Members

Blog Posts

Cisco Business Security Consultant in Russia

For many, Cisco is the quality and reliability metric that large companies should choose for themselves. This raises the question: what should small companies with limited IT infrastructure budgets do? We will talk about this and not only at the event, but also give practical advice:

What can you save on when choosing equipment, and where is it better to overpay to protect yourself from potential problems?

How not to get confused in the Cisco equipment line and is it true that Catalyst is a router
Is it possible to set up a secure remote workplace without setting up a VPN?

Nikolay Petrenko, Promotion Manager for Cisco Webex Collaboration Solutions in Russia

Cisco Webex for the price of a cup of coffee

Today, each of us is surrounded by a huge number of all kinds of applications for chats and calls. Most of these apps are free. So why are there still paid messengers? At the event, you will learn about the capabilities of the Cisco Webex corporate messenger, which, as a business application, costs less than a cup of coffee drunk during this presentation.

Alexey Lukatsky, Cisco Business Security Consultant in Russia

How to turn your infrastructure into a cybersecurity tool with a minimum investment

During the pandemic, we not only faced new business challenges, but also realized that it can be done without being tied to our traditional jobs. Now we can conduct our business from anywhere in the world where there is Internet, to which we can connect our laptop, tablet or smartphone, which will connect to applications and data located in our data center or in the cloud.

But these opportunities have brought not only flexibility to the business, but also new questions, some of which sound like this:

· Can i trust cloud services?

· Can I trust employees' personal devices?

· How can I secure the connection of a remote or mobile worker?

· How can I ensure that an intruder hiding behind my employee's account will not gain access to my data?

· How can I be sure that my employee's mother-in-law or mother-in-law does not connect to my applications from his home computer?

· How can I protect an employee if no security equipment can be installed on his home computer, because the computer is very old?

These and many other cybersecurity questions arising in the process of transition to a new, post-image reality will be answered during the speech.

In addition, all participants will receive a practical checklist that will allow them to assess how much their companies are already ready to work in the new environment.

For more information about: cisco call manager

Views: 6

Comment

You need to be a member of On Feet Nation to add comments!

Join On Feet Nation

© 2024   Created by PH the vintage.   Powered by

Badges  |  Report an Issue  |  Terms of Service