Snyder On Security: An insider's guide to the essentials

News

Snyder On Security: An insider's guide to the essentials

These session tracks feature hands-on advice from one of the brightest minds in the industry and the highest rated speaker at our previous Information Security Decisions. You asked for him, and we've brought him back for an entire track. Benefit from the first-hand advice of Dr. Joel Snyder, senior partner with consultancy Opus One and technical editor for Information Security magazine.

Sessions available for download (click title to download slides) include:

Network Access Control: Who's on First?
Speaker: Dr. Joel Snyder, senior partner, Opus One
The term NAC, network access control, has risen to the top of the buzzword heap. In fact, every security vendor now has a "NAC solution," even though there's little agreement on what NAC means and some refer to NAC in a slightly different way. NAC touches on a range of issues, like network security, policy enforcement, end point security, and admissions control. In this session, Snyder gives a vendor-neutral and hype-free presentation on what NAC can and should mean, along with a roadmap on the most significant NAC architectures.
For more information: Read Network access control: Compliance enabler or detractor?

2006 Update on SSL VPNs: Security without Complexity
Speaker: Dr. Joel Snyder, senior partner, Opus One.
Secure remote access to corporate networks has emerged as an absolute requirement for every group in an organization. Meanwhile, IPsec remote access vendors have not kept up the pace to match these requirements. SSL VPNs represent a new force in remote access that is gaining increasing acceptance as a better and more versatile way to solve the remote access puzzle. By relying on the Web browser and providing a diverse set of solutions to different remote access challenges, SSL VPN products are helping IT groups meet the demand for secure access without compromising security.
For more information: Visit our SSL VPN resource center.

6 Steps to Selecting the Right IPS
Speaker: Dr. Joel Snyder, senior partner, Opus One.
Network Intrusion Prevention Systems (IPS) can be extremely effective pieces of your overall network security strategy. However, the IPS marketplace is filled with products that all do very different things and are suitable for very different environments. Simply throwing any IPS into the network without careful consideration can be a costly error, both in terms of capital outlay and operational provisions. In this session you learn six key steps to deciding on the right IPS for you.
For more information: Visit SearchSecurity.com's Network Intrusion Prevention resource center.

Firewalls of the Future? Understanding Unified Threat Management
Speaker: Dr. Joel Snyder, senior partner, Opus One.
The term Unified Threat Management (UTM) has as many meanings as there are products that carry that label. At its core, UTM brings together three main ideas: multiple security features, integrated on the basis of a mature firewall, deployed in an appliance form-factor. The intuitive appeal of UTM is obvious. Why should businesses have two (or three or four) boxes performing separate functions, when a single box will do? It sounds like UTM is a no-brainer, but it's actually not right for every organization. This session provides a strong understanding of UTM and shows you where UTM can bring the greatest value.
For more information: Attend the SearchSecurity.com webcast Understanding unified threat management.


Go to the full listing of sessions
Go to Track 1: Proven Tactics to Repel Emerging Threats
Go to Track 2: Enhanced Identity and Access Management
Go to Track 3: Achieving Compliance: A Real-World Roadmap


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
 

COMMENTS powered by Disqus  //  Commenting policy