Ladies and gentlemen,
we listen carefully to what our customers say and we try to satisfy your opinions, remarks and especially needs. That is why we are starting the implementation of the idea of sharing our expert knowledge - we start with a series of meetings entitled "Knowledge that inspires - especially in times of crisis".
At the beginning, we have prepared 4 meetings of various forms (workshops, life shows, presentations, etc.). They will always be practice-oriented and conducted by experts. Details of the next ones soon.
We invite you to a common space with full-fledged and up-to-date knowledge of cybersecurity. We want to create not only a place for gaining knowledge, but also for checking it or building a community that substantively supports its participants.
CEO of Apius Technologies SA
"Yes, our company uses cloud solutions." - How to understand such a statement? Does it mean that the company uses applications served in the SaaS model? Maybe the point is that the company uses IaaS or PaaS services provided by a public cloud provider such as AWS or Azure? Or maybe it creates its applications based on serverless class technologies, e.g. Fargate or AWS Lambda? Or is it about using containers under the control of some variety of Kubernetes orchestrator?
The cloud has many forms and the answer to this question will be different for each company or institution. The variety and complexity of this class of environments is a factor that significantly hinders their effective protection. For this reason, as part of our webinar, we will show how to ensure a consistent, single point of supervision over the security of various cloud environments. You will learn, among other things, how:
number of seats: 23/50
The star of the meeting on November 24 will be network security in the world of containers launched within Kubernetes. Three lecturers representing companies: Apius, Tiger and Arista will provide comprehensive knowledge in this area, taking into account its various aspects. We will focus on the approach to designing security policies and monitoring network traffic between containers using Calico Enterprise. Can you build secure networks?
See what Tiger's technology will give you - a demo of a solution using the security mechanisms offered by Calico Enterprise.
In the webinar program:
We invite you to the next webinar as part of our series. This time we will focus on File Access Management, i.e. managing access to files, regardless of where they are processed (local servers, NAS arrays, Cloud environments). We will present a comprehensive approach to file protection, from inventory and classification, owner determination, application of security mechanisms, to generating reports and alerts.
The presentation will be supplemented by a live demonstration, during which the possibilities of implementing individual stages of protection implementation will be presented from the tool console.
The proposed workshops are in the form of Attack and Defend and can be described as a virtual "war room". Enjoy a unique gameplay experience that gives you an insight into the Red Team and Blue Team strategies in action, allowing you to play as an attacker and create a better defense plan. Everything in practice, full of emotions and under the supervision of experts.
Number of participants - 20 people. We will confirm participation by phone each time.
Splunk ITSI is a top-class ITSM solution that offers numerous functionalities, not only in the field of monitoring itself, but also in the field of broadly understood event analytics.
During the webinar, our experts will present how this tool can be used to effectively manage the enormity of information from monitored systems in large-scale environments. So as not to miss any important event on the one hand, and on the other - to significantly reduce the number of threads, grouping them into a logical whole.
Mechanisms will be presented, such as: event correlation, thread aggregation or linking similar IT incidents.
As a result, participants will find that by aggregating thousands of events into a finite number of threads, monitoring can be even more effective than with the classical approach.
Prisma Cloud Compute Edition (former Twistlock) - the future. Do developers, system and application operators love this solution?
During the webinar, participants will supplement their knowledge about container solutions. Then they will see in a lab environment, in practice - how Prisma Cloud Compute Edition differs from the traditional approach to application security.
They will also learn what the shift left security is, i.e. how to take care of the security of the application at the stage of its development and not only at the stage of its maintenance. Attentive observers will also notice that the container control policies are dynamic and use machine learning. We will also convince you that the test run of Prisma Cloud Compute Edition is not only low-labor, but also safe for the application.
The transition to cloud solutions and remote work has added more tasks and topics to be solved for managers and members of IT teams in companies. We know how to get access to engineers who are experts in dozens of technologies, have dozens of professional certificates, and are always available when needed. The problem of sick leaves, holidays, shortage of jobs or other random events will cease to matter.
Your team will breathe a breath, focus on priorities and tasks will be carried out on time and of high quality.
At the meeting, we will suggest how to strengthen your position in the company as an important and efficient part of an organization that is flexible and effectively achieves its goals. Everything in an accessible form of cooperation and an attractive financial formula.
We propose to transfer knowledge to practice. During the workshops, you will broaden your knowledge about the possibility of automating and organizing processes in SOC / NOC - in particular:
How to standardize the handling of events of various types with the use of appropriate tools,
How to relieve the staff of repetitive and low-development tasks and enable them to focus on those activities that have the greatest value for the company,
Where in the event handling process there are opportunities to shorten the time (reaction / problem solution) thanks to the use of automation,
Is SOAR a security tool only, and will it also handle other types of tasks?
And above all - we will try to show that thanks to the SOAR class solution, it is possible to handle more events per day without the need to increase the size of the SOC / NOC team.