Search Results for: network

Palo Alto Networks Cybersecurity dla Data Center – ze szczególnym uwzględnieniem
Sesja polecana dla tych, którzy poszukują sposobów na podniesienie bezpieczeństwa swojego centrum danych i zabezpieczenia środowiska wirtualnego. Webinarium prowadzone zostanie wspólnie z firmą VMware. Zmiany zachodzące w dzisiejszych centrach danych i tego jak te centra mogą wyglądać w ciągu najbliższych kilku lat. Dlaczego warto skupić się na kontroli ruchu bazując na aplikacjach i odejść od kontrolowania portów i protokołów? Do czego może się przydać mikro segmentacja i w jaki sposób skutecznie wdrożyć ją w swoim centrum danych? Jak uniezależnić się od adresów IP przy pisaniu samoczyszczących się polityk bezpieczeństwa? Webinar przeznaczony jest dla osób technicznych. W razie pytań prosimy o kontakt z Arkadiuszem Kotowskim, akotowski@paloaltonetworks.com

TOPICS:

Networking - Nuvem privada virtual em poucos minutos usando a Akamai Cloud
VPC ou Virtual Private Cloud é um conceito em que é possível configurar redes privadas em uma infraestrutura de nuvem. É uma boa prática usar VPCs para proteger suas aplicações do mundo externo (Internet) por meio de um ambiente com acesso gerenciado e controlado.

TOPICS:

Top 5 reasons Azure customers are using Aviatrix for cloud enterprise network
In this webinar, Principal Solutions Architect Manny Calero will sit down with Azure Global Black Belt Heather Sze to discuss some of the top reasons Azure customers are leveraging Aviatrix in Azure. They will discuss how Aviatrix is keeping up with native CSP components, what is driving customers' interest in Aviatrix, and what are the top concerns for customers when migrating to Aviatrix as a platform. These leading architects will also be taking questions from the audience to discuss real-world challenges that customers are facing and how Aviatrix and Azure together are helping to enable and accelerate customer deployments.

TOPICS:

Top 5 reasons Azure customers are using Aviatrix for cloud enterprise network
In this webinar, Principal Solutions Architect Manny Calero will sit down with Azure Global Black Belt Heather Sze to discuss some of the top reasons Azure customers are leveraging Aviatrix in Azure. They will discuss how Aviatrix is keeping up with native CSP components, what is driving customers' interest in Aviatrix, and what are the top concerns for customers when migrating to Aviatrix as a platform. These leading architects will also be taking questions from the audience to discuss real-world challenges that customers are facing and how Aviatrix and Azure together are helping to enable and accelerate customer deployments.

TOPICS:

How will China’s New Silk Rail Route Change Europe’s Distribution Networks?
Presentation of the results of an AEW & BCI sponsored study on the supply chain implications of China’s New Silk Rail Routes •The increasing role of rail connections in the China-Europe trade •How do we expect Covid-19 to impact on China-Europe rail connections? •User perspective -- Expectation from leading manufacturers, shippers and logistics services providers

TOPICS:

Pivotal Cloud Foundry 1.10: First Look - Windows at Scale, Network Isolation
Ship software early and often with Pivotal Cloud Foundry 1.10, now generally available. Join Jared Ruckle and Pieter Humphrey for a deeper look at these capabilities, demos, and expert Q&A about many of the new options, including: * Pivotal Cloud Foundry Runtime for Windows enables operators to run fleets of Windows Servers at scale * cf push .NET apps with the Hosted Web Core Buildpack * Steeltoe brings popular microservices patterns to .NET * Deploy apps to a specific host with isolation segments, and boost compliance. * Use distributed tracing in Pivotal Cloud Foundry Metrics to reduce latency in microservices Learn all about the latest updates to the leading multi-cloud platform in this online event.

TOPICS:

2nd Gen. SD-WAN – open & flexible infrastructure for the enterprise network
This webinar will cover: •First generation (grey box) vs second generation (uCPE white box) SD-WAN •The enterprise uCPE/SD-WAN use case •Key considerations for SD-WAN •Migrating to a second generation SD-WAN •Multivendor uCPE/SD-WAN integration project •How provisioning is made effortless

TOPICS:

Joint Security Solutions that Protect your Business with F5 Networks,Cisco & SHI
Encryption is everywhere today—and while it’s great for privacy and data security, encryption also lets attackers embed malware and other malicious threats in encrypted traffic, creating security blind spots for organizations. Cisco Firepower Threat Defense (FTD) and Web Security Appliance (WSA) are built to block threats, and quickly mitigate any that breach your defenses. But if you deploy Cisco FTD and WSA along with F5 SSL Orchestrator, not only do you optimize their threat mitigation and performance capabilities, you also optimize their ability to stop encrypted threats. Together, F5 SSL Orchestrator and Cisco’s FTD and WSA deliver top-of-the-line actionability, availability, and superior orchestration. They increase your security posture and threat mitigation, future-proof your existing investments in security solutions, meet or surpass regulatory compliance requirements, and ensure a superior user experience. Join this webinar to learn more about our joint Cisco & F5 Security Solutions. We’ll discuss: •Common pain points of dealing with encrypted traffic, manual versus automated management scenarios, defocusing core function of existing security solutions, and meeting regulatory compliance pain points •The benefits and alignment of a joint Cisco Firepower Threat Defense or Web Security Appliance and F5 SSL Orchestrator solution •New ways to manage and solve encrypted traffic blind spots and encrypted threat mitigation Register Now

TOPICS:

Active Directory Log4Shell Risks: What You Need to Know to Protect Your Network
By watching this video you will get a better understanding of how Log4J (Log4Shell) exploitation can impact your Active Directory environment and overall security posture, and steps you can take to mitigate the threat.

TOPICS:

Enhance Your Identity Protection with Seamless Deception Technology Integration with Consortium Networks and Acalvio
This session will delve into how CrowdStrike customers can effortlessly enhance their identity protection with Acalvio’s cutting-edge deception technology, seamlessly integrated with the CrowdStrike Falcon platform. Key Highlights: • Seamless Integration: Discover how Acalvio’s technology integrates directly with CrowdStrike Falcon, utilizing the existing FalconHost agent, so you can enhance your security without deploying additional agents. • Identity Threat Landscape: Understand the growing risks and how traditional solutions fall short. • Deception Technology: Learn how deploying honey accounts and honeytokens can provide early detection of identity threats across your organization. • Success Stories: Hear how leading organizations have leveraged these tools to protect their identities and prevent breaches. This is a must-attend event for any organization looking to enhance their security posture with minimal disruption.

TOPICS: