As the market moves towards more flexible, intelligent and programmatic networks, Juniper is delivering network security solutions for service providers and enterprises cloud builders who need uncompromising performance and availability and low tolerance for intrusions. In this session, you'll learn about Juniper's dynamic, intelligent firewall solution, including the use of deception techniques to thwart miscreants in the reconnaissance phase of an attack.
EIT ICT Labs is an initiative of the European Union and its mission is to drive European leadership in ICT innovation for economic growth and quality of life. The EIT ICT Labs Privacy, Security & Trust Action Line provides funding and practical business support to enterprises and startups in the cyber security and privacy arena. Communication Valley Reply presents it services Active Fraud Prevention and IDENTITYOU, marketed in EU thanks to EIT ICT Labs support. The services provide effective mitigation to the whole malware / web fraud lifecycle from detection to recovery. The services exploit malware and breach detection techniques to provide something useful to the world.
Attackers are constantly adapting their tools, techniques, and procedures as they seek to exploit new technologies and new vulnerabilities. This session takes an up-to-date look at the underbelly of cybercrime and current threat actors based on recent insight from RSA's Research and Threat Intelligence teams: who are the latest targets, how are they perpetrating their attacks and how can you calibrate your defense strategies to incorporate up-to-date intelligence for more proactive defense.
Adoption of cloud computing is one of the most transformational shifts in technology today. Yet, protecting applications and data in the cloud is very much a challenge. A new data-centric approach is protect against today's sophisticated attacks is needed in the Data Center and the Cloud. This session covers how Data Center Security protects businesses' most valuable assets, describes different cloud deployments and their security risks, and it addresses the required evolution of security posture of these assets for better protection (and compliance).
Attackers are getting more targeted evasive and advanced, deploying unknown exploits and unique malware that current day endpoint security is simply not equipped to prevent or even detect. Join Palo Alto Networks as we walk you through the shortcomings of existing endpointsecurity, and why it's leaving your enterprise vulnerable tosophisticated andzero-day attacks,waiting for detection and remediation to step in, which is too little too late.