InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Enforcing Threat Intelligence at The Network Perimeter

Presented by

Tom Bienkowski, Director, Product Marketing, NETSCOUT Chris Rodriguez, Research Manager, Cybersecurity Products, IDC

About this talk

Digital transformation (DX) brings both new opportunities and differentiation; along with increases in the cybersecurity attack surface and risk to organizations. As bad actors continue to change their techniques, tactics and procedures (TTPs), continuous cyber threat intelligence plays a vital role in protection. But cyber threat intelligence by itself is useless unless it can be made actionable. Join NETSCOUT and IDC analyst Chris Rodriguez in this webinar to learn how organizations can enforce continuous threat intelligence at the network perimeter using stateless technology to not only complement stateful components of the cyber security stack (e.g. NGFWs), but also provide the benefit of bi-directional protection.
NETSCOUT Arbor DDoS Protection

NETSCOUT Arbor DDoS Protection

29964 subscribers71 talks
DDoS protection strategies, best practices and latest trends.
NETSCOUT's Arbor DDoS protection solutions provide pervasive network visibility, automated DDoS attack detection, and intelligently orchestrated mitigation.
Related topics