Sign up for our weekly newsletter!
REGISTER NOW
Webinar Archives
Webinars are free sponsored educational seminars that are accessed over the Internet. You can register for upcoming Webinars or view archived presentations via the links below.
Microsegmentation: A Better Way to Protect Application Workloads & Secure Data
Date: 11/30/2017
Sponsors:
vArmour
View archived webinar

Microsegmentation allows IT and developers a way to decouple security policies from the restraints of physical hardware. By embedding security policies directly into the virtualization layer -- within the hypervisor itself -- microsegmentation offers a much more efficient and practical way to secure workloads. Many enterprise applications still run on legacy machines and non-virtualized bare-metal servers, and sometimes contain the most sensitive data a company can have. Keeping these apps more segregated by limiting the amount of traffic traveling between apps can ensure that someone snooping on a network cannot access the data of an enterprise's most important legacy application. Ideally, customers want a single unified policy and enforcement mechanism that is extensible and portable, for their entire compute estate running on legacy systems, bare-metal servers, virtualized hosts and cloud workloads. Microsegmentation allows customers to achieve this goal and eliminates many of the most vulnerable spots in the application chain.

Agility, Scalability & Automation Enabling Digital Transformation Through the ADC
Date: 10/12/2017
Sponsors:
Radware
View archived webinar

Companies are changing the way business is done through digital transformation to gain a competitive advantage. Effectively, they are utilizing IT innovation to incorporate agility, scalability, and automation to enable services to be delivered digitally through the internet. The application delivery controller (ADC) plays a vital role in this transition, since it supports critical network capabilities necessary for transforming the manner in which companies conduct business in the modern internet age.

Accordingly, this webinar will focus on the role of ADCs and how they enable digital transformation through:

  • Agility Create a flexible network framework to move, add, and update applications quickly and easily
  • Scalability Pool resources within and across datacenters and clouds to deliver real-time on-demand resourcing
  • Automation Integrate policies and tools to automate manual processes to create error-free processes quickly and easily.

Latest Articles
A recently discovered flaw in Microsoft's Office 365 suite could meant that a business's so-called "stealthy admins" could compromise security without even realizing it.
BGPMON researchers have found that Russian DNS servers redirected Internet traffic through Russia several times earlier this month. The question is whether it's a test or a harbinger of things to come.
Of all the breaches, malware and ransomware that security researchers saw this year, WannaCry had the greatest effect, according to Kaspersky Labs.
A pair of researchers from enSilo have disclosed how they created a new vulnerability within Windows-based systems that can compromise NTFS transactions, and the worst part is that security vendors are not prepared.
When it comes to security, how deceptive should enterprises be to thwart cybercriminals? Attivo Networks and a number of other security startups are advocating a different approach.
Flash Poll
upcoming Webinars
A Look Ahead to Security in 2018
Tuesday, December 19, 2017
12:00 p.m. New York / 5:00 p.m. London
here
Information Resources
Video
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with