Search Results for: network

Network Segmentation Without a Single Firewall Rule
To prevent malware epidemics that are designed to move laterally, Stowe Australia needed stronger data center segmentation, limiting the spread of breaches by blocking unauthorized East-West traffic and reducing lateral movement. While already segmented into coarse zones through the WAN with firewalls, Stowe’s IT team, led by Karl Houseman, sought a higher degree of granularity. Listen to this on-demand webinar where Karl and Illumio's Andrew Kay cover: • How Stowe avoided manually programming firewalls with a solution that they had up and running in a day. • How to prevent unauthorized hopping between branches, servers, and applications on a flat network. • What happens when you pit Illumio against leading firewall vendors in a live Segmentation Showdown demonstration

TOPICS:

The Rise of the Edge Network and Multi-Cloud Strategy
The binary choice of on-prem computing or shipping data and workloads to hyperscale cloud datacenters is now becoming an inhibitor to resource optimization, business innovation and compelling new use models. As a result, one area of intense focus of such innovation is on “edge computing”. Edge computing is the placement of data center or network-class compute and storage resources away from centralized hubs and closer to the endpoint devices in order to improve service capabilities, optimize TCO, comply with data locality requirements, and reduce application latency. This session will provide an overview of the market dynamics driving the growing interest in edge computing models and concepts. It will cover some of the critical use models and attributes likely to drive the transition and it will highlight some of the core technologies and providers that will help open and enable the deployment of IT resources dynamically when and where they are needed—from core to edge to endpoint. More about our speakers: James Greene is the Sr Industry Marketing Manager, Network Products Group at Intel Corporation. James is co-author of the book: Intel® Trusted Execution Technology for Servers: A Guide to More Secure Datacenters and contributed to the US National Institute for Standards and Technology (NIST) Interagency Report 7904 - Trusted Geolocation in the Cloud: A Proof Of Concept Implementation. He has been a speaker, panelist or presenter at a number of public venues, such as the International Forum on Cyber Security, SecureTech Canada, Intel Developer Forum, OpenStack Conference and Design Summit, InfoSec World 2011, vmworld, ENSA@Work, RSA in US and Europe, CSA Congress, HP Discover and other industry forums. Ben McCahill is the Director of Strategy and Business Planning at Intel Corporation.

TOPICS:

How to Break Automatic Policy Enforcement in Network Security
4 facts you need to know. - Misconfigurations are a major root cause of cyber-attacks. - Manual changes within complex infrastructure often lead to these misconfigurations. - Compound that with emergency changes made during critical events, a major contributor to misconfigurations and cyber-attacks. - Your current security policies are being breached regularly and its humanly impossible to enforce those policy violations without automation. For increased certainty that your network and cloud infrastructure are mitigated against the calamitous ability of the human, you need to implement automated and hyper-speed change management along with security orchestration. This is not another webinar about SOAR! Rather, we are going to discuss: - What true automated change management means. - How you can implement and automate your network and cloud security activities. - Implementing policy based controls that match your requirements, ensuring both hyper and accurate change management. - How you detect and remediate catastrophic emergency changes that are often made with little attention to risk exposure. Join our special guests Hadas Lahav and Sagi Bar-Zvi on this webinar as they explain what you can do and more importantly how you can implement fully automatic policy based security orchestration for your infrastructure. Hadas Lahav is the Director of Product Management for Automation Products, and is leading Tufin’s SecureChange and SecureApp products. Hadas joined Tufin 3.5 years ago, and prior to that served in senior product management and product development positions at top security and service companies. Sagi Bar-Zvi is Tufin’s Global Strategic Pre-Sales Manager. He oversees global strategic projects from conception to completion. Being with Tufin for many years, Sagi started in Tufin’s RnD and then moved to the states to act as a Lead Solutions Architect in the Americas.

TOPICS:

Understanding the NSA's Zero Trust Network Guidance
This past March, the U.S. National Security Agency (NSA) released a new cybersecurity information sheet, Advancing Zero Trust Maturity Throughout the Network and Environment Pillar, which recognizes Zero Trust Segmentation (ZTS) as a foundational element of Zero Trust. With this validation, it’s more important than ever that organizations implement ZTS as part of their Zero Trust strategy. John Kindervag, godfather of Zero Trust and Chief Evangelist at Illumio, and Kate Kuehn, Head of Global Advocacy for WWT, sat down to discuss the importance of Zero Trust Segmentation for building Zero Trust and how the Illumio and WWT partnership makes it easy for customers to gain the benefits of a Zero Trust architecture with Zero Trust Segmentation at its core.

TOPICS:

Bridging Security Gaps with Networks-to-Endpoint Integration
The typical enterprise uses an average of 30 security products, most of which from variety of vendors and typically do not integrate well and offer little information sharing…if any. Using a portfolio of integrated products from fewer vendors means greater synergies and efficiencies. This is especially true of endpoint security software, where many organizations have long and established relationships with a favorite vendor. This can lead to a sense of complacency, and there may also exist a disincentive to replace software on all of an organization’s endpoint devices, leaving organizations potentially exposed to an evolving threat landscape. Join us for this informative webinar where IDC analyst Konstantin Rychkov will: • Introduce the concept of endpoint protection integrated with network security components • Demonstrate how the two together provide greater effectiveness and efficiency in security • Detail how an integrated security stack is instrumental to holistic enterprise-wide security

TOPICS:

Bridging Security Gaps with Networks-to-Endpoint Integration
The typical enterprise uses an average of 30 security products, most of which from variety of vendors and typically do not integrate well and offer little information sharing…if any. Using a portfolio of integrated products from fewer vendors means greater synergies and efficiencies. This is especially true of endpoint security software, where many organizations have long and established relationships with a favorite vendor. This can lead to a sense of complacency, and there may also exist a disincentive to replace software on all of an organization’s endpoint devices, leaving organizations potentially exposed to an evolving threat landscape. Join us for this informative webinar where IDC analyst Konstantin Rychkov will: • Introduce the concept of endpoint protection integrated with network security components • Demonstrate how the two together provide greater effectiveness and efficiency in security • Detail how an integrated security stack is instrumental to holistic enterprise-wide security

TOPICS:

Network Artificial Intelligence to Troubleshoot Telco Cloud
With adoption of Telco Cloud, Diagnostics and Troubleshooting in deployment environment have become more complex and challenging. Traditional operational processes are often falling short of expectations, while the Telco Cloud infrastructure is demanding an operational convergence that requires catering to more heterogeneous infrastructure than ever before. In many occasions, the reported faults of a certain functionality of Telco Cloud are often rooted from An entirely different layer of Infrastructure. Thus, identifying limit conditions, isolating faults, and taking corrective actions require leveraging contextual intelligence. Towards this, Experts are considering to leverage Network Artificial Intelligence to analyze and model the behavior of VNFs and NFV environment, and identify the root causes and corrective actions through this intelligence. This particular webinar focuses on this aspect, and discusses HCL’s solution approach while referring Intel’s some of the recent effort and portfolios around Artificial Intelligence.

TOPICS:

Transforming Cloud Connectivity & Security in Distributed Networks
Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps.   In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security solution enables highly distributed organizations to improve productivity, reduce costs, better manage risk, and streamline compliance.

TOPICS:

Accelerate your Cloud Migrations with simplified networking and security
As Enterprises recognize the value of migrating workloads to the cloud, the pace of migrating their applications from existing environments increases. Large migrations add significant complexity and may end up slowing down the migration process if executed without proper planning. To ensure success, it is important to consider all the factors for migration including current pain points, assessing, and identifying the right tools, and more importantly prepping the new environment in a way that will continue to meet their current needs, scale, and perform at the levels that Enterprise need all while delivering on the promise of the Cloud. This TechTalk will discuss a strategic approach for enterprises to migrate on-prem workloads to the cloud. This includes prepping the new environment with an Enterprise-grade Architecture using the Aviatrix cloud network platform and accelerating the migration using cloud migration tools. Solutions Architects from both Aviatrix and Digital States will focus on migrating to AWS Cloud using Digitalstates Cloud Migration Accelerator (DCMA) to speed up that process.

TOPICS:

Palo Alto Networks + AWS Immersion Day
Participe de uma experiência de laboratório prático imersivo de 2 horas com especialistas da Palo Alto Networks (PANW) e Amazon Web Services (AWS). Este workshop focará nos princípios modernos de segurança nativa da nuvem e na proteção de ambientes AWS com o Prisma Cloud. Durante o workshop, você aprenderá como a plataforma Prisma Cloud facilita a redução de riscos por meio de uma estratégia de segurança do código à nuvem, abordando continuamente vulnerabilidades em todo o ciclo de vida do aplicativo. O laboratório prático incluirá o uso das integrações nativas da plataforma com a AWS para identificar e remediar caminhos de ataque perigosos. Este evento é ideal para profissionais técnicos, arquitetos de segurança em nuvem e qualquer pessoa que trabalhe nas áreas de SecOps e DevSecOps.

TOPICS: