Search Results for: network

Securing today’s networks: How SASE makes it easy
Attend this webinar and see for yourself how modern SASE platforms actually eliminate complexity, making it far easier to manage and fully secure modern networks—freeing up your precious IT resources to pursue projects that support your core business. At the webinar, you’ll discover why SASE is critical to ensuring ongoing security. And in a live demo of Barracuda SecureEdge, you’ll see how simple it can be to deploy and manage an advanced SASE platform that incorporates the latest, most powerful security technologies.

TOPICS:

Web Security Wish List for Effective Network Protection
You deserve to have everything you want for Web Security. Here is what’s likely on your wish list. •Effective protection against advanced cyber attacks •Safe application enablement •Unwanted and high-risk websites blocked •Simple deployment of one appliance to cover everything •No call for emergency responses Learn how a next-generation web security solution can deliver what legacy, proxy-based alternatives don’t. Watch this webinar as your first step to making your network more secure and your life easier.

TOPICS:

The Evolution of Network Security: Bridging Classical and Quantum Systems
In an era where data security is paramount, understanding the interplay between cutting-edge physics-based security methods and classical security protocols is crucial. With a basic understanding of quantum mechanics, attendees will explore the intricacies of physics-based security, such as Quantum Teleportation and Quantum Secure Communication (QSC), and their relationship with classical security systems like Post-Quantum Cryptography (PQC), and the One-Time Pad (OTP). In this webinar, Keith Kenemer, Research Software Engineer at Aliro Quantum, walks through the interplay between classical, math-based security and emergent physics-based security for the Quantum Era. In this webinar, you’ll learn: - Classical/algorithmic security methods & vulnerabilities to quantum attacks: where we are today - Quantum physics-based security & quantum networking protocols - Hybrid Classical + Quantum security (QKD) - Future security & privacy in the Quantum Era The convergence of physics-based and classical security systems will shape the landscape of data protection, with implications for various industries, from finance to national security. Organizations who are preparing their businesses, security posture, and connectivity for the quantum age are investigating how to plan, design, and implement Quantum Networks today. This webinar will help prepare you to navigate the quantum future.

TOPICS:

Technical Deep Dive: Plan & Design Your Wireless Network
The SonicWall SonicWave access point series features the latest Wave 2 technology. Built with security and user experience in mind, the SonicWave series provides a secure end-to-end solution. Learn best practices for planning and deploying your wireless network, including: • RF Fundamentals and the significance of 802.11ac Wave 2 technology • An overview of the SonicWave product portfolio • Site survey to understand AP placement and coverage analysis • How to setup, monitor and configure your access points

TOPICS:

How to Solve Day 2 Operational Network Challenges in the Cloud
In this TechTalk, solutions architects will discuss common challenges enterprise organizations face when operationalizing cloud workloads and how you can get the network visibility and monitoring to resolve them. Learn how enterprises today are using Aviatrix to solve real-world security issues in the cloud. Be prepared to be amazed by some of the features available today, including: FlowIQ Intelligent flow analytics and visualizations Centralized routing controls with latency and alerting Control Plane auditing capabilities and topology replay Advanced security inspection and threat lookups with ThreatIQ

TOPICS:

What’s New in Micro Focus Network Operations Management?
Join us for an informative look at the latest release of Network Operations Management (NOM). Learn about Micro Focus NOM’s new modern and intuitive workflow-based user experience, which combines monitoring data with configuration status. Now you can solve compliance and performance issues faster than ever before. You’ll also get a sneak preview of all the latest enhancements, including integration to Vertica, our big data analytical database, and our innovative “bridge release,” which enables you to quickly upgrade to this latest release from as many as 10 previous versions.

TOPICS:

Network Analysis With A Former FBI Analyst To Uncover Threats
In this webinar, former FBI Digital Media Exploitation Analyst and Gravwell Solution Engineer Kyle Seike combines Corelight at Home and Gravwell to actively hunt in network logs for unknown threats. The webinar starts with a walkthrough of the optimal setup for Corelight before moving into the Gravwell Query Studio to actively hunt within the Corelight data. Our findings are visually represented using the Gravwell dashboards allowing us to create automated alerts should we identify malicious behaviour in the future. Webinar duration: 25 minutes

TOPICS:

Best Practices to Gain Visibility and Control of Your Demand Network
This Webcast examines new demand network management trends and technologies that will enable multi-enterprise companies to maximize the potential of their demand networks.

E2open

Visibility into applications, workloads and traffic, secret life of your network
Join Martyn Crew, Sr. Director, Product Marketing, and Jim Mandelbaum, Field CTO, Gigamon to hear how to improve app, traffic, and workload visibility. During this webinar you will learn how you can identify all the applications running on your networks and eliminate up to 50% of the applications traffic sent to your security tools without compromising security. Gigamon Application Intelligence enables you to: - Identify unauthorized or potentially dangerous rogue applications - Categorize, filter, and manage applications traffic based on risk-level - Troubleshoot user-experience and security issues using metadata.

TOPICS:

Rapid7 - When an actor is 7 years in your network [BNL]
This is a recorded live session from Cybersec Europe 2023, Brussels, with Christiaan Beek, Senior Director Threat Analytics at Rapid7. When it comes to response and discovery times, over the years we have seen the time of a detection goes down. But what if you learn from the Incident Response Team that the incident was part of a seven year long campaign and activity in your network? During this session Christiaan Beek highlights this campaign, the actors involved, and he shows how intelligence was used to determine a strategy. But he also talks about the challenges that the Rapid7 team faced when handling a major incident like this when a pandemic was ruling the world.

TOPICS: