This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

it-sa 365: Logo Cisco
Launch Days Technology I

Threat Intelligence meets DNS

Which attacks do you miss? - Why DNS-level security is your starting point for the best defense against threats must be.

calendar_today Tue, 06.10.2020, 13:45 - 14:00

event_available Digital

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Cloud Security Endpoint Protection Mobile Security Network Security / Patch Management SIEM / Threat Analytics / SOC Websecurity / VPN

Event

This action is part of the event Launch Days

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Today, employees work from anywhere - from co-working environments and cafes to Home office - and use networked devices and cloud applications to rebuild their working days design and define. This is excellent for productivity and efficiency - but at the same time the network security is strained to the utmost. Furthermore, gaps and Weak points are created as employees move further and further away from the "conventional office". 79% of organizations are increasing direct Internet access (DIA) and SaaS adoption to 60% in the next two years, so they will recognize that, while the old approach has worked in the past, it is not sufficient for today's networks. Security experts need a simpler and more reliable method to improve visibility and security for distributed improve environments and users, both inside and outside the network. Hackers are alert and combine today's technological innovations with their mad creativity. They switched from attacks that aim to steal data, to blackmail, which instead blocks users from accessing their data when they do not pay a ransom. They manipulate files and sabotage software and devices to influence stock values or make websites illegible. They use Zero-Day-vulnerabilities, intercept and hack online credit card transactions in a fraction of a second, And also they attack networked devices ranging from surveillance cameras to smart watches, skateboards and even Cars. ... read more

Language: German

Questions and Answers: Yes

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.