Search Results for: network

Microsoft Network architecture options for Azure & multi-cloud deployments [NA]
In this webinar, experts from both Microsoft and Aviatrix will discuss the architectural challenges customers are facing today. Learn how overcoming those challenges with proven references designs position enterprises IT teams for success as they increase their Azure footprint and plan for multi-cloud. Principle Solution Architects from Microsoft and Aviatrix will discuss: ° What challenges customers face with the “Hub and Spoke” transit architectures in Azure ° What challenges customers face with the Virtual WAN architecture in Azure ° How architecture matters when enterprises are faced with the inevitable extension to multi-cloud ° How a multi-cloud-network architecture (MCNA) provides a framework to overcome challenges in Azure as well as for multi-cloud deployments

TOPICS:

WanaCrypt0r Ransomware – How Palo Alto Networks protects you (Cantonese)
Hours after WanaCrypt0r first emerged last month, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world. Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over. Join our Hong Kong cybersecurity experts for an educational Unit 42 webinar in Cantonese, where you’ll learn: • How WanaCrypt0r exploits vulnerabilities and spreads across networks • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls • Actionable steps to protect your organization against this and future ransomware campaigns

TOPICS:

ExtraHop #1: Unlocking the Ultimate Source of Truth in the Cloud—Network Data
Learn how virtual taps from AWS, Azure, and Google Cloud enable NDR solutions to help secure cloud environments with agentless and immutable monitoring and threat detection capabilities. Invisible to attackers, NDR solutions sit out of band and analyze network traffic streams to provide crucial information about devices, users, and potential attacks that other security tools simply can’t. Join ExtraHop and (ISC)2 to examine how best-of-breed NDR also augments security personnel visibility into SSL/TLS 1.3 encrypted traffic and ML-driven threat detection that alerts only on items that matter while providing intelligence to remediation and forensic workflows.

TOPICS:

Gigamon #3: Network Traffic Decryption: Keeping Secure in a Private World
Today’s network environment can feel like a Cold War-era novel, full of who’s watching whom scenarios and heavily protected intelligence communications. Visibility is critical to an organization’s security posture, and encrypted channel communications can become an obstacle to it when gets to the wrong eyes. Decryption can illuminate what is hidden and restores the advantage you need to see what’s lurking in the shadows. Join Gigamon and (ISC)2 on September 5, 2019 at 1PM Eastern for an examination of decryption best practices, a review of encryption methodologies, the obstacles that impact security, resources and regulatory compliance and what’s changed with TLS 1.3 and how this newer protocol impacts visibility.

TOPICS:

Extend Network Security with CN-Series Container Firewall on AWS Marketplace
Organizations pivoting to cloud-native application architectures and container deployment need to prioritize, secure and maintain operational consistency across hybrid environments. Securing cloud-native applications is a difficult challenge; organizations have to ensure tools are being effectively and consistently deployed, configured, and managed across different parts of the environment in order to prevent cyber attacks. Organizations need to invest in tools available for procurement via cloud marketplaces and deployed natively through Kubernetes to ensure a consistent and streamlined DevOps workflow. However, as organizations migrate their data, they often neglect to implement security earlier in the development cycle, leaving them defenseless against attackers. In spite of this, organizations who secure their applications early on can still become complacent and vulnerable against unknown and unpatched vulnerabilities, especially when they fail to prioritize their runtime network security. Join ESG Senior Analyst, John Grady and guests from AWS and PANW as they discuss how organizations can develop an advanced container security solution and the importance of prioritizing Network Security for containers as threats that plagued legacy applications also impact containerized workloads. You’ll learn: - How to leverage containers to support business agility and Digital Transformation - Selecting the right tools to support zero trust strategies and streamline the DevOps workflow - How containerized firewall solutions can give security teams the visibility to secure hybrid environments and integrate these firewall solutions with DevOps tool - How to protect your containerized workloads against unpatched and unknown vulnerabilities - How to maintain a consistent security posture across traditional VMs and Containers - Protect containerized applications deployed anywhere using AWS Marketplace for Containers Anywhere

TOPICS:

Extend Network Security with CN-Series Container Firewall on AWS Marketplace
Organizations pivoting to cloud-native application architectures and container deployment need to prioritize, secure and maintain operational consistency across hybrid environments. Securing cloud-native applications is a difficult challenge; organizations have to ensure tools are being effectively and consistently deployed, configured, and managed across different parts of the environment in order to prevent cyber attacks. Organizations need to invest in tools available for procurement via cloud marketplaces and deployed natively through Kubernetes to ensure a consistent and streamlined DevOps workflow. However, as organizations migrate their data, they often neglect to implement security earlier in the development cycle, leaving them defenseless against attackers. In spite of this, organizations who secure their applications early on can still become complacent and vulnerable against unknown and unpatched vulnerabilities, especially when they fail to prioritize their runtime network security. Join ESG Senior Analyst, John Grady and guests from AWS and PANW as they discuss how organizations can develop an advanced container security solution and the importance of prioritizing Network Security for containers as threats that plagued legacy applications also impact containerized workloads. You’ll learn: - How to leverage containers to support business agility and Digital Transformation - Selecting the right tools to support zero trust strategies and streamline the DevOps workflow - How containerized firewall solutions can give security teams the visibility to secure hybrid environments and integrate these firewall solutions with DevOps tool - How to protect your containerized workloads against unpatched and unknown vulnerabilities - How to maintain a consistent security posture across traditional VMs and Containers - Protect containerized applications deployed anywhere using AWS Marketplace for Containers Anywhere

TOPICS:

NEC and Fortinet joint cyber defense solution for Software Defined Networking
NEC and Fortinet have established a technology partnership to help organizations effectively secure their Software Defined Networking based deployments. The NEC-Fortinet joint solution provides programmable cyber defense, automating and enhancing an organization’s ability to protect against sophisticated cyber attacks. Join Fortinet Consulting Systems Engineer Tuukka Helander and NEC SDN experts Franco Buratti and Giuseppe Nantista in this live session which will consist of presentation and a live demo from the NEC showroom in Rome, where FortiGate is detecting indications of compromise and feeds NEC ProgrammableFlow Controller via SDN security adapter to block compromised hosts. In the demo we will show how FortiGate adds Unified Threat Management capabilities to the NEC SDN platform by providing anti-virus, web filtering and IPS functionalities.

TOPICS:

Voice Biometrics and Deep Neural Networks: Intelligent Auth, Seamless CX
The mixture of ever-increasing computing power, storage capacity and machine learning is enabling new, holistic security solutions for enterprise contact centers and customer support channels. Pindrop has leveraged it’s extensive access to hundreds of millions of calls per year via its anti-fraud solution and Phoneprinting™ technology to deliver their latest Deep Voice™ biometric engine, enabling the next generation of multi-layered security, intelligent authentication, and cross-platform identity. In this webinar, join Opus Research and Pindrop to learn how Pindrop’s proprietary Deep Voice biometric technology marries Deep Neural Networks and Voice Biometrics to overcome the cumbersome processes involved with enrollment, verification accuracy and fraud prevention to help contact centers deliver rich, natural, and secure voice experiences.

TOPICS:

Next-generation Networks with IGXGlobal and Juniper’s AI-Driven Enterprise
Join IGXGlobal’s Lead Technical Architect, Michael Wendt, and Juniper’s VP Global AI-Driven Enterprise Sales, Tom Wilburn, to find out how Juniper’s AI-Driven Enterprise can deliver end-to-end visibility, simplicity and exceptional performance to streamline your IT operations. • Simplify operations and improve visibility into the performance of connected devices with Wired Assurance • Replace manual troubleshooting tasks with automated wireless operations and get unique visibility into user service levels with Wi-Fi Assurance • Simplify network deployment and operations and shorten the mean time to repair SD-WAN issues with WAN Assurance cloud service Presenters: Michael Wendt, Lead Technical Architect - IGXGlobal Tom Wilburn, VP Global AI-Driven Enterprise Sales - Juniper

TOPICS:

Innovation Inside Out: Bringing Buying Groups to Life at Palo Alto Networks
For complex and expensive B2B purchase decisions, everyone understands the logic of Buying Group thinking -- heck, most of us are already participants in the process! And we all know that MQLs are interesting signals, they’re just not very strong or predictive on their own. So, if the new ideas about long-needed lead management changes make so much sense, why hasn’t everyone jumped right in on making it happen? That’s the question we asked Palo Alto Networks’ Jeremy Schwartz. And he’s able to explain the key challenges and how they’re working their way through every single one. Join Jeremy and TechTarget CMO John Steinert as they discuss how Jeremy is helping to drive GTM innovation from the inside. They’ll cover the business benefits of the Buying Groups concept; how to think about it, communicate it, and work through the change management elements necessary to bring it to life in a global leading-edge corporation.

TOPICS: