29 past events found
+ 1 on-demand webcast found
Back to Search Begin New Search Save Search Auto-Notify
Tech Talk Tuesdays | Arbor Edge Defense...
One of the biggest threats to maintaining Continuity of Operations is a DDoS attack. Tom will discuss: (1) the evolution of modern DDoS attacks; (2) technical vulnerabilities of on-premise devices such as VPN gateways, firewalls and application servers to DDoS attacks; and (3) demonstrate the technical features of Arbor Edge Defense that enable it to be the first and last line of an automated perimeter defense
August 4, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Tech Talk Tuesdays | Enhancing Visibili...
The flexibility and ease of deployment of SD-WAN has accelerated its deployment as new network edges emerge for large enterprise and government entities as MPLS continues to be prevalent within the Federal ecosystem. Tory will discuss: (1) Remote site monitoring solutions for MPLS; (2) Utilizing vSTREAM Family of Virtual Appliances for maintaining visibility in SD-WAN environments; (3) Deployment options for vSTREAM within uCPE of SD-WAN or Pu...
July 28, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Stop your Firewall from Burning: How to...
Today, even the largest purpose-built security appliances can't decrypt all SSL/TLS traffic without impacting network performance. And with encrypted traffic increasing significantly, you have an inspection gap that limits the effectiveness of many security features. If you virtualize the security stack, you create an architecture that is completely flexible to the features and inspection you need. But, it must be turnkey so you can streamline...
July 22, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Tech Talk Tuesdays | Cloud Migration
Cloud migration is a complex endeavor for even the most experienced of IT professionals. Patrick will discuss: (1) The AWS “Well Architected Framework” whitepaper; (2) How Smart Data and NETSCOUT Threat Intelligence Solutions can help improve operational efficiency, lower costs, improve performance, and build Security into any Cloud environment; and (3) technical best practices for monitoring cloud migrations and cloud implementations.
July 21, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Threat Intel Virtual Workshop with Crow...
Federal agencies are working tirelessly to keep our nation and its most precious assets safe from an unrelenting and increasingly complex stream of cyberattacks. As our adversaries are getting more sophisticated with their approach and methods, public and private sector organizations alike are fighting hard each and every day to stay one step ahead of attacks. Join experts from CrowdStrike and GuidePoint Security for an informative threat inte...
July 15, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Tech Talk Tuesdays | Monitoring VDI Env...
The Virtual Desktop Infrastructure continues to evolve its mission critical application status as organizations of all types realize the importance of enhanced user mobility and remote access. Paul will discuss: (1) Common challenges of access; poor user experience; and application issues; (2) How to use network visibility to understand and manage your VDI environment; and (3) Best Practices for Instrumentation.
July 14, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
A Better Approach for Agencies to Put S...
The recent shift towards DevOps makes it clear that Federal agencies are moving forward with adopting this operational model to facilitate the practice of automating development, delivery, and deployment of mission-critical software. While the traditional idea of a software release dissolves into a continuous cycle of service and delivery improvements, agencies find that their conventional approaches to software security are having a difficult...
July 14, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
An AppSec Awareness Program for Develop...
Today, agencies are striving to improve their application security programs, while at the same time, not slowing down the development, delivery, and deployment of their software applications. Can a balance be achieved between security and an organization’s (or agency’s) daily business requirements? We know it’s possible. Application Security (AppSec) Awareness Programs that are specifically focused on the development communit...
July 14, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Defending Your New Perimeter from Next...
It is more important than ever to protect the availability of networks, security and application infrastructures to maintain continuity of operations. As government employees and contractors are continually accessing job essential applications from remote locations, new vectors of attack are emerging. One of the biggest threats to maintaining continuity and continuity of operations is a DDoS attack. Join Tom Bienkowski, Director, Product Marke...
May 14, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
What do agencies need to do to protect...
Federal contractors and subcontractors are being breached at alarming rates, resulting in the loss of sensitive data. To address this challenge, agencies like the Department of Defense are turning to new cybersecurity requirements for contractors, including the Cybersecurity Maturity Model Certification (CMMC). How can agencies continuously monitor security performance within their contractor and subcontractor ecosystem? How should they work w...
January 22, 2020
Organizer: DLT, a Tech Data company
Location: Webcast
Add Favorite
Back to Search Begin New Search