Search Results for: network

See Who’s Hiding in Your Network
Adversaries may be lurking in your network, trying to locate your confidential data or steal credentials to blend in with your users. How can you quickly detect and stop them? If you've deployed firewalls in key network locations, you can zero in on malicious behavior by analyzing log data with machine learning to uncover active attacks anywhere in your network. Join us for an informative webinar to see: A live attack demo from Unit 42 data, featuring the latest techniques and tools How log data from your firewalls and behavioral analytics from Cortex XDR™ help detect attacks How to map security alerts in Cortex XDR to tactics in the MITRE ATT&CK™ framework

TOPICS:

The Easy Button for Off-Network Protection
In this webinar, you will quickly learn how to turn on protection for your devices as they leave the safety of the traditional network environment. As we transition to our state and local users working from home, attack surfaces grow larger every day. Whether you have Windows or Mac endpoints or iOS or Android devices, deploying off-network protection is fast and easy. Join us for this brief webinar to learn how!

TOPICS:

Does your Network Have 3-D Compliance?
In this webinar we’ll be discussing the critical topic of network compliance, vectors of attack, and how to secure networks. We’ll introduce a new comprehensive model called 3-D Compliance to help you think about multiple aspects of being fully compliant. A recent specific Common Vulnerability and Exposures (CVE) will be analyzed and discussed as an example vulnerability. Learn more about 3-D Compliance in this series of Micro Focus blogs: https://community.softwaregrp.com/t5/IT-Operations-Management-ITOM/Defend-Against-Network-Attack-Vectors-Introducing-Three/ba-p/1656856#.W0j4k7nrseF

TOPICS:

Simplify your network for the manufacturing industry
Manufacturers who thrive in the digital era are the ones who embrace simplified IT operations. It’s the secret to being competitive, agile, and capable of delivering exceptional products and services—fast. In this webinar, we’ll show how Cisco platforms and solutions can ease the transition to a more effective model for IT infrastructure—on your network and across the entire cloud/network IT stack. You’ll learn about: The current landscape of opportunities to enhance manufacturing experience applying IT simplification across your organization The recurring challenges of IT transformation in the manufacturing industry and the people, process, and technologies involved in the path forward How Cisco networking solutions deliver key capabilities that can help simplify your IT operations

TOPICS:

Detecting Malicious Traffic on your Network
One of the biggest pain points of most network and security analytics solutions is their inability to conclusively tie data generated by disparate sources including application / platform event logs, network flows, HR user profiles and access entitlements. Gurucul solves this problem by defining unique identities (users and/or entities) and linking all the data elements to those identities using linking algorithms or patterns. Gurucul combines identity and network-based alerting to give the SecOps and NetOps teams an end-to-end picture of the incident, enabling them to answer essential questions such as: - Which device triggered the incident? - What transactions were performed? - How much data was transferred? - Who is the owner of the device/subnet?

TOPICS:

Supercharge SecOps with Network Insights
Why is network data your most valuable asset to ensure compliance? Join Nikhil Handigol, Co-founder of Forward Networks, to explore our integrations with Tenable and Rapid7. The demo will highlight how our solutions deliver complete attack surface visibility that empowers SecOps teams to proactively identify impacted hosts with critical vulnerabilities accessible from the Internet or other critical exposure points in seconds.

TOPICS:

The Upside-Down World of Networking & Security
Legacy networking and security products are complicated and sometimes just outright scary. You may be trapped in the upside-down world, a dark and cold place full of downtime, endless updating, and glaring security gaps. Join Cato’s Director of Product Marketing for this fun and insightful look at the legacy way of doing networking & security and learn how SASE and SSE can help bring you back from the upside-down world.

TOPICS:

The Upside-Down World of Networking & Security
Legacy networking and security products are complicated and sometimes just outright scary. You may be trapped in the upside-down world, a dark and cold place full of downtime, endless updating, and glaring security gaps. Join Cato’s Director of Product Marketing for this fun and insightful look at the legacy way of doing networking & security and learn how SASE and SSE can help bring you back from the upside-down world.

TOPICS:

The Upside-Down World of Networking & Security
Legacy networking and security products are complicated and sometimes just outright scary. You may be trapped in the upside-down world, a dark and cold place full of downtime, endless updating, and glaring security gaps. Join Cato’s Director of Product Marketing for this fun and insightful look at the legacy way of doing networking & security and learn how SASE and SSE can help bring you back from the upside-down world.

TOPICS:

SASE: Next in Network Security
The network and security landscape has changed dramatically in 2020, leaving gaps in your existing security. These changes have paved the way for a new concept: The Secure Access Service Edge (SASE), which delivers a combined set of security and networking capabilities that improve performance and tighten security for any device, location, and user. Join us to learn how cloud-delivered security can help your organization meet these challenges head-on.

TOPICS: