This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X


Hiding in Plain Sight - What's Really Happening on Your Network

Palo Alto Networks invites you to join us for this exclusive webinar where we will analyze the intertwined relationship between cyber attacks and applications based on recent data collected from over 1,499 networks in Europe, the Middle East, South Africa, Russia and the Baltics.

The Impact of endpoint data growth on corporate visibility and compliance

Did you know that forty-six percent of IT knows or suspects employees are using their individual, non-IT approved cloud accounts to store corporate data?1 Moreover, sixty percent of IT pros say insufficient backup of laptops and desktops is a problem for their organisation—putting them at risk for data loss and non-compliance.2

How to Securely Move to the Digital by Default Services Standard - Are You Prepared?

UK Government is driving more and more of their critical transactional businesses online. This transition to a digital by default methodology is fraught with challenges and risks which are often not clearly understood.

Feeling confident in today's mobile environment

Today we live in a world without boundaries, where we are always connected and therefore, always need to be secure. Mobile devices, including smartphones, laptops, and tablets connect people to their work 24 hours a day. With our increased connectedness comes increased risk.


Defending Against the Rogue: Technology Solutions to Address unwanted Users, Devices and Applications

Securing your network against unwanted and unknown threats has become mission critical. Many organisations, however are in the dark as to what is on their network - making it impossible to control access and mitigate risk.

Cybersecurity - Best Practices for Protecting Identities and Assets

Cybersecurity, or more accurately cybersecurity breaches, have been in the headlines for months now. Headlines aside, threats are increasing in number while also becoming more sophisticated. Join us for this webinar to learn more about about the types of threats that exist and how you can defend against them.

Hunting Attackers with Network Audit Trails

Find out how to detect sophisticated cyber attacks using network logging technologies (e.g. NetFlow and IPFIX). See how you can use these technologies to create an audit trail of network activity.

A Malicious Insider's Guide to Compromising Encrypted Networks

IT administrators and external contractors are trusted insiders with privileged access rights that often times have the broadest access to organization's critical business information, which is usually transmitted in encrypted form. This blinds forensic teams from knowing what exactly they are actually doing, posing a potential threat.

Applications Matter; So Should Application Security

Join Matt Schofield and Jason Smith to understand how NTT Com Security and F5 Networks are applying both process and technology to help customers create and maintain an application security strategy designed not to obstruct the business.

Sign up to our newsletters