Tech Talk Tuesday: Webinar Round Up for 8/3

Happy August, and happy (#TechTalkTuesday)! If you've been having a hard time keeping track of webinars, we're here to round up the best webinars from our partners for you in one convenient spot. Check out the round up below:


 
paloalto34.png
 

Palo Alto Networks

Why Branches In Financial Services Need Next-Gen SD-WAN
When: August 18, 10 AM PDT

Financial branch offices have adopted WAN solutions to ease their evolving demands, allowing SD-WAN to shine in supporting branch transformation and maximizing investments. Register for the upcoming webinar to learn about the various challenges faced by financial institutions and best practices in connecting and securing branches to improve customer experience.


 
MenloSecurity-logo.png
 

Menlo Security

Prioritizing Steps on Your Path to SASE
When: August 11, 12 PM PDT

Modern businesses are shifting to the cloud and focusing on digital transformation, and SASE is becoming a common solution in aligning security and networking architectures. Learn how to properly approach SASE in phases in order to securely achieve business goals.


 
ciscologo175.png
 

Cisco

Secure Agile Networks for a Multicloud and Distributed World​
When: August 11, 11 AM SGT

In an increasingly distributed, multicloud world, it can be difficult to address network priorities while driving business value. See how Cisco Catalyst and DNA Enterprise Stack can help simplify control, increase visibility, and improve connectivity and security all in the pursuit of secure agile networks for a cloud first world.


 
gigamon175.png
 

Gigamon

Ransomware Loitering Presents an Opportunity for Network Detection
When: On-Demand

Ransomware attacks are shifting tactics from quick and opportunistic attacks to a prolonged and targeted approach in order to encrypt as many critical data as possible. However, this also allows security teams more time to detect harmful activity before data is encrypted. Hear how security analysts effectively employ network detection and response to pinpoint malicious activity before disaster occurs.