Take Advantage of Advanced Threat Protection Available in Next-Generation Firewalls

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Next-generation firewalls include embedded threat protection features, such as IPS, which enable Information Security to stay ahead of increasingly advanced threats. Yet migrating and optimizing next-gen firewalls puts an undue burden on IT or information security teams, according to a recent survey conducted by Skybox Security. 

To truly reduce risk and reap the advanced protection next-generation firewalls, you need to evolve risk assessments, fine-tune IPS signatures, and mature your next-generation firewall platforms. 
This webinar will look at:
  • Tips to shorten and optimize the migration to a mature next-gen firewall deployment
  • Best practices for upgrading to next-gen firewall operations 
  • How to move into ‘active protection’ mode


Jeremy Bergsman

Practice Manager, CEB

    Andrew Buss

    Service Director, Freeform Dynamics

      Michelle Johnson Cobb

      Chief Marketing Officer, Skybox Security

        Sean Keef

        Security Consultant, Skybox Security

          Stephen Pritchard

          Freelance Writer, Infosecurity Magazine

            Brought to You by

            Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s privacy policy for additional information.