Search Results for: network

Improved Network Visibility on v2.3 [Live Demo]
The recent version 2.3 of the AirCheck™ G3, EtherScope® nXG, and LinkRunner® 10G software further improves network visibility by making it easier to identify Bluetooth or BLE devices, simplifying the task of locating Wi-Fi client devices with AirMapper Site Survey, providing an easier way to import Authorization files, and much more! Live demo included. Join Julio Petrovitch and Brad Reinboldt, Product Managers at NetAlly, to learn more about the latest NetAlly product updates (including those introduced with the Link-Live v7.0 release).

TOPICS:

AWS Security: Securing AWS Workloads with Palo Alto Networks
Today, AWS provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world with customers across all industries are taking advantage of low cost, agile computing. In this webinar, Dinah Barrett, Specialist Solutions Architect | Management Tools, AWS and David Maclean, Special Cloud Engineer, Palo Alto Networks will dive into the need for additional security, over and above native security to protect AWS workloads and developer environments, examining the shared responsibility model for cloud security & diving into specific use cases.

TOPICS:

AWS Security: Securing AWS Workloads with Palo Alto Networks
Today, AWS provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world with customers across all industries are taking advantage of low cost, agile computing. In this webinar, Dinah Barrett, Specialist Solutions Architect | Management Tools, AWS and David Maclean, Special Cloud Engineer, Palo Alto Networks will dive into the need for additional security, over and above native security to protect AWS workloads and developer environments, examining the shared responsibility model for cloud security & diving into specific use cases.

TOPICS:

WanaCrypt0r Ransomware – How Palo Alto Networks protects you
Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world. Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over. Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn: • How WanaCrypt0r exploits vulnerabilities and spreads across networks • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls • Actionable steps to protect your organization against this and future ransomware campaigns

TOPICS:

WanaCrypt0r Ransomware – How Palo Alto Networks protects you
Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world. Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over. Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn: • How WanaCrypt0r exploits vulnerabilities and spreads across networks • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls • Actionable steps to protect your organization against this and future ransomware campaigns

TOPICS:

WanaCrypt0r Ransomware - How Palo Alto Networks protects you
Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world. Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over. Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn: • How WanaCrypt0r exploits vulnerabilities and spreads across networks • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls • Actionable steps to protect your organization against this and future ransomware campaigns

TOPICS:

WanaCrypt0r Ransomware – How Palo Alto Networks protects you
Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world. Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over. Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn: • How WanaCrypt0r exploits vulnerabilities and spreads across networks • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls • Actionable steps to protect your organization against this and future ransomware campaigns

TOPICS:

WanaCrypt0r Ransomware – How Palo Alto Networks protects you
Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world. Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over. Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn: • How WanaCrypt0r exploits vulnerabilities and spreads across networks • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls • Actionable steps to protect your organization against this and future ransomware campaigns

TOPICS:

SMALL BYTES: How To Use Device Certification to Expand Network Observability
A step-by-step guide on self certification in DX NetOps performance monitoring. In this episode, discover how self certification is the process of certifying new network technologies, new vendors or new metrics in order for the NetOps solution to poll and collect critical performance data for end-to-end visibility and optimal operations. Broadcom is collecting your personal data when you submit such information as part of the BrightTALK registration process. Your personal data is processed according to Broadcom's Privacy Policy: https://www.broadcom.com/company/legal/privacy/policy When you interact with Broadcom, this serves as your authorization to BrightTALK to provide your contact information to Broadcom in order for Broadcom to follow up on your interaction.

TOPICS:

Microsoft Network architecture options for Azure and multi-cloud deployments
In this webinar, experts from both Microsoft and Aviatrix will discuss the architectural challenges customers are facing today. Learn how overcoming those challenges with proven references designs position enterprises IT teams for success as they increase their Azure footprint and plan for multi-cloud. Principle Solution Architects from Microsoft and Aviatrix will discuss: ° What challenges customers face with the “Hub and Spoke” transit architectures in Azure ° What challenges customers face with the Virtual WAN architecture in Azure ° How architecture matters when enterprises are faced with the inevitable extension to multi-cloud ° How a multi-cloud-network architecture (MCNA) provides a framework to overcome challenges in Azure as well as for multi-cloud deployments

TOPICS: