Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Webinars

Sep 29, 2021

The annual Black Hat USA 2021 in Las Vegas featured a full slate of cybersecurity researchers presenting. They offered up discoveries about new critical security vulnerabilities, new threats, and new security tools that enterprise defenders need to know about as they plan their road maps and adjust their strategic priorities for the future. Join us for the webinar for an overview of the ten hottest presentations and learn about some of the key trends explored by researchers, including supply chain security issues, the use and abuse of artificial intelligence in cybersecurity and other business applications, the latest in social engineering and disinformation, and the goings-on within organized threat groups.

Sep 30, 2021

Endpoint security continues to evolve. The increasing complexity of the threat landscape means we can no longer depend on next-gen antivirus (NGAV) or EDR (Endpoint Detection and Response) alone to protect against sophisticated attacks. It's well known that endpoint attacks are a common and frequently used entry point for attackers to move laterally to other valuable network assets. The good news is that there is a way to get more endpoint security with less effort, it's called eXtended Detection and Response (XDR), and it's available today. XDR is a common sense approach that recognizes that endpoint security must work seamlessly with other security controls, including identity, network, and email to defend against attacks. XDR provides a more holistic and effective approach to threat response. And endpoint security plays a pivotal role in XDRs ability to deliver more simplicity, visibility and efficiency to SecOps teams. Join Cisco security and their customer as they discuss how XDR helped protect their endpoints better with less effort.

Oct 05, 2021

Data storage strategy isn’t just about where you put your data, it’s about how you use your data. As more organizations expand into hybrid cloud environments, they are taking another look at requirements for speed, security, sustainability, retrieval rate, retention/destruction and data governance. What data is right for multiple clouds, and what isn’t? How can you prevent potential data exposure and breaches when managing multiple clouds? Learn more and get better prepared with this InformationWeek webinar.

Oct 06, 2021

Cyber experts agree: Data cannot become more secure until end user authentication goes beyond the simple password. But what are the right tools and strategies for authentication in your organization? How can you move beyond the password and implement next-generation authentication technology? In this webinar, experts offer a broad look at your options for multifactor authentication, the challenges and pitfalls of these options, and how to develop an authentication strategy that works best for your enterprise.

Oct 07, 2021

To defend themselves effectively, companies need to detect ransomware attacks early, gather the intelligence to understand the attack and prevent attacks from occurring in the future. In this webinar, Shailesh Athalye, EVP Product Management will discuss ransomware trends, defensive maneuvers and discuss the inspiration and research behind Qualys' new Ransomware Risk Assessment service that provides companies with a hyper-personalized plan to remediate the vulnerabilities in their environment.

Oct 12, 2021

Every day, enterprises deploy application code that contains critical security vulnerabilities - because those flaws went overlooked or unrecognized by the application development team. How do these vulnerabilities escape the development process? In this Dark Reading webinar, top application security experts outline some of the most commonly-occurring vulnerabilities and offer insight on how and why these flaws are introduced during software development. Attendees will learn about tools and practices for eliminating these vulnerabilities, and receive advice and recommendations on how to improve the development process to find and fix application security flaws - before the code is deployed.

Oct 19, 2021

IT security teams are rapidly learning that an effective cyber defense means gaining a better understanding of attackers and the methods they use. In this Dark Reading webinar, top experts offer insights on how your organization can use emerging tools and practices such as threat hunting and threat intelligence to learn more about potential adversaries and proactively identify potential attacks. Attendees will also learn how they can combine these tools and practices to create an even more effective defense.

Oct 27, 2021

Over the past two years, the concept of secure access service edge (SASE) networking has taken the IT industry by storm, causing many enterprises to rethink their network architectures and their fundamental approach to wide area network security. This unique, information-packed event looks at some of the key strategies an IT organization will need to consider as it moves into the SASE generation of technology and services. Leading SASE technology developers, service providers, and IT practitioners who have pioneered this new wave of networking and how it works in real-world IT environments will provide their latest insights and recommendations.

On-Demand Webinars

2021-06-10 13:00:00 EDT

Enterprises want and need the flexibility to use multiple cloud providers. Reasons range from business continuity requirements to localized data governance to simply avoiding vendor lock-in. As such, they require database solutions that can be easily deployed, scaled, and managed across any public cloud.

2021-05-06 13:00:00 EDT

Modern business runs on highly distributed applications used by a highly distributed workforce. As such, centralized connectivity and security approaches of old break down. Many organizations are now turning to Secure Access Service Edge (SASE), which can converge network and security into a unified, global cloud-native service. 

2021-04-28 13:00:00 EDT

The fast pace of application development, deployment, and continuous modification in business today requires a flexible and dynamic infrastructure to support DevOps and NetOps activities. Most companies use a hybrid cloud infrastructure, which matches these requirements. The challenge is how to manage this infrastructure to ensure performance and security needs are met. 

2021-04-20 11:00:00 EDT

Today's hybrid cloud architectures render traditional application performance troubleshooting and monitoring methods obsolete. Compounding matters, the wide-scale use of microservices and containers, and the adoption of continuous integration (CI) and continuous delivery (CD) principles mean constant change making it increasingly harder to pinpoint issues. During this Network Computing webinar we’ll discuss these issues and more.

2021-04-13 13:00:00 EDT

In today's world, more now than ever before, enterprises are looking to accelerate their digital transformation efforts to accelerate delivery and drive innovation.  Central to this movement is hybrid cloud, automation and AI.  In this webinar, we will dive into combining existing on-premises business critical infrastructure with off-premises public cloud resources, cloud-native development with Kubernetes and Red Hat OpenShift, automation with Red Hat Ansible and real-world use cases.  Come join us to learn more about building an open, flexible hybrid cloud platform infused with automation that provides an approachable and incremental path to modernize applications with new cloud-native technologies and drive business growth.