<img height="1" width="1" alt="" style="display:none;" src="http://www.bizographics.com/collect/?pid=8264&fmt=gif">

Unisys & SANS Present: Zero Trust Implemented Webinar Series
Unisys Security Solutions partnered with The SANS Institute, the most trusted resource for information security training, to present our Zero Trust Implemented webinar series.

Monday, March 25th, 1PM EST
“Playing Moneyball in Cybersecurity”
Jonathan Goldberger and Matt Soderlund

When giants like Equifax, Facebook, and Google are getting breached on a larger scale than ever before, setting security priorities based on headlines and gut instinct doesn’t cut it anymore. Finally, your board of directors understands the need to pay close attention to cybersecurity. You’re now being asked to demonstrate the business impact of your security investments, and you need objective, data-validated priorities to obtain budget approval. Find out how Unisys TrustCheck™ lets you play cybersecurity Moneyball.

Tuesday, April 2nd, 1PM EST
“Building a Zero Trust Model in the Cloud with Microsegmentation”
John Kindervag, Field Chief Technology Officer, Palo Alto Networks and Salvatore Sinno, Global Chief Security Architect at Unisys

The Zero Trust architecture is the foundation of the future of public cloud security. In this webcast, John Kindervag, the creator of the Zero Trust Model, and Unisys experts will show how Unisys Stealth® and Palo Alto Networks provide a unified platform to enhance system survivability and reduce the impact of potential threats.

Wednesday, April 17th, 3:30PM EST
“Why You Need Private PKI”
Jonathan Goldberger and Matt Soderlund

The commercialization of IT has made it exponentially more difficult to ensure that everything on your network is authenticated. Learn how Unisys’ Managed PKI service provides critical PKI infrastructure and services necessary to secure machines, network and mobile devices, virtual servers, and the Internet of Things.

Tuesday, April 30th, 1PM EST
“What Are Fileless Attacks and How Can You Stop Them?”
Jonathan Goldberger and Matt Soderlund

Fileless attacks achieve a breach without writing files to the host system. Learn how Unisys’ Advanced Endpoint Protection protects your organization by denying these kinds of attacks access to system resources.

Tuesday, May 14th, 1PM EST
“A Better Way to Answer the Question ‘Are We Secure?’”
Jonathan Goldberger and Matt Soderlund

What if you could communicate to the board, to your CISO, and to the auditor an actual return on investment (ROI) for new security controls? Learn how to answer the tough questions with Unisys’ TrustCheck™.

Wednesday, June 5th, 1 PM EST
“It’s Peanut Butter and Jelly time!”
Jonathan Goldberger and Matt Soderlund

The real value is when two or more security solutions work together to provide an outcome greater than the sum of the parts. Watch how Unisys Stealth® (Peanut Butter) with a SIEM solution (Jelly) can isolate malicious users/machines within minutes.

Copyright © Unisys | Privacy Notice | Terms of Use