Search Results for: network

The state of network security - How to leverage SASE to protect your business
How is your business leveraging Secure Access Service Edge (SASE) to manage network breaches, ransomware attacks, and hybrid-work challenges? In our webinar we will outline the cloud-native SASE deployments that can help to protect your business from new security risks related to the pandemic and digital transformation. We will also share findings of our brand new research report on the state of network security in 2021. Join Barracuda network security experts to hear the strategies and solutions IT decision makers are deploying to defeat attacks, protect their networks, and secure hybrid working model.

TOPICS:

TechTalk | Stop Unseen Malicious Behavior in Your OCI Network
Native cloud networking obscures the visibility cloud security professionals need to successfully monitor network traffic. As a result, security engineers are faced with the challenge of stopping malicious behavior that they cannot see. Find out how Aviatrix Site2Cloud and OCI Dynamic Routing Gateway improves visibility, security, scalability, and reliability in your OCI network.

TOPICS:

[APAC] Scalable, Automated Network Threat Detection in Action
Join this webinar to see how you can secure your network against advanced persistent threats (APTs) requires greater visibility to detect actors and their actions so that you can reduce your response time. Combining machine learning, rules-based detection, and threat intelligence to analyse network, user, and host activity, MistNet is a scalable network threat detection solution with flexible deployment options. Key takeaways include: •Automating threat detection with MITRE ATT&CK. •Maximising network threat detection with NDR. •Scaling network threat detection. •See MistNet NDR in action. Join Dan Crossley, Enterprise Sales Engineering Manager at LogRhythm and Garry Wilson, Solutions Architect at Sapphire, for our introduction to MistNet NDR by LogRhythm in partnership with Sapphire!

TOPICS:

Toward Real-time Intrusion Detection In Cyber Networks
Real-time intrusion characterization in cyber networks is a highly complex problem that requires network-informed anomaly detection tools for success. Dynamic analysis of network traffic features provides a means for detecting anomalies related to novel intrusions, however, is challenged by data storage, real-time querying, and processing constraints. Since a large proportion of features are irrelevant in determining specific intrusion characteristics, efficient algorithms can be constructed, based on bespokely selected features. In this talk, we discuss a variety of current computational methods, and their pitfalls, for selecting real-time feature subsets over a range of different network attack types. In doing so, we highlight a novel capability being developed at Sandia National Laboratories for network traffic intrusion detection

TOPICS:

5 Ways to Achieve Cost Optimization with Network Automation
Building a cost-effective infrastructure is priority number one for network teams everywhere. Whether you’re addressing simple service requests or deploying new applications, workloads are being spread across different teams. Network automation can streamline your business process and help you save big. Watch our webinar to learn how network automation can reduce costs through: o Rapid and error-free application deployment using single automation workflow o The reuse of workflows to address mundane tasks o The optimization of network infrastructure by auto-decommissioning unused configurations

TOPICS:

Skype Operations Framework & Network Readiness (APAC Timezone)
Microsoft just announced the Skype Operations Framework (SOF) - which incorporates network pre-assessment. This session will take a deep dive in to how the program can be used to deliver and effective and reliable Skype for Business Deployment. One of the most critical elements in a successful UC deployment in the cloud or a hybrid environment is ensuring the IT infrastructure is optimized to cope with the demands of real-time communications. However, organizations often fail to pre-assess their network and UC environment and later find out during deployment the network is unable to handle the demands, causing a poor user experience. Join us to learn more about the new SOF and network pre-assessment requirement.

TOPICS:

Skype Operations Framework & Network Readiness (EMEA Timezone)
Microsoft just announced the Skype Operations Framework (SOF) - which incorporates network pre-assessment. This session will take a deep dive in to how the program can be used to deliver and effective and reliable Skype for Business Deployment. One of the most critical elements in a successful UC deployment in the cloud or a hybrid environment is ensuring the IT infrastructure is optimized to cope with the demands of real-time communications. However, organizations often fail to pre-assess their network and UC environment and later find out during deployment the network is unable to handle the demands, causing a poor user experience. Join us to learn more about the new SOF and network pre-assessment requirement.

TOPICS:

Let me show you VMware's Network and Security vision and strategy
Networking and security components should be defined and consumed in software. NSX is a key building block of the Virtual Cloud Network, which allows VMware customers to connect and secure applications and data across private, public, and edge/branch clouds. Virtual Cloud Network has a scale-out architecture that delivers consistent, pervasive connectivity and security for apps and data wherever they reside.

TOPICS:

Let me show you VMware's Network and Security vision and strategy
Networking and security components should be defined and consumed in software. NSX is a key building block of the Virtual Cloud Network, which allows VMware customers to connect and secure applications and data across private, public, and edge/branch clouds. Virtual Cloud Network has a scale-out architecture that delivers consistent, pervasive connectivity and security for apps and data wherever they reside.

TOPICS:

Change Automation: Turning Network Security Alerts into Action
You use multiple network security controls in your organization, but chances are, they’re not talking to each other. And while you probably get alerts from SIEM solutions and vulnerability scanners, responding to them feels like a twisted game of whack-a-mole. So, if manual, error-prone changes are insufficient for your multi-device, multi-vendor hybrid network, what’s the solution? Simple: Network security change automation. On Wednesday 14th April, 17:00 GMT, the ISF will be joined by Leslie McIntosh, Senior Engineer, AlgoSec for a webinar exploring how enterprise-wide change automation can transform your network security policies—without replacing existing business processes: 1. Comprehensive Change Automation: Increase agility, accelerate incident response, and reduce compliance violations and security misconfigurations 2. Smarter Security, Part 1: Automate security policy changes without breaking core network connectivity 3. Smarter Security, Part 2: Analyze and recommend changes to your network security policies 4. Smarter Security, Part 3: Push network security policy changes with zero-touch automation to your multi-vendor security devices 5. Use What You’ve Got: Maximize ROI of your existing security controls by automatically analyzing, validating, and implementing network security policy changes

TOPICS: