& cplSiteName &
Comments
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
pdonegan67
50%
50%
pdonegan67,
User Rank: Light Sabre
6/12/2014 | 1:48:03 PM
The four key technologies for network security
Ed points to encryption, containerization, proxy & virtualization as the four key pillars of technology for enabling operators to protect the network in a mobility era where the perimeter can no longer do the job it used to do. The video presentation is well worth a look.

 
Ray@LR
50%
50%
[email protected],
User Rank: Blogger
6/11/2014 | 12:27:50 PM
A great video for many reasons...
This video was first shown to the audience at the recent Light Reading event on mobile network security in London, hence the introduction. 

It is also one of the best B2B videos I have ever seen, for a number of reasons.

1) Amoroso not only knows his stuff but is able to communicate very effectively

2) His views on how the whole approach to mobile network security need to change are genionely fascinating and insightful

3) he enslists the hlpe of colleagues who are also able to impart fantastic insights

4) Amoroso clearly has his eyes on Jimmy Fallon's job... or a stint in Vegas.  


Featured Video
Flash Poll
Upcoming Live Events
September 17-19, 2019, Dallas, Texas
October 1, 2019, New Orleans, Louisiana
October 2-22, 2019, Los Angeles, CA
October 10, 2019, New York, New York
November 5, 2019, London, England
November 7, 2019, London, UK
December 3-5, 2019, Vienna, Austria
December 3, 2019, New York, New York
All Upcoming Live Events
Partner Perspectives - content from our sponsors
Transform Beyond Borders to Lead the Innovation
By Ben Zhou, CEO, Whale Cloud
Reject Limits. Build the Future.
By David Wang, Huawei
China Telecom & Huawei Jointly Complete the World's First End-to-End 5G SA Voice & Video Call
By Jay Liu, Senior Marketing Manager, Cloud Core Product Line, Huawei Technologies
All Partner Perspectives