Search Results for: network

Oh G, Can We Talk About What’s Happening With 5G Networks These Days?
5G wireless connectivity is gaining momentum, with consumers and companies keen to adopt the newest generation of wireless for its fast speeds, low latency and innovation possibilities. Municipalities are moving 5G into smart buildings. Health systems are incorporating 5G to raise the bar on care decisions and treatments. And everyone wants to stream any and all media without any drag, whether live or on demand. This requires reappraisals of wireless network infrastructures, data management, access controls, location tracking and carrier contracts…just to name a few boxes that need to be checked. Join Infosecurity Professional’s Editor in Chief Anne Saita as she moderates a panel discussion at 1 p.m. Eastern/10 a.m.Pacific on Tuesday, June 15, 2021 on the biggest risks associated with 5G rollouts.

TOPICS:

Level-up Cloud Security with Palo Alto Networks’ VM-Series for AWS Graviton
Cloud security should be job zero, regardless of where you are in your ongoing journey. With this imperative in mind, Palo Alto Networks’ VM-Series Next-Gen Virtual Firewall for AWS now supports AWS Graviton processors so companies like yours may capitalize on Graviton-based processors in EC2 without compromising security. What price and performance advantages could your business realize with Graviton? In this webinar, Enterprise Strategy Group Principal Analyst John Grady joins Meghna Muralinath, Sr. Product Manager of VM-Series for AWS, Steven Cacciaroni, Director of Business Development at AWS Cloud, and Anti Gyori, Sr Product Manager, EC2 for AWS to investigate this topic. Register today or join the session on May 1, 2024, at 11am EST for: • Introduction to VM-Series optimized for AWS • Test results to highlight performance increase with VM-Series with Graviton • Use cases for VM-Series on Graviton-based EC2 • And an interactive Q&A.

TOPICS:

Play Network Cop: Detect & Restrict Lateral Movement in Multi-Cloud Environments
If you can’t see it, you can’t protect it. Considering 44% of breaches perform some sort of lateral movement, that’s a lesson you don’t want to learn the hard way. (Source: VMware Contexa) Today, east-west infiltration by cybercriminal adversaries can quickly turn a relatively minor breach into a damaging data-exfiltration incident or a full-scale ransomware attack. That's why reducing attacker dwell time and curbing lateral movement are essential components to any network security strategy—no matter if you operate on premises, in private clouds or multi-cloud architectures. Join expert Chad Skipper for eye-opening insights and practical strategies to defend your organization against post-breach lateral movement. You’ll leave the session armed with: Research, statistical analysis, and threat reports emphasizing the threat that lateral movement represents Key metrics, strategies, and modern solutions for detecting post-exploitation east-west movement Best practices for an effective response once suspicious activity is detected

TOPICS:

Changing Structure of the Telecommunications Industry: Lessons for Russia & CIS
With the race to 5G picking up across the region questions about who will own the infrastructure still need answering. With the Infrastructure density required for a 5G network it is not plausible for every major operator to maintain a national network. One credible option is the creation of shared networks ensuring access and competitive pricing for all 5G network operators. Join us to discuss why the future of 5G is a shared one. Who is best placed to operate a shared network? What can lessons can the CIS take from other 5G network sharing projects? What do global 4G network sharing projects teach us about 5G?

TOPICS:

How to be Audit and CCRI Ready using a Network Digital Twin for Federal and Commercial Organizations
Ensuring audit readiness is paramount for maintaining security, compliance, and operational efficiency across the Department of Defense (DoD), civilian federal agencies, and the private sector. This webinar is designed to provide organizations with the strategies necessary to achieve and maintain audit preparedness, using the Cyber Command Readiness Inspection (CCRI) audits as a robust framework. Join Federal Technology Expert Scot Wilson and Networking Audit Veteran Mike Lossmann to learn how Forward Enterprise assists organizations in determining audit readiness, developing actionable remediation plans, and ensuring long-term compliance. They will demonstrate practical approaches to meeting stringent audit requirements, addressing vulnerabilities, and implementing security controls that align with the high standards set by CCRI audits. Key Takeaways: - Assessing CCRI Audit Readiness: Learn how to evaluate your organization’s preparedness by identifying and addressing critical vulnerabilities, such as CVEs (Common Vulnerabilities and Exposures), and ensuring compliance with directives from higher headquarters. - Vulnerability Management: Discover strategies to eliminate vulnerabilities, secure external access exclusively via HTTPS, and identify devices from insecure supply chains. - Device Hardening and Security Compliance: Explore methods to apply necessary security controls, comply with all high-priority Security Technical Implementation Guides (STIGs), and mitigate medium-risk STIGs wherever possible. - Operational Readiness Planning: Understand how to develop a comprehensive plan of action for managing technical debt, including addressing end-of-life hardware and software. - Long-Term Compliance Assurance: Gain insights into maintaining ongoing compliance through continuous monitoring and action planning to prevent and resolve compliance issues over time.

TOPICS:

Demo: Respond to audits in minutes not weeks
Join Mike Lossmann, an expert with over 18 years of experience in handling complex networks, for a practical session on network security. Mike will demonstrate how to quickly prove network security for an audit using a digital twin, network snapshots, and a security posture assessment tool. This tool provides an instant and up-to-date view of microsegmentation across the network.

TOPICS:

Has SD-WAN Become Obsolete?
Find out where SD-WAN should be in your Networking strategy! SD-WAN has dominated the Enterprise Networking space for several years but with the introduction of Cloud-based converged Networking and Security, is SD-WAN still relevant? Join us to find out more about: • Converging LAN and WAN edge security • SD-WAN and Zero Trust Network Access • How SD-WAN puts the Networking into SASE

TOPICS:

NetOps Expert ep 10: Critical Requirements for Fast Isolation of Network Issues
NetOps by Broadcom addresses the three fundamental requirements that enable NetOps teams to speed issue detection and resolution. A highly scalable, unified data model, advanced analytics and intelligent triage workflows. The solution presents operators with the intelligence they need, within intuitive, easy-to-understand troubleshooting workflows. The solution minimizes alarm noise, so NetOps teams can quickly diagnose issues and identify the root cause.

TOPICS:

2nd Gen. SD-WAN – open & flexible infrastructure for the enterprise network
This webinar will cover: •First generation (grey box) vs second generation (uCPE white box) SD-WAN •The enterprise uCPE/SD-WAN use case •Key considerations for SD-WAN •Migrating to a second generation SD-WAN •Multivendor uCPE/SD-WAN integration project •How provisioning is made effortless

TOPICS:

Active Directory Log4Shell Risks: What You Need to Know to Protect Your Network
By watching this video you will get a better understanding of how Log4J (Log4Shell) exploitation can impact your Active Directory environment and overall security posture, and steps you can take to mitigate the threat.

TOPICS: