̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

̽»¨ÊÓÆµ Signs New VMware Distribution Agreement with Broadcom
VMware

Securing Critical Data & Apps with Lateral Security and Web App Firewall


Event Date: February 25, 2026
Hosted By: VMware & ̽»¨ÊÓÆµ

Cyberattacks including ransomware and web-based attacks are unrelenting. Building true security resilience requires more than perimeter defenses; stopping lateral (east-west) movement quickly is critical, and traditional firewalls alone are not enough.  There are also disparate security tools that complicate and slow down defenses.

This webinar will walk through real-world attack scenarios, tracing the data path to demonstrate a comprehensive, layered security approach. Each layer is mapped to the NIST Cybersecurity Framework, helping stakeholders understand how a zero trust strategy can be operationalized while meeting government-mandated security certifications and compliance requirements such as HIPAA, FIPS, and PCI-DSS.

We'll explore: 

  • Web Attack Defense: We begin with a web attack scenario and explore the intricacies of Avi Web Application Firewall (WAF), which is mandatory for PCI-DSS compliance.
  • Ransomware and Lateral Security: Next, we demonstrate how vDefend defends against ransomware extending lateral security from basic infrastructure protocol protection to comprehensive application microsegmentation.
  • Threat Prevention, Visibility, and Recovery: Finally, we explore integrated threat prevention capabilities using IDS/IPS and NTA, and conclude with a unified approach to threat visibility, detection, and recovery that seamlessly integrates NDR and VMware Live Recovery (Advanced Cyber Compliance).

Attendees will leave with a clear understanding of how a unified, standards-aligned security architecture improves resilience, reduces risk, and accelerates recovery in the face of modern cyber threats.


Resources


No resources were found. Please try another search.