Back to Search Begin New Search Save Search Auto-Notify

View Full Calendar

On-Demand Webcasts

Upcoming Events

Location + Refine Your Search

Agency + Refine Your Search

Organizer + Refine Your Search

Focus + Refine Your Search

Category + Refine Your Search

Back to search

Zero Trust for the Cloud Era: New Use C...
Zero trust is increasingly a guiding principle for modern cybersecurity programs. With an ESG survey finding that for 51% of enterprise respondents it’s the top driver of adopting zero trust - ahead of reducing the number of cybersecurity incidents and supporting Digital Transformation - there’s no denying that zero trust is now central to cybersecurity modernization. You may ask: ‘Weren’t organizations starting to impl...
January 26, 2022
Organizer: Gigamon
Location: Webcast
Add Favorite
The Rise of Ransomware: Planning for Wh...
Think your backups are a panacea for ransomware defense? Think again. Traditional backups are no longer enough and despite ransomware being a popular business model for cybercriminals for years, it’s gaining relevance with supply chain attacks, and big game hunting - attacks on enterprises - are increasing. Graff, JBS, Colonial Pipeline and software manager Kaseya are just some of the businesses held to ransom recently. With Colonial pay...
January 19, 2022
Organizer: Gigamon
Location: Webcast
Add Favorite
Cloud Migration: Who Is Responsible For...
Fingers crossed, life is starting to get back to normal, and the winning streak cloud-based services saw as a result of the pandemic shows no sign of slowing down as businesses move to embrace hybrid and ‘work from anywhere’ models. Yet despite the numerous benefits of the rapid migration to cloud - collaboration where previously there were silos ranking near the top - the stark reality is that cyber security for the cloud era is f...
January 12, 2022
Organizer: Gigamon
Location: Webcast
Add Favorite
Understanding TLS Decryption: Deploy Yo...
The final webinar in our three-part Tech Talk series on TLS Decryption provides practical advice on how to seamlessly deploy a decryption solution to effectively combat malware threats from encrypted traffic.You’ll learn everything you need to know about implementation, including: Planning Validation Integration
November 9, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Understanding TLS Decryption: Design Yo...
This Tech Talk webinar on designing a decryption solution to reduce malware threat is the second in a three-part series on TLS Decryption.You’ll learn how to create a solution that centrally decrypts encrypted traffic to eliminate blind spots, frees up tools capacity and complies with privacy needs, including: Requirements Architectures Best practices
November 2, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Improving Management and Protection of...
Virtualization remains at the forefront of the data center, and is extending into the cloud to enable true hybrid and multi-cloud environments. These environments are being augmented by new technologies, including containers, software-defined storage, networking, and other capabilities. Operations are looking for ways to optimize all aspects of their virtual environment.In this webinar, we will discuss: Lessons about network traffic visibility...
October 5, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Securing the Hybrid Cloud: Visibility B...
With the move to cloud and the multitude of approaches, your ability to effectively monitor and secure workloads gets even more difficult. IT complexity, the rate of change, lack of skills, and organizational silos have made confidently managing security and performance nearly impossible. Join our session for a discussion of the security considerations for on-prem private, public and hybrid clouds. You'll learn best practices and see how a lit...
August 11, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Supporting a Hybrid Data and Analytics...
In the modern era, analytics are everywhere and provide organizations with mission-critical business, operations, and technology metrics providing directional guidance. Tools must be accessible to everyone from hardcore data scientists to citizen developers. Hybrid complexity adds a greatly increased attack surface, more vulnerabilities and more threats from more bad actors than ever before. Full visibility, 24/7 availability and unlimited sca...
August 10, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Profiling and Posturing your IoMT Network
The world is constantly changing and now more than ever, already pushed-to-the-brink IT departments are being called upon to help their organizations continue their transformation efforts, to reshape the end user computing experience, and to ensure that IT is secure, compliant, and financially sustainable. Legacy approaches to modern problems may still have a place, but as IT leaders and professionals work to ensure that their platforms are su...
August 3, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Securing the Hybrid Cloud: 5G Networks
5G networks, almost by definition, are hybrid cloud networks. Any company adopting 5G is in effect adopting a hybrid cloud model. As mobile network service providers launch their 5G services around the world starting with radio access network (RAN) deployment followed by the core network; security vulnerabilities, including preventing or mitigating their effects, are top of mind. Whether the network functions and services are physical, virtual...
July 27, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Back to Search Begin New Search