Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Webinars

Oct 19, 2021

IT security teams are rapidly learning that an effective cyber defense means gaining a better understanding of attackers and the methods they use. In this Dark Reading webinar, top experts offer insights on how your organization can use emerging tools and practices such as threat hunting and threat intelligence to learn more about potential adversaries and proactively identify potential attacks. Attendees will also learn how they can combine these tools and practices to create an even more effective defense.

Oct 27, 2021

This unique, information-packed event looks at some of the key strategies an IT organization will need to consider as it moves into the SASE generation of technology and services. Leading SASE technology developers, service providers, and IT practitioners who have pioneered this new wave of networking and how it works in real-world IT environments will provide their latest insights and recommendations.

Oct 28, 2021

Through hyper automation, RPA is swiftly becoming a valuable platform for advancing business process like inventory management, financial reporting, service desk management, and more. It is transforming previously manual tasks by allowing such offerings as self-service catalog ordering, accelerated software development, and automated HR and back-office operations. Join us as our experts discuss how automation is changing the workforce and improving efficiency.

Nov 02, 2021

Credential theft, lateral movement and other cyber attack tricks have foiled perimeter security again and again. We know that the old philosophy of trusting everything and everyone inside a network is no longer sound. The zero-trust model - trust nothing, verify everything - is the proposed answer to this problem. But it's easier said than done in real enterprise. At this webinar, learn what zero-trust really looks like in practice, how to overcome challenges along the way, what security benefits you'll realize right away, and how your organization can take the first steps toward implementing a zero-trust model.

Nov 03, 2021

Creating secure code is crucial to enterprise application development. But many application developers resist taking extra security steps because they add extra work and time to the development process. In this Dark Reading webinar, application security experts discuss ways to speed and automate the process of developing secure code by using next-generation tools and processes. For cybersecurity practitioners, this webinar offers insight on attractive, practical ways to add security to the development process. For application developers, this webinar offers recommendations on ways to integrate security into the development process while improving both security and efficiency.

Nov 09, 2021

Multi-Factor Authentication (MFA) can be a highly effective way to safeguard your organization's data, but that doesn't mean it's unhackable. And nobody knows that better than award-winning author and Data-Driven Defense Evangelist at KnowBe4, Roger Grimes. While researching his most recent book Hacking Multifactor Authentication, Roger tested over 150 MFA solutions. And he wants to share what he learned with you! Join Roger as he discusses the good, the bad, and the ugly lessons he learned from his research. He'll share with you what works, what doesn't, and what you should absolutely avoid.

Nov 11, 2021

Maybe it's not time yet to start "quantum-proofing" (and maybe it is), but that doesn't mean your encryption strategy doesn't need a refresh. If your organization is like most enterprises, you've likely purchased or adopted a wide variety of encryption tools and capabilities over the years. But does this mixture of technologies and strategies really ensure that your most sensitive data is protected? How are you managing encryption keys across all of your systems? How do you make encryption work across your own infrastructure, as well as the infrastructures of your service providers? In this webinar, experts discuss a variety of tools and strategies for implementing and managing enterprise encryption, and how you can not only implement next-generation encryption technology, but make better use of what you already have.

On-Demand Webinars

2021-10-06 13:00:00 EDT

When organizations need to protect their on-prem networks, IT departments typically turn to old, legacy hardware boxes. These hardware boxes are expensive, hard to manage, and slow. To complicate matters further, legacy approaches to connectivity (re: MPLS) and security (re: on-prem firewalling and DDoS ‘scrubbing centers’) just don’t work for today’s distributed workforce and cloud-hosted applications.

Between cloud app adoption growth and the work-from-home mode of operation becoming part of business as usual, the Internet is mission-critical: to share data, solve challenges, and stay connected. But as the importance of the internet increases so too do the risks of cyber threats and network demands.

Join this informative webinar where you will hear experts discuss the death of network hardware appliances and how cloud-native architectures can help you continue to provide secure, enterprise-class connectivity.

2021-06-10 13:00:00 EDT

Enterprises want and need the flexibility to use multiple cloud providers. Reasons range from business continuity requirements to localized data governance to simply avoiding vendor lock-in. As such, they require database solutions that can be easily deployed, scaled, and managed across any public cloud.

2021-05-06 13:00:00 EDT

Modern business runs on highly distributed applications used by a highly distributed workforce. As such, centralized connectivity and security approaches of old break down. Many organizations are now turning to Secure Access Service Edge (SASE), which can converge network and security into a unified, global cloud-native service. 

2021-04-28 13:00:00 EDT

The fast pace of application development, deployment, and continuous modification in business today requires a flexible and dynamic infrastructure to support DevOps and NetOps activities. Most companies use a hybrid cloud infrastructure, which matches these requirements. The challenge is how to manage this infrastructure to ensure performance and security needs are met. 

2021-04-20 11:00:00 EDT

Today's hybrid cloud architectures render traditional application performance troubleshooting and monitoring methods obsolete. Compounding matters, the wide-scale use of microservices and containers, and the adoption of continuous integration (CI) and continuous delivery (CD) principles mean constant change making it increasingly harder to pinpoint issues. During this Network Computing webinar we’ll discuss these issues and more.