Hi [[ session.user.profile.firstName ]]

Securing your Enterprise

As the threat landscape continues to evolve, so must our defenses. Having the ability to inspect and prevent against both known and unknown attacks on your network is critical to business productivity and your overall security posture. The days of making network security decisions based solely on ports and protocols through stateful inspection are no longer adequate for protection and prevention.

Please join us to learn how the Palo Alto Networks Enterprise Security Platform empowers organizations to take full control over their environment by providing visibility and granular control over applications, users, and content.
Recorded May 13 2015 27 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Cody Fussell, Technical Engineer at Arrow ECS
Presentation preview: Securing your Enterprise
  • Channel
  • Channel profile
  • 2 years running, Trend Micro awarded most effective breach detection Recorded: Sep 16 2015 36 mins
    Joe Crowley, Sales Engineer at Arrow ECS
    Just announced! For the 2nd year in a row, NSS Labs awarded Trend Micro Deep Discovery with “most effective breach detection solution.” Arrow offers Deep Discovery evaluation appliances, and provides first-level support, data analysis, and return shipping services. Join us for a chance to win $100 and see a live demo of Deep Discovery.
  • Gemalto Use Cases to help to protect Your Customers Recorded: Sep 15 2015 61 mins
    Trisha Paine, VP Marketing at Gemalto
    Now that the final integration of SafeNet and Gemalto is complete, you have more products in your Gemalto portfolio to offer your customers. The combined offering of SafeNet’s leading data protection products with Gemalto’s leading digital security services creates a worldwide leader in enterprise and banking security from core data protection to secure access at the edge of the network—we bring TRUST to everyday services by securing identities, data, and transactions.

    Our webinar will begin with an overview of Gemalto as a whole and expand into some of the most popular use cases for both legacy Gemalto and legacy SafeNet products, including:
    • Internet of Things - connected cars and smart grid
    • Encryption as an IT Service
    • Cloud Bursting
    • eBanking
    • Compliance
  • Arrow’s Enhanced Blue Coat Evaluation Program Recorded: Aug 6 2015 15 mins
    Joe Crowley, Sales Engineer at Arrow ECS
    Arrow is now offering Blue Coat SSL, Proxy and PacketShaper as the newest additions to our evaluation program. The Hardware Evaluation Program from Arrow North America is a fully managed and supported service that is available free of charge to our resellers to help with product evaluations and proof of concepts.

    Join our webinar for a first-hand overview of how the program works and what Arrow has to offer you and your customers.
  • New! Arrow will manage and support Trend Micro Deep Discovery eval appliances Recorded: Aug 6 2015 30 mins
    Jeff Van Natter, Distribution Channel Manager at Trend Micro
    New opportunity! Partners now have rapid access to the NSS Labs winner for breach detection, Trend Micro Deep Discovery. You can work with the technical security experts at Arrow who will ship Deep Discovery appliances, provide first-level support, data analysis, and return shipping services. Join us for a chance to win $100 and to learn the specifics of the program from Trend Micro.
  • HP and Trend Micro deliver One Solution for Advanced Threat Defense Recorded: Jul 23 2015 58 mins
    TJ Alldridge, Product Marketing at HP, and Patrick Hill, Sales Engineer at HP
    Help your customers identify, act upon, and stop advanced threats from spreading beyond the initial infection point.
  • Blue Coat Security Analytics Platform: A DVR for your network Recorded: Jul 22 2015 30 mins
    Ryan Smith, Blue Coat Security Analytics SME
    Old-school security is all about protection. Avoiding the unthinkable. It’s about prohibiting, blocking, forbidding, constraining, and reining people in to avert disaster. But look harder at what else security can buy you. The Security Analytics Platform delivers clear, actionable intelligence about advanced security threats to apps, files, and web content. With this retrospective look at traffic on the network, you can quickly identify the advanced and targeted attacks that slip past traditional prevention-based security tools, and take action to resolve issues and prevent future occurrences. Empowering businesses to detect and analyze breaches quickly so they can minimize the impact of a breach, learn from threat intelligence gleaned from a worldwide network of users and ward off future breaches.

    • Who did this to us?
    • How did they do it?
    • What systems and data were affected?
    • Can we be sure it’s over?
    • Can it happen again?

    Please join Blue Coat SE, Jamille Kelly, and Blue Coat Security Analytics SME, Ryan Smith, for an in-depth look and product demonstration.
  • The Solution for Threat Analysts and Monitoring Services Recorded: Jul 22 2015 39 mins
    Joe Crowley, Sales Engineer at Arrow ECS
    The solution for threat analysts and monitoring services. Trend Micro Deep Discovery monitors all ports, and over 80 protocols. It does this with ONE appliance, monitoring the web, files and emails. Join us for a chance to win $100 and see Arrow Sales Engineer Joe Crowley, provide a demonstration of Deep Discovery.
  • Integration Means Security: Palo Alto Networks Platform Pitch Recorded: Jul 16 2015 30 mins
    Jamie Lee, Technical Engineer at Arrow ECS
    Integration means security. Palo Alto Networks' natively integrated platform brings network, cloud and endpoint security into a common architecture, with complete visibility and control, ensuring your organization can detect and prevent attacks. Join our webinar to learn more about the Palo Alto Networks platform and how to successfully present their Platform Pitch to your customers.
  • Palo Alto Networks Firewalls: What IS App-ID, anyway? Recorded: Jun 24 2015 32 mins
    Ricardo Maldonado, Sales Engineer at Arrow ECS
    Traditional firewalls aren’t smart enough to protect your users and your information anymore. Mobility, cloud, and the explosion of the number of remote workers all changed the network security landscape dramatically. Today, you have to KNOW what’s really happening on your network – and how to control it. Palo Alto Networks’ NGFW can help you can regain control of your network by giving you full visibility into what applications are on your network, who is using them, and who they’re communicating with. Join our webinar for an in-depth example of setting up and using App-ID on a live firewall, a review of real-world examples and use cases, and a Q&A session with one of Arrow’s PCSNEs.
  • Anatomy of the Advanced Threat Recorded: Jun 17 2015 37 mins
    Joe Crowley, Sales Engineer at Arrow ECS
    Advanced threats routinely defeat or evade traditional security. Help your customers avoid strategic chaos and massive costs with Deep Discovery, advanced threat protection from Trend Micro. Join us for a chance to win $100 and to see Arrow ECS's Joe Crowley demo Deep Discovery.
  • FortiSandBox: The Almost Human Line of Defense Recorded: May 27 2015 42 mins
    Paul Bowen, Architect for Advanced Threat Solutions at Fortinet
    Join us for a chance to win a Yeti cooler and learn about the best way to protect your organization, your partners and your customers from APT’s.

    - Learn how the FortiSandbox can scan file shares on Linux or Windows operating systems and sniff the wire @10GB for real-time protection

    - Discover the simplicity of integrating other Fortinet productions like NGFW, FortiMail and most SIEMS into the solution

    - Gain peace of mind, knowing your always on network is constantly being monitored and properly looking at every access point for what is malicious, what is suspicious and what is allowed access.

    Join Paul Bowen, architect for advanced threat solutions at Fortinet and discover why FortiSandbox is the APT’s worst nightmare and your best friend.
  • Top 10 Things You Should Know About Healthcare IT Security Recorded: May 14 2015 42 mins
    Mor Ahuvia, Product Marketing Manager at Gemalto
    Maintaining the security of patient data is a complex proposition that affects every employee of a healthcare facility, every area of its IT system, and all vendors, partners, and insurers that work with the healthcare provider. While many facilities are working toward achieving full compliance with HIPAA, HITECH, and other privacy regulations, there are a variety of factors to consider that go beyond compliance issues to address the overall risk to your facility. This latest webinar from Gemalto, will address the top 10 things you should be concerned about and how to address them.
  • Defining the new generation of Network Security Recorded: May 13 2015 46 mins
    Joe Crowley, Sales Engineer at Arrow ECS
    Join us for a chance to earn $100 and see why Trend Micro’s network threat detection appliance beat the competition in recent NSS Labs testing. Trend Micro Deep Discovery scored the highest in breach detection of all the tested threat detection appliance products. Register today to see Arrow's Joe Crowley demo Deep Discovery.
  • Defending Against Advanced Threats Recorded: Apr 27 2015 44 mins
    Jamille Kelly, Systems Engineer at Blue Coat
    Discover a more comprehensive approach to advanced response and detection: the Blue Coat Advanced Threat Defense Solution. It empowers IT teams to quickly detect advanced malware, analyze network traffic in real time, activate immediate incident response, continuously monitor network traffic, and deploy forensics to stay a step ahead.
  • Arrow and Intel Security: Managed Services Program Recorded: Apr 27 2015 2 mins
    Arrow and Intel Security
    Learn about the benefits of Intel Security's Managed Services Provider Program and why you should choose Arrow as your distributor for your Managed Services specialization.
  • Initial Configuration of the Palo Alto Networks Firewall Recorded: Apr 16 2015 18 mins
    Jamie Lee, Technical Engineer at Arrow ECS
    Please join us for an in-depth discussion on how to effectively configure the management features of the Palo Alto Networks Firewall. In this presentation, you will learn the procedural elements on configuring the in-band management interface, and the optional out-of-band interface. This discussion will also include the basic configuration fundamentals in securing management access to your Palo Alto Networks appliance.
  • View market-leading virtual server security running in a live VMware environment Recorded: Apr 8 2015 38 mins
    Joe Crowley, Sales Engineer at Arrow ECS
    Trend Micro Deep Security is the global leader in virtualization security specifically architected for VMware, ensuring the strongest protection for your physical, virtual and cloud environments.

    - Shield vulnerabilities like Heartbleed and Shellshock before they can be exploited
    - One management console for all physical, virtual and cloud servers
    - Agentless security for improved VM performance and consolidation rates
    - Provides virtual patching capabilities
    - Addresses major regulatory requirements for HIPAA, NIST, SSAE 16 and many others
    - Certified for VCE Vblock and Cisco UCS

    There are two options to attend a 30-minute demo of Deep Security in a live VMware environment: March 11th at 9am MST and April 8th at 9am MST.

    Register here for the March 11th demo: https://www.brighttalk.com/webcast/9537/143223
  • How to Register, Authorize, and License Your Palo Alto Networks Firewall Recorded: Mar 26 2015 16 mins
    Cody Fussel, Technical Engineer at Arrow ECS
    Ensuring that your Palo Alto Networks assets are properly registered and managed is imperative to business operations. Please join us to learn how to properly register, authorize, license, and manage your Palo Alto Networks devices, including the management of user account access to the Palo Alto Networks Support Portal.
  • View market-leading virtual server security running in a live VMware environment Recorded: Mar 11 2015 32 mins
    Joe Crowley, Sales Engineer at Arrow ECS
    Trend Micro Deep Security is the global leader in virtualization security specifically architected for VMware, ensuring the strongest protection for your physical, virtual and cloud environments.

    - Shield vulnerabilities like Heartbleed and Shellshock before they can be exploited
    - One management console for all physical, virtual and cloud servers
    - Agentless security for improved VM performance and consolidation rates
    - Provides virtual patching capabilities
    - Addresses major regulatory requirements for HIPAA, NIST, SSAE 16 and many others
    - Certified for VCE Vblock and Cisco UCS

    There are two options to attend a 30-minute demo of Deep Security in a live VMware environment: March 11th at 9am MST and April 8th at 9am MST.

    Register here for the April 8th demo: https://www.brighttalk.com/webcast/9537/143225
  • The Biggest Security Breaches of 2014: What went wrong? Recorded: Feb 27 2015 51 mins
    Carric Dooley, Worldwide VP of Foundstone Services, Intel Security
    Some of the largest security attacks took place last year, making 2014 a year of massive breaches. What went wrong?

    We will discuss the biggest security breaches of 2014 during our upcoming webinar. Join us to learn about the nature of these breaches and attacks, what we have learned from these situations, and what customers should know in order to protect their environments.
Arrow ECS - Security
Covers the following suppliers: AEP Networks, BlueCoat, Fortinet, Imation, McAfee, NetIQ, Novell, PKWare, RES, RSA, SafeNet, Trend Micro, Websense, Palo Alto Networks

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing your Enterprise
  • Live at: May 13 2015 5:00 pm
  • Presented by: Cody Fussell, Technical Engineer at Arrow ECS
  • From:
Your email has been sent.
or close