Networking and Security | January 2016

Webinars and Events

Webinars and Events

Blue Coat Web Application Firewall (WAF)

Please join us for the next Customer Support Technical Webcast on Tuesday, February 2nd for an in-depth presentation on Blue Coat’s complete WAF solution. Blue Coat Product Manager for WAF, Michael Mauch, will lead a technical deep dive into these exciting topics:

  • Blue Coat’s rich solution progression from Reverse Proxy to Web Application Reverse Proxy and now a complete WAF
  • Quick Recap of Blue Coat Reverse Proxy Capabilities
  • What’s different about Blue Coat WAF security model
  • WAF Solution Components and versions
  • WAF Solution Sizing
  • Multi-Tenancy: What and how-to
  • Configuration and Workflow for publishing and protecting web applications
  • Web Application protection details
  • Demonstration: Solution in action
  • Q&A

You will not want to miss Michael’s hour-long presentation, nor the opportunity to ask follow-up questions during the 30-minute Q/A session. BlueTouch Training Services has introduced three new short Knowledge Assets to complement this Webcast. These free, self-paced e-learning modules are designed to provide Customers with the foundational knowledge required to get the most out of the Technical Webcast on the 2nd. Please visit Blue Coat’s YouTube Channel to view these knowledge assets:

  1. Introduction to Web Application Firewalls click here
  2. The Blue Coat Web Application Firewall click here
  3. Blue Coat Web Application Firewall—OWASP Top Ten Coverage click here

As Web Application Firewall is built on Reverse Proxy Solution, we recommend you review the Webcast by Blue Coat’s Owen Johnson on the subject, located here.

Customer Support Technical Webcasts are offered to help Blue Coat’s end customers and partners to be more successful when deploying our solutions and are tailored specifically for your technical staff. Technical Webcast invitations are sent to customers who have subscribed to receive notices via the Blue Coat Subscription Center. Customers can log into BlueTouch Online to set their communication preferences relating to the Technical Webcast along with other valuable resources.

Register Now (8am PDT Webcast) Register Now (5pm PDT Webcast)

New Product Introduction - SandBlast Agent Partner Webcast

Introduction to SandBlast Agent, the latest addition to the Check Point Zero-Day Protection family. Join us to hear how SandBlast Agent extends advanced threat prevention and forensics to endpoint devices and what it means to your customers. Register now so you don’t miss this channel partner training webcast, where you will learn:

  • How SandBlast Agent extends Check Point’s zero-day solutions to the endpoint
  • Why this solution offers significant differentiation over the competition
  • Where you can find tools to help you WIN more business

Find out more here 

Register Now

Don’t be in Denial: The Rise of the DDoS Attack

Date: 17th Feb @ 11am

Presenter: Sven Sellen, EU DDoS/ KDP Sales Manager

Registration Link: Click HERE


For little more than the price of a latte in your favourite coffee shop, almost anyone can purchase a Distributed Denial of Service (DDoS) attack capable of taking down a high-end e-commerce site for an hour. With recent calculations from leading analytical firm IDC showing that the cost of this period of downtime can cost a company between £5,000 and £30,000, this is definitely not a risk to be ignored.

A DDoS attack is one of the most popular weapons in the modern cybercriminals’ arsenal, which aims to make information systems such as websites or databases impossible for regular users to access normally. There can be different motives behind launching DDoS attacks, ranging from cyber-hooliganism to dirty competition practices or even extortion.

The modern DDoS industry is a multi-layered structure. It includes people who commission attacks, the botnet creators who make their resources available, intermediaries who arrange the attacks and talk to the clients; and the people who arrange for payments for all the services provided. Any network node available in the Internet may become a target, be it a specific server, a network device or a disused address in the victim sub-network. In this special webinar event, European DDoS expert, Sven Sellen will discuss the risks that businesses face from DDoS attacks as well as solutions on how to keep your online presence secured against them.

Register Now

Intel Security Partner Update

Date: 11th Feb @ 12pm

Presenter: Dr Simon Moores

Registration Link: Click HERE


Today's digital security threats are more sophisticated and complex than ever. At the same time, computing advancements are opening up new possibilities for exploring, connecting, sharing and building a better world. We need security solutions that mitigate todays risks and anticipate tomorrow's solutions that not only defend against attacked but enable us to explore the digital world without fear, by detecting and adapting ever evolving threats.

Join Intel Security and Arrow ECS for an afternoon where the changing threat landscape is addressed by leading expert, Dr Simon Moores, along with a look at how Intel Security helps to combat these threats with its market leading solutions.

Register Now

Application Delivery Services for Hyper‑Converged Infrastructures

Organisations are increasingly deploying integrated systems to consolidate, simplify and scale infrastructures. Hyper-converged infrastructures such as Nutanix’s Xtreme Computing Platform are used to run application workloads – however, enterprises must still manage those applications. Enterprise applications including Microsoft Exchange, SharePoint and others deployed on hyper-converged infrastructures continue to require the same critical application delivery services to ensure security, availability and performance as in traditional data center infrastructures.

Join this webinar to learn about the advantages and benefits of integrated systems for your applications and:

  • Why application delivery services are critical for successful deployments
  • How Nutanix significantly reduces infrastructure costs and eliminates storage complexity
  • What the key use cases are – Microsoft Enterprise Applications, VDI and Business Continuity/Disaster Recovery
Register Now

ForeScout Technical Workshop

This course will start at 10:00 and the morning session will include corporate messaging – a refresh of the messaging for partners, product updates – an update to CA Core, plugins and modules since the last update and a focus area session including deployment, architecture, span v non span, response options, what it means and best practice.

The afternoon session will include a policy focus session around the 4C’s – how and why this best practice approach works and use case and customer wins – a review of selected customers in different verticals and why ForeScout win, technical challenges, proof points and critical success factors. The workshop will finish at 16:00. ForeScout would be delighted if delegates are able to join them for drinks after the workshop.

Register Now