Join Carolina Advanced Digital, Inc. for:
Top 5 Security solutions you haven’t heard of but need
Or – What you don’t know CAN hurt you!
With new IT security initiatives and refocus of budgets, stay ahead of the curve with these top notch security solutions.
Join us on April 18, 2017 for a technical overview of how these key partners help secure your data.
• Aruba Clearpass: Adaptive Trust for Mobile and IoT with ClearPass – See a live demo and UI Flows using ClearPass and a review of integration with Infoblox.
• Infoblox: Data Exfiltration – It Could be Present and You Don’t Know It. Visibility into compromised devices attempting outbound connections via DNS.
• HPE: Enterprise Data Security, IoT Solutions –Bringing HPE Format-preserving Encryption (FPE)
to the extensive data flows creased by IoT.
• Acunetix: Web Application Security – with cutting-edge vulnerability scanning technology.
We said 5… Join us to hear about our 5th Top Security Solution!
Agenda:
8:30-9:00am- Check-in & Continental Breakfast
9:00-10:30am- Aruba ClearPass Overview-Securing the Network and IoT
10:30-12:00- Infoblox- Data Exfiltration (DDI: DNS-DHCP-IPAM)
12:00-12:30- HPE Overview- Data, Application security
12:30-1:00- Acunetix Web Application Security with vulnerability scanning
1:00-2:30- Networking lunch with Presenters and Peers
- May 15th: NCHICA Spring Forum on Cybersecurity, we’re sponsoring and will be in attendance
- May 16th: Planning for Digital Transformations & IoT in Healthcare presented by HPE and Carolina Advanced Digital
Tuesday, May 16, 2017 | |
8:30-9:00 am | Registration |
9:00-10:00 am | Finding the ‘Right Mix’ of IT in a Hybrid World (Kevin Shabow, HPE) |
10:00-11:00 am | Digital Transformation of Healthcare (Tim Study, HPE) |
11:00-12:00 pm | Designing Healthcare’s Intelligent Edge (Jennifer Minella, Carolina Advanced Digital) |
12:00-1:00 pm | Lunch |
You’re invited to join Carolina Advanced Digital and Zscaler for our “It Starts with Zero” webinar on Thursday. May 19 at 10:00am ET
Zero trust is based on the principle that no entity—user, device, or application—should be inherently trusted. Instead, access is granted using identity and business policy, and it changes based on context. By removing access and security from the constructs of the network, zero trust reduces complexity and increases security.
Join us for a discussion on the topics below:
- Modernizing your network to reduce technical debt and cut networking costs for internet-bound traffic
- Strengthening security posture by implementing a zero trust approach
- Empowering work from anywhere with a better user experience and more visibility
- Securely providing corporate access to any user on any device from any location
- Promoting alignment between IT objectives and business initiatives
Thursday, May 19, 2022, 10:00am-11:00am ET
Register Today: https://bit.ly/3iUHY1d