Date(s) - 02/11/2020
1:00 pm - 2:00 pm
Theme: Scalable Network Security with SWARM-SecOps
Hosted by: IP Performance
SWARM-SecOps is a scalable solution providing visibility into your network events allowing us to apply our know-how. By gaining visibility of your operations you will get actionable information to improve your security posture. Businesses come in all shapes and sizes, from the Simple to complex, SWARM scales to meet your needs. You know your business – we know how to help you protect it.
This webinar is presented by:
Senior Engineer, IP Performance Ltd
Andy has been working in network and security infrastructure in a pre and post sales role for 20 years having moved from a service-based industry to IT/Telecomms in the year 2000. At IP Performance, Andy started as a junior support engineer supporting ISP customers. Today, Andy supports multiple customer environments from a design, implementation and support perspective across ISP's, Rail Operators, Local Government, Higher Education and Energy Supply covering IoT, Security, Routing, Switching and Firewall platforms. Andy has an unhealthy interest in centralised logging and network visibility.
Senior Network and Security Engineer, IP Performance Ltd
Duncan has been a network and security engineer for 15 years. He started his career as a first line support analyst for a large managed services corporation where he became interested in Networking. He then moved to IP Performance and became a specialist in networking, application delivery more recently security. He has built, designed and supported network infrastructure for ISPs, Rail Operating Companies, Local Government, Higher Education institutions and large internet presences. Luke Flinders
Senior Security Analyst, IP Performance Ltd
Luke has worked in the Financial and Health sectors and is now sharing his skill via IP-Performance to support National Infrastructure. During his career he has been heavily involved in a number of Incident response situations including Ransomware, Webserver compromise and data breaches. He is also involved in developing Threat hunting and advisory emulation procedures to help you find what your tools have missed. He is always looking to share his knowledge, even to those that don’t want to hear it.