Citrix Tech Insight Demo Video: Micro VPN

Traditional VPNs grant the entire device access to backend resources. With the micro VPN, which is part of Citrix EndPoint Management, a single , per app VPN gives access to a specific app backend resource.

View Now

Citrix Tech Insight Demo Video: Access Control for StoreFront

Access Control for StoreFront integrates SaaS and web apps into an on-premises StoreFront deployment. When integrated, users can access the SaaS and web apps from StoreFront and have the following capabilities:

  • SSO to SaaS apps.
  • Enhanced SaaS app security.
  • URL filtering within SaaS apps.

View Now

Citrix Tech Insight Demo Video: Microapp Overview

Learn how Citrix Workspace Intelligence allows users to be more productive through the use of microapps. Microapps leverage publicly available APIs within SaaS, web, legacy, and homegrown applications to allow users to view information and perform actions without launching the full application.

View Now

Citrix Virtual Apps and Desktop Service is the platform of choice

Today’s IT departments are under pressure to reduce costs and embrace cloud agility, while being asked to manage an ever increasing list of desktop, web and mobile applications. Citrix virtual apps and desktops is the platform of choice for Enterprise IT. Giving administrators robust tools to simplify management of complex environments.

View Now

Citrix SD-WAN improves your Microsoft Office 365 experience

Organizations today need a modern network. One that is cloud ready and can deliver the best experience for all types of apps, whether SaaS, cloud or virtual. With Citrix SD-WAN a poor quality Microsoft Office 365 experience in remote sites is a thing of the past. Citrix SD-WAN is a complete WAN edge solution that delivers high performance and exceptional experience.

View Now

SD-WAN for Microsoft Office 365

People depend on a seamless Office 365 user experience to be productive. But, backhauling SaaS traffic over private networks can strain your WAN, leading to a poor user experience. Watch this video to learn how Citrix SD-WAN intelligently identifies, prioritizes, and routes Office 365 traffic to reduce latency and boost performance.

View Now

Customer 360 powered by Zero2Hero™ video

The Zero2Hero™ (z2H™) stack solution is aptly named for its ability to be set up in a matter of hours, and helps our clients go from zero, to analytics heroes incredibly quickly. Zero2Hero™ aggregates the data to ensure key data is prioritized. This provides your customer with a unique customer experience based on their preferences and behaviors. Watch the video to learn more.

View Now

Project Ares Gamified Cyber Training

Project Ares allows cyber teams from across enterprise, government, and academic institutions to automate and augment the cyber workforce by providing immersive, gamified cyber range learning environments that emulate company networks. Realistic scenarios engage teams in immersive, mission-specific virtual environments using real-world tools, network activity and a large library of authentic threat scenarios.

View Now

Webinar – Rock Your SOC (Security Operations Center) with Watson for Cyber Security

In today’s threat environment, given the sophistication and increase in cyber-attacks, security analysts must investigate and accurately identify threats on a daily basis to detect and stop threats in time before damage is caused. During an investigation, analysts need to pivot on multiple data sources such as threat feeds, security blogs, research articles, talking to peers and more. It can quickly become overwhelming when an analyst needs to investigate each incident in 20 minutes or less just to keep up with current alerts. Inaccuracies can creep in while they are simultaneously navigating and correlating information from multiple sources.

With the cognitive power of Watson for Cyber Security, analysts can now use QRadar Advisor with Watson to investigate incidents compiled by the QRadar security analytics platform and provide key insights to qualify and identify root cause of the incident.

Watch this webinar to see how a Tier 1 and Tier 2 SOC analyst uses QRadar Advisor with Watson to accurately identify and understand threats at speed and scale. See the complete lifecycle of an investigation in the SOC from when an offense is compiled by QRadarsecurity analytics platform to how you can use the results from the investigation from Watson to shutdown threats.

Carlos Aguilera, Global Security Solutions Architect
At IBM, Carlos helped create and shape the Manage SIEM service practice. In his current role as a Global Security Solutions Architect, he is responsible for communicating, shaping, and developing the services to best answer enterprise client needs. Carlos applies creative thinking and lessons learned through his tenure at IBM to offer solutions to complex problems for his clients. Recently Carlos devotes most of his time working on cognitive technologies such as QRadar Advisor Watson for Cyber Security or Havyn (cognitive security assistant).

Chris Hankins, CISSP, is the Offering Manager for Cognitive Security within the IBM Security Business Unit
Chris leads the IBM North America technical practice for cognitive security. Using his experience as a security analyst and architect, he leverages his expertise in cyber operations, forensics, threat intelligence, incident response and cognitive security to help organizations address strategic and operational initiatives within their security program, address sophisticated threats, and improve the overall risk posture of the business.

View IBM's privacy policy here

View Now

Transforming the Cisco WAN with Network Intelligence

Branch office networks and the enterprise WAN are in a state of dramatic transformation. The joint solution between ThousandEyes and Cisco integrates Network Intelligence with Cisco ISR 4000 and ASR 1000 routers. Learn how the integrated solution lets you repurpose existing infrastructure to build an intelligent and cloud-aware WAN.
View Now

Network Device Monitoring with ThousandEyes

ThousandEyes integrates monitoring and visualization of device health, end-to-end network paths and the performance of your internally hosted and cloud applications in one place. Identify critical dependencies in your internal network and monitor how device health impacts application performance.
View Now