Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Webinars

Jul 13, 2022

In this special presentation, our experts will examine the growing intersection between the Employee Experience and the Digital Employee Experience. We'll also reveal what today's IT professionals must focus on as they look to a future of changing and expanding workplace responsibilities.

Jul 14, 2022

From Darkside, to Lockbit, to Conti, ransomware gangs pulled off many headline-making attacks in the last year and they have evolved their techniques to become more stealthy and sophisticated when targeting organizations. In this webinar, experts walk you through the steps these gangs and affiliates often take to breach a network and then move around, undetected, in preparation for a future ransomware attack. We will then examine which tools and strategies should be put in place in order to defend against the disruptive and damaging incidents.

Jul 19, 2022

It's hard enough to prevent employees from coughing up their login credentials to phishers. But what happens when the hackers go straight to your enterprise password stores? This session will teach you how to store your enterprise passwords securely.

Jul 21, 2022

The Cortex Xpanse research team has uncovered new data in our study of the global attack surface. From December 2021 to June 2022, we monitored scans of 50 million IP addresses associated with 100+ global enterprises, and we discovered new information on industries with active RDP exposures. See where your organization's attack surface stands compared to other industries. Armed with knowledge, be proactive in discovering your unknown assets and exposures in order to build resilient security operations. Join now to learn more about the global attack surface and your own.

Jul 26, 2022

Cyber attacks by external adversaries are damaging, but it's your trusted users - those who know your systems and data best - who can truly wreak havoc in your enterprise. In this webinar, experts discuss methods for detecting and preventing risky or anomalous end user behavior, as well as methods for preventing unauthorized access and transfer of data by end users. You'll also get insight on the evolution of technology used to prevent accidental data leaks, such as data leak protection (DLP) and alternatives.

Jul 28, 2022

Advances in networking and new technologies have expanded the possibilities of deploying applications at the network edge. These edge devices bring with them their own security management challenges and risks. How do you scale your security to manage the sheer number of devices on the edge? In this webinar, experts discuss how to decide whether to move to the cloud or deploy to the edge. You will learn strategies and technologies for building out the edge securely and to manage the new workloads and applications effectively.

Aug 02, 2022

The COVID-19 pandemic transformed enterprises into remote workplaces overnight, forcing IT organizations to revamp their computing and networking strategies on the fly. Some of the changes were intended to be temporary, and some rules were adopted without thinking through all the implications. With businesses moving to permanent work-from-home and hybrid work models, enterprise IT teams need to rebuild their security strategies and switch off temporary rules and controls. In this webinar, experts discuss how to rethink the remote computing architecture and adjust the rules to consider remote networking and access, all the while giving users safe access to corporate systems and data.

Aug 18, 2022

At this virtual event, you'll get a better picture of today's threat landscape; learn what tools and techniques can best help your organization detect and prevent these attacks; design a thorough incident response plan that will help your organization survive a successful attack intact; and be prepared with a fast answer to the age-old question: "to pay or not to pay?"

On-Demand Webinars

2022-06-09 13:00:00 EDT

Businesses today need real-time insights into application performance, user experience, and security risks. Increasingly, they are turning to tools and services that aggregate, analyze, and derive insights from log, trace, and telemetric data generated by numerous sensors and point solutions. In this webinar, our specialist will explore the tools and techniques to help shine a light into all the shadowy parts of your network infrastructure.

2022-04-26 13:00:00 EDT

Security has historically been bolted onto traditional network architectures as an afterthought. With the shift to everything-as-a-service, legacy security appliances can become bottlenecks to scale and agility. Perimeter-based security models require all network traffic to trombone through specific Internet exit points, impacting SaaS application performance. Security needs to evolve from a bottleneck to an enabler for the next wave of digital transformation. Our experts will be covering the fundamentals of network SECaaS in this new webinar.

2022-04-07 13:00:00 EDT

In an ever evolving and expanding threat landscape, organizations cannot rely on traditional network security. Organizations need to mitigate risks and protect their network through the use of proactive, cloud-based and machine learning approaches. And, when it comes to security containers, it's a whole new ball game. Join this webinar to learn from front-line examples on how to protect your container deployments.

2022-03-30 13:00:00 EDT

For decades, enterprises have searched for networking solutions that would provide remote workers and distributed offices with secure and reliable connectivity to conduct business. Due to the pandemic's disruption, requirements have changed rapidly. At the same time, cyberattacks have continued to evolve and become more pervasive and even more dangerous.

In this webinar, you will find that, increasingly, what is needed is a WAN approach that focuses on security based on a zero-trust strategy. Such an approach will accommodate today's work-from-anywhere business operations and support whatever happens in the future.

2022-01-26 13:00:00 EST

Protecting core applications and sensitive data in a private cloud requires the agility of cloud-centric, cloud-delivered security to converge with Zero Trust Enterprise Architecture principles.

The time to secure your applications, users, and devices is now.

Join this webinar where we will share pragmatic approaches to implementing Zero Trust architecture for enterprise private cloud.

In this session, we’ll explore how to align next-generation virtual firewalls with Zero Trust identity of users, applications, and devices, while securing transaction flows that make up the critical life-blood in your Private Cloud or Virtual Data Centers.