We believe the network will play an even more critical role in enabling customers to aggregate, automate, and draw actionable insights from highly distributed data, where there is a premium on security and speed.Register now
|1.00PM - 1.50PMTime||The Importance of Threat Intelligence & How Talos Protects Customers||Benny Ketelslegers,
|Download PDF||Talos is the security research and threat intelligence arm of Cisco. In a typical day Talos blocks 20 billion threats and identifies 1.5 million unique pieces of malware. In this presentation, we will present Talos’ threat intelligence capability and discuss several recent threat campaigns observed.|
|1.50PM - 2.40PMTime||Secure Data Center||Christoper Say,
Technical Solutions Architect,
|Download PDF||Data is currency. Data centers need protecting because that is where the money is. The modern Data Center is incredibly complex especially in a multicloud environment. Learn how to secure your data center by having:
- the right security considerations for a hybrid cloud strategy
- application insights with AppDynamics; understanding application behavior with Cisco Tetration Analytics; and visibility across the entire network with Stealthwatch
- Microservices/Application segmentation to reduce the attack surface with NGFW, ACI and Tetration
- threat protection by strategically deploying sensors north-south, east-west with Stealthwatch, Tetration/ACI and AMP
|2.40PM - 3.10PMTime||Break|
|3.10PM - 3.40PMTime||Unlock the Power of Data||Arkar Bo Bo,
Solution Architect, Network and Security,
|The world is changing. Whether you like it or not the Cloud, IOT and Automation Era is here, and challenging businesses every moment. Almost every data we created was analysed by either applications or search engine. Thousands of new applications come out every day. Computing is moving to the Edge through IoT, and is a must for business to remain relevant.
Currently we are seeing challenges in industry IOT solutions in terms of data collection and analysis. In this breakout session, we will discuss the cisco kinetic solution , a platform that can easy to collect, analyse data and make decisions faster and more accurately to get the best business driven data.
And in today’s threat prevalent world, security is no longer a check-in-a-box. New threats surface every day, and the advent of edge computing and IoT meant security need to be relooked at. This session also explore the considerations and solutions to have strong security intelligence to protect your network effectively
|3.40PM - 4.30PM Time||Unlock the Value of Data with Cisco Kinetic||Suresh Venkatachalam,
Senior Manager, Market Development,
|Download PDF||The data produced by all your things is a high-value asset that can change the trajectory of your business - if you can make full use of it. But that can be challenging when you’re working with disparate things and a variety of applications that may live in edge or fog nodes, your data center, private clouds and/or public clouds. This session discusses how Cisco Kinetic makes it easy to connect distributed devices (“things”) to the network — then extract, normalize, and securely move data from those devices to distributed applications to drive business outcomes|
Sorry, no results matched your search criteria(s). Please try again.