Threat Modeling - Identifying Threats to Network Security

New threat actors are emerging everyday with the explosion of social media, cloud computing and an endless pool of mobile devices. Evolving threat landscape and security trends require a proactive risk mitigation method to defend networks, information assets and users.Do not miss this informative webinar that introduces you to the concepts of 'Threat Modeling' and how to engage threat modeling as a defensive measure against security threats. The session also provides you with knowledge on counter-measures and ways to harden security that help you stay ahead of the threat curve.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Our Vision for 2019, Including Securing SD WAN

Cisco

We live in a cloud-first world. What’s more, that world increasingly leans on multiple clouds for success. Whether it’s public, private or hybrid environments, organisations are leveraging the benefits of the multi-cloud world to drive operational efficiencies, scale quickly and expand growth. Multiple clouds allow for greater flexibility, and the ability to leverage the most appropriate cloud-services from different providers. So - how do you deploy effective security for a multi-cloud world? Join us as we explore how a vision of “visibility and protection everywhere” can be realised to secure access and usage of the cloud, and give organisations confidence that all employees and data are protected.
Watch Now

“Pay-as-you-Protect” Network Protection: How On-Demand Virtualized Infrastructure Can Enhance Network Security

The scale of DDoS and other network attacks are increasing exponentially. Today, CSPs are often addressing this by over-provisioning capacity in proprietary hardware that is scaled for rare peaks that lie unused most of the time. As well as being inefficient, this approach doesn't always guarantee enough capacity for some of the attack types that can be generated today.
Watch Now

4G to 5G Transition Planning - Evolution and co-existence with legacy systems

The adoption of 5G is expected to be very gradual including years of co-existence with previous generation technologies. Thus, internetworking is a must have consideration for any operators who plan to introduce 5G networks or enterprises who look to leverage 5G services. Moreover, during the build out of 5G, interworking with existing systems is crucial to allow operators to offer seamless service delivery both within their own networks as well as for roaming.
Watch Now

Cracking the 5G Code in the Enterprise

Join us for this webinar as we partner up with Celona to discuss CBRS private LTE and what the future holds for private 5G. We’ll hear from Celona co-founder and CTO Mehmet Yavuz who will answer some of the most common questions we get around 5G and the 5 steps to Enterprise 5G. From iBwave, our Product Manager Zachary Elias will review what needs to be considered from a 5G design perspective, what RF coverage looks like and how it differs from other technologies like Wi-Fi.
Watch Now