& cplSiteName &
Comments
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
pdonegan67
50%
50%
pdonegan67,
User Rank: Light Sabre
6/12/2014 | 1:48:03 PM
The four key technologies for network security
Ed points to encryption, containerization, proxy & virtualization as the four key pillars of technology for enabling operators to protect the network in a mobility era where the perimeter can no longer do the job it used to do. The video presentation is well worth a look.

 
Ray@LR
50%
50%
[email protected],
User Rank: Blogger
6/11/2014 | 12:27:50 PM
A great video for many reasons...
This video was first shown to the audience at the recent Light Reading event on mobile network security in London, hence the introduction. 

It is also one of the best B2B videos I have ever seen, for a number of reasons.

1) Amoroso not only knows his stuff but is able to communicate very effectively

2) His views on how the whole approach to mobile network security need to change are genionely fascinating and insightful

3) he enslists the hlpe of colleagues who are also able to impart fantastic insights

4) Amoroso clearly has his eyes on Jimmy Fallon's job... or a stint in Vegas.  


Featured Video
Upcoming Live Events
September 17-19, 2019, Dallas, Texas
October 1-2, 2019, New Orleans, Louisiana
October 10, 2019, New York, New York
October 22, 2019, Los Angeles, CA
November 5, 2019, London, England
November 7, 2019, London, UK
December 3, 2019, New York, New York
December 3-5, 2019, Vienna, Austria
March 16-18, 2020, Embassy Suites, Denver, Colorado
May 18-20, 2020, Irving Convention Center, Dallas, TX
All Upcoming Live Events