Hi [[ session.user.profile.firstName ]]

So wählen Sie die richtige NGFW für Ihr Unternehmen aus: Unabhängige Tests

So wählen Sie die richtige NGFW für Ihr Unternehmen aus: Alles, was Sie über unabhängige Tests wissen sollten:
Viele Anbieter behaupten, dass ihre NGFW die beste Sicherheit und Performance bietet – aber stimmt das auch? Wir finden, eine solche Aussage sollte man auch objektiv belegen können. In unserem Webcast erfahren Sie, welche Bedeutung unabhängige Tests haben und warum Zertifizierungen wichtig sind, um die richtigen NGFW-Lösungen für Sie und Ihr Unternehmen zu finden.
Recorded Dec 18 2012 44 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sven Janssen, Country Manager Germany
Presentation preview: So wählen Sie die richtige NGFW für Ihr Unternehmen aus: Unabhängige Tests

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • End Point to Perimeter: Network protection that’s inside out and outside in Recorded: May 16 2013 55 mins
    Daniel Ayoub, Dell SonicWALL and Ken Drachnik, Dell Kace
    Join us as top security experts look at some of the latest security challenges and provide strategies for defense, including how to quickly implement a robust solution that provides the protection you need without impacting your network performance or reducing employee productivity. You will learn how to better protect your networks from the inside as well as the outside, with solutions that reduce work for IT and security teams.

    You will learn about:
    •The malware menace – latest stats and facts
    •Third party industry firewall comparison results: which firewall is best for you?
    •Best and easiest practices for securing end points
    •How a customer implemented a solution—step-by-step
    •And much more…
  • Keep the bad guys out and the good guys good Recorded: May 9 2013 53 mins
    Scott Lang, Director Solution Marketing, Security
    How can you best protect your business while still enabling end users to be productive? Join us for this webcast and see our approach, called Connected Security. Dell Software reduces risks from the inside-out and the outside-in, with a simple and unified approach.


    You need to protect your perimeter, but often, the highest profile breaches are perpetrated by insiders targeting the privileged accounts used only by trusted users. Today, you need security that spans both inside and outside of your network perimeter. No company is truly secure until they have addressed both.

    You’ll learn:

    -Why you need to protect your entire IT landscape
    -How effective security enables IT to take on BYOD, the cloud and more
    -Why the Dell approach is different
  • Latest threat research and how it affects your business Recorded: Apr 9 2013 56 mins
    Alex Dubrovsky Director of Software Engineering & Threat Research
    On a daily basis your network is being attacked. Some you may be aware of others are hidden with in applications. Join Dell SonicWALL Director of Threat Research team to learn the following:
    - Analysis of each threat
    - Behavior and propagation techniques
    - Past and recent telemetry information associated with each threat

    We will have time for Q&A so don't miss out.
  • Securing Your 10GbE Environment Recorded: Apr 9 2013 24 mins
    Matt Hickey, Large Enterprise SE Manager
    During this webinar we will provide an overview of some of the concerns and previous limiting factors in securing 10GbE networks, and provide an overview of how Dell | SonicWALL can assist with:

    - Delivering IPS and Anti-Malware at 10GbE speeds, supporting your recent infrastructure investments
    - Providing a low latency/high throughput security solution protecting your internal network assets
    - Creating granular user and group access controls at the application level, reducing the impact of non-productive bandwidth intensive applications

    Many organizations have made significant investments recently, transforming their infrastructure to support 10 GbE speeds looking to capitalize on the benefits and efficiencies gained by increased bandwidth without upgrading their existing security appliance, introducing a potential security risk and bottleneck. This webinar will provide you with an overview of this, and discuss how Dell | SonicWALL can assist your team in meeting these requirements.
  • Best practices: Email security cloud and virtual migration checklist Recorded: Mar 19 2013 15 mins
    Jane Wasson, Sr. Product Marketing Manager
    When migrating to a cloud based solution, it is important to identify the migration steps. Being informed and prepared is the best solution. Join Dell SonicWALL as we review a best practices checklist for planning and executing an email security migration that minimizes the risk of business disruption.
    With our unique ability to deliver powerful, real-time email threat protection through a variety of deployment platforms ,Dell SonicWALL has an email security to meet the needs of your organization
  • Overview of an ever-evolving threat landscape Recorded: Mar 7 2013 60 mins
    Wilson Lee, Dell SonicWALL and Jeff Multz, Dell SecureWorks
    Every day, new cyber threats and attack techniques emerge to hammer on your network. The Georgia Tech Research Institute reports that it analyzes 100,000 pieces of new malware daily. With the growth of Advanced Persistent Threats (APTs) and hacktivist groups, staying on top of the threat landscape is more challenging than ever.

    You’ll learn:
    •The fastest growing security attack vectors and data breach sources
    •How to respond to emerging security threat trends
    •Why threat intelligence is important to IT security in an evolving threat landscape
  • How to prioritize, secure and simplify your BYOD strategy Recorded: Feb 12 2013 34 mins
    Matt Dieckman, Mobile Solutions Product Manager
    While organizations are rapidly embracing Bring Your Own Device (BYOD), many IT executives still find it a complex proposition and are unsure of how to proceed. In reality, the actual BYOD solution may be a simple reapplication of existing technologies or relatively small adjustment but for others, it may require an extensive overhaul.

    You'll also hear how Boston Pizza Company implemented their BYOD solution.
  • Top trends driving IT Security for 2013 Recorded: Jan 22 2013 64 mins
    Daniel Ayoub, Product Marketing Manager
    Information networks are staged for tectonic changes in 2013. Users and endpoint devices are proliferating across a range of platforms and OSs. Network resources are being virtualized. And the threats to systems and data are becoming more sophisticated and pervasive. Find out what all this means for IT security technologies and techniques and what you can do to stay ahead of the game.
  • Under the hood: Malware research and protection Recorded: Jan 17 2013 24 mins
    Eric Crutchlow, Sr. Product Manager
    As malware variants evolve and employ more sophisticated, evasive tactics, traditional security measures are no longer effective. With input from millions of shared touch points, the Dell™ Global Response Intelligent Defense (GRID) Network™ helps to identify new and emerging threats before they reach your organization.

    You’ll learn:
    •The steps required for continuous threat protection
    •Why it’s important to collaborate with security organizations and vendors
    •How threat data is cross-pollinated between Dell solutions
  • So wählen Sie die richtige NGFW für Ihr Unternehmen aus: Unabhängige Tests Recorded: Dec 18 2012 44 mins
    Sven Janssen, Country Manager Germany
    So wählen Sie die richtige NGFW für Ihr Unternehmen aus: Alles, was Sie über unabhängige Tests wissen sollten:
    Viele Anbieter behaupten, dass ihre NGFW die beste Sicherheit und Performance bietet – aber stimmt das auch? Wir finden, eine solche Aussage sollte man auch objektiv belegen können. In unserem Webcast erfahren Sie, welche Bedeutung unabhängige Tests haben und warum Zertifizierungen wichtig sind, um die richtigen NGFW-Lösungen für Sie und Ihr Unternehmen zu finden.
  • Product Demo: Road Test Our New Interactive Security Portal and Experience Recorded: Dec 14 2012 40 mins
    Eric Crutchlow, Sr. Product Manager. Dell SonicWALL
    The new Dell Security Portal can help your help your organization stay protected in an era of increasing and advanced IT threats with insightful world-class security expertise.


    · LiveDemo showcases solutions in real-time to help in product selection and troubleshooting

    · Learn about solutions that now support iOS- and Android-based devices

    · Gain hands-on access to the entire Dell SonicWALL solution portfolio
  • So wählen Sie die richtige NGFW für Ihr Unternehmen aus: Unabhängige Tests Recorded: Dec 11 2012 6 mins
    Sven JANSSEN Country Manager Germany
    So wählen Sie die richtige NGFW für Ihr Unternehmen aus: Alles, was Sie über unabhängige Tests wissen sollten:
    Viele Anbieter behaupten, dass ihre NGFW die beste Sicherheit und Performance bietet – aber stimmt das auch? Wir finden, eine solche Aussage sollte man auch objektiv belegen können. In unserem Webcast erfahren Sie, welche Bedeutung unabhängige Tests haben und warum Zertifizierungen wichtig sind, um die richtigen NGFW-Lösungen für Sie und Ihr Unternehmen zu finden.
  • How to choose the right NGFW for your organization: Independent Third Party Test Recorded: Dec 10 2012 45 mins
    Tim Kirk, Pre-Sales Engineer
    Vendors claim their NGFW have the best performance and protection, but how do you really know? Claiming to be the best and actually being the best are two different realities. Join Dell SonicWALL as we discuss the importance of Independent Third Party Testing and find out why testing and certifications are key to finding the right NGFW solutions for you and your organization.
  • Combating Cyber Threats: An Insider’s Look at Modern Network Security Recorded: Dec 5 2012 57 mins
    Daniel Ayoub, Dell SonicWALL
    Organizations continue to face the ongoing challenges of securing a continually evolving network perimeter while maintaining a balanced budget. Confronted with multifaceted goals, what does it entail to ensure your organization is up to date with next-generation threat protection?

    Join the discussion with Jerry Horton from Mississippi Department of Corrections as he gives you an insider’s view at his strategy and how he used next-generation firewalls to increase his network security within budget and still enable secure remote access to hismobile workforce.

    Register for the BrightTALK Hacker Summit<http://www.brighttalk.com/webcast/1745/49441> webinar, hear how Dell SonicWALL supports organizations like yours for successful network security strategy
  • CSI Network: Crimes of Bandwidth - Discovering the Culprit Using Network Forens Recorded: Oct 17 2012 55 mins
    Wilson Lee, Dell SonicWALL Adam Powers, Plixer
    In the world of digital networks, security breaches and anomalous traffic plague IT departments worldwide. How do you pro-actively analyze networks where information is transmitted and lost in nanoseconds? Network forensics monitors and analyzes network traffic to detect intrusions, attacks, and abuses while the crime is occurring -- before your network is victimized. If your network has been breached or degraded by intruders or users, then join Dell SonicWALL for this hour of CSI Network.
  • Securing information in higher education organizations Recorded: Oct 9 2012 36 mins
    Gabe Perez - Dell Enterprise Security
    Information technology in higher education environments is constantly evolving and consequently, continually presenting challenges to the overall security of the environment and the information contained therein. This webinar will explore these challenges and demonstrate how Dell can help provide solutions to these challenges while continuing to utilize the power and ubiquity of today's complex information networks.
  • Postini shutdown raises the question again - Cloud or on-premise email security? Recorded: Oct 2 2012 44 mins
    Swarup Selvaraman
    The recent decision by Google to shutdown Postini has left many wondering if hosted services is the right direction for your organization. The closure of Postini email security is forcing customers to migrate to Google Apps. However, migration to Google Apps won’t be easy and doesn't offer the support or functionality you need.

    Join us and learn about different deployment platforms to meet your organization’s email security needs. Understand the pros and cons of on-premise vs. cloud based deployments.

    Attend the webinar to learn and understand how to make an informed decision to protect your email infrastructure.
Dynamic Security for the Global Network
Dell(TM)SonicWALL(TM) provides intelligent network security and data protection solutions that enable customers and partners to dynamically secure, control, and scale their global networks. Using input from millions of shared touch points in the SonicWALL Global Response Intelligent Defense (GRID) Network, the SonicWALL Threat Center provides continuous communication, feedback, and analysis on the nature and changing behavior of threats.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: So wählen Sie die richtige NGFW für Ihr Unternehmen aus: Unabhängige Tests
  • Live at: Dec 18 2012 9:00 am
  • Presented by: Sven Janssen, Country Manager Germany
  • From:
Your email has been sent.
or close