47 past events found
Back to Search Begin New Search Save Search Auto-Notify
Public Sector & Healthcare Debriefs: Ex...
Throughout 2020, ransomware increasingly threatened organizations in every industry worldwide – and the threat continues. In the 2021 Global Threat Report, CrowdStrike outlined a vast, interconnected eCrime ecosystem with criminal adversaries existing to support enterprise ransomware operations. Many of these adversaries specialize and work in concert with each other, combining malicious services, ransomware distribution methods and mone...
March 30, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Using CrowdStrike for Software Savings
Since CrowdStrike collects a vast amount of benign meta-data, there are many non-security use cases you can tap into such as: Enterprise Software usage across the Organization. Identify unused software licenses aka “shelf-ware” to save money Identifying RPA (Robotic Process Automation) tasks across my users. i.e. finding menial and repetitive tasks end-users do and replace them with bots Finding Insights on Application Issues / Cra...
March 16, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Protecting Our Nation’s Election Infras...
Across the globe, elections are under threat of manipulation and interference. Adversaries increasingly attempt to use offensive cyber operations to directly affect political outcomes. From intelligence collection and “hack and leak” campaigns to election infrastructure targeting, nation-state adversaries around the globe see election interference as a means to advance their national security and political interests. Although diffe...
October 22, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Tech Talk Tuesdays | Arbor Edge Defense...
One of the biggest threats to maintaining Continuity of Operations is a DDoS attack. Tom will discuss: (1) the evolution of modern DDoS attacks; (2) technical vulnerabilities of on-premise devices such as VPN gateways, firewalls and application servers to DDoS attacks; and (3) demonstrate the technical features of Arbor Edge Defense that enable it to be the first and last line of an automated perimeter defense
August 4, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Tech Talk Tuesdays | Enhancing Visibili...
The flexibility and ease of deployment of SD-WAN has accelerated its deployment as new network edges emerge for large enterprise and government entities as MPLS continues to be prevalent within the Federal ecosystem. Tory will discuss: (1) Remote site monitoring solutions for MPLS; (2) Utilizing vSTREAM Family of Virtual Appliances for maintaining visibility in SD-WAN environments; (3) Deployment options for vSTREAM within uCPE of SD-WAN or Pu...
July 28, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Stop your Firewall from Burning: How to...
Today, even the largest purpose-built security appliances can't decrypt all SSL/TLS traffic without impacting network performance. And with encrypted traffic increasing significantly, you have an inspection gap that limits the effectiveness of many security features. If you virtualize the security stack, you create an architecture that is completely flexible to the features and inspection you need. But, it must be turnkey so you can streamline...
July 22, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Tech Talk Tuesdays | Cloud Migration
Cloud migration is a complex endeavor for even the most experienced of IT professionals. Patrick will discuss: (1) The AWS “Well Architected Framework” whitepaper; (2) How Smart Data and NETSCOUT Threat Intelligence Solutions can help improve operational efficiency, lower costs, improve performance, and build Security into any Cloud environment; and (3) technical best practices for monitoring cloud migrations and cloud implementations.
July 21, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Tech Talk Tuesdays | Monitoring VDI Env...
The Virtual Desktop Infrastructure continues to evolve its mission critical application status as organizations of all types realize the importance of enhanced user mobility and remote access. Paul will discuss: (1) Common challenges of access; poor user experience; and application issues; (2) How to use network visibility to understand and manage your VDI environment; and (3) Best Practices for Instrumentation.
July 14, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
LA County Elections Goes Digital with N...
LA Country Registrar-Recorder/County Clerk’s Office embarked on an aggressive path to improve the voter experience for over 5.4 million registered voters spanning 4,100 square miles and 13 different languages. Named “Voting Solutions for All People” (VSAP), this initiative brought over 30,000 digital ballot marking devices and 8,000 digital pollbooks to be deployed across nearly 1,000 voting centers. Learn how Cherwell helped...
July 14, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Defending Your New Perimeter from Next...
It is more important than ever to protect the availability of networks, security and application infrastructures to maintain continuity of operations. As government employees and contractors are continually accessing job essential applications from remote locations, new vectors of attack are emerging. One of the biggest threats to maintaining continuity and continuity of operations is a DDoS attack. Join Tom Bienkowski, Director, Product Marke...
May 14, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Back to Search Begin New Search