Gibt es eigentlich eine Möglichkeit Z-Scaler über eine Art Hardware-Schnittstelle zur Verfügung zu stellen? Wenn bei uns Windows neu aufgespielt werden muss, muss das Gerät dazu im Firmennetz sein, doch das geht natürlich nicht, wenn die Windows-Software nicht auf dem Gerät läuft. Daher stellt sich die Frage, ob man ZScaler auf z. B. einem Raspberry Pi installieren kann und dann über WLAN oder LAN über den Raspberry Pi auch so eine Verbindung ins Firmennetzwerk aufbauen kann.
@JeanPereiraOfficial Жыл бұрын
Es hat mir geholfen, ein besseres Verständnis für die Sicherheitsaspekte des Internet of Things zu bekommen. Die Präsentationen waren informativ und gut strukturiert, und die Sprecher haben das Thema spannend vermittelt. Vielen Dank an das Team für diese wertvolle Ressource! 💪🌟
@AVANTEC-Cyber-Security Жыл бұрын
Herzlichen Dank für Dein Feedback. Liebe Grüsse vom AVANTEC-Team
@EL-yi6df Жыл бұрын
How do I prevent a Guest to forward the invitation to another person?
@AVANTEC-Cyber-Security Жыл бұрын
We prefer to use Group Policies to prevent Guest to forward the invitation to another person. If you have any questions or want us to show you, don't hesitate to contact us: [email protected] Thank you, Simon
@FeterSack1252 жыл бұрын
die Audioqualität ist unterirdisch. Man versteht nichts
@SimonPucher2 жыл бұрын
Thanks to Filipe, it was a good overview about Advanced Phishing Protection!
@PatrickBurkeTV2 жыл бұрын
Great content. The audio was grainy.
@AVANTEC-Cyber-Security2 жыл бұрын
Dear Patrick, Thank you very much for your feedback. We will work on that. Best regards, Melanie
@muyeenahmad2472 жыл бұрын
Could you please add English subtitles so that we can also understand ☺️☺️
@AVANTEC-Cyber-Security2 жыл бұрын
Dear Muyeen, Thank you very much for your interest. We are sorry, but currently we are not able to provide subtitles to our webinar videos. Kind regards, Melanie
@Frank-tz7cr3 жыл бұрын
Ich finde das Video sehr gut und informativ. Eine Frage: Ist eine Private Cloud zwingend in den vier Wänden eines Unternehmens oder kann man diese auch auslagern?
@AVANTEC-Cyber-Security3 жыл бұрын
Hallo Frank Vielen Dank für Deine Frage. Eine Private Cloud kann als als Gegenstück einer Public Cloud angesehen werden. Public Clouds sind Umgebungen, in denen die Ressourcen geteilt werden (shared Environment, shared Hardware). Private Clouds können als sogenannte single Tenant Umgebungen definiert werden, die nur für ein einziges Unternehmen bestimmt sind. Dabei werden die Hardware und das Netzwerk so gestaltet, dass andere Kunden im selben Datacenter nicht darauf zugreifen können. Somit kann eine Private Cloud sowohl On-Prem (in einem eigenen Datacenter) wie auch in der Cloud (z.B. Azure) betrieben werden. Gruss, Borna Cisar
@Frank-tz7cr3 жыл бұрын
@@AVANTEC-Cyber-Security Danke für die ausführliche Info, das hilft mir weiter. Viele Grüße Frank
@poseidon85103 жыл бұрын
Thanks , it's possible in english plz ?
@AVANTEC-Cyber-Security3 жыл бұрын
Hello, thank you for you interest! This content is only available in German, however if you need any further information, do not hesitate to contact us: [email protected].
@inosystems15363 жыл бұрын
Schrecklicher Ton, auf Kopfhörern sogar nur links. Hört ihr euch das vorher auch an bevor ihr sowas uploaded ?
@MrknisterKanister3 жыл бұрын
Ist ja wirklich eine sehr gute und informative Präsi. Aber man hätte als Mikro keine Kartoffel nehmen müssen.
@dhananjai3 жыл бұрын
Please share the script in English
@AVANTEC-Cyber-Security3 жыл бұрын
Dear D S - Thank you very much for your interest. Currently the script is available in German only. Best, Melanie
@michaelmeniru98633 жыл бұрын
Fantastic seminar Mark, very well explained
@aquabat1044 жыл бұрын
how does a connection come IN from the remote user to an internal app when the connector only talks OUTbound
@AVANTEC-Cyber-Security4 жыл бұрын
Dear aquabat104, Thank you very much for your question. There are three components involved: client, Zscaler cloud and connector. 1. The client requests an application by sending a request to Zscaler cloud. 2. The connector checks inside the company what application he is able to connect to and provides this information to the Zscaler cloud. 3. In the cloud the client request and the connector connection get stitched together and the client is able to connect through the stitched connection to the application. 4. Furthermore you will be able to enforce double encryption which will open another tunnel through the stitched connection so your traffic is encrypted from the client to the connector. We hope that our answer is helpful. If you need any further information, please do not hesitate to contact us ([email protected]). Best regards, Melanie
@UncleBillyProduction5 жыл бұрын
Private documents with personal information are rendered elsewhere and thus available to any hackers of that system. No matter how secure a system claims to be, they all get hacked eventually so this solution doesn't sound so good.
@AVANTEC-Cyber-Security5 жыл бұрын
Hi UncleBillyProduction Thank you very much for your comment. I agree with you that every system can (and most probably will be) compromised sooner or later. It all depends on how quickly you are able to respond to such a compromise. And if you hoard data that could be copied by an attacker. Symantec does not store content longer than necessary. Let’s now speak about a cloud service as the discussed “web isolation” by Symantec. It’s quite hard to compromise this service by using it, i.e. by surfing to a malicious payload. This web content is rendered in a container that is discarded as soon as you surf to a new location. This content origins from a web server. If you are concerned about the privacy of this data, this has been stored somewhere in the web in the first place and could get “hacked” there as well. Of course you have to trust your security vendor or any cloud service you are using for not maliciously copy your data. If you are concerned about privacy the whole service is also available as on-premises installation where you can control what data is sent back out to the Internet.
@UncleBillyProduction5 жыл бұрын
@@AVANTEC-Cyber-Security Thank you for your thought provoking reply. So are you saying a system that houses these containers could not be compromised and thus have malware monitoring (scraping/recording) containers as they are created and destroyed? Perhaps that is not possible as we know things today, but if that's where people start having their information processed, then that's where the power/money/brains behind hacking will concentrate.
@AVANTEC-Cyber-Security4 жыл бұрын
@@UncleBillyProduction Thank you very much for your answer and sorry for the late reply. Of course any service could be compromised, be it hosted in the cloud or run by yourself. What I’m saying is that the web content you are downloading originates from the Internet and could be extracted by compromising the originating website as well. If you do not trust the “rendering cloud service” (as it could be compromised or you do not trust the service itself) you can still run it yourself on-premises. Have a nice day and best wishes, Anja
@lqtube5 жыл бұрын
any place we can get the slides?
@everlastinggobstopper68795 жыл бұрын
Not to be critical here, but the presenter should be more prepared for this or practice a couple of times before presenting. It is good content material, but should have a cleaner presentation. thanks!
@AVANTEC-Cyber-Security5 жыл бұрын
Dear Chris, Thank you very much for your feedback. We appreciate this a lot. We are always eager to improve our content and will incorporate your feedback in our planning. Have a great day! Best, Melanie
@parry16 жыл бұрын
Lovely presentation and very clearly articulated! Great job
@NameEncrypted6 жыл бұрын
Can we route Azure SQL traffic using this solutioin?
@AVANTEC-Cyber-Security6 жыл бұрын
Dear Mr. Syedmansur Thank you very much for your comment. May I kindly ask you to contact us directly under [email protected]. We will be happy to provide detailed information. Best wishes, Anja Zimmerli, Marketing Assistant
@skroyslg6 жыл бұрын
Awesome Webinar - host have excellent networking and security knowledge base and appears to have granular understanding of network packets.