Leveraging Automation to Securely Adopt Next-Gen Firewalls: A Faster, More Efficient Approach

Date: Wednesday, June 26th at 11am PT / 2pm ET

Join Insight expert Kevin Wilson along with Red Hat Ansible expert John Gibson, for a webinar on how organizations can securely automate and speed up the adoption of Next-Gen Firewalls (NGFWs) using the Red Hat Ansible Automation Platform. During this webinar, you'll learn:

  • How to decrease unplanned downtime
  • How to speed up security implementation and improve compliance while maintaining business agility
  • Real-life examples of how Red Hat Ansible can help prevent outages and misconfigurations and reduce resourcing requirements when making changes to NGFWs
  • The benefits of an iterative strategy when approaching an NGFW automation implementation, and what to look for in a partner

Don't miss this opportunity to learn from our experts and discover how you can streamline your NGFW change deployment, all while improving security and compliance. Register now.

About the presenters:

John Gibson, ISV Partner Alliance Manager, Red Hat

John is an experienced ISV partner alliance manager at Red Hat, recognized for his expertise in the computer software industry. With a strong background in sales, he is adept in employee training, network design, teamwork and Salesforce. John has a notable track record of designing and leading integrations and certifications for OpenShift and Ansible, focusing on cutting-edge technologies such as AI, Machine Learning (ML), automation and Kubernetes.

Kevin Wilson, Field Architect, Insight

Kevin is a seasoned field architect at Insight, boasting more than 30 years in the IT industry. His expertise spans networking, data center transformation and security services, with a background in enterprise consumer, system integrator and consultancy roles. Kevin is known for his ability to manage complex multivendor projects, providing comprehensive architectural design and ensuring their successful completion.


This content is provided in partnership with Insight and Red Hat. As a result, both Insight and Red Hat are collecting your personal data when you submit such information as part of the form submission process. For more information on each party’s privacy practices, please see: Insight’s Privacy Policy and Red Hat's Privacy Policy.

Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.