Search Results for: network

A Quantum Leap for Network Security
The coronavirus outbreak has accelerated the digital transformation of enterprises requiring them to expand support for remote workers across the globe. Businesses need to securely support remote workers, while also protecting enterprise data and intellectual property from attack. Cyber attacks have increased during this crisis, since remote workers have become easy targets for hackers. Enterprises have three key network security issues during these challenging times: •Security that stops cyber attacks as they happen •Ability to expand security on demand to support rapid IT network growth •Unified security to speed up operations and reduce costs Stream the webinar to learn how Check Point addresses these key IT concerns through the new Quantum Security Gateways™. They combine the Best Security and the Ultimate hardware to deliver ultra-scalable, power efficient protection against Gen V cyber threats. For the first time in Check Point’s history, all Quantum Security Gateways™ are bundled with Check Point’s award-winning SandBlast Zero Day Protection right out of the box. Learn more: https://www.checkpoint.com/products/next-generation-firewall/ Demos: https://www.checkpoint.com/demos/

TOPICS:

Security Challenges for Mobile Networks
When industry press is regularly reporting on cyber security breaches in telecoms, why are they blaming on 5G? How has 5G increased the attack surface? Throughout this presentation, we will look at what the industry observers are saying, looking behind the headlines and uncovering the reasons why 5G poses a greater risk to mobile operators. We will investigate the cyber security industry from a mobile telecoms point of view, explaining where the 5G Security challenges are coming from. We will also take a deep dive into protection measures open to equipment vendors and operators. And finally, we will explore the mitigation techniques available to mobile operators to keep their networks as safe as possible from the threat of a cyber-attack.

TOPICS:

SASE – Ushering in a new paradigm for networking
Secure access service edge (SASE, a term coined by Gartner) is seen as the next wave of evolution for SD-WAN, bringing together the traffic optimizing power that SD-WAN offers with intrinsic security functionality. No longer just a vision, vendors are adopting it left and right and making it available to customers to derive further value from their networks and elevate the experience for all. But what does SASE really mean to these end users, to people who have transitioned to working from home? Is it all it’s cracked up to be? Are there implications we need to consider? In this webinar, founder and principal analyst of ZK Research Zeus Kerravala discusses the merits of SASE and why businesses should embrace it while also looking to broaden its scope.

TOPICS:

Securing Networks from Edge-to-Cloud
Adoption of Cloud and WAN Edge technologies is rapidly on the rise in both Enterprise and Service Provider markets. Cloud technologies are used to deliver various multitenant services and Edge technologies accelerate the connectivity to the Cloud. But this increases the surface area of attack and therefore poses significant risk. Virtual firewall solutions provide comprehensive protection, deep visibility and consistent security controls across a variety of deployment models. In this webinar you will learn how the Industry leading FortiGate Virtual Firewall enables key use cases such as Segmentation, Threat Protection, Security automation, and Secure SD-WAN to protect networks from Edge to Cloud.

TOPICS:

Kubernetes Ingress by Avi Networks
Containers and microservices are the building blocks for modern cloud-native applications. More enterprises move from experimenting in dev test environments to deploying Kubernetes clusters in production. Avi Networks, now part of VMware has helped companies like Deutsche Bank with an enterprise-grade load balancing solution including web application firewall (WAF) and global server load balancing (GSLB) capabilities in one platform. Container services should be provided in an infrastructure agnostic way regardless of the underlying Kubernetes environments. In this Avi Tech Corner episode 12, you will learn about: - Kubernetes native constructs across GKE, PKS, AKS, EKS, and more - Advanced ingress gateway with L4-L7 features including WAF and GSLB - Observability and metrics that help make automated decisions

TOPICS:

The Role of PKI in OT Networks
The need for rapid and reliable production of customized products is paramount in today's dynamic manufacturing landscape. Achieving this requires smart production systems that communicate within highly agile environments, ensuring fast manufacturing processes and adherence to tight delivery schedules. However, integrating heterogeneous machinery and IT applications often complicates digital transformation efforts. Standards such as OPC UA simplify this process by enabling quick and easy connections between various machines and existing IT environments. One of the significant benefits of OPC UA is its robust security standards, which ensure secure data transmission both locally and over the Internet. But how do these advancements intersect with PKI services and certificate management systems? Join us for an in-depth webinar where we explore the current status of OPC UA standardization, the integration challenges, and the solutions from a PKI manufacturer’s perspective. Learn how PKI can enhance security and efficiency in OT networks. Keyfactor is an approved (ISC)2 CPE Submitter partner. Earn .5 CPE credit by viewing this webinar.

TOPICS:

The Network Security Prescription for Healthcare
Due to the profitable nature of selling Private Health information (PHI) data, many cyber criminals focused their efforts on the healthcare industry in 2020. In order to safeguard user PHI from exploitation, healthcare firms must therefore never underestimate the importance of securing PHI data versus financial related data. While 2020 can be characterized as the year of COVID-19 and ransomware crises and remote work, the challenges that healthcare organizations faced with data privacy and Proactive Patient Identification before the pandemic have not indicated that 2021 will be any different. The pandemic has impacted the way healthcare professionals offer care to patients and has accelerated usage of telemedicine and telehealth. With this shift in healthcare delivery, physicians rely on tools such as the Electronic Health Record (EHR) to be able access their patient’s charts from anywhere and share information with other healthcare providers and organizations. Join our webinar where we’ll discuss: - How have rapid shifts in telemedicine and telehealth increased privacy and security risks? - What tools are needed to safeguard the financial and personal information delivery of patients? - How do we satisfy the different stakeholders in today's environment and how do we provide a solution that satisfies everyone in these circumstances? - How can healthcare providers provide Secure Network Access to private information? - How can we mitigate threats relating to cloud-based devices? - How do you internally secure PHI information?

TOPICS:

Automating your AI for IT™ Network with Mist
In this webinar, we will discuss how Mist has brought a unique user-centric approach to Wi-Fi using 100% APIs while leveraging an AI-driven, modern microservices cloud architecture. Learn how this AI for IT™ automation solution brings the power of APIs across the Juniper enterprise switching, SD-WAN and Mist wireless portfolios. We will share several best practices and how, by leveraging Mist’s APIs, customers like you can enable a seamless integration experience across the IT stack and experience proactive operations that will deliver a better user experience. You will see hands-on examples of how easy it is to create thousands of customer sites through automation and hear about experiences from some of Mist’s Fortune 100 customers in how they have leveraged Mist APIs to transform their business with automation and insights. We will also share an innovative customer example of complete API integration using OpenConfig of which Mist is the first Wi-Fi vendor to support this open standard. Finally, we will share several example automated scripts that expose Mist APIs to customers who are new to this software model through easy to use tools like Postman. You will learn about several simple Python templates that are publicly available for customers to experiment with and begin their automation and API journey.

TOPICS:

Gain Visibility into Applications on Your Network
It is often difficult to identify applications communicating & the lack of go-to solutions to gain context-rich intelligence can cause blind spots in applications. In this demo Irvin Guerra breaks down a short step-by-step way to gain visibility into the applications running in your infrastructure as well as how you can visualize, filter & gain a deep understanding into applications.

TOPICS:

UC Network Monitoring & Troubleshooting
APAC Timezone Webinar

TOPICS: