Compromised IOT devices are increasingly becoming a source of botnet attacks. But even as enterprises turn to VPNs to secure these devices, holes in their security posture remain. Learn how to strengthen your security posture by inspecting branch-to-branch traffic through a central firewall deployed in cloud.
Presenters:
-
Manny CaleroPrincipal Solutions Strategist Aviatrix

-
Jorge Alberto Cortes CanoPrincipal Solutions Architect Aviatrix

-
Host: Rod StuhlmullerVP Product Marketing Aviatrix

-
Sarah ConnersPrincipal Solutions Architect Aviatrix

-
Sarah ConnersPrincipal Solutions Architect Aviatrix

-
Rod StuhlmullerVP Product Marketing Aviatrix

Customers who trust Aviatrix















