SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Security from Above: 
                                 How Cloud‐based Security Delivers  
                              Up‐to‐the‐Minute Network Protection 
                                                                                                                      
                                                                                                   February 2010 
                                                          
THE NEED TO RECONSIDER SECURITY APPROACHES  
The convergence of numerous trends is causing organizations to reconsider their approach to security. 
While widespread email viruses and worms have decreased, attacks via the web are on the rise. This is 
because web browsers consolidate many applications ─ including those used for email, instant 
messaging, and ecommerce ─ making the browser an attractive launch pad for attacks.  

Web 2.0 and other complex web technologies also open the door to new two‐stage web attacks and 
social‐engineering exploits.1 In fact, during the first quarter of 2009, Web 2.0 services and sites led with 
the highest number of all recorded hacking incidents at 21%.2 These new methods of attack are 
particularly dangerous, because they can originate from trusted sources or become embedded within 
legitimate and authorized email and web content. 

Two factors are driving the further growth of web‐based malware threats. First, is that cybercriminals are 
financially motivated to spread malware and acquire web users’ personal data. And they have the means 
to do so. Due to the proliferation of Web 2.0 and the dramatic progression of spam from plain text emails 
to the use of sophisticated and malicious social‐engineering tactics, spammers can now readily infect 
devices used by unsuspecting victims. By using email as the invitation to web‐based infections, spammers 
can easily locate and entice victims, and expose them to infections via botnets, spyware, malware, and 
blended threats that can then manage and further exploit the infection. All it takes is one malicious email, 


1
   The Register, Adobe Flash attack vector exploits insecure web design, November 13, 2009 
 http://www.theregister.co.uk/2009/11/13/adobe_flash_wallop/ 
2
   Secure Enterprise 2.0 Forum, Web 2.0 Hacking Incidents on the Rise in Q1 2009, May 5, 2009 http://www.secure‐
enterprise20.org/node/39  

WatchGuard Technologies                                                                        www.watchguard.com
one click of an employee’s mouse and an organization's business and network are at risk for security 
breaches, regulatory violations, or theft of confidential information – or even an intrusion that turns the 
network into a source of Internet threats to infect other networks. 
 
Second, cybercriminals can automate web‐based attacks. Through modified packing and crypting 
techniques, and other obfuscation methods, attackers can now create thousands of new variants of the 
same threat with little effort. And because botnets now take advantage of new techniques such as Fast 
Flux DNS to create dynamic domains, malware sites can stay active for weeks or months at a time. 

Moreover, the growth in the web itself enables those with malicious intent to launch attacks that reach a 
broader range of users via a growing number of attack vectors. Leading anti‐virus technology provider, 
Kaspersky Lab, discovered over 33.9 million unique instances of malware in 2009, with more than 15 
million new malware instances in the same period.3 This coincides with massive growth in the number of 
registered domains, which according to VeriSign, reached 184 million in September 2009.4 The number of 
attack source points is actually much larger when one considers Web 2.0 and the web‐based features it 
delivers to social networking and media sites, such as user‐generated content, dynamic content, and 
mashups.  

How can organizations address the expanding threat landscape while maintaining a reasonable cost of 
security? Preventing users from tapping into the web’s wealth of resources is an unrealistic strategy. Most 
organizations are not willing to sacrifice the productivity and marketing gains they realize from allowing 
their people to interact through leading web sites. Searches on Google, web‐based instant messaging sites 
such as Meebo or MSN Messenger, and social networking sites like Facebook simply offer too much value 
to ignore.  

To stay productive while fending off the growing number of threats, many organizations are leveraging 
cloud‐based security solutions, including a new generation of reputation services, to strengthen their 
security posture. They view cloud‐based security as the only practical means of keeping pace with the 
ever‐changing threat landscape without over‐burdening their IT budgets. This paper will describe the 
evolution of cloud‐based security, focusing in particular on next‐generation reputation services and their 
impact on organizations’ security success within today’s expanding threat landscape.  

EARLIER REPUTATION SERVICES CAN'T KEEP PACE 
Since the 1990s, reputation services have been helping organizations block unwanted or bad traffic to 
ensure that threats never enter the network. By identifying and blocking threats at the perimeter, 
reputation services help prevent attacks, reduce the on‐premise IT footprint required to scan traffic, and 
lower the costs associated with the bandwidth, hardware, and other resources required to block threats. 
As web technologies and the web itself have grown more sophisticated, early generation reputation 
services have become less effective in identifying and blocking threats. To fully understand this loss of 
effectiveness, it's important to understand how these services have evolved. 

Early reputation services relied solely on DNS blacklists (DNSBL) of known spammer IPs, blocking traffic 
originating from those IPs. As malware began infecting legitimate domains, reputation services could not 
distinguish between spammer domains and legitimate domains that were spamming as the result of 
malware infections. This meant DNSBLs only addressed 50‐80% of the problem IPs.  




3
  Kaspersky Lab, “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28, 2010 
4
  VeriSign, The Domain Name Industry Brief, December 2009 http://www.verisign.com/domain‐name‐
services/domain‐information‐center/industry‐brief/ 



www.watchguard.com                                                                                         page 2
Most current reputation services analyze IP volume in conjunction with DNSBLs to gain further context 
around each IP address. While this boosted effectiveness, the development of botnets and dynamic IPs 
still rendered these reputation services only 70‐80% effective ─ far too low for enterprise security 
standards. 

Leaders in the reputation services industry recognized that their         Early reputation services that 
reliance on historical information as their only source of 
                                                                          rely on DNSBL’s are akin to 
malware data would soon make them obsolete. To address the 
dynamically changing web threats faced by millions of                     credit bureaus – they can only 
organizations, leading providers are making acquisitions that will 
                                                                          monitor the historically known, 
enable them to offer next‐generation reputation services.  
                                                                         unwanted traffic. 
As shown in Figure 1, next‐generation reputation services 
provide a superior level of protection by combining DNSBL and 
volume analysis with content inspection, behavioral analysis, and feedback loops to detect and block 
malware, spyware, and malicious code before users ever see them. This proactive approach makes these 
next‐generation reputation services 99.9% accurate, with a significantly more effective catch rate greater 
than 98% ─ enabling them to offer vastly greater security than that offered by early generation or current 
services. By identifying and addressing threats proactively, these services offer greater defense at the 
perimeter. 




                                                                                                                   
 
Figure 1:  Cloud‐based security offers superior protection against attacks and threats. Early generation 
services act like a basic passport scan that considers only historical data.  Most current reputation services 
can be likened to airport metal detectors which provide limited visibility into threats attempting to enter.  
Next‐generation reputation services provide comprehensive scanning of those attempting to gain access, 
much like airport bio‐thermal body x‐ray scanners. 

CLOUD‐BASED SECURITY LEVERAGES NEXT‐GENERATION TECHNOLOGY 
Next‐generation reputation services are delivered from the cloud to provide greater levels of email and 
web security. Unlike many loosely termed “cloud applications” that are mere extensions or a re‐naming of 
existing applications into cloud terminology, next‐generation reputation services actually optimize their 
services through the cloud.  

Anonymous, statistical data from participating customers’ security devices, third‐party DNSBLs, and 
reputation databases are fed to the cloud. Next‐generation reputation services aggregate, analyze, and 
act upon this data ─ while identifying new threats in real time ─ to deliver unprecedented levels of 
security that no individual organization could deliver on its own. The cloud security service provider then 


www.watchguard.com                                                                                       page 3
streams these threat updates across its network and customers’ networks in real‐time to ensure dynamic 
protection. This is the promise of cloud‐based security – extending protection by aggregating real‐time 
monitoring intelligence from thousands of global systems.  

Next‐generation reputation services incorporate numerous algorithms and techniques to combine 
historical information that exists within the cloud (for example, data on spammers and categorized web 
sites) with adaptive identification techniques and behavioral analysis. They analyze the behavior of every 
incoming message through several automated operations: 

•   Examining embedded links 
•   Inspecting headers and content 
•   Applying malware, spyware, crimeware, and spam signature scanning 
•    Performing URL filtering 
•    Behavior patterns of the connecting IP 
      
As a result, they are able to determine the reputation and risk level of email and web traffic attempting to 
enter a customer’s network. With nearly 100% accuracy, threats – including denial‐of‐service attacks and 
spammer probing – are vaporized at the connection level, reducing the burden on local appliances. Just as 
important, cloud‐based security services can scale to support explosive traffic growth across the web. 

CLOUD‐BASED SECURITY IN ACTION 
To fully appreciate the robust nature of next‐generation reputation services, let's examine below the step‐
by‐step process that occurs at a geographically dispersed organization when an email connection is made 
to the network from a non‐trusted IP address (or from a compromised email).  

Message traffic from email and the web arrive at the network perimeter from the Internet. The 
reputation service inspects all the traffic, ready to block all unwanted traffic at the connection level as a 
powerful first line of defense. All clean traffic is allowed into the network for processing and routing by a 
customer’s point security solutions. If the customer's security appliance discovers any additional threats 
or spam as it examines content, sender information, and context, the content is blocked. The appliance 
then reports the discovery back to the reputation service, which in turn streams the feeds across the 
entire network.  

The reputation service analyzes the data and generates a result that depends, in order of priority, on the 
reputation for that specific sender at that IP address, for the domain originating from that IP address, and 
the reputation of the IP address itself. The service then returns a reputation score to the security device. 
Depending upon the threshold configured by the customer, the email security device can either allow or 
reject the connection. 

Other customer appliances in the network can "ask" the cloud about new threats from connecting IPs 
before they analyze them locally. This approach means that local appliances will process less data, so that 
email and web traffic is transferred quickly and bandwidth capacity remains high.  

Since the reputation score is critical to the acceptance or rejection of the email, next‐generation services 
place a tremendous emphasis on getting the score right. They can collect information from over a billion 
sources, including port 443 connections from web, email, and network devices; third‐party 
synchronizations, such as spamhaus and SORBS (Spam and Open Relay Blocking System); and honeypot 
domains, to name a few. 

All this enables the superior catch rate that isn't possible with early generation reputation services. 



www.watchguard.com                                                                                         page 4
WHY THE CATCH RATE MATTERS 
Consider an organization that receives one million emails 
per month. DNS Blacklisting would eliminate                     Bringing Cloud‐based Security 
approximately 50‐80% of unwanted messages. This                 Concerns Down to Earth  
leaves upwards of 250,000 unwanted messages entering 
                                                                With cloud‐based computing 
the network. Even if a reputation service considers IP 
                                                                services, organizations have to share 
traffic volume data, the 70‐80% catch rate would still let 
up to 150,000 unwanted messages slip through the                sensitive data with third‐party 
perimeter.                                                      providers, such as those offering 
                                                                SaaS. With next‐generation cloud‐
A next‐generation service – with a more than 98% catch          based security, devices only share 
rate – allows only 17,000 messages to enter the network         anonymous data about malicious 
for further in‐depth inspection, resulting in a significant 
                                                                traffic – no sensitive data is exposed. 
increase in threat protection and cost savings. 

BENEFITS OF CLOUD‐BASED SECURITY 
Next‐generation reputation services are exponentially more effective than early generation services and 
help customers make the most of their existing security appliances. In doing so, they provide 
organizations with four major benefits: 

    Faster, more dynamic security: By aggregating millions of pieces of information from around the 
    globe in real time, cloud‐based security offerings provide an up‐to‐the‐minute picture of threats and 
    the ability to stop them. 
    Less processing on local devices: Cloud‐based services analyze spam, offloading local devices of 
    intensive processing and bandwidth consumption so they can focus on new threats. 
    Automatic updates: Because cloud‐based services push updates out via the cloud and propagate 
    them to customer premise equipment, they eliminate the need for customers to manually download 
    updates. 
    Cross‐community customer benefits: Cloud‐based services can detect patterns and geographically 
    isolate threat sources to prevent them from impacting customer devices in other geographies. 
 
WHY THE TIME IS RIGHT FOR CLOUD‐BASED SECURITY  
As more and more business occurs over the web, those with malicious intent are keeping pace and 
developing innovate ways to launch attacks. To date, companies have relied on reputation services to 
help thwart these attacks, but earlier reputation services 
are unable to provide sufficient protection in the face of        Combining real‐time threat data 
today's complex threats.                                          from local security appliances with 
                                                                  cloud‐based security intelligence 
The ideal solution combines processing and analysis in 
                                                                  offers the best possible option for 
the cloud with data provided by local devices and real‐
time monitoring intelligence from multiple global                 complete attack management and 
systems. This next‐generation cloud‐based service                 prevention. 
leverages proprietary algorithmics and advanced features 
to deliver the world's most effective reputation service, 
with a more than 98% catch rate. By offloading local email and web security appliances, the cloud‐based 
service alleviates local devices of the need to process or archive unwanted traffic. This results in lower 
costs for network processing and bandwidth. And the benefits extend to all participating customers, since 
the cloud‐based service can dynamically protect them from newly discovered threats in real time. 




www.watchguard.com                                                                                    page 5
Combining real‐time threat data from local security appliances and cloud‐based security intelligence 
offers the best possible option for complete attack management and prevention. 

NEXT STEPS 
To see how a next‐generation, cloud‐based reputation service works – and to check your own domain or 
IP reputation – visit http://www.reputationauthority.org. 

For more information on the powerful WatchGuard XCS family of email and web security products with 
built‐in WatchGuard ReputationAuthority™, visit www.watchguard.com/xcs.    

 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 


ADDRESS:                  ABOUT WATCHGUARD 
505 Fifth Avenue South    Since 1996, WatchGuard Technologies has provided reliable, easy to manage security appliances to 
Suite 500                 hundreds of thousands of businesses worldwide. Our Firebox X family of extensible threat 
Seattle, WA 98104         management (XTM) solutions provides the best combination of strong, reliable, multi‐layered security 
                          with the best ease of use in its class. Our newest appliances – the WatchGuard XTM 8 Series and XTM 
WEB:                      1050 – provide high performance and fully extensible, enterprise‐grade security at an affordable 
www.watchguard.com        price. WatchGuard extensible content security (XCS) appliances deliver comprehensive email and 
                          web traffic protection for security, privacy, and compliance. WatchGuard is a privately owned 
NORTH AMERICA SALES:      company, headquartered in Seattle, Washington, with offices throughout North America, Europe, 
+1.800.734.9905           Asia Pacific, and Latin America. For more information, please visit www.watchguard.com. 
 
INTERNATIONAL SALES:       
+1.206.613.0895           No express or implied warranties are provided for herein. All specifications are subject to change and 
                          any expected future products, features, or functionality will be provided on an if and when available 
                          basis. ©2010 WatchGuard Technologies, Inc. All rights reserved. WatchGuard, the WatchGuard Logo, 
                          and WatchGuard ReputationAuthority are either registered trademarks or trademarks of 
                          WatchGuard Technologies, Inc. in the United States and/or other countries. All other trademarks and 
                          tradenames are the property of their respective owners. Part.No. WGCE66692_021610 

 


www.watchguard.com                                                                                                      page 6

Weitere ähnliche Inhalte

Was ist angesagt?

A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyGovernment
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
comparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-papercomparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-paperRenny Shen
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Ageglobal
 
FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010Andris Soroka
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsKory Edwards
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?CPPGroup Plc
 
Don zaal a 11.15 11.45 fccu
Don zaal a 11.15 11.45 fccuDon zaal a 11.15 11.45 fccu
Don zaal a 11.15 11.45 fccuwebwinkelvakdag
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsIRJET Journal
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revistathe_ro0t
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresIOSR Journals
 
Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Symantec Italia
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?Windstream Enterprise
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1newbie2019
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictZsolt Nemeth
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public SectorSeqrite
 

Was ist angesagt? (20)

A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
comparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-papercomparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-paper
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
 
Retail
Retail Retail
Retail
 
FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?
 
Don zaal a 11.15 11.45 fccu
Don zaal a 11.15 11.45 fccuDon zaal a 11.15 11.45 fccu
Don zaal a 11.15 11.45 fccu
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking Applications
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revista
 
A01450131
A01450131A01450131
A01450131
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive Measures
 
Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
 
Security Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – NetmagicSecurity Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – Netmagic
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 

Andere mochten auch

INSPIRIT nova institucional
INSPIRIT nova institucionalINSPIRIT nova institucional
INSPIRIT nova institucionalINSPIRIT BRASIL
 
Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- DatasheetINSPIRIT BRASIL
 
Resultados da pesquisa INSPIRIT realizada no CNASI 2011
Resultados da pesquisa INSPIRIT realizada no CNASI 2011Resultados da pesquisa INSPIRIT realizada no CNASI 2011
Resultados da pesquisa INSPIRIT realizada no CNASI 2011INSPIRIT BRASIL
 
Online Community Best Practices Final
Online Community Best Practices FinalOnline Community Best Practices Final
Online Community Best Practices FinalRoger Pilney
 
Forrester - Wave Community
Forrester  - Wave CommunityForrester  - Wave Community
Forrester - Wave CommunityINSPIRIT BRASIL
 
Clase ing 3 (5)
Clase  ing 3 (5)Clase  ing 3 (5)
Clase ing 3 (5)mbtorres
 
IT360 - Muito além do HelpDesk simples
IT360 - Muito além do HelpDesk simplesIT360 - Muito além do HelpDesk simples
IT360 - Muito além do HelpDesk simplesINSPIRIT BRASIL
 

Andere mochten auch (9)

INSPIRIT nova institucional
INSPIRIT nova institucionalINSPIRIT nova institucional
INSPIRIT nova institucional
 
Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- Datasheet
 
Projeto Zoo INSPIRIT
Projeto Zoo INSPIRITProjeto Zoo INSPIRIT
Projeto Zoo INSPIRIT
 
XCS - Watchguard
XCS - WatchguardXCS - Watchguard
XCS - Watchguard
 
Resultados da pesquisa INSPIRIT realizada no CNASI 2011
Resultados da pesquisa INSPIRIT realizada no CNASI 2011Resultados da pesquisa INSPIRIT realizada no CNASI 2011
Resultados da pesquisa INSPIRIT realizada no CNASI 2011
 
Online Community Best Practices Final
Online Community Best Practices FinalOnline Community Best Practices Final
Online Community Best Practices Final
 
Forrester - Wave Community
Forrester  - Wave CommunityForrester  - Wave Community
Forrester - Wave Community
 
Clase ing 3 (5)
Clase  ing 3 (5)Clase  ing 3 (5)
Clase ing 3 (5)
 
IT360 - Muito além do HelpDesk simples
IT360 - Muito além do HelpDesk simplesIT360 - Muito além do HelpDesk simples
IT360 - Muito além do HelpDesk simples
 

Ähnlich wie Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Protection

Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)DnaSylCotter
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021Shawn Nutley
 
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaperAlan Rudd
 
Abuse_in_the_Cloud_Palani_Ashwin
Abuse_in_the_Cloud_Palani_AshwinAbuse_in_the_Cloud_Palani_Ashwin
Abuse_in_the_Cloud_Palani_AshwinAshwin Palani
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Securitycrussell79
 
List some ways in which the privacy threats posed by cyber technology.docx
List some ways in which the privacy threats posed by cyber technology.docxList some ways in which the privacy threats posed by cyber technology.docx
List some ways in which the privacy threats posed by cyber technology.docxdarlened3
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_AdamsJulius Adams
 
Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industryaap3 IT Recruitment
 
HOW TO AUGMENT YOUR CNI CYBERSECURITY WHEN USING CLOUD TECHNOLOGY.docx
HOW TO AUGMENT YOUR CNI CYBERSECURITY WHEN USING CLOUD TECHNOLOGY.docxHOW TO AUGMENT YOUR CNI CYBERSECURITY WHEN USING CLOUD TECHNOLOGY.docx
HOW TO AUGMENT YOUR CNI CYBERSECURITY WHEN USING CLOUD TECHNOLOGY.docxVOROR
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersCloudflare
 
empowering your business with top-notch cybersecurity services.pdf
empowering your business with top-notch cybersecurity services.pdfempowering your business with top-notch cybersecurity services.pdf
empowering your business with top-notch cybersecurity services.pdfbasilmph
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 

Ähnlich wie Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Protection (20)

Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)Dna
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021
 
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaper
 
Abuse_in_the_Cloud_Palani_Ashwin
Abuse_in_the_Cloud_Palani_AshwinAbuse_in_the_Cloud_Palani_Ashwin
Abuse_in_the_Cloud_Palani_Ashwin
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
List some ways in which the privacy threats posed by cyber technology.docx
List some ways in which the privacy threats posed by cyber technology.docxList some ways in which the privacy threats posed by cyber technology.docx
List some ways in which the privacy threats posed by cyber technology.docx
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Project 3
Project 3Project 3
Project 3
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
 
188
188188
188
 
Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industry
 
HOW TO AUGMENT YOUR CNI CYBERSECURITY WHEN USING CLOUD TECHNOLOGY.docx
HOW TO AUGMENT YOUR CNI CYBERSECURITY WHEN USING CLOUD TECHNOLOGY.docxHOW TO AUGMENT YOUR CNI CYBERSECURITY WHEN USING CLOUD TECHNOLOGY.docx
HOW TO AUGMENT YOUR CNI CYBERSECURITY WHEN USING CLOUD TECHNOLOGY.docx
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
10. 23757.pdf
10. 23757.pdf10. 23757.pdf
10. 23757.pdf
 
empowering your business with top-notch cybersecurity services.pdf
empowering your business with top-notch cybersecurity services.pdfempowering your business with top-notch cybersecurity services.pdf
empowering your business with top-notch cybersecurity services.pdf
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 

Mehr von INSPIRIT BRASIL

New-Desktop Central para IT Managers
New-Desktop Central para IT ManagersNew-Desktop Central para IT Managers
New-Desktop Central para IT ManagersINSPIRIT BRASIL
 
New institucional inspirit (esp)
New institucional inspirit (esp)New institucional inspirit (esp)
New institucional inspirit (esp)INSPIRIT BRASIL
 
New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)INSPIRIT BRASIL
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageINSPIRIT BRASIL
 
M86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayM86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayINSPIRIT BRASIL
 
Trustwave - Segurança 360
Trustwave - Segurança 360Trustwave - Segurança 360
Trustwave - Segurança 360INSPIRIT BRASIL
 
NOVA - Apresentação Institucional INSPIRIT
NOVA - Apresentação Institucional INSPIRITNOVA - Apresentação Institucional INSPIRIT
NOVA - Apresentação Institucional INSPIRITINSPIRIT BRASIL
 
Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)INSPIRIT BRASIL
 
Overview -IT360 ManageEngine
Overview -IT360 ManageEngineOverview -IT360 ManageEngine
Overview -IT360 ManageEngineINSPIRIT BRASIL
 
Estudo Gartner - IT360 ManageEngine
Estudo Gartner -  IT360 ManageEngineEstudo Gartner -  IT360 ManageEngine
Estudo Gartner - IT360 ManageEngineINSPIRIT BRASIL
 
Coletânea de Cases - RIVERBED
Coletânea de Cases - RIVERBEDColetânea de Cases - RIVERBED
Coletânea de Cases - RIVERBEDINSPIRIT BRASIL
 
INSPIRIT- Riverbed- Data protection and Disaster Recovery
INSPIRIT-  Riverbed- Data protection and Disaster RecoveryINSPIRIT-  Riverbed- Data protection and Disaster Recovery
INSPIRIT- Riverbed- Data protection and Disaster RecoveryINSPIRIT BRASIL
 
TrustWave - Visão Geral da Solução
TrustWave - Visão Geral da SoluçãoTrustWave - Visão Geral da Solução
TrustWave - Visão Geral da SoluçãoINSPIRIT BRASIL
 
Apresentação BlueKiwi - INSPIRIT
Apresentação BlueKiwi - INSPIRITApresentação BlueKiwi - INSPIRIT
Apresentação BlueKiwi - INSPIRITINSPIRIT BRASIL
 
Content Watch - Company & Product Overview (Eng)
Content Watch - Company & Product Overview (Eng)Content Watch - Company & Product Overview (Eng)
Content Watch - Company & Product Overview (Eng)INSPIRIT BRASIL
 
Intranet 2.0 e Social CRM - BlueKiwi e Lithium
Intranet 2.0 e Social CRM - BlueKiwi e LithiumIntranet 2.0 e Social CRM - BlueKiwi e Lithium
Intranet 2.0 e Social CRM - BlueKiwi e LithiumINSPIRIT BRASIL
 
Nova Apresentação Institucional INSPIRIT
Nova Apresentação Institucional INSPIRITNova Apresentação Institucional INSPIRIT
Nova Apresentação Institucional INSPIRITINSPIRIT BRASIL
 
Zoho Corp - Zoho CRM - Apresentação INSPIRIT
Zoho Corp - Zoho CRM - Apresentação INSPIRITZoho Corp - Zoho CRM - Apresentação INSPIRIT
Zoho Corp - Zoho CRM - Apresentação INSPIRITINSPIRIT BRASIL
 

Mehr von INSPIRIT BRASIL (20)

New-Desktop Central para IT Managers
New-Desktop Central para IT ManagersNew-Desktop Central para IT Managers
New-Desktop Central para IT Managers
 
New institucional inspirit (esp)
New institucional inspirit (esp)New institucional inspirit (esp)
New institucional inspirit (esp)
 
New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantage
 
M86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayM86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web Gateway
 
Trustwave - Segurança 360
Trustwave - Segurança 360Trustwave - Segurança 360
Trustwave - Segurança 360
 
NOVA - Apresentação Institucional INSPIRIT
NOVA - Apresentação Institucional INSPIRITNOVA - Apresentação Institucional INSPIRIT
NOVA - Apresentação Institucional INSPIRIT
 
Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)
 
Overview -IT360 ManageEngine
Overview -IT360 ManageEngineOverview -IT360 ManageEngine
Overview -IT360 ManageEngine
 
Estudo Gartner - IT360 ManageEngine
Estudo Gartner -  IT360 ManageEngineEstudo Gartner -  IT360 ManageEngine
Estudo Gartner - IT360 ManageEngine
 
Coletânea de Cases - RIVERBED
Coletânea de Cases - RIVERBEDColetânea de Cases - RIVERBED
Coletânea de Cases - RIVERBED
 
INSPIRIT- Riverbed- Data protection and Disaster Recovery
INSPIRIT-  Riverbed- Data protection and Disaster RecoveryINSPIRIT-  Riverbed- Data protection and Disaster Recovery
INSPIRIT- Riverbed- Data protection and Disaster Recovery
 
TrustWave - Visão Geral da Solução
TrustWave - Visão Geral da SoluçãoTrustWave - Visão Geral da Solução
TrustWave - Visão Geral da Solução
 
Apresentação BlueKiwi - INSPIRIT
Apresentação BlueKiwi - INSPIRITApresentação BlueKiwi - INSPIRIT
Apresentação BlueKiwi - INSPIRIT
 
Content Watch - Company & Product Overview (Eng)
Content Watch - Company & Product Overview (Eng)Content Watch - Company & Product Overview (Eng)
Content Watch - Company & Product Overview (Eng)
 
Intranet 2.0 e Social CRM - BlueKiwi e Lithium
Intranet 2.0 e Social CRM - BlueKiwi e LithiumIntranet 2.0 e Social CRM - BlueKiwi e Lithium
Intranet 2.0 e Social CRM - BlueKiwi e Lithium
 
Nova Apresentação Institucional INSPIRIT
Nova Apresentação Institucional INSPIRITNova Apresentação Institucional INSPIRIT
Nova Apresentação Institucional INSPIRIT
 
Cases Riverbed 2009
Cases Riverbed 2009Cases Riverbed 2009
Cases Riverbed 2009
 
Zoho Corp - Zoho CRM - Apresentação INSPIRIT
Zoho Corp - Zoho CRM - Apresentação INSPIRITZoho Corp - Zoho CRM - Apresentação INSPIRIT
Zoho Corp - Zoho CRM - Apresentação INSPIRIT
 
IT360 - ManageEngine
IT360 - ManageEngineIT360 - ManageEngine
IT360 - ManageEngine
 

Kürzlich hochgeladen

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Kürzlich hochgeladen (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Protection