Browse communities
Browse communities
Presenting a webinar?

Best Practice Satellite Communication Solutions for Service Providers

Mark Pitts - Product Director, Ultra Communicate, Ultra Electronics AEP Networks
As a service provider in the maritime, or oil and gas sectors, you need to ensure you are offering the best satellite communication service for voice and data at an affordable and manageable cost, enabling you to bill or charge for a premium rate for a dynamic service that provides a flexible cost model. Join AEP networks for a Webinar to learn:

- How by utilising combined best of breed technologies from COMTEC Vipersat in combination with AEP Networks, organisations can now achieve dynamic SCPC as a new flexible and controllable solution to optimize bandwidth.

- How The Comtec Modems in combination with AEP Networks provide Dynamic SCPC technology providing sophisticated integrated real time monitoring and reporting to enable service providers to monitor and manage usage patterns in real time and can now control fair usage and monitor usage patterns of bandwidth across a fleet of vessels in real time.
Jun 14 2012
37 mins
Best Practice Satellite Communication Solutions for Service Providers
More from this community:

IT Security

  • Live and recorded (5381)
  • Upcoming (115)
  • Date
  • Rating
  • Views
  • In this webcast we will look at how to effectively manage Macs in the enterprise as well as mobile devices leveraging your existing IT infrastructure.

    The growth of Mac in the enterprise is undeniable. Apple’s success with the iPhone and iPad is bleeding over into end user preference for laptops. Where Macs used to account for only low single digit percentages of devices deployed and were therefore largely ignored, they are now growing across all verticals and industries and represent a significant challenge for IT.
  • Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Practice Makes Perfect When Defending Against DDoS Attacks

    DDoS attacks have been on the rise, especially hard-to-detect Layer 7 attacks that take down websites via resource exhaustion. Take the guesswork out of defending against these attacks by validating your DDoS defense effectiveness using realistic scenarios of real-world users and attacker behavior at scale.

    In this webinar, we will analyze and discuss the techniques and technology necessary to validate defenses against DDoS attacks:
    • Take a deep dive into multi-vector DoS attack strategies
    • Learn how to attack yourself in a controlled, safe environment
    • Create a DDoS Range to test your network defenses, personnel, and incident playbook

    Register now to reserve your spot.
  • Did you know the average breach goes undetected for 229 days? The earlier you can detect and respond to a breach, the faster you lower the risk and potential damage. Traditionally, companies have implemented a number of point solutions to for each new threat, an expensive and cumbersome approach. However, by combining threat protection from Fortinet with threat detection and response from AlienVault, companies now have an affordable way to significantly reduce the cost and complexity of complete threat management.

    Join threat experts from AlienVault and Fortinet for this webcast to learn how this integrated solution will provide:

    · Continuous threat prevention, detection and remediation in an easy-to-use solution

    · The ability to identify all critical assets and the potential attack surfaces in your network

    · Advanced analysis of FortiGate logs for threat identification and response through AlienVault USM

    · Simplified protection of your network with ONLY two products, at a price you can afford

    · Continual improvement of your security posture through frequent assessment.

    · Integrated threat intelligence that maximizes the efficiency of your security monitoring program
  • As organisations accept that they are more than likely to be breached, strengthening business resilience and response capabilities is becoming just as important as developing defensive strategies. As a result, organisations are crafting risk-based approaches to balance their priorities in order to protect, detect, respond and recover.

    Drawing on the findings of the Infosecurity Europe Industry Survey, this panel of industry experts will discuss the challenges for information security practitioners and how to prioritise and balance risk. The speakers will share insight into how to develop an information security strategy that protects the organisation’s information assets, whilst ensuring it is resilient and capable of responding robustly to incidents.
  • Companies rely heavily on networked technology today to operate their businesses. Highly distributed organizations like restaurant chains, retail stores, financial services or supply chain companies have an extra layer of difficulty. Rarely does each of the remote locations have IT expertise on site. As an IT manager, you are demanded by your executive management to keep the network available 100% of the time, avoid security breaches, support all the new strategic marketing initiatives and to do all of this with less money than you had in your budget last year! This session will review the top 5 challenges an IT manager in this situation needs to consider and suggest solutions:

    1) Executive mandate to "Do more with less"
    - Free-up your time to do what you do best
    - Vendor consolidation
    - Outsource, focus Internal resources on strategic tasks

    2) Lack of IT Expertise at remote sites
    - Consistency of deployment, Office in a box
    - How to make sure all locations have the same technology
    - Preplanned for growth and new services

    3) Sometimes lack of ownership of remote sites (Franchises)

    4) Security compliance/PCI DSS

    5) High availability
    - Network is down, business has stopped (can't take payments)
  • Join us to hear Africa Director Hendrik Malan and guest speaker Grant Theis, CEO of ttrumpet, as they discuss the emergence of Over-the-Top (OTT) providers and the potential opportunities for growth in the enterprise market.
  • Wie Sie in drei Schritten ein klares IT-Configuration Management aufsetzen

    Als Verantwortlicher für IT-Security sind Sie konstant mit möglichen Angriffszenarien und deren Abwehr beschäftigt. Ein Großteil der Angriffe sind nur deshalb erfolgreich, weil Komponenten in Ihrem Netzwerk unzureichend konfiguriert sind.
    Die Herausforderung ist, genau diese Maschinen zu identifizieren und sicher zu stellen, dass sie korrekt konfiguriert werden und dies auch bleiben.
    Lernen Sie in unserm Webcast wie Qualys Policy Compliance Ihr IT-Configuration-Management verbessern kann und damit Ihre Basis-Security stärkt und das Ganze voll automatisiert.
    Erfahren Sie:
    • Etablieren und Umsetzung von Security Configurations
    • Automatisierung und Durchführung von regelmäßigen Configuration Assessments
    • Priorisierung und Umsetzung von Remedation Workflows
  • Vous souhaitez en finir avec l’information dispersée à travers des centaines de répertoires partagés, espaces personnels, et disques durs locaux ?

    Vous êtes à la recherche d’une plateforme collaborative tout-en-un ?

    Vous êtes certainement déjà familier avec Microsoft SharePoint, mais êtes-vous sur de connaître l’étendue de son périmètre fonctionnel ?

    Car si SharePoint reste une excellente plate-forme intranet, de portail web, de collaboration et de partage documentaire, SharePoint va bien au-delà de ces fonctions avec le réseau social (RSE), les outils de développement, et la gestion documentaire (de type GED).

    Participez à notre webinar pour mieux comprendre la richesse de la plateforme et ses bénéfices : une collaboration unifiée et des gains de productivité à chaque niveau de l’entreprise (utilisateurs métiers, DSI, direction).

    Nous aborderons également les modèles de déploiement de SharePoint (100 % cloud, hybride ou on-premises) ainsi que les limites et bénéfices de chaque configuration.

    Dans un second temps, nous nous pencherons sur les questions de déploiement de SharePoint et nous découvrirons comment AvePoint, avec sa solution de migration pour SharePoint 2013 & Office 365, vous permet d’accélérer la mise en place de votre plateforme.

    Nous ferons un tour d’horizon des problèmes les plus communément rencontrés pendant les projets de migration, et nous verrons en 3 points comment AvePoint vous permet notamment de les adresser :

    • Optimisation des ressources dédiées à la migration en automatisant la suppression du contenu obsolète

    • Réduction de la perturbation des activités pendant le processus de migration grâce à une planification personnalisée.

    • Maintien de l’ensemble du contenu, des permissions et des métadonnées jugés pertinents par vos équipes.
  • Channel
  • Channel profile
  • Get Off Windows XP by 2013? How to save costs in XP to Windows 7 Migrations Recorded: Aug 8 2012 60 mins
    Kieran Kelly, Director – Information & Cloud Solutions
    Webcast for EMEA participants:
    Don’t be left in the dark when Windows XP support ends

    Join this webinar to find out how your business can postpone or avoid the costly hardware refresh required to effectively run Windows 7/8, and retain access to XP functionality and legacy applications. Learn how to provide security features to retain role based application access and prevent data leakage.

    With Microsoft support for Windows XP expected to end in 2013, businesses need to consider the cost of buying new hardware that can effectively run Windows 7/8 and whether Windows 7 can support all their necessary legacy applications.

    Abtech and Ultra Electronics AEP Networks cordially invite you to join a webinar on 18 July 2012 9.00am PST and find out how your organization could avoid or postpone migration to Windows 7, without interrupting your day-to-day operations.

    Windows XP has been a ‘workhorse’ for organizations for a decade, but by early 2013 will constitute less than 5% of the install base. If Microsoft does not extend support for Windows XP at this point, users will be without essential security patches, leaving system vulnerabilities unplugged.

    This webinar will demonstrate an innovative alternative to this high-cost upgrade. By adopting a system of thin clients with AEP Networks Ultra Protect for virtual application delivery, and delivery of Microsoft Terminal Services, organizations can avoid the outlay of upgrading to Windows 7 while retaining functionality.

    Key discussion points will include:
    - How to leverage Terminal Services infrastructure to reduce desktop management and support costs
    - How to use old PCs as thin clients and securely deliver all applications to a simple LanProtect Webtop
    - How a thin client environment can reduce software licensing costs
    - How the AEP Networks LanProtect product enables you to access your applications from an iPad or other mobile devicess
    - How to effectively secure the access to this infrastructure
  • Get Off Windows XP by 2013? How to save costs in XP to Windows 7 Migrations Recorded: Jul 18 2012 36 mins
    Michael Stewart- Vice President of Sales, Ultra Electronics AEP Networks
    Don’t be left in the dark when Windows XP support ends

    Join this webinar to find out how your business can postpone or avoid the costly hardware refresh required to effectively run Windows 7/8, and retain access to XP functionality and legacy applications. Learn how to provide security features to retain role based application access and prevent data leakage.

    With Microsoft support for Windows XP expected to end in 2013, businesses need to consider the cost of buying new hardware that can effectively run Windows 7/8 and whether Windows 7 can support all their necessary legacy applications.

    Abtech and Ultra Electronics AEP Networks cordially invite you to join a webinar on 18 July 2012 9.00am PST and find out how your organization could avoid or postpone migration to Windows 7, without interrupting your day-to-day operations.

    Windows XP has been a ‘workhorse’ for organizations for a decade, but by early 2013 will constitute less than 5% of the install base. If Microsoft does not extend support for Windows XP at this point, users will be without essential security patches, leaving system vulnerabilities unplugged.

    This webinar will demonstrate an innovative alternative to this high-cost upgrade. By adopting a system of thin clients with AEP Networks Ultra Protect for virtual application delivery, and delivery of Microsoft Terminal Services, organizations can avoid the outlay of upgrading to Windows 7 while retaining functionality.

    Key discussion points will include:
    - How to leverage Terminal Services infrastructure to reduce desktop management and support costs
    - How to use old PCs as thin clients and securely deliver all applications to a simple LanProtect Webtop
    - How a thin client environment can reduce software licensing costs
    - How the AEP Networks LanProtect product enables you to access your applications from an iPad or other mobile devicess
    - How to effectively secure the access to this infrastructure and protect against data loss or theft
  • Best Practice Satellite Communication Solutions for Service Providers Recorded: Jun 14 2012 37 mins
    Mark Pitts - Product Director, Ultra Communicate, Ultra Electronics AEP Networks
    As a service provider in the maritime, or oil and gas sectors, you need to ensure you are offering the best satellite communication service for voice and data at an affordable and manageable cost, enabling you to bill or charge for a premium rate for a dynamic service that provides a flexible cost model. Join AEP networks for a Webinar to learn:

    - How by utilising combined best of breed technologies from COMTEC Vipersat in combination with AEP Networks, organisations can now achieve dynamic SCPC as a new flexible and controllable solution to optimize bandwidth.

    - How The Comtec Modems in combination with AEP Networks provide Dynamic SCPC technology providing sophisticated integrated real time monitoring and reporting to enable service providers to monitor and manage usage patterns in real time and can now control fair usage and monitor usage patterns of bandwidth across a fleet of vessels in real time.
  • Network Security CLAS Consultant Research Survey Findings Recorded: Jun 6 2012 37 mins
    Steve Page, Consultant, SP Marketing Services, Rob Stubbs, Product Director, AEP Networks
    75 CLAS Consultants participated in an Independent Survey into Network Security. During this webcast you will learn:
    - How CLAS Consultants percieve the threat of Network Hacking, as part of the Threat Lanscape
    - What are the trend that they see that are contributing the increased threat levels surrounding the Security of Networks
    - What types of remediation/ security technologies can be used to address the challenges
  • Localised secure issuance, personalisation and deployment of smart identity card Recorded: May 25 2012 16 mins
    David Worsdell, Marketing Manager - Ultra Electronics Card Systems
    Personalised smart cards can combine physical and logical access control with identity and smart payment. Using Ultra Electronics Card Systems’ Magicard desktop issuance solutions, these cards can be issued, personalised and deployed as part of an integrated solution to protect your organisation’s IP. A combination of logical and visual security can be utilised to ensure only users with the correct credentials and digital passport/certificate can gain access to corporate information and assets.
  • How to make your Encryption work over roaming bearers Recorded: May 25 2012 19 mins
    Mark Pitts - Product Director, Ultra Communicate, Ultra Electronics AEP Networks
    Organisations need to secure their business and financial communications infrastructure especially in areas where existing communications could fall over and there is no back up in place. Not having a backup or failover solution in place can result in lost business and reputational damage and in many cases result in customer churn.

    Rapidly deployable communications can be essential in providing back up in securing these communications, whether this be a point of sale device requiring a 3G network to securely communicate financial transactions via banking networks, or a telephone operating system or computer network that goes down due to road works or construction causing damaged or severed communication lines.

    During this session you will learn how businesses can keep their mission critical business communications going without the cost & inconvenience of using non secure satellite communications and without waiting for deployment of an expert network engineer on site to repair the fault quickly
  • Secure remote access to any application anywhere using any device Recorded: May 24 2012 34 mins
    Alex Teh , Commercial Director - Vigil
    The demands for high powered users to be able to access the corporate network for their applications, using any device, at any location has greatly increased in the last year. Senior executives are looking to use a combination of home computers, corporate laptops, tablets and smartphones to access the network for their key applications.

    During this session you will learn how the IT security manager’s job can be made easier at the same time as ensuring access is delivered in a secure way using a combination of tools like Mobile Device Management (MDM), identity and access management tools, and encryption technologies
  • Disaster response, building securely encrypted communications in disaster zones Recorded: May 24 2012 29 mins
    Chris Jones - Director of Business Development, Ultra Electronics AEP Networks
    After a major incident in an area with limited and possibly broken communications infrastructure, such as after a terrorist attack or major disaster, rapidly deployable communications can be essential for the speedy deployment of resources, and for reconstruction of infrastructure critical to secure supply chains for saving human life.

    During this session you will learn how AEP Networks has provided this capability, with a multi-bearer, multi-service communications hub, which can be easily deployed with transportable Wi-Fi / Wi-Max, TETRA/PMR or cellular GSM/3G wireless base stations. Find out how by allowing rapid remote configuration over the air, using satellite or wide area backhaul, how experts in Network Operations Centres can plan spectrum assignment and network configurations during mission transit phase.

    See how field commanders can then communicate effectively with their field resources and strategic command chain, without the cost & inconvenience of making multiple one-to-one calls over satellite phones and without waiting for deployment of an expert network engineer into the field.
  • Securing Cloud Services (Ultra Protect) Recorded: May 23 2012 34 mins
    Bill Armstrong, Product Manager Ultra Protect, Ultra Electronics - AEP Networks
    Securing access to any business application in a fully protected, secure environment to thousands of users in both LAN and Cloud Environments presents a host of challenges both from a performance and end user adoption perspective. Equally in a Cloud Services model and the new era of mobile working and BYOD adds additional complexities.

    During this session you will learn how to secure application & desktop access through multiple form factors, and how to deliver a highly versatile platform that delivers outstanding performance to thousands of users enabling significant cost saving in the drive to a shared services model. During this session you will learn more about the latest Ultra Protect 7.4 revision for iPad, providing Secure Cloud or LAN Access via the Apple iPad.
  • DNSSEC, the challenge Recorded: May 23 2012 27 mins
    Tim Rooney, Product Director - BT Diamond
    DNSSEC has become widely recognised, not only as the solution for preventing DNS spoofing, but also as a way to provide additional security-in-depth for the Internet. Without DNSSEC, criminals can use DNS to pose as trustworthy online entities like government agencies by using DNS cache poisoning. DNSSEC uses PKI to digitally sign DNS messages. These digital signatures ensure the validity of responses to DNS queries preventing fraudulent DNS responses that could be used for attacks such as phishing. Generating, storing and managing cryptographic keys to a high level of assurance requires an HSM - with AEP Networks Keyper, your digital keys will be of high quality (generated using a highly random method) and safely stored where they cannot be accessed or misused.
Trusted Security and Versatile Communications Everywhere
Ultra Electronics AEP Networks provides trusted security everywhere and secures data and voice communication regardless of device, environment or location. Delivering proven security architectures to more than 5,000 organisations all over the world including governments, enterprises and carriers, AEP Networks counts international governments, ICANN, VeriSign, Optus, Shell, Barclays, MasterCard and New York Metropolitan Transport Authority amongst its 1,000 blue chip customers.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practice Satellite Communication Solutions for Service Providers
  • Live at: Jun 14 2012 1:00 pm
  • Presented by: Mark Pitts - Product Director, Ultra Communicate, Ultra Electronics AEP Networks
  • From:
Your email has been sent.
or close
You must be logged in to email this