SIEM: Fluch oder Segen?
2:37
Жыл бұрын
Пікірлер
@PhreakDarkSoul
@PhreakDarkSoul 8 ай бұрын
Gibt es eigentlich eine Möglichkeit Z-Scaler über eine Art Hardware-Schnittstelle zur Verfügung zu stellen? Wenn bei uns Windows neu aufgespielt werden muss, muss das Gerät dazu im Firmennetz sein, doch das geht natürlich nicht, wenn die Windows-Software nicht auf dem Gerät läuft. Daher stellt sich die Frage, ob man ZScaler auf z. B. einem Raspberry Pi installieren kann und dann über WLAN oder LAN über den Raspberry Pi auch so eine Verbindung ins Firmennetzwerk aufbauen kann.
@JeanPereiraOfficial
@JeanPereiraOfficial Жыл бұрын
Es hat mir geholfen, ein besseres Verständnis für die Sicherheitsaspekte des Internet of Things zu bekommen. Die Präsentationen waren informativ und gut strukturiert, und die Sprecher haben das Thema spannend vermittelt. Vielen Dank an das Team für diese wertvolle Ressource! 💪🌟
@AVANTEC-Cyber-Security
@AVANTEC-Cyber-Security Жыл бұрын
Herzlichen Dank für Dein Feedback. Liebe Grüsse vom AVANTEC-Team
@EL-yi6df
@EL-yi6df Жыл бұрын
How do I prevent a Guest to forward the invitation to another person?
@AVANTEC-Cyber-Security
@AVANTEC-Cyber-Security Жыл бұрын
We prefer to use Group Policies to prevent Guest to forward the invitation to another person. If you have any questions or want us to show you, don't hesitate to contact us: [email protected] Thank you, Simon
@FeterSack125
@FeterSack125 2 жыл бұрын
die Audioqualität ist unterirdisch. Man versteht nichts
@SimonPucher
@SimonPucher 2 жыл бұрын
Thanks to Filipe, it was a good overview about Advanced Phishing Protection!
@PatrickBurkeTV
@PatrickBurkeTV 2 жыл бұрын
Great content. The audio was grainy.
@AVANTEC-Cyber-Security
@AVANTEC-Cyber-Security 2 жыл бұрын
Dear Patrick, Thank you very much for your feedback. We will work on that. Best regards, Melanie
@muyeenahmad247
@muyeenahmad247 2 жыл бұрын
Could you please add English subtitles so that we can also understand ☺️☺️
@AVANTEC-Cyber-Security
@AVANTEC-Cyber-Security 2 жыл бұрын
Dear Muyeen, Thank you very much for your interest. We are sorry, but currently we are not able to provide subtitles to our webinar videos. Kind regards, Melanie
@Frank-tz7cr
@Frank-tz7cr 3 жыл бұрын
Ich finde das Video sehr gut und informativ. Eine Frage: Ist eine Private Cloud zwingend in den vier Wänden eines Unternehmens oder kann man diese auch auslagern?
@AVANTEC-Cyber-Security
@AVANTEC-Cyber-Security 3 жыл бұрын
Hallo Frank Vielen Dank für Deine Frage. Eine Private Cloud kann als als Gegenstück einer Public Cloud angesehen werden. Public Clouds sind Umgebungen, in denen die Ressourcen geteilt werden (shared Environment, shared Hardware). Private Clouds können als sogenannte single Tenant Umgebungen definiert werden, die nur für ein einziges Unternehmen bestimmt sind. Dabei werden die Hardware und das Netzwerk so gestaltet, dass andere Kunden im selben Datacenter nicht darauf zugreifen können. Somit kann eine Private Cloud sowohl On-Prem (in einem eigenen Datacenter) wie auch in der Cloud (z.B. Azure) betrieben werden. Gruss, Borna Cisar
@Frank-tz7cr
@Frank-tz7cr 3 жыл бұрын
@@AVANTEC-Cyber-Security Danke für die ausführliche Info, das hilft mir weiter. Viele Grüße Frank
@poseidon8510
@poseidon8510 3 жыл бұрын
Thanks , it's possible in english plz ?
@AVANTEC-Cyber-Security
@AVANTEC-Cyber-Security 3 жыл бұрын
Hello, thank you for you interest! This content is only available in German, however if you need any further information, do not hesitate to contact us: [email protected].
@inosystems1536
@inosystems1536 3 жыл бұрын
Schrecklicher Ton, auf Kopfhörern sogar nur links. Hört ihr euch das vorher auch an bevor ihr sowas uploaded ?
@MrknisterKanister
@MrknisterKanister 3 жыл бұрын
Ist ja wirklich eine sehr gute und informative Präsi. Aber man hätte als Mikro keine Kartoffel nehmen müssen.
@dhananjai
@dhananjai 3 жыл бұрын
Please share the script in English
@AVANTEC-Cyber-Security
@AVANTEC-Cyber-Security 3 жыл бұрын
Dear D S - Thank you very much for your interest. Currently the script is available in German only. Best, Melanie
@michaelmeniru9863
@michaelmeniru9863 3 жыл бұрын
Fantastic seminar Mark, very well explained
@aquabat104
@aquabat104 4 жыл бұрын
how does a connection come IN from the remote user to an internal app when the connector only talks OUTbound
@AVANTEC-Cyber-Security
@AVANTEC-Cyber-Security 4 жыл бұрын
Dear aquabat104, Thank you very much for your question. There are three components involved: client, Zscaler cloud and connector. 1. The client requests an application by sending a request to Zscaler cloud. 2. The connector checks inside the company what application he is able to connect to and provides this information to the Zscaler cloud. 3. In the cloud the client request and the connector connection get stitched together and the client is able to connect through the stitched connection to the application. 4. Furthermore you will be able to enforce double encryption which will open another tunnel through the stitched connection so your traffic is encrypted from the client to the connector. We hope that our answer is helpful. If you need any further information, please do not hesitate to contact us ([email protected]). Best regards, Melanie
@UncleBillyProduction
@UncleBillyProduction 5 жыл бұрын
Private documents with personal information are rendered elsewhere and thus available to any hackers of that system. No matter how secure a system claims to be, they all get hacked eventually so this solution doesn't sound so good.
@AVANTEC-Cyber-Security
@AVANTEC-Cyber-Security 5 жыл бұрын
Hi UncleBillyProduction Thank you very much for your comment. I agree with you that every system can (and most probably will be) compromised sooner or later. It all depends on how quickly you are able to respond to such a compromise. And if you hoard data that could be copied by an attacker. Symantec does not store content longer than necessary. Let’s now speak about a cloud service as the discussed “web isolation” by Symantec. It’s quite hard to compromise this service by using it, i.e. by surfing to a malicious payload. This web content is rendered in a container that is discarded as soon as you surf to a new location. This content origins from a web server. If you are concerned about the privacy of this data, this has been stored somewhere in the web in the first place and could get “hacked” there as well. Of course you have to trust your security vendor or any cloud service you are using for not maliciously copy your data. If you are concerned about privacy the whole service is also available as on-premises installation where you can control what data is sent back out to the Internet.
@UncleBillyProduction
@UncleBillyProduction 5 жыл бұрын
@@AVANTEC-Cyber-Security Thank you for your thought provoking reply. So are you saying a system that houses these containers could not be compromised and thus have malware monitoring (scraping/recording) containers as they are created and destroyed? Perhaps that is not possible as we know things today, but if that's where people start having their information processed, then that's where the power/money/brains behind hacking will concentrate.
@AVANTEC-Cyber-Security
@AVANTEC-Cyber-Security 4 жыл бұрын
@@UncleBillyProduction Thank you very much for your answer and sorry for the late reply. Of course any service could be compromised, be it hosted in the cloud or run by yourself. What I’m saying is that the web content you are downloading originates from the Internet and could be extracted by compromising the originating website as well. If you do not trust the “rendering cloud service” (as it could be compromised or you do not trust the service itself) you can still run it yourself on-premises. Have a nice day and best wishes, Anja
@lqtube
@lqtube 5 жыл бұрын
any place we can get the slides?
@everlastinggobstopper6879
@everlastinggobstopper6879 5 жыл бұрын
Not to be critical here, but the presenter should be more prepared for this or practice a couple of times before presenting. It is good content material, but should have a cleaner presentation. thanks!
@AVANTEC-Cyber-Security
@AVANTEC-Cyber-Security 5 жыл бұрын
Dear Chris, Thank you very much for your feedback. We appreciate this a lot. We are always eager to improve our content and will incorporate your feedback in our planning. Have a great day! Best, Melanie
@parry1
@parry1 6 жыл бұрын
Lovely presentation and very clearly articulated! Great job
@NameEncrypted
@NameEncrypted 6 жыл бұрын
Can we route Azure SQL traffic using this solutioin?
@AVANTEC-Cyber-Security
@AVANTEC-Cyber-Security 6 жыл бұрын
Dear Mr. Syedmansur Thank you very much for your comment. May I kindly ask you to contact us directly under [email protected]. We will be happy to provide detailed information. Best wishes, Anja Zimmerli, Marketing Assistant
@skroyslg
@skroyslg 6 жыл бұрын
Awesome Webinar - host have excellent networking and security knowledge base and appears to have granular understanding of network packets.