̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Events and Resources

Events

Splunk-New-Microsite-logo.png
Multi-Vendor

Splunk & Zscaler for Security


Event Date: March 01, 2022
Hosted By: Splunk, Zscaler & ̽»¨ÊÓÆµ

The perimeter is what keeps attackers out of your systems, but with users, applications, and data moving outside of traditional boundaries the perimeter can no longer be tied to a single layer of security.  In today’s working environment, where employees are connecting from anywhere at any time, controlling that access is now more critical than ever.

Participtants joined Splunk and Zscaler as they shared how a tightly integrated cloud security analytics platform will reduce your attack surface, prevent lateral movement, and give you the visibility to make real-time threat determinations.

During this webinar, we covered practical and effective ways to eliminate unnecessary exposure and gain increased visibility for security operations including:

  • Splunk’s centralized log ingestion and analytics platform monitors and correlates Zscaler logs to give you a better understanding of what’s happening in the environment
  • Zscaler Internet Access (ZIA) provides secure connections for all users no matter what device they are using and Zscaler Private Access (ZPA) allows the user access to private applications while effectively keeping the application hidden from the internet
  • The tight integration between Zscaler and Splunk Cloud simplifies security operations by reducing the need to pivot across product consoles during investigations
  • API-level integration with Splunk SOAR enables automation and orchestration within Zscaler and mitigates the proliferation of threats

Fill out the form below to view this archived event.


Resources


Featured

Google and Okta have joined forces to streamline and secure identity management in higher education, leveraging Okta’s robust IAM platform and Google Workspace’s extensive collaboration tools. This partnership aims to automate identity processes, enhance cross-platform access, and support the unique...

This case study explores the challenges and solutions experienced by the state of California in regards to a full cloud transition of their legal operations. Download the resource to learn from common mistakes and how to make the move the right way.

An email account today is not only a digital identity, but also a key to your SaaS applications and an unattended archive of sensitive content. Material can protect accounts even after they have been compromised and give you the tools to keep your users, internal and external VIPs, and information s...

This one-pager introduces Read AI, an AI-powered solution that enhances productivity by generating summaries, transcripts, and highlights for meetings, emails, and messages. It integrates seamlessly with major platforms like Microsoft Teams, Google Meet, and Zoom, emphasizing security through SOC 2 ...

CIS Hardened Images are pre-configured virtual machine images aligned to CIS Benchmarks, available on AWS, Azure, Google Cloud and Oracle Cloud. They provide scalable, cost-effective cloud environments with built-in compliance reporting, regular updates and support for frameworks like FedRAMP, PCI D...

Government supply chains are hampered by fragmented data spread across ERPs, logistics systems, and vendor portals, making it impossible to get a unified, real-time view of inventory, shipments, and supplier risk. Incorta + Google address this by pulling granular, cross-system supply chain data into...

Ibl.ai is transforming education with generative AI, providing personalized tutoring, content creation, and administrative analytics. With partnership from Google and Amazon Web Services, ibl.ai offers scalable AI agents to boost student achievement and optimize educational processes.

Learn how Nasuni and Google Cloud are transforming the management of CCTV footage for City and State agencies. As urban surveillance systems expand, the demand for robust video storage solutions grows. Traditional storage methods can't keep up with the massive amounts of data generated by thousands ...

Gain complete control over your organization’s data with Qanapi’s Key Management Service (KMS). Designed for teams using Google client-side encryption, Qanapi enables you to securely manage encryption keys, ensuring data is locked before reaching the cloud and seamlessly unlocked when ne...

Access this webinar recording to see how Studio Science’s groundbreaking Youth Placement Exchange is transforming the juvenile justice system. Built with Salesforce and Mulesoft API, this secure solution empowers courts and treatment providers to rehabilitate youth while fostering safer, stron...