Search Results for: network

Security Insights to Keep Your Network Safe in 2023 (ET Time Zone)
In this webinar we will review network security insights from Frost & Sullivan’s research, and discuss best practices and tools to address the biggest concerns and challenges in 2023. The panelists will share their unique insights in network security and secure remote access, with case studies derived from experience across a range of different industries, sectors, and application areas. In particular, you will learn how the Perimeter 81 platform supports improved security for remote user access to business resources and cloud applications via a zero-trust model.

TOPICS:

How to use AppNeta network paths to create dynamic groups in DX NetOps
Small Bytes Episode #9 - The ability to view your network delivery paths in the context of various business functions, objectives, or technical correlations (such as ISP, prod & pre-prod etc) drive significant insights within DX NetOps Dashboards. The DX NetOps portal provides easy to use and flexible dynamic grouping rules that work hand-in-hand with AppNeta defined tags and attributes to provide up to date perspectives on your Network Delivery paths. Learn how to take advantage of these capabilities to drive unparalleled visibility and faster triage your network experience. Broadcom is collecting your personal data when you submit such information as part of the BrightTALK registration process. Your personal data is processed according to Broadcom's Privacy Policy: https://www.broadcom.com/company/legal/privacy/policy When you interact with Broadcom, this serves as your authorization to BrightTALK to provide your contact information to Broadcom in order for Broadcom to follow up on your interaction.

TOPICS:

[APAC] Introducing MistNet NDR by LogRhythm: Network Threat Detection Made Easy.
If we reflect on the cybersecurity news of 2020, it is clear that determined threat actors are using carefully planned and sophisticated attack techniques to breach the networks of target organisations. In any successful cyber intrusion, the threat actors successfully evaded the endpoint security systems, but the network communications provides us with an opportunity for detection. In this on-demand webinar, you will learn three key network-based techniques that threat actors will employ during a typical attack on a target environment. We discuss why these techniques are so successful and why you should consider an NDR solution to enhance your own threat hunting and detection approaches. Listen to Dan Crossley, Enterprise Sales Engineering Manager and John Golden, Enterprise Sales Manager, LogRhythm, to gain insight into the following attack techniques: - How attackers establish Command & Control (C2) communications and infrastructure - How Domain Generation Algorithms (DGAs) work and why they are used - How attackers can exfiltrate data via DNS tunnelling

TOPICS:

Federal: TIC 3.0 with high performance encryption and multi-cloud networking
Would you be interested in a TIC 3.0 architecture pattern that delivers high performance encryption (75Gbps+) as well as intelligent routing, advanced security, and cyber visibility? In this tech talk we will cover the approved TIC (Trusted Internet Connection) 3.0 architecture using the Aviatrix multi-Cloud Networking Platform. Aviatrix’s delivers the advanced networking, security, and operational visibility and control with the simplicity and agility of the cloud. Join us to learn how Aviatrix is supporting the various missions of the US Federal government across AWS, Azure, GCP, and Oracle Cloud.

TOPICS:

Migrate from F5 to Avi Networks - Go from rigid hardware to elastic software
Does the following IT conversation look familiar? Application Owner: “It takes the network guys too long to provision load balancing services” Network Team: “Yes, but it is because our hardware load balancers are so inflexible” CIO: “I am tired of spending hundreds of thousands every few years and it doesn’t even help our future plans” If that sounds familiar, this webinar is for you. Enterprises seeking elastic application services are choosing an elastic software-defined approach to load balancing. Learn how large multinational enterprises have solved their application delivery challenges by migrating from F5 BIG-IP and Viprion hardware appliances to Elastic Application Service Fabric. Nathan McMahon from the Avi Networks solution architecture team will present the best practices for migrating from F5 appliances to the Avi Vantage Platform. You will learn how to convert your current configurations and iRules to a simple API-driven software platform that: • Reduces your TCO by more 70% • Helps troubleshoot application issues in minutes • Accelerates application roll outs by 5 times

TOPICS:

VMware NSX Advanced Load Balancer (by Avi Networks) Intro and Demo
In this session you will see the powerful capabilities for automation and self-service that are built into VMware’s enterprise-grade load balancer, WAF, and Container Ingress solution called VMware NSX Advanced Load Balancer (by Avi Networks). The software-only platform is used by global enterprises to migrate from legacy appliance based load balancers and WAFs to a modern, software-defined platform that simplifies network operations, provides remarkable visibility and application insights, and lowers overall costs for application delivery. Presenters: Ashish Shah, Senior Director, Product Management, VMware Chandra Sekar, Senior Director, Marketing, VMware

TOPICS:

VMware NSX Advanced Load Balancer (by Avi Networks) Intro and Demo
In this session you will see the powerful capabilities for automation and self-service that are built into VMware’s enterprise-grade load balancer, WAF, and Container Ingress solution called VMware NSX Advanced Load Balancer (by Avi Networks). The software-only platform is used by global enterprises to migrate from legacy appliance based load balancers and WAFs to a modern, software-defined platform that simplifies network operations, provides remarkable visibility and application insights, and lowers overall costs for application delivery. Presenters: Ashish Shah, Senior Director, Product Management, VMware Chandra Sekar, Senior Director, Marketing, VMware

TOPICS:

Secure Financial Services: Palo Alto Networks & NETSCOUT integrated in AWS
In today's digital landscape, financial services institutions face unprecedented cybersecurity threats, especially as you migrate critical data and applications workloads to cloud environments. The stakes could not be higher. To mitigate these risks, leading financial institutions are implementing a Zero Trust framework to adhere to stringent regulatory requirements governing workload security and personally identifiable information (PII) protection. In this webinar, we will explore the Palo Alto Networks and NETSCOUT integrated solution in AWS. The webinar will describe the integrated solution capabilities that can help ensure cloud security compliance and support your Zero Trust framework implementation including: ● Compliance monitoring tools tailored to the specific needs of the financial services industry ● Comprehensive network visibility ● Threat detection ● Dynamic access control Come learn best practices for your Zero Trust framework and to support your security and compliance goals. Presenters: Jerry Mancini, Sr. Director Office of the Enterprise CTO – NETSCOUT Faisal Pias, Partner Solutions Architect – AWS Salman Syed, Sr. Technical Marketing Engineer - Palo Alto Networks

TOPICS:

Zero Day Ransomware wreaks havoc in SA networks: Combat it with Deception
Join us on this Webinar where we will show you how effective Next Gen Deception is in countering cyber threats. The intensity, volume and success of breaches is impacting South African organisations almost on a daily basis. Malware and specifically Ransomware is a difficult breach vector to detect before it is too late. On gaining a foothold in your network, Ransomeware will (much like human hackers) use automation to probe your network, engage in propagation, establish CnC channels and execute when ready to do so. It is thus imperative that suspicious activity associated with the malware is detected before execution. Effective next gen fluid deception is exceptionally powerful in detecting this activity before it is too late. It does this by using AI to understand your network, your assets and your standards and then deploying hundreds of decoys and potentially thousands of lures and breadcrumbs across your IT estate in a matter of hours. To propagating malware and human hackers, these fake assets are indistinguishable from your real assets and thus when they scan a decoy or try to connect to it, you are immediately alerted of their presence. The use of high interaction decoys then “engage” the malware or hacker to glean more intelligence on their modus operandi, intention and approach so that you can shut them down before execution.

TOPICS:

Secure Financial Services: Palo Alto Networks & NETSCOUT integrated in AWS
In today's digital landscape, financial services institutions face unprecedented cybersecurity threats, especially as you migrate critical data and applications workloads to cloud environments. The stakes could not be higher. To mitigate these risks, leading financial institutions are implementing a Zero Trust framework to adhere to stringent regulatory requirements governing workload security and personally identifiable information (PII) protection. In this webinar, we will explore the Palo Alto Networks and NETSCOUT integrated solution in AWS. The webinar will describe the integrated solution capabilities that can help ensure cloud security compliance and support your Zero Trust framework implementation including: ● Compliance monitoring tools tailored to the specific needs of the financial services industry ● Comprehensive network visibility ● Threat detection ● Dynamic access control Come learn best practices for your Zero Trust framework and to support your security and compliance goals. Presenters: Jerry Mancini, Sr. Director Office of the Enterprise CTO – NETSCOUT Faisal Pias, Partner Solutions Architect – AWS Salman Syed, Sr. Technical Marketing Engineer - Palo Alto Networks

TOPICS: