Message: Only variable references should be returned by reference
Line Number: 257
Channel partners, distributors and SIs are invited to attend the Global Partner Summit. We’ll focus on building and growing your security practice. Come learn about the latest trends in security, innovative solutions and the channel vision from HPE top executives.
|8:30am - 9:00am||BREAKFAST|
|9:00am - 9:15am||Welcome & State of the Business|
|9:15am - 9:45am||State of Security|
|9:45am - 10:30am||HPE Data Security|
|10:30am - 10:45am||BREAK|
|10:45am - 11:30am||Security Operations|
|11:30am - 12:15pm||Application Security|
|12:15pm - 1:30pm||LUNCH|
|11:30am - 2:15pm||Developing an MSSP Business|
|2:15pm - 3:15pm||Panel Discussion|
|3:15pm - 3:45pm||Program Updates|
Reinforce your position as an industry leader and connect with security customers. Leverage this opportunity to engage nearly 2,000 influencers, decision makers and technologists in one location.
The sooner you join as a sponsor, the sooner you can take advantage of HPE Security’s marketing investment in Protect 2016.
If you have to cancel your event registration, the following terms apply:
Please submit your cancellation request in writing to the Protect 2016 Registration Team
Protect 2016 registration substitutions must be received in writing by email to the Registration Team indicating both the original attendee and the substitute registrant. Sharing of attendee passes is not allowed. One pass per person only—this applies to the duration of the event.
Develop your skills and deepen your product knowledge. Enroll in the session of your choice via the Protect 2016 registration system. Partner bootcamps are open to distributors and channel resellers only. Space is limited, so sign up early.
Attendees are required to provide their own laptops with wi-fi capability.
|HPE Security ArcSight Management Center||HPE Security ArcSight Management Center (ArcMC) simplifies policy configuration, deployment maintenance and monitoring tasks. This training covers techniques needed to centralize device management, user management and configuration management with ArcMC. Learn integration strategies to reduce daily management of ArcMC, logger, connector appliance and connectors products.||
|HPE Security ArcSight Activate workshop||Reduce content implementation and support costs while increasing consistency in your deployment. Learn how the HPE Security ArcSight Activate Framework works and how to deploy it in your ArcSight solution.||
|HPE Security hunt teams workshop||While our adversaries’ capabilities and techniques evolve, so must ours. HPE Security Intelligence and Operations Consulting (SIOC) takes a unique approach to hunting that builds on years of experience leading the industry in security operations. Through combining advanced analytical tools and techniques with effective processes, HPE SIOC is changing the battlefield for our customers and our industry. This unique training will help you understand the core capabilities necessary to build a hunt team, technologies that can be used to quickly identify unknown attacks and methodologies to tie your hunt team into your security operations to identify and mitigate a wide range of advanced threats.||
|HPE Security operations primer||Looking to build a security operations capability? Join us for an intensive look into what it takes to develop an internal security monitoring and incident response capability. Learn security operations best practices directly from the experts.||
|HPE Security WebInspect Enterprise - using and administering||Introduction to WebInspect Enterprise, which manages dynamic and static scanning focuses to ensure effective and efficient application security during your SDLC. This course will demonstrate how to create and manage your automated web application vulnerability scans and provide security risk solutions. This training also provides participants with hands-on activities using a practical, solutions-based approach to identify and mitigate today’s biggest application security risks. Students learn to create, scan and manage projects using both HPE Fortify SSC (Software Security Center) and WebInspect Enterprise.||
|HPE Security ArcSight FlexConnector Configuration||HPE Security ArcSight FlexConnector Configuration training provides you with an overview of the ArcSight SmartConnectors framework and explains the ArcSight ESM Schema. It teaches you how to construct and manipulate FlexConnector configuration and property files and use various parsing methods including fixed delimited, regular expressions and database query. Examples from standard connectors are used to illustrate device-specific methodologies.||
Partner bootcamps are open to distributors and channel resellers only. Limited space, so register early.
Attendees are required to provide their own laptops with wi-fi capability.
|HPE Security ArcSight||
This two-day bootcamp is designed for HPE channel partner pre-sales team members. Build skills that will equip you to represent and position HPE Security ArcSight solutions and understand concepts of delivering ArcSight solution proof-of-concept engagements. Learn from deep-dives into ArcSight products with hands-on lab work. And hear about advanced ArcSight topics related to architecture and solution sizing.
Pre-requisites: This training is technical in nature. This is not an ArcSight basic training course, but is intended to augment already-developed skills.
|Free to distribution partners and channel resellers only. Not open to HPE employees, prospects or customers.||
|HPE SecureData integration||This bootcamp is targeted at developers, partners or sales engineer team members with hands-on integration or PoC responsibilities. Learn how to install HPE SecureData as well as develop and debug an HPE simple API for Java web application. Please bring a laptop with wi-fi capabilities. All other training resources will be provided.||Free to distribution partners and channel resellers only. Not open to HPE employees, prospects or customers.||
|HPE Security ArcSight MSSP||This bootcamp is designed for partners who are on-boarding as an authorized HPE Security ArcSight MSSP. Get help architecting and setting up your HPE ArcSight platform in a multi-tenant configuration and drive cost-effectiveness in your Security Operations Center. Learn how to manage permissions in the MSSP environment, understand customer tagging and utilize the same to scale your MSSP business.||Free to distribution partners and channel resellers only. Not open to HPE employees, prospects or customers.||
|HPE Enterprise Secure Key Manager||This bootcamp will cover how to implement and configure the HPE Enterprise Secure Key Manager appliance and software within a customer’s environment to support remote encryption key management. We'll pay special attention to 3PAR Array with SED and/or ProLiant server.||Free to distribution partners and channel resellers only. Not open to HPE employees, prospects or customers.||
|HPE Security Fortify||This bootcamp is designed for pre-sales and architecture team members. Its purpose is to build the skills that will equip you to represent and position HPE Fortify application security solutions and effectively deliver proof-of-concept engagements.||Free to distribution partners and channel resellers only. Not open to HPE employees, prospects or customers.||
|HPE Security SecureMail||This bootcamp will enable sales engineers to comfortably demonstrate HPE SecureMail at a customer site. It will explain the technical differences between the HPE solution and competitive solutions using PKI encryption. Attendees will also be demonstrate how a DLP can be configured to automatically encrypt sensitive emails using SecureMail.||Free to distribution partners and channel resellers only. Not open to HPE employees, prospects or customers.||
|HPE ArcSight User Behavior Analytics||This bootcamp is designed for sales engineers and will provide a technical overview, demo and implementation of HPE Security ArcSight User Behavior Analytics. After participating, attendees should be able to give a sales presentation and demo on UBA and will understand what’s involved in a UBA POC.||Free to distribution partners and channel resellers only. Not open to HPE employees, prospects or customers.||
The event takes place at The Gaylord National Resort and Convention Center.
Rooms are based on availability, so please book your room in advance. First night’s deposit + tax are required to hold your room, which will be charged by the hotel at the time of your reservation. The Protect room rate is $234.00 per night + 18% tax + $12.00 resort fee.
All changes to your hotel reservation are subject to hotel availability at the time the change request is submitted. All changes must be submitted by August 31, 2016. After August 31, 2016, a fee of one night + tax may apply. Please submit all changes in writing to the Protect 2016 Hotel Team.
Reagan Washington National (DCA) is the hotel’s primary airport. It is located approximately eight miles from the Gaylord. The average taxi fare is about $25, one-way. Super Shuttle is approximately $19 one way, and reservations are required.
Washington Dulles (IAD) is located approximately 35 miles from the Gaylord. The average taxi fare is about $70, one way from this airport. Super Shuttle is approximately $44 one way, and reservations are required.
Baltimore -Washington (BWI) is located approximately 42 miles from the Gaylord. The average taxi fare is about $70, one way from this airport. Super Shuttle is approximately $45 one way, and reservations are required.
The Gaylord is handicap accessible.
The average high temperature in National Harbor, MD in the month of September is 80 degrees F; 26.67 degrees C.The average low temperature is 57 degrees F; 13.89 degrees C.
National Harbor features dozens of restaurants, shops and nighttime entertainment options. Explore the nearby destinations of Old Town Alexandria, Georgetown and more via the water taxi. Shop at more than three dozen boutiques steps away from the Gaylord in and around near Alexandria, VA.
Over 2,000 security professionals joined forces onsite to explore an integrated approach to security and risk management. See what they experienced so you, too, may fearlessly innovate.VIEW SESSION CATALOG
HPE Protect Highlights 2016
HPE Protect, Sue Barsamian's Opening Keynote
What will you learn at Protect 2016? We're offering six key tracks, each targeting a critical area of enterprise security.
Rapid growth of the app economy has challenged the traditional SDLC, pushing for ever agile processes, more automation and greater collaboration across development, QA and security operations.
The traditional Software Security Assurance (SSA) approach is to deploy static and dynamic testing technologies during the build and QA process. While security testing is still a critical part of a successful SSA program, it is no longer enough. Two new trends emerge in the new SDLC: shifting left onto the desktop of the developer and bringing software security into operations.
In the digital world risk and threats are everywhere and they are increasing in diversity and complexity. These risks include cyber-attacks, disasters and failures, data protection challenges and regulatory pressures.
Hear from the experts how HPE Backup & Governance solutions help organizations address their top concerns around backup and recovery through three primary solution areas: Protect & Prevent – which helps protect against known and unknown threats; Detect & Respond – which helps customers monitor and take action on risk events; and Recover & Comply – which helps ensure business continuity and safeguard compliance with legal and regulatory requirements.
Data security drives leadership in data-centric security and encryption solutions. Join our track sessions and CyberSecurity Hall demonstrations to learn how we help neutralize breach impacts by securing sensitive data-at-rest, in-use and in-motion. Our solutions provide advanced encryption, tokenization and key management that protect sensitive data across enterprise applications, data processing IT, cloud, payments ecosystems, mission critical transactions, storage and big data platforms.
If you’re lucky enough to have a Security Operations Center, you know that it’s a mixed blessing – with threats increasing in intensity, complexity and damage potential, your Intelligent Security Operations has the tough task of continually improving the organization’s security posture. What can be done to dramatically reduce the time to detect a threat that would otherwise go unnoticed for months? How do you reduce security risks when security expertise is hard to come by and retain? How do keep false positives from distracting your team from the real threats? How can processes and technology boost the effectiveness of your scarce security resources?
Join your industry peers, industry thought leaders and the HPE Security ArcSight team to gain best practices and real-world examples of how organizations are successfully addressing these thorny challenges.
Today’s digital workplace that includes mobile users and devices, BYOD, guests and IoT is pushing the boundaries regarding traditional edge and perimeter security. Risks are amplified due to user behavior, mobile apps, unknown device types and the lack of a cohesive protection model. Legacy AAA, NAC and traffic inspection is not enough.
Join us to better understand how integration features and the exchange of context between policy management, MDM/EMM, MFA, firewalls and SIEM solutions provide a new model for securing today’s workplace – in the enterprise, retail, healthcare, education, government or large public venues.
As physical and digital worlds collide, organizations are increasingly reliant on their IT systems to empower their business operations and accelerate business value. The digital world gives rise to extended enterprise eco-systems, which increases the volume and types of risks, threats and vulnerabilities that can impact an organization. The catastrophic effect of a cyber-attack, the huge fines associated with compliance fails and the severe economic impact at the disabling of a data-center have long-standing effects on organizations, their reputations, brands and ultimately shareholder value. Join us to explore an integrated approach to security and risk management.
Thank you to our sponsors from Protect 2016.
Get the latest from leading bloggers and twitterati about what's going on with Protect. Visit often for frequent, relevant posts.