishing attacks and viruses. Compliance scanning and management prevent confidential data leaks and regulatory violations.

    New with release 8.0, an integrated email encryption cloud service ensures mobile-ready secure email exchange. Also, advanced email anti-spoofing and anti-phishing protection is now available with support for SPF, DKIM and DMARC email authentication capability
  • Visualizing and Quantifying Cybersecurity Threats through Firewall Reporting Recorded: Mar 24 2014 49 mins
    Every day, terabytes of big data traverse your firewall. How do you know it is doing its job intercepting viruses, spyware, intrusions, attacks, and filtering nefarious websites and web applications?

    Make your security policies more effective with firewall reporting. Learn how you can:

    • Benefit from ways other companies use firewall reporting to be more
    • Make sense of the cyber-threats attacking your company with
    firewall analytics
    • Analyze who has been doing what, where, when, and how on your
    • Easily create customized firewall reports with intuitive analytics tools
  • Definition of an Effective Intrusion Prevention System Recorded: Mar 18 2014 40 mins
    Cybercriminals often try to circumvent intrusion prevention systems by obfuscating advanced attacks using complex algorithms designed to evade detection. A tightly integrated intrusion prevention system with sophisticated anti-evasion capabilities with full stack inspection of inbound and outbound application traffic is required to defeat these threats.
    Register for this webinar with NSS Labs, the trusted authority in independent product testing, and Dell™ to learn about the requirements for an effective intrusion prevention system. Their findings are based on the NSS Labs 2013 Intrusion Prevention System (IPS) Security Value Map, which maps vendors based on security effectiveness and value (cost per protected Mbps) of tested product configurations. In addition, Dell will summarize key results from the Dell SonicWALL™ SuperMassive™ E10800 IPS Product Analysis Report.

    Join us to explore:
    •NSS Labs Intrusion Prevention System testing methodology
    •Security effectiveness, performance, and total cost of ownership
    •Dell SonicWALL SuperMassive E10800 IPS Product Analysis Report results
  • 2014 Top IT Security Trends Recorded: Mar 12 2014 37 mins
    IT networks are staged for massive changes in 2014. With users and endpoint devices proliferating and with threats to systems and data becoming more sophisticated and pervasive, organizations of all sizes must be prepared for what lies ahead.
    Attend our  “Top Trends Driving IT Security in 2014” webinar to find out what these trends mean for your IT network, and what you can do to stay ahead of the game.
    You’ll learn:
    •What kinds of attacks to expect from a new generation of exploits
    •How botnet operators now cloak their command and control operations
    •What types of organizations and platforms will be targeted by ransomware
    •Why Near Field Communication capabilities open the door to new exploits
    Why traditional security is no longer effective against new, sophisticated threats
  • March Madness and network sanity Recorded: Mar 6 2014 32 mins
    March Madness can stress your network and create opportunities for someone to exploit your vulnerabilities. Being aware of the threats can help prepare for them to keep your network sane and secure.

    What You Will Learn:

    1. you can achieve a deeper level of security by being aware what is happening on your network.
    2. be aware of how you access the games, use secure connections
    3. Keeping your applications and firewall up to date can help you keep secure.
  • 2014 Top IT Security Trends Recorded: Jan 28 2014 52 mins
    Join Dell SonicWALL for this one hour session as we examine the top 10 IT security trends expected in 2014.
  • Mobile security; the risks of co-mingling personal and business Recorded: Jan 15 2014 60 mins
    Employees and especially mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices can create risk of business data loss and introduction of malware.
  • Assurez-vous de la sécurité de votre entreprise pendant les fêtes. Recorded: Dec 13 2013 37 mins
    La saison des achats de fêtes de fin d'année a commencé avec pour conséquence un nombre record d’acheteurs en ligne, dont vos employés. Cette année, veillez à ce que votre réseau soit protégé et que vos employés soient autant productifs pendant les fêtes que toute l’année.
  • Connected Security: Respond to 2014's Challenges Recorded: Dec 5 2013 48 mins
    We will look at major trends driving business decisions and then talk about how you can ensure that your IT security efforts can be a business enabler to support innovation and ultimately success in today’s demanding marketplace.

    Join us to learn how to:

    • Respond quickly to security threats and problems before they negatively impact the business.

    • Protect every part of the infrastructure – inside and outside the network – reducing the number of vendors and disparate solutions and gaining efficiencies by reducing costs.

    • Provide common-sense reporting that spans across areas of the network and infrastructure, helping to reduce the risk of errors from missed problems or threats, and saving time.

    • Unify the patchwork of processes, reducing the complexity of meeting security and compliance objectives
  • The holiday online shopping season is here. Are you prepared? Recorded: Nov 28 2013 54 mins
    The holiday buying season is upon us, and that means record numbers of online shoppers, including your employees. This year, make sure your network is protected and your employees remain productive before Christmas and all through the New Year by joining our webinar, Protection and Productivity during the Holiday Season.
  • Sorgen Sie dafür, dass Ihre Organisation in der Weihnachtszeit sicher bleibt. Recorded: Nov 27 2013 54 mins
    Der Startschuss für die Weihnachtsshopping-Saison ist gefallen. In dieser Zeit nutzen Millionen Menschen das Internet, um Geschenke online einzukaufen – auch während der Arbeitszeit. Nehmen Sie an unserem Webinar Schutz und Produktivität in der Weihnachtszeit teil. Wir sagen Ihnen, was Sie tun müssen, damit Ihr Netzwerk geschützt ist und Ihre Mitarbeiter produktiv bleiben – egal ob vor der Weihnachtszeit oder im neuen Jahr.
  • Protection and Productivity During the Holiday Buying Season Recorded: Nov 12 2013 61 mins
    The holiday buying season featuring Cyber Monday is here again and that means online shopping. Lots of it. Find out how to keep your network secure from cyber-criminals and your employees focused by ensuring Internet bandwidth is reserved solely for critical business activity.
  • Der mobile Wahnsinn – Strategien, um mobile Sicherheitsbedrohungen in den Griff Recorded: Oct 31 2013 55 mins
    Immer mehr Mitarbeiter wünschen sich einen schnellen und einfachen mobilen Zugriff auf geschäftskritische Unternehmensanwendungen. In diesem Webinar beschäftigen wir uns mit mobilen Sicherheitsbedrohungen und stellen Strategien vor, mit denen Sie mobiles Arbeiten ermöglichen und gleichzeitig das Risiko für Ihre IT-Infrastruktur senken können.
Dynamic Security for the Global Network
Dell(TM)SonicWALL(TM) provides intelligent network security and data protection solutions that enable customers and partners to dynamically secure, control, and scale their global networks. Using input from millions of shared touch points in the SonicWALL Global Response Intelligent Defense (GRID) Network, the SonicWALL Threat Center provides continuous communication, feedback, and analysis on the nature and changing behavior of threats.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Next-Generation Firewall for Federal: Enabling Application Control
  • Live at: Feb 16 2012 7:00 pm
  • Presented by: Jacob Bardin, Federal Territory Manager, SonicWALL
  • From:
Your email has been sent.
or close
You must be logged in to email this