Search Results for: network

Exploring the Intersection of 5G Private Networks and Digital Health
Are you facing challenges in securing, managing, and maintaining patient data while maintaining regulatory compliance? In addition, adopting digital health services introduces new cybersecurity vulnerabilities as healthcare systems become potential targets for data breaches and cyber-attacks. Join us as we discuss how our 5G advanced network solutions provide the infrastructure essential to your digital health initiatives.

TOPICS:

Pervasive Network Visibility: Why it’s a necessity today and how to achieve it
In a world with new, evolving cyber threats and a constantly expanding attack surface, pervasive network visibility is critical. As we face a more distributed workforce, the proliferation of apps and the usage of shadow IT, it is even more critical than ever. But what does this mean and how do you achieve it? Join ePlus and Gigamon for an interactive presentation and learn how visibility into your traffic, applications and threats will help reduce your attack surface and help keep your customers and your data safe.

TOPICS:

Constructing Holistic Networks 4G, 5G and IoT
Resiliency and availability are two key words when it comes to data centre communications. No matter if you are operating a local or Co-Lo data centre, businesses will always want a solution that covers them both. As UK Connect’ Technical Consultant I will share my thoughts and knowledge on 4G, 5G and IoT networks. Not only that, but some key insights on how the construction industry has utilised this mobile broadband infrastructure.

TOPICS:

Future-proofing Fingbox: The IoT home network monitoring device
Fing App is a network scanning and troubleshooting tool used by millions. Fingbox is a complementary hardware device which plugs into Wi-Fi routers to monitor, secure and troubleshoot networks and their connected devices. Fing's engineering team built Fingbox using Ubuntu Core and Snaps to speed up development time, save budget and resources and ensure a future-proofed product went to market. Initial development speed was massively improved as Fing engineering resources could concentrate on building product features for our users and not on OS/platform development as this comes ready to go with Ubuntu Core. The ability to upgrade seamlessly within hours was fundamental during the Fingbox product launch phase and it’s as important now that the product is in production. In this webinar, you’ll hear from Fing Co-Founder and Big Data Architect, Carlo Medas, on how Fingbox was built with Ubuntu Core and how Fingbox’s key features including parental control, Digital Fence and Digital Presence are updated and improved ongoing using Snaps.

TOPICS:

In-Depth Security for the Agile Network, Part 1: Threat Assessment
As the landscape has shifted around us, the move to more distributed environments has created an opening for vastly greater security threats. In the first quarter of 2020 alone, notes UN counterterrorism chief Vladimir Voronkov, phishing websites increased by 350%, with many targeting hospitals and healthcare systems. Akamai data reveals that during a 60-day period starting in early March, there was an astonishing 447% increase in requests to access websites that were potentially malicious. At a time when operational agility is critical, the volume and persistence of these attacks threatens to stop businesses in their tracks. Join us on October 15 at 1 p.m. ET for “In-Depth Security for the Agile Network, Part 1: Threat Assessment,” the first in a three-part webinar series from Comcast Business. In part 1, our panelists will discuss the nature of the current threat environment: who the scammers are, their tactics, and how they’re gaining access; the rise of specific scams and hacks during the pandemic; and their potential impacts on infrastructures, networks, and devices. We’ll explore the ways in which SMB and mid-market businesses are as vulnerable to threats as large enterprises, with a focus on DNS-layer security as a foundational line of defense. Panelists: •Bruce Van Nice is a Senior Manager of Product Marketing in Akamai’s Carrier division. He has spent more than 25 years in networking and security, working in a variety of roles. He has covered technologies ranging from edge and core routers to wireless, and a wide range of security solutions. Bruce is an active contributor at industry events and forums, speaking about DNS, security, privacy, and data analytics. •Sukhjinder Singh, Wireless/Mobility Technology Strategy and Product Management, Comcast Business, is responsible for managing security products/services offered to Comcast Business SMB customers.

TOPICS:

How SaaS providers are solving multi-cloud networking and security challenges
In this TechTalk, we show how to solve many of the technical challenges SaaS providers face in rapidly and securely onboarding new customers. Aviatrix Solutions Architects will guide you through a simple solution to overlapping IP address space and how to deliver multi-cloud network segmentation to achieve secure isolation between customers. You will learn how to leverage the solution that dozens of multi-cloud SaaS providers are using in production today.

TOPICS:

Bringing Together Application Performance & Network Intelligence with Cisco FSO
Customers expect flawless application experiences. If you can’t triage performance issues quickly, the implications can be detrimental to your brand and company’s bottom line. Join this webinar to learn how Cisco Full-Stack Observability is bringing together network intelligence and application monitoring data to provide you holistic visibility across the application stack to deliver exceptional digital experiences.

TOPICS:

Ready to build private 5G networks with Cisco and NEC
Join our webinar presented by Cisco and NEC to explore our joint Private 5G solution. Delve into Cisco's Private 5G offering and discover NEC's end-to-end integration and management capabilities. Gain insights into the market landscape and uncover the transformative potential of Private 5G networks. Reach out to NEC at coeenquires@emea.nec.com to discuss your requirements.

TOPICS:

Zero Trust Network Access: Security for the Remote, Distributed Workforce
With remote work and cloud-based resources now the rule rather than the exception, your distributed enterprise requires a higher grade of security than is possible with traditional remote-access solutions. Join us to hear how Zero Trust Network Access (ZTNA) sets the new standard for continuously verifying that only the right person, with the right device and the right permissions, can access specific company resources. Barracuda’s Mike Goldgof and in-house ZTNA expert Sinan Eren will take you through an in-depth discussion of: - Why the ZTNA market emerged and how it has evolved - How ZTNA helps secure your remote workforce and mitigate risk - How your peers are using ZTNA to safely scale remote access capacity while maintaining productivity - Plus, you’ll see first-hand how Barracuda is expanding the capabilities of its CloudGen family of secure connectivity solutions with ZTNA to give distributed businesses like yours a new way to modernize remote access, enforce global security and access policies, and achieve seamless connectivity without compromising productivity. Don’t miss this opportunity to know more about this new paradigm for secure remote network access. Sign up now!

TOPICS:

Zero Trust Network Access: Security for the Remote, Distributed Workforce
With remote work and cloud-based resources now the rule rather than the exception, your distributed enterprise requires a higher grade of security than is possible with traditional remote-access solutions. Join us to hear how Zero Trust Network Access (ZTNA) sets the new standard for continuously verifying that only the right person, with the right device and the right permissions, can access specific company resources. Barracuda’s Mike Goldgof and in-house ZTNA expert Sinan Eren will take you through an in-depth discussion of: Why the ZTNA market emerged and how it has evolved How ZTNA helps secure your remote workforce and mitigate risk How your peers are using ZTNA to safely scale remote access capacity while maintaining productivity Plus, you’ll see first-hand how Barracuda is expanding the capabilities of its CloudGen family of secure connectivity solutions with ZTNA to give distributed businesses like yours a new way to modernize remote access, enforce global security and access policies, and achieve seamless connectivity without compromising productivity. Don’t miss this opportunity to know more about this new paradigm for secure remote network access. Sign up now.

TOPICS: