Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Dec 01, 2021

One of the most effective and proven way of dealing with such large and complex volume of data is with the help of modern Big Data Analytics workloads solutions using Artificial Intelligence (AI) techniques, implementing Machine Learning (ML) algorithms. In fact, enterprises across the world are embracing an “AI-first” approach. Register for this webinar to learn how your enterprise can mature analytics capabilities and become more data-driven.

Dec 02, 2021

In this webinar, we'll be covering the state of network optimization and tools and techniques for troubleshooting.

Dec 07, 2021

A good patch management process can help make your enterprise data more secure. But what does it do for vulnerabilities that haven't been patched? Attackers are increasingly manipulating open-source, third-party components in software -- do you have a process to find and repair those bugs? In this webinar, top experts will update you on the latest critical applications vulnerabilities and provide advice on how you can scan, detect, and remediate new vulns on an ongoing basis.

Dec 07, 2021

The proliferation of encryption as a means of securing data in transit has significantly impacted SecOps teams’ visibility into their environments. As more organizations move to protect their data internally by enabling encryption on traffic moving laterally, the visibility gap continues to increase leaving large blindspots for attackers to operate in. While many organizations understand the necessity of maintaining visibility into encrypted traffic, the solutions are difficult and costly to implement. In this webinar we will discuss how to advance SecOps’ ability to monitor encrypted traffic within your organization’s network.

Dec 08, 2021

Join Omdia, Black Hat and Dark Reading at this free, all-day virtual event offering expert insight on the cyber-threats and trends enterprises will face in the coming year. On December 8, Cybersecurity Outlook 2022 will look at some of the new threats posed by online attackers, as well as evolving products and technologies that may mitigate those threats. You'll hear from some of the cybersecurity industry's top thinkers, as well as researchers who have been studying the next wave of cyber vulnerabilities and exploits.

Dec 09, 2021

Does the year ahead hold significant promise for IT and Security teams, or does the upheaval caused by COVID-19 and the spike in cyberattacks continue well into 2022? As threat actors continue to evolve, what should security teams look out for and how should security executives prepare to ensure their organization doesn't become the subject of the next news headline? Please join Qualys CISO, Ben Carr and Director of Malware Threat Research, Travis Smith for a discussion covering emerging trends.

Dec 14, 2021

It's a sad truth: not all employees are nice. Corporate espionage, sabotage and other security incidents could be committed or aided by any insider with something to gain. How do you know when a once-trustworthy employee is about to do something malicious? How can you identify anomalous behavior among your users? Most of all, how can you prevent employees from taking cyber actions that might hurt your enterprise's business? In this webinar, experts discuss methods for detecting and mitigating malicious insider threats, and for preventing users from using their trusted positions to threaten your data.

Dec 15, 2021

Over the past few years, cyber attackers have favored exploits in which they steal a legitimate user's credentials and then navigate enterprise defenses as a trusted end user. This "lateral movement" enables the attacker to quickly gain access to a wide variety of applications and data, and can lead to a major data breach. In this webinar, experts discuss methods for recognizing anomalous and unauthorized behavior among trusted users, and how to prevent those "users" from gaining access to critical information. You'll also learn how to limit trusted users from accessing systems or gaining privileges that their roles don't require them to have.

On-Demand Webinars

2021-10-06 13:00:00 EDT

When organizations need to protect their on-prem networks, IT departments typically turn to old, legacy hardware boxes. These hardware boxes are expensive, hard to manage, and slow. To complicate matters further, legacy approaches to connectivity (re: MPLS) and security (re: on-prem firewalling and DDoS ‘scrubbing centers’) just don’t work for today’s distributed workforce and cloud-hosted applications.

Between cloud app adoption growth and the work-from-home mode of operation becoming part of business as usual, the Internet is mission-critical: to share data, solve challenges, and stay connected. But as the importance of the internet increases so too do the risks of cyber threats and network demands.

Join this informative webinar where you will hear experts discuss the death of network hardware appliances and how cloud-native architectures can help you continue to provide secure, enterprise-class connectivity.

2021-06-10 13:00:00 EDT

Enterprises want and need the flexibility to use multiple cloud providers. Reasons range from business continuity requirements to localized data governance to simply avoiding vendor lock-in. As such, they require database solutions that can be easily deployed, scaled, and managed across any public cloud.