Disaster response, building securely encrypted communications in disaster zones

Chris Jones - Director of Business Development, Ultra Electronics AEP Networks
After a major incident in an area with limited and possibly broken communications infrastructure, such as after a terrorist attack or major disaster, rapidly deployable communications can be essential for the speedy deployment of resources, and for reconstruction of infrastructure critical to secure supply chains for saving human life.

During this session you will learn how AEP Networks has provided this capability, with a multi-bearer, multi-service communications hub, which can be easily deployed with transportable Wi-Fi / Wi-Max, TETRA/PMR or cellular GSM/3G wireless base stations. Find out how by allowing rapid remote configuration over the air, using satellite or wide area backhaul, how experts in Network Operations Centres can plan spectrum assignment and network configurations during mission transit phase.

See how field commanders can then communicate effectively with their field resources and strategic command chain, without the cost & inconvenience of making multiple one-to-one calls over satellite phones and without waiting for deployment of an expert network engineer into the field.
May 24 2012
29 mins
Disaster response, building securely encrypted communications in disaster zones
Join us for this summit:
More from this community:

IT Security

Webinars and videos

  • Live and recorded (4527)
  • Upcoming (155)
  • Date
  • Rating
  • Views
  • Modulo Director of Technical Services John Ambra walks Risk Manager users through the latest version 8.4, and answers user questions at the end.
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Once upon a time, a knowledge worker accessed proprietary
    documents on a company-owned desktop computer within the corporate
    firewall. Today's work environment is dramatically different - sensitive
    data and proprietary documents are increasingly produced and accessed
    outside the firewall, on employee-owned devices. Virtual collaboration is
    growing, and the cloud is redefining security paradigms even further. Yet,
    some things remain the same. Intellectual property must be protected,
    regulations must be complied with, and individual identities,
    authentication and privileges must be dynamically managed. This panel will
    look at how changing use cases and scenarios are changing the threat
    landscape for corporate IP, and how leading vendors are rising to the
    occasion to help enterprises meet these challenges. It will also discuss
    best practices in developing and executing a forward-looking IP protection
    strategy.
  • Once upon a time, a knowledge worker accessed proprietary
    documents on a company-owned desktop computer within the corporate
    firewall. Today's work environment is dramatically different - sensitive
    data and proprietary documents are increasingly produced and accessed
    outside the firewall, on employee-owned devices. Virtual collaboration is
    growing, and the cloud is redefining security paradigms even further. Yet,
    some things remain the same. Intellectual property must be protected,
    regulations must be complied with, and individual identities,
    authentication and privileges must be dynamically managed. This panel will
    look at how changing use cases and scenarios are changing the threat
    landscape for corporate IP, and how leading vendors are rising to the
    occasion to help enterprises meet these challenges. It will also discuss
    best practices in developing and executing a forward-looking IP protection
    strategy.
  • Trend Micro sponsored an extensive security survey of businesses in North America and Europe. Conducted by Cyber-Edge Group, LLC, a premier research and marketing firm, the survey examines the current and planned deployment countermeasures for establishing effective cyber defenses. This webinar will reveal the significant findings from the survey and accompanying report and is intended to provide IT security decision makers with a better understanding of how their perceptions, concerns, priorities – and most importantly – current defensive postures stack up against those of other IT security professionals and organizations. Key highlights from the report include:
    • One in four security professionals doubt whether their organization has invested adequately in cyber threat defenses.
    • Over 60% of respondents were affected by a successful cyber-attack in 2013, but less than 40% expect to fall victim again in 2014.
    • Mobile devices (smartphones and tablets) are perceived as IT security’s “weakest link”, followed by laptops and social media applications.
    • One in four organizations lack the tools necessary to properly investigate the root cause and material impact of network security breaches.

    Join Mark Bouchard, Vice President with Cyber-Edge Group and Jon Clay, Director of Global Threat Research with Trend Micro, for this webinar to learn more about the state of cyber threat defenses among today’s businesses and gain a better understanding of what you can do to improve your defenses going forward.
  • Channel
  • Channel profile
Up Down
  • Get Off Windows XP by 2013? How to save costs in XP to Windows 7 Migrations Recorded: Aug 8 2012 60 mins
    Webcast for EMEA participants:
    Don’t be left in the dark when Windows XP support ends

    Join this webinar to find out how your business can postpone or avoid the costly hardware refresh required to effectively run Windows 7/8, and retain access to XP functionality and legacy applications. Learn how to provide security features to retain role based application access and prevent data leakage.

    With Microsoft support for Windows XP expected to end in 2013, businesses need to consider the cost of buying new hardware that can effectively run Windows 7/8 and whether Windows 7 can support all their necessary legacy applications.

    Abtech and Ultra Electronics AEP Networks cordially invite you to join a webinar on 18 July 2012 9.00am PST and find out how your organization could avoid or postpone migration to Windows 7, without interrupting your day-to-day operations.

    Windows XP has been a ‘workhorse’ for organizations for a decade, but by early 2013 will constitute less than 5% of the install base. If Microsoft does not extend support for Windows XP at this point, users will be without essential security patches, leaving system vulnerabilities unplugged.

    This webinar will demonstrate an innovative alternative to this high-cost upgrade. By adopting a system of thin clients with AEP Networks Ultra Protect for virtual application delivery, and delivery of Microsoft Terminal Services, organizations can avoid the outlay of upgrading to Windows 7 while retaining functionality.

    Key discussion points will include:
    - How to leverage Terminal Services infrastructure to reduce desktop management and support costs
    - How to use old PCs as thin clients and securely deliver all applications to a simple LanProtect Webtop
    - How a thin client environment can reduce software licensing costs
    - How the AEP Networks LanProtect product enables you to access your applications from an iPad or other mobile devicess
    - How to effectively secure the access to this infrastructure
  • Get Off Windows XP by 2013? How to save costs in XP to Windows 7 Migrations Recorded: Jul 18 2012 36 mins
    Don’t be left in the dark when Windows XP support ends

    Join this webinar to find out how your business can postpone or avoid the costly hardware refresh required to effectively run Windows 7/8, and retain access to XP functionality and legacy applications. Learn how to provide security features to retain role based application access and prevent data leakage.

    With Microsoft support for Windows XP expected to end in 2013, businesses need to consider the cost of buying new hardware that can effectively run Windows 7/8 and whether Windows 7 can support all their necessary legacy applications.

    Abtech and Ultra Electronics AEP Networks cordially invite you to join a webinar on 18 July 2012 9.00am PST and find out how your organization could avoid or postpone migration to Windows 7, without interrupting your day-to-day operations.

    Windows XP has been a ‘workhorse’ for organizations for a decade, but by early 2013 will constitute less than 5% of the install base. If Microsoft does not extend support for Windows XP at this point, users will be without essential security patches, leaving system vulnerabilities unplugged.

    This webinar will demonstrate an innovative alternative to this high-cost upgrade. By adopting a system of thin clients with AEP Networks Ultra Protect for virtual application delivery, and delivery of Microsoft Terminal Services, organizations can avoid the outlay of upgrading to Windows 7 while retaining functionality.

    Key discussion points will include:
    - How to leverage Terminal Services infrastructure to reduce desktop management and support costs
    - How to use old PCs as thin clients and securely deliver all applications to a simple LanProtect Webtop
    - How a thin client environment can reduce software licensing costs
    - How the AEP Networks LanProtect product enables you to access your applications from an iPad or other mobile devicess
    - How to effectively secure the access to this infrastructure and protect against data loss or theft
  • Best Practice Satellite Communication Solutions for Service Providers Recorded: Jun 14 2012 37 mins
    As a service provider in the maritime, or oil and gas sectors, you need to ensure you are offering the best satellite communication service for voice and data at an affordable and manageable cost, enabling you to bill or charge for a premium rate for a dynamic service that provides a flexible cost model. Join AEP networks for a Webinar to learn:

    - How by utilising combined best of breed technologies from COMTEC Vipersat in combination with AEP Networks, organisations can now achieve dynamic SCPC as a new flexible and controllable solution to optimize bandwidth.

    - How The Comtec Modems in combination with AEP Networks provide Dynamic SCPC technology providing sophisticated integrated real time monitoring and reporting to enable service providers to monitor and manage usage patterns in real time and can now control fair usage and monitor usage patterns of bandwidth across a fleet of vessels in real time.
  • Network Security CLAS Consultant Research Survey Findings Recorded: Jun 6 2012 37 mins
    75 CLAS Consultants participated in an Independent Survey into Network Security. During this webcast you will learn:
    - How CLAS Consultants percieve the threat of Network Hacking, as part of the Threat Lanscape
    - What are the trend that they see that are contributing the increased threat levels surrounding the Security of Networks
    - What types of remediation/ security technologies can be used to address the challenges
  • Localised secure issuance, personalisation and deployment of smart identity card Recorded: May 25 2012 16 mins
    Personalised smart cards can combine physical and logical access control with identity and smart payment. Using Ultra Electronics Card Systems’ Magicard desktop issuance solutions, these cards can be issued, personalised and deployed as part of an integrated solution to protect your organisation’s IP. A combination of logical and visual security can be utilised to ensure only users with the correct credentials and digital passport/certificate can gain access to corporate information and assets.
  • How to make your Encryption work over roaming bearers Recorded: May 25 2012 19 mins
    Organisations need to secure their business and financial communications infrastructure especially in areas where existing communications could fall over and there is no back up in place. Not having a backup or failover solution in place can result in lost business and reputational damage and in many cases result in customer churn.

    Rapidly deployable communications can be essential in providing back up in securing these communications, whether this be a point of sale device requiring a 3G network to securely communicate financial transactions via banking networks, or a telephone operating system or computer network that goes down due to road works or construction causing damaged or severed communication lines.

    During this session you will learn how businesses can keep their mission critical business communications going without the cost & inconvenience of using non secure satellite communications and without waiting for deployment of an expert network engineer on site to repair the fault quickly
  • Secure remote access to any application anywhere using any device Recorded: May 24 2012 34 mins
    The demands for high powered users to be able to access the corporate network for their applications, using any device, at any location has greatly increased in the last year. Senior executives are looking to use a combination of home computers, corporate laptops, tablets and smartphones to access the network for their key applications.

    During this session you will learn how the IT security manager’s job can be made easier at the same time as ensuring access is delivered in a secure way using a combination of tools like Mobile Device Management (MDM), identity and access management tools, and encryption technologies
  • Disaster response, building securely encrypted communications in disaster zones Recorded: May 24 2012 29 mins
    After a major incident in an area with limited and possibly broken communications infrastructure, such as after a terrorist attack or major disaster, rapidly deployable communications can be essential for the speedy deployment of resources, and for reconstruction of infrastructure critical to secure supply chains for saving human life.

    During this session you will learn how AEP Networks has provided this capability, with a multi-bearer, multi-service communications hub, which can be easily deployed with transportable Wi-Fi / Wi-Max, TETRA/PMR or cellular GSM/3G wireless base stations. Find out how by allowing rapid remote configuration over the air, using satellite or wide area backhaul, how experts in Network Operations Centres can plan spectrum assignment and network configurations during mission transit phase.

    See how field commanders can then communicate effectively with their field resources and strategic command chain, without the cost & inconvenience of making multiple one-to-one calls over satellite phones and without waiting for deployment of an expert network engineer into the field.
  • Securing Cloud Services (Ultra Protect) Recorded: May 23 2012 34 mins
    Securing access to any business application in a fully protected, secure environment to thousands of users in both LAN and Cloud Environments presents a host of challenges both from a performance and end user adoption perspective. Equally in a Cloud Services model and the new era of mobile working and BYOD adds additional complexities.

    During this session you will learn how to secure application & desktop access through multiple form factors, and how to deliver a highly versatile platform that delivers outstanding performance to thousands of users enabling significant cost saving in the drive to a shared services model. During this session you will learn more about the latest Ultra Protect 7.4 revision for iPad, providing Secure Cloud or LAN Access via the Apple iPad.
  • DNSSEC, the challenge Recorded: May 23 2012 27 mins
    DNSSEC has become widely recognised, not only as the solution for preventing DNS spoofing, but also as a way to provide additional security-in-depth for the Internet. Without DNSSEC, criminals can use DNS to pose as trustworthy online entities like government agencies by using DNS cache poisoning. DNSSEC uses PKI to digitally sign DNS messages. These digital signatures ensure the validity of responses to DNS queries preventing fraudulent DNS responses that could be used for attacks such as phishing. Generating, storing and managing cryptographic keys to a high level of assurance requires an HSM - with AEP Networks Keyper, your digital keys will be of high quality (generated using a highly random method) and safely stored where they cannot be accessed or misused.
Trusted Security and Versatile Communications Everywhere
Ultra Electronics AEP Networks provides trusted security everywhere and secures data and voice communication regardless of device, environment or location. Delivering proven security architectures to more than 5,000 organisations all over the world including governments, enterprises and carriers, AEP Networks counts international governments, ICANN, VeriSign, Optus, Shell, Barclays, MasterCard and New York Metropolitan Transport Authority amongst its 1,000 blue chip customers.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Disaster response, building securely encrypted communications in disaster zones
  • Live at: May 24 2012 1:00 pm
  • Presented by: Chris Jones - Director of Business Development, Ultra Electronics AEP Networks
  • From:
Your email has been sent.
or close
You must be logged in to email this