Over the last years, many customers have had to deal with cyber attacks targeted at intellectual property. We have entered a new phase in which criminals unleash destructive attacks, rendering IT environments unusable and effectively halting business. Consumerization of IT and the cloud add inherent tension and security implications to this new reality. How can one deal with data that moves in and out of your datacenters, to unmanaged devices and cloud services not directly under your control? How can you create a cost efficient architecture and plan for prevention, detection, and recovery in a time where cloud and consumerization of IT are high on every CxO's agenda? The presenters of this session have been on the Targeted Attack frontline with enterprise customers over the last years. They explain the threats of targeted attacks and share an architecture model using a data classification model, as well as their field experiences and services you can leverage to deal with prevention, detection and recovery.
Organizations are adopting Application Virtualization with App-V 5.0 for the positive impact or for lifecycle management. The end result from a user and administrator perspective is that the performance of App-V applications should be the same, if not better. This assumption of performance being similar to traditional applications and better than previous versions of App-V requires a closer look. Some important questions must be answered: Is the performance better? What if the performance is significantly lower? Can your environment handle the user load? To answer these questions about App-V 5.0, we put it to the test! This session shares the unique results of extensive testing, across various scenarios, and provide a comparison of App-V 5.0, previous versions of App-V, traditionally installed applications. We’re not talking about ‘perceived’ performance here, but factual and reproducible data, figures and graphs that will help you identify the performance impact of a migration to this technology or this version. Moreover, we show you effective and ineffective tuning and optimization tweaks that will improve the performance of your environment immediately! If you are interested in this Virtual Reality Check, join us in this high intensity and information rich session.
Today we are able to see a clear shift in how enterprises are targeted by malware engineers. The attack landscape has adapted to the new world and they now perform targeted attacks, especially over the social networks. Because guess what? The CEO, CTO, or even the girl next door has a social network account. Join this session and explore how social engineering has grown over time and examine lessons learned from the field on how to best mitigate those traps.