Search Results for: network

Infrastructure, Networking, Cloud & DevOps Market Trends for Partner Marketers
The Infrastructure, Networking, Cloud, and DevOps partner ecosystems continue to rapidly evolve as companies respond to complex customer needs, shifting buyer preferences, and emerging trends like generative AI (GenAI). Staying on top of the latest industry research is a must for Partner Marketers focused on crafting differentiated messaging, delivering compelling content, and driving partner pipeline. Listen in as Scott Sinclair (Practice Leader, Infrastructure, Networking, Cloud & DevOps at Enterprise Strategy Group) highlights recent study findings and advises on what they mean for Partner Marketers.

TOPICS:

Identify and Respond to Security Threats with Palo Alto Networks and ServiceNow
Security teams today commonly use a combination of email, spreadsheets, and phone calls to manage their incident response processes. This leads to average detection and containment times that are measured in days and weeks and can result in costly breaches. The key to reducing detection and response times lies in automating basic tasks, identifying when threats target the assets that are most critical to the business, and allowing actions to be initiated from a single platform instead of dealing with multiple consoles or teams. Join Tim Riley, Business Development and Francesco Vigo, Partner Architect from Palo Alto Networks and John Ferguson, Product Manager from ServiceNow to learn how to: •Accelerate threat identification by combining ServiceNow® Security Operations with automated enrichment from Palo Alto Networks WildFire and AutoFocus • Speed up decision-making with business context for security incidents • Reduce time to eradicate by initiating Palo Alto Networks Next-Generation Firewall changes from within ServiceNow

TOPICS:

Introducing MistNet NDR by LogRhythm: Network Threat Detection Made Easy.
If we reflect on the cybersecurity news of 2020, it is clear that determined threat actors are using carefully planned and sophisticated attack techniques to breach the networks of target organisations. In any successful cyber intrusion, the threat actors successfully evaded the endpoint security systems, but the network communications provides us with an opportunity for detection. In this on-demand webinar, you will learn three key network-based techniques that threat actors will employ during a typical attack on a target environment. We discuss why these techniques are so successful and why you should consider an NDR solution to enhance your own threat hunting and detection approaches. Listen to Dan Crossley, Enterprise Sales Engineering Manager and John Golden, Enterprise Sales Manager, LogRhythm, to gain insight into the following attack techniques: - How attackers establish Command & Control (C2) communications and infrastructure - How Domain Generation Algorithms (DGAs) work and why they are used - How attackers can exfiltrate data via DNS tunnelling

TOPICS:

Building Network Automations: Integration & Data Transformation Best Practices
Getting started with automating network infrastructure requires a logical, step-by-step approach, which Rich Martin, Director of Technical Marketing at Itential, outlines in the following demo specifically focused on integration and data transformation. Martin will show you step-by-step how to: • Self-generate an integration using an OpenAPI specification file from NetBox. • Utilize newly integrated API tasks for IP Address requests and Inventory query. • Create a Data Transformation to manipulate data for network changes. • Build, run, and test the workflow using Operations Manager. Watch the third part of this demo series on how to build automated workflows with Itential, as Martin continues to build upon the workflow from the previous demo. Now that your use case is fully built out with the pre-check, network change, and post-check processes, it’s time to add in integrations with the systems in your ecosystem and data transformation between those systems. This allows for a fully automated end-to-end process.

TOPICS:

Navigating the New Network w/ the Zero Trust Framework & an adaptable foundation
Today’s modern network and security architectures are wrestling with a variety of forces that make it difficult to identify the right strategy for organizations. The increase on new network demands from IoT growth, to cloud application and service adoption to the need to support Work from Anywhere, decision makers are struggling to identify the right solutions that support their evolving needs. Forrester's Zero Trust (ZT) framework is the modern security architecture blueprint for enterprises to help navigate these network and security challenges. Fundamentally, ZT is about moving away from traditional perimeter-based security approaches and embracing a workload-first, data-driven, and identity-aware security model. While ZT improves security, there's also a hidden benefit: It's a critical lever to improve employee experience (EX). Security and productivity are fundamental necessities for the modern enterprise. Join experts from Infoblox and Forrester for this webinar as they explore the ZT framework, and help enterprises navigate the future with a solid foundation.

TOPICS:

Navigating the New Network w/ the Zero Trust Framework & an adaptable foundation
Today’s modern network and security architectures are wrestling with a variety of forces that make it difficult to identify the right strategy for organizations. The increase on new network demands from IoT growth, to cloud application and service adoption to the need to support Work from Anywhere, decision makers are struggling to identify the right solutions that support their evolving needs. Forrester's Zero Trust (ZT) framework is the modern security architecture blueprint for enterprises to help navigate these network and security challenges. Fundamentally, ZT is about moving away from traditional perimeter-based security approaches and embracing a workload-first, data-driven, and identity-aware security model. While ZT improves security, there's also a hidden benefit: It's a critical lever to improve employee experience (EX). Security and productivity are fundamental necessities for the modern enterprise. Join experts from Infoblox and Forrester for this webinar as they explore the ZT framework, and help enterprises navigate the future with a solid foundation.

TOPICS:

Navigating the New Network w/ the Zero Trust Framework & an adaptable foundation
Today’s modern network and security architectures are wrestling with a variety of forces that make it difficult to identify the right strategy for organizations. The increase on new network demands from IoT growth, to cloud application and service adoption to the need to support Work from Anywhere, decision makers are struggling to identify the right solutions that support their evolving needs. Forrester's Zero Trust (ZT) framework is the modern security architecture blueprint for enterprises to help navigate these network and security challenges. Fundamentally, ZT is about moving away from traditional perimeter-based security approaches and embracing a workload-first, data-driven, and identity-aware security model. While ZT improves security, there's also a hidden benefit: It's a critical lever to improve employee experience (EX). Security and productivity are fundamental necessities for the modern enterprise. Join experts from Infoblox and Forrester for this webinar as they explore the ZT framework, and help enterprises navigate the future with a solid foundation.

TOPICS:

Kubernetes Expert Panel: Networking Services for Modern Container Applications
Enterprises are adopting agile, cloud-native development methods and tools to create better production environments. Containers and Kubernetes are at the heart of this transformation, but such enterprise-scale transitions put the onus on IT operations. Learn how the networking and security stack can match the cloud-native automation, portability, and self-services of Kubernetes applications. In this session, learn how to overcome common pitfalls when deploying production-ready container applications and ways to simplify the operational challenges of delivering secure and scalable, multi-cluster Kubernetes applications. Join a panel discussion moderated by Chandra Sekar, Senior Director of Marketing, with VMware container networking experts - VP and Chief Architect Ranga Rajagopalan, Pere Monclus – VMware CTO of Networking and Security, Swapnil Hendre, Director of Solutions Engineering and Design to learn about agile system environments, and automation best practices to deliver load balancing and WAF for Kubernetes applications.

TOPICS:

Public Cloud Security Compliance with Palo Alto Networks Evident
With DevOps teams eager to harness the public cloud to accelerate delivery of apps and services, legacy security tools can’t keep pace. What’s needed is a more robust, automated approach to securing public cloud deployments and ensuring compliance. Join Jason Montgomery, WEUR Cloud Security Manager at Palo Alto Networks for this informative webinar focusing in how to achieve Public Cloud Security Compliance. During this event Jason will discuss how Palo Alto Networks Evident can help you transition your business to the cloud in a secure and compliant fashion. During this webinar you'll learn: •Why legacy tools can't proactively control cloud security risk •Why business needs automated, API-centric tools •How we can maintain rigorous security controls while optimizing development and delivery for speed Register Now and join Palo Alto Networks on Wednesday September 12th at 10:00 a.m.

TOPICS:

Identify and Respond to Security Threats with Palo Alto Networks and ServiceNow
Security teams today commonly use a combination of email, spreadsheets, and phone calls to manage their incident response processes. This leads to average detection and containment times that are measured in days and weeks and can result in costly breaches. The key to reducing detection and response times lies in automating basic tasks, identifying when threats target the assets that are most critical to the business, and allowing actions to be initiated from a single platform instead of dealing with multiple consoles or teams. Join Tim Riley, Business Development and Francesco Vigo, Partner Architect from Palo Alto Networks and John Ferguson, Product Manager from ServiceNow to learn how to: •Accelerate threat identification by combining ServiceNow® Security Operations with automated enrichment from Palo Alto Networks WildFire and AutoFocus • Speed up decision-making with business context for security incidents • Reduce time to eradicate by initiating Palo Alto Networks Next-Generation Firewall changes from within ServiceNow

TOPICS: