Presented by Aruba & Structured
In an ever-expanding era of corporate mobility, IoT, BYOD, and more, learn how to manage and control device connectivity in a simple, secure and dynamic way.
Presented by Aruba & Structured
In an ever-expanding era of corporate mobility, IoT, BYOD, and more, learn how to manage and control device connectivity in a simple, secure and dynamic way.
Presented by Xiologix
In this presentation, we will do a quick review of the current state of ransomware and then jump right into proactive approaches utilizing the latest tools to prevent and combat this growing threat. We will include a discussion of identifying attack vectors, network defenses, storage defenses, asset management, SOC, incident response, and the benefits of each.
Presented by Illumio
You rely on the network to deliver applications. But as IT scales in size, connectivity, and environments outside the network to public cloud, we cannot rely solely on the network to secure applications. The answer is to decouple security segmentation from the network. This allows us to protect applications wherever they run –because they do not live exclusively on our networks anymore, and enforcement must go wherever they do.
During this informative session, we’ll discuss:
Presented by One Identity
Managing elevated and shared access credentials is one of the biggest challenges facing complex heterogeneous organizations today. Administrators must be able to access the systems they manage with sufficient rights to do their jobs, but organizations must control that access to ensure security and regulatory compliance. The days of administrators sharing accounts and passwords and operating without auditing are gone (or they should be).
Large enterprises face unique challenges. They too must control the use of elevated privileges, but they need to find ways to enhance authentication for these accounts to meet mandates while still enabling administrators to administer. Even with multifactor authentication to “check out” a privileged account or session, we still need to take steps to mitigate potential account compromises–making sure the admin that authenticated today is still who they say they are. We’ve come to the point where we need to continuously analyze administration by watching normal behavior and comparing it to current behavior – with real-time in-line remediation to add a powerful layer of risk mitigation.
Presented by INTERFACE Advisory Council
As more companies have to interact with cloud to drive their business forward, more do so without truly understanding security and the long-term ramifications in doing so. Join our experts for an in-depth discussion. This session will talk about what things we wish we knew before moving to the cloud. Bring your questions for this interactive discussion!
Presented by Fortinet
Come join our talk on mitigating cybercrime and learn about best practices to help your company maintain a strong security posture through the digital transformation and beyond. The bad guys are using automated tactics to try to find a foothold in your network. Isn’t it time to leverage an integrated security approach to automate your response?
Presented by Cerium Networks
Today’s collaboration technologies come with many exciting features and benefits–all of which impact the network in various ways. This session will help the audience understand those impacts and how to manage them. This session covers everything from inter-branch communications, survivability, collaboration beyond your walls, and ensuring your collaboration environment is secure.
Topics include:
Presented by Silver Peak Systems
Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.
Presented by SoftwareONE
Overspending in cloud infrastructure is a common challenge. Learn why costs get out of control and methods to help control the spend.
Presented by Star Leaf & Netrix
The presentation will go over the complexities of a successful video/collaboration environment from a technical and physical perspective. We will discuss the technology, psychology of, and successful adoption of Video Conferencing in the workplace. One size does not fit all and equipment must be scaled appropriately. We will also go over the recommended beta/installation program and what that looks like.