A Better Defense: Does Modern Security Fit With Modern Attacks?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The typical security network structure consists of many working parts, but is that enough to protect the modern business from modern cyber-threats? Well, the number of successful attacks would suggest not. So where can things be improved? One way is to consider software-defined segmentation and how it can replace the firewall to give you a competitive advantage for security.

In this webinar, a panel of experts will discuss the state of the firewall from its origins to its modern use points and ask if it is really still fit for security needs or whether the future of security requires a more dynamic solution.

Key takeaways:

  • How you can use software-defined segmentation and what benefits it can bring to security strategies
  • Why you don’t need to rip out your old firewalls but also why you should consider investing in other technology rather than spending more on firewalls.
  • Why you need to consider monitoring of outsourced services

Speakers

Photo of Torry Crass

Torry Crass

Cyber Security Advisor, vCISO at Woodstar Labs

Photo of Dave Klein

Dave Klein

Senior Director of Engineering & Architecture, Guardicore

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.