Supporting Event: Joint ICT Christmas Party (14 Dec 2018)

Supporting Event: Joint ICT Christmas Party (14 Dec 2018)

Joint ICT Christmas Party Date:  14 Dec 2018 (Fri)Time:  5:45-7:00pm (registration starts at...

Modern Endpoint Security (5 Dec 2018)

Modern Endpoint Security (5 Dec 2018)

Modern Endpoint Security Date: 5-Dec 2018 (Wed)Time: 7:15pm - 9:00pmVenue: ADC 203, HKU SPACE...

Supporting Event: Building Your Open Source Intelligence Capabilities (7 Nov 2018)

Supporting Event: Building Your Open Source Intelligence Capabilities (7 Nov 2018)

Building Your Open Source Intelligence Capabilities Date:  7 Nov 2018 (Wed)Time:  09:30 -...

  • Supporting Event: Joint ICT Christmas Party (14 Dec 2018)

    Supporting Event: Joint ICT Christmas Party (14 Dec 2018)

  • Modern Endpoint Security (5 Dec 2018)

    Modern Endpoint Security (5 Dec 2018)

  • Supporting Event: Building Your Open Source Intelligence Capabilities (7 Nov 2018)

    Supporting Event: Building Your Open Source Intelligence Capabilities (7 Nov 2018)

(ISC)2 APAC Secure Webinar - Security at Network Speeds

Date: 18 Apr 2018 (Wednesday)
Time: 14:00 Hong Kong  (Duration: 1 Hour)
Registration: https://www.isc2.org/News-and-Events/Webinars/APAC-Webinars?commid=312817
Fee: Free of charge to members and non-members

Highlight:

Exponentially increasing network traffic volumes and security tool sprawl are overwhelming security operations and network operations teams. A network packet broker is supposed to eliminate complexity and save costs, not add to them!
 
Organizations need to:
•    Deliver just the right data to the right tools.
•    Drive consolidation across their security stack.
•    Manage a common platform across physical, virtual and public cloud environments.
 
Hence, a next-generation network packet broker is required to deliver visibility to security tools focused on threat prevention, detection, analytics and forensics. The right tools get the right traffic at the right time, every time.
 
Attend this webinar to learn how to:
•    Maximize tool performance and ROI by applying advanced traffic intelligence.
•    Rapidly detect and respond to new threats while eliminating security tool sprawl.
•  Have pervasive and consistent visibility across their physical, virtual and cloud infrastructure.

NOTE: 1 CPE will be submitted automatically to the (ISC)² members' accounts (Member ID required)