"Featuring Forrester Research: Is Your Network Ready for Next-Gen Secure Access?"

"The reality for today’s IT administrators has shifted from a world of IT-controlled datacenters and endpoints to a hybrid of BYOD mobility, cloud services, and datacenter applications. While basic VPN solutions provide simple connectivity to the datacenter, Next Generation Secure Access is needed to help IT oversee and control a hybrid world that delivers a seamless enterprise user experience to workers with the latest apps and services.

Join guest speaker Tyler Shields, Principal Analyst – Forrester Research, and Kevin Sapp, VP of Strategy – Pulse Secure, for a 60-minute webinar where you will learn about:

1. The changing landscape of secure access and why you need to reevaluate your current access needs
2. The gap between basic VPN and Next Generation Secure Access
3. How you can bridge the gap and implement Next Generation Secure Access tools and solutions into your network "
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Mitigate Identity-Related Breaches in the Era of Digital Transformation

KuppingerCole

Cyber attackers continue to be successful in gaining access to many different organizations, often by exploiting identities and weak authentication. To ensure they are protected, organizations should consider modern Adaptive Authentication techniques to increase identity security and thwart attacks.
Watch Now

Bug Bounties and How They Help

Trend Micro

Once a vulnerability becomes known to cybercriminals, the race is on for vendors to create a patch before it is exploited. And with the regular use of exploits in attacks and threats like the WannaCry ransomware using a vulnerability, getting the win has never been so crucial. This month we will cover the bug bounty marketplace, including the different types of markets available to vulnerability researchers. As well, we will review Trend Micro Research and how their research can benefit organizations through responsible disclosure and pre-disclosed filters to virtually patch vulnerabilities.
Watch Now

Identify Early Warning Indicators with Managed Detection and Response

Join Vectra’s Director of Consulting Analysts Jonathan Barrett on 22 June 2022 at 8 AM PDT I 17:00 CEST as he explains how Sidekick MDR finds early warning signs of malicious activity and enhances the built-in learning.
Watch Now

Introduction to Kubernetes Security

Aqua

Kubernetes is fundamentally a complex system with lots of different potential attack vectors aimed at data theft, currency mining and other threats. Liz Rice, a renowned technology evangelist, will take us through an overview of the current state of security-related features in Kubernetes, and offer directional starting points on how to secure Kubernetes components and the applications that run on top of these Kubernetes components. Brice Fernandes, software engineer and entrepreneur at Weaveworks, will then demonstrate how you can build a secure and reliable Kubernetes deployment pipeline with GitOps best practices, separating the responsibility between packaging software and releasing it to a production environment.
Watch Now