Filtering By Tag 'Webinar'x clear filter
This webinar recording will dive deeper into what sets Wi-Fi 6 apart and explore other ways that it can help enhance your organization’s network.
Aruba Networks has been driven to help organizations reimagine the workplace for a post COVID-19 world. Watch the webinar to see how organizations can leverage their existing Aruba solutions for contact tracing, an essential part of a business reopening plan.
With remote work being a much larger part of our workplace now than it was just a few months ago, organizations need to think differently about protecting data in motion, securing connections, and minimizing the risks of attackers penetrating their network.
Watch the webinar to learn how to quickly and seamlessly secure remote access for your organization and deploy additional security components.
Aruba Networks has been at the forefront of helping organizations respond to the initial challenges of working remotely and now their new contact tracing solution will enable schools to safely allow in-person learning. Watch the webinar to learn how Aruba Networks is helping educational institutions leverage their existing Aruba infrastructure to implement new contact and location tracing technology.
Join Vandis and our Mobility engineers as they explore ArubaOS 8 and how it is engineered to deliver enterprise grade performance and mission-critical reliability for deployments of all sizes. During this demo, you will see the step-by-step process of using ArubaOS 8 to enable live upgrades without disruption to your production wireless infrastructure.
The Domain Name System (DNS) is the address book for the entire internet. Your organization's internal DNS knows the IP address for every device on your network. When you request a domain is outside of your network, your request moves through a firewall and onto the internet. Attack techniques such as tunneling and malicious domain generation allow bad actors to utilize the DNS to compromise your network in a way that is difficult to detect and even more difficult to resolve.
TTPs, or Tactics, Techniques, and Procedures, framework the most effective modern threat hunting. Since they are descriptive, they characterize what adversaries are doing, and exactly how they are doing it. Although these characteristics are derived from individual incidents, they can be helpful in developing contextual understanding across a general threat landscape
A Verizon Report recently found that far more breaches are stemming from identity tactics than network vulnerabilities. Watch this webinar to learn how addressing identity technology can deter hackers and insider threats to better protect your organization.
Within the past two years, the number of non-signature based attacks has increased significantly. These attacks, like name impersonations and domain lookalikes, have become so sophisticated that they're nearly impossible to tell apart from the real thing. Watch this webinar to learn how to better secure your mailboxes with IRONSCALES.
Businesses are turning to third-party vendors to help conduct day-to-day operations. While that often allows for the most efficient use of resources, it presents a challenge: how do you ensure that your third-party vendor's business practices are as safe and secure as your own?
Watch the webinar to see why current methods for measuring vendor security fall shot, and how to get a full picture of their security posture.