Building and Maintaining Security at the Network Edge

Advances in networking and new technologies have expanded the possibilities of deploying applications at the network edge. These edge devices bring with them their own security management challenges and risks. How do you scale your security to manage the sheer number of devices on the edge? In this webinar, experts discuss how to decide whether to move to the cloud or deploy to the edge. You will learn strategies and technologies for building out the edge securely and to manage the new workloads and applications effectively.

On Demand
1h 00min

Attend this webinar and you'll:

  • Join a nuanced discussion about when to move to the edge versus the cloud.
  • Learn tips for how to manage specific security challenges of edge computing.
  • Explore how to securely build out the edge from the start and prepare the environment to manage expanding workloads and new applications.
  • Find out how to manage and secure an exploding number of devices on the edge.

Featured Speakers

  • Jason Clark
    Jason Clark
    Independent Security Researcher

    Dr. Jason Clark is a subject matter expert in cyber security with nearly 20 years of real-world experience within the intelligence community, academia, and industry. He has extensive knowledge and experience on a variety of technology related topics. Currently, his main area of interest is researching and analyzing better methods to detect, deter, and mitigate insider threats. Dr. Clark holds a CISSP and is a member of IEEE and ACM. He has served on a number of program committees, delivered numerous virtual webinars, and has presented his published work at a variety of conferences around the world.

  • Rod Dixon
    Rod Dixon
    Sr. Product Marketing Manager

    Rod is a proven professional with over 30 years of experience in product strategy, development and cross functional delivery of mid-market and enterprise networking, protection storage, and SaaS based business solutions. He holds an MBA in Marketing Management from the Martin J. Whitman School of Management at Syracuse University, and a Bachelor's in Computer/Information Sciences from the State University of New York at Potsdam. In his free time, Rod enjoys strength training, competitive sprinting, and spending time with his growing family.

  • Becky Bracken
    Becky Bracken
    Dark Reading

    Becky Bracken is a veteran journalist covering cybersecurity for Dark Reading.

Sponsored By