Rama Naageswaran, VP, Product, shares Rubrik’s perspective on the Data Security landscape and briefly discusses the strategy to help customers secure and protect one of their most precious assets – their data. Rama provides an intro Rubrik’s Data Security portfolio and vision.
Rubrik – An Origin Story with Soham Mazumdar
Rubrik, the Zero Trust Data Security Company, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including: Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery, and orchestrated application recovery. Rubrik’s Co-Founder and Architect, Soham Mazumdar, gives a brief […]
RackTop Data-Centric Zero Trust Security for Unstructured Data
Jonathan Halstuch, CTO and co-founder, explains why putting the security controls where the data is stored with active defense eliminates threat vectors, cost and complexity. RackTop is the only end-to-end Cyberstorage solution. BrickStor’s active security features detect and stop ransomware attacks and data theft in real time with audit-ready compliance reporting. Learn how BrickStor SP […]
What is RackTop Cyberstorage? Why You Need Data Centric Solutions to Solve Data Centric Security Problems
CEO and co-founder, Eric Bednash introduces RackTop’s cyberstorage technology and explains why data security and storage technologies must be aligned to build cyber-resilient infrastructures.
Automate All the Things with Juniper vSRX and Terraform
Calvin Remsburg introduces the Juniper Terraform (JTAF) providing organizations the ability to leverage the Hashicorp Terraform toolset to standup new infrastructure and security solutions automatically as well as highlighting how automation drives a new level of ease bringing these tools to the orgs existing operational tools in place (i.e., Slack, ServiceNow, etc.).
Protect the Remote Workforce with Juniper Secure Edge
Myo Zarny & Sandeep Rajan present Juniper Secure Edge and Security Director Cloud for all SRX firewall management. Myo and Sandeep showcased the new service Juniper launched in February that introduced the power of the SRX firewall in a consumable service all managed from a single instance of Security Director Cloud.
Profiling Threat Behaviors with Juniper ATP Cloud
Krystle Portocarrero showcases how Juniper ATP Cloud and its Adaptive Threat Profiling brings the power of a customer’s own environmental user activities and events generated to augment threat detection.
Juniper Connected Security Overview with Kate Adam
Introductions to the Juniper team and why Juniper’s Connected Security strategy seeks to make defending the network easier by extending security services to all points of connection from client to workload.
ZPE Demo: Zero Pain Ecosystem – Launching Security Apps from ZPE’s Cybersecurity Platform
In this demo, we will show our enterprise cybersecurity platform that powers what we call the Zero Pain Ecosystem. We will demonstrate the ease of use in securing remote branch locations, by using Horizon3’s NodeZero to launch an automated pen test, and by running a Splunk agent to feed XDR systems. We will conclude this […]
ZPE Demo: Immutable Principles of Branch Deployment
In this demo, we will show you how to overcome supply chain security risks and address ransomware by putting immutable infrastructure principles into action. We will demonstrate how to use SaltStack automation on our out-of-band platform, which we’ll use to build, destroy, and re-build an edge data center — with ease and at scale.
ZPE Introduction: Why Cybersecurity for Enterprise Can’t Be Solved By One Vendor
Cybersecurity vendors are at the top of their game. So why are cyberattacks increasing and becoming more effective? We’ll discuss the modern enterprise’s pain of having too many products, from too many vendors, which leaves too many security gaps. We’ll also discuss why this dynamic attack surface can’t be solved simply by adding more products, […]
Effective Threat Containment with Arista Macro-Segmentation
Segmentation is not a new concept and yet, many organizations struggle to be successful at this key security control due to the implementation complexities. Sachin Vador dives into how Arista’s approach provides a standards-based mechanisms for segmentation while avoiding challenges such as TCAM exhaustion and proprietary formats.
Pervasive Visibility to Deliver Zero Trust with Arista DMF
Visibility is foundational to security, but legacy network packet brokers are broken when dealing with enterprise-wide security threats. Prashant Gandhi will describe how Arista DANZ Monitoring Fabric provides pervasive observability via a modern, programmable monitoring fabric, enabling security analysts and tools with access to any packets/flows at any time in addition to traffic insights.
Arista Awake Labs: Real World Incident Response Case Studies
In this session, Kevin Adams-Romano will share a few examples that illustrate the need for network visibility for effective threat hunting and breach response. The network represents ground truth and with the right combination of people, process and technology, it can offer the early warning signs needed to disrupt attacks ranging from ransomware and insider […]
Detecting Modern Threats with Arista NDR
Networks have become more complex and perimeters have vanished. Yet, we are still reliant on decades-old network security platforms as defenses from modern threat actors. Gary Golomb will discuss the challenges with relying on data sources like NetFlow and present recent innovations in the Arista NDR platform that address those challenges.
Arista Introduction and Security Strategy with Rudolph Araujo
Arista provides visibility, detection and response across wired, wireless, and cloud infrastructure. In this introduction, Rudolph Araujo will talk about Arista’s AI-driven approach to enable the customer’s zero trust journey as well as how the company brings decades of experience to bear for customers through threat research, incident response, and threat hunting solutions.
How to Secure your Secrets with Keeper Security
Since IT network secrets unlock access to highly privileged systems and data, securing secrets is just as critical to preventing cyberattacks as securing end-user passwords. One study found that 75% of ransomware attacks involve compromised credentials – most of the time, RDP credentials. However, secrets management is a challenge for IT teams, who must mitigate […]
Microsoft Security Automate Threat Detection and Response with SIEM+XDR
Today’s threat landscape continues to grow in complexity, sophistication and frequency. As advanced attacks emerge, Microsoft is on the frontlines working with customers and partners. We’ll share the latest technology around our integrated SIEM+XDR solution, to protect your environment end-to-end and get ahead of adversaries.
Microsoft Security Azure Active Directory – Zero Trust
Microsoft defines Zero Trust as a proactive, integrated approach to security across all layers of the digital estate that explicitly and continuously verifies every transaction, asserts least privilege, and relies on intelligence, advanced detection, and real-time response to respond to threats. Nitika Gupta, Principal PM Manager, will cover the lessons we’ve learned across thousands of […]
Microsoft Security Overview with Ryan Mcgee
Microsoft Security is committed to empowering every person and every organization on the planet to achieve more by providing comprehensive protection. It brings together the capabilities of security, compliance, identity, endpoint management, and privacy, designed to work in your multicloud and multi-platform environment. Microsoft Security helps defend organizations around the world against the evolving threat […]