Featured
Understanding SASE: SASE, Firewall-as-a-Service, and IoT
Teddy Nicoghosian (Principal Technical Product Marketing Manager), Gus Fernandez (Consulting System Security Engineer)
This is the third in our ongoing 5-webinar series on the benefits and capabilities of Secure Access Service Edge (SASE). In this session, you’ll learn how the Barracuda SecureEdge SASE platform lets you implement Firewall-as-a-Service (FWaaS) and its application to Internet-of-Things (IoT) and Industrial IoT (IIoT) use-cases.
Join us for this detailed, technical presentation to gain a complete, practical understanding of how to configure and deploy firewall capabilities delivered from the cloud as a service, eliminating the need to transport, manage, and maintain physical appliances across multiple locations.
In addition, see how FWaaS lets you streamline and simplify IoT and IIoT security to protect against network intrusions, sabotage, and other cyberattacks that seek to exploit IoT vulnerabilities.
All episodes
-
Understanding SASE: The Big Picture
Teddy Nicoghosian, Principal Technical Product Marketing Manager, Barracuda
Register for Barracuda’s upcoming series of five webinars that together will cover everything you need to know to ensure success in your migration to a Secure Access Service Edge (SASE) network-security model.
Join us and gain a full understanding of why SASE is the emerging standard for securing today’s complex networks that integrate cloud and SaaS applications, mobile workers, business-critical web apps and APIs, and IaaS workloads.
The first webinar in the series provides a high-level overview of the elements of a modern SASE platform and how they work together to provide comprehensive security. The remaining webinars will be detailed, in-depth explorations of each element individually:
Webinar 2: SASE and Zero Trust
Webinar 3: SASE, Firewall-as-a-Service, and IoT security
Webinar 4: SASE and Secure Web Gateway
Webinar 5: SASE and SD-WANDon’t miss out on this opportunity to gain an expert understanding of SASE and how to implement it to protect your organisation against today’s most sophisticated cyber threats. Reserve your spot at Webinar 1: SASE Overview.
-
Understanding SASE: SASE and Zero Trust
Teddy Nicoghosian (Principal Technical Product Marketing Manager), Emre Tezisci (Sr. Product Marketing Manager)
The second in our five-webinar series on Secure Access Service Edge (SASE) implementation is a deep dive into zero-trust architecture and how to use it in the context of a comprehensive SASE platform.
In this detailed technical presentation, Teddy Nicoghosian and Emre Tezici will demonstrate and explain every step of how to implement, configure, and administer zero trust access controls within the Barracuda SecureEdge SASE platform.
Following the webinar, you’ll have the information and practical know-how needed to get all the benefits of zero trust. And you’ll have a full understanding of how zero trust adds value for your organisation with improved protection against sophisticated attackers, a more transparent user experience, and simple, streamlined management on the back end.
-
Understanding SASE: SASE, Firewall-as-a-Service, and IoT
Teddy Nicoghosian (Principal Technical Product Marketing Manager), Gus Fernandez (Consulting System Security Engineer)
This is the third in our ongoing 5-webinar series on the benefits and capabilities of Secure Access Service Edge (SASE). In this session, you’ll learn how the Barracuda SecureEdge SASE platform lets you implement Firewall-as-a-Service (FWaaS) and its application to Internet-of-Things (IoT) and Industrial IoT (IIoT) use-cases.
Join us for this detailed, technical presentation to gain a complete, practical understanding of how to configure and deploy firewall capabilities delivered from the cloud as a service, eliminating the need to transport, manage, and maintain physical appliances across multiple locations.
In addition, see how FWaaS lets you streamline and simplify IoT and IIoT security to protect against network intrusions, sabotage, and other cyberattacks that seek to exploit IoT vulnerabilities.