Take Advantage of Advanced Threat Protection Available in Next-Generation Firewalls

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Next-generation firewalls include embedded threat protection features, such as IPS, which enable Information Security to stay ahead of increasingly advanced threats. Yet migrating and optimizing next-gen firewalls puts an undue burden on IT or information security teams, according to a recent survey conducted by Skybox Security. 

To truly reduce risk and reap the advanced protection next-generation firewalls, you need to evolve risk assessments, fine-tune IPS signatures, and mature your next-generation firewall platforms. 
This webinar will look at:
  • Tips to shorten and optimize the migration to a mature next-gen firewall deployment
  • Best practices for upgrading to next-gen firewall operations 
  • How to move into ‘active protection’ mode


Photo of Jeremy Bergsman

Jeremy Bergsman

Practice Manager, CEB

Photo of Andrew Buss

Andrew Buss

Service Director, Freeform Dynamics

Photo of Michelle Johnson Cobb

Michelle Johnson Cobb

Chief Marketing Officer, Skybox Security

Photo of Sean Keef

Sean Keef

Security Consultant, Skybox Security

Photo of Stephen Pritchard

Stephen Pritchard

Freelance Writer, Infosecurity Magazine

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.