Breaching the External Network Security Perimeter

Network security device vendors have done a good job of preventing or minimizing external attacks on enterprise network infrastructure by adding a range of capabilities to their products, such as access control, IPS, VPN, DLP, antivirus, and other threat prevention measures. Now attackers are looking for innovative ways of gaining access to valuable enterprise data. We will explore various techniques attackers employ to bypass protections and gain access to an internal network—having no special resources other than information publicly available over the Internet.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Amazon Web Services Networking

ipSpace

Traditional networking engineers entering the world of Amazon Web Services for the first time often feel like Alice in Wonderland. Everything looks and sounds familiar, and yet it all feels a bit different – ACLs sit in front of servers instead of on a router, there is no router, NAT happens somewhere behind the scenes, each subnet has its own routing table.
Watch Now

Securing IT, OT, IoT & 5G Critical Infrastructure from Cyberattacks

Critical infrastructure has a very broad definition and impacts many various companies. The industry is also consistently being targeted by hackers and ransomware exploits in North America. Join our upcoming webinar to break down what’s going on, impacts in the industry, the mindset of a hacker to help keep your company safe, and outline how Sectrio can keep you out of the headlines
Watch Now

Three tips you need to know for Comprehensive User Experience Assurance in 5G

COVID-19 has changed our lives and forced us to think alternative ways to accomplish our daily routines. There is no going back to the old normal. 5G has experienced a big boost as the demand for remote working and improved communications have been paramount for business continuity.
Watch Now

Nokia Educational Series - Evolution of voice from VOLTE to 5G

Nokia

The evolution of voice from circuit to voice over VoLTE requires the implementation of IMS. What happens to voice with the introduction of 5G? Happily, IMS is advertised to be “access transparent” so no big deal, right? Or is it? The reality isn’t quite as clean as the advertising might lead you to believe. In this Webinar we will discover the evolution from a VoLTE network to a Voice over 5G network and the interim steps and the migration period it will require. Join us to discuss some of those special cases and migration steps in this webinar.
Watch Now

Spotlight

resources