Websense, Inc., a global leader in unified Web, data, and email content security, delivers the best security for modern threats at the lowest total cost of ownership. Our channel will include frequent webinars aimed at helping companies protect themselves against modern threats.
Hit “Like” and Keep your Data Secure: Safe Social Media Use for BusinessJoerg Sieber, Product Marketing Manager for Web Security, Websense, Inc.When you consider the abundant security risks, many companies are still wary about broadly enabling social media. After all, nowadays your social media identity may be more valuable to cybercriminals than your credits cards. However, with the right tools, it is possible to be safe while being social. In this webcast, we’ll examine the latest tactics cybercriminals are using within social media to target individuals and get access to information. We’ll also discuss the importance of real-time defenses at the gateway and review Websense social controls and video categories. Other topics will include: - Seven stages of advanced threats and how social networking plays into early stages - Websense defenses for social media threats (inline, real-time, etc.) - Benefits of the Websense/Facebook partnership.Read more >
When you consider the abundant security risks, many companies are still wary about broadly enabling social media. After all, nowadays your social media identity may be more valuable to cybercriminals than your credits cards. However, with the right tools, it is possible to be safe while being social. In this webcast, we’ll examine the latest tactics cybercriminals are using within social media to target individuals and get access to information. We’ll also discuss the importance of real-time defenses at the gateway and review Websense social controls and video categories. Other topics will include: - Seven stages of advanced threats and how social networking plays into early stages - Websense defenses for social media threats (inline, real-time, etc.) - Benefits of the Websense/Facebook partnership.
Targeted attacks are now well beyond traditional URL+AV defenses, and forward facing defenses do not provide containment against data theft and cybercrime call-home communications. In addition, cloud apps, mobility and remote users are increasing SSL use that is often a blind spot for many defenses. Change is the only constant in the IT security world and being educated on threat stages, defenses, and effectiveness is paramount.
CISOs around the world are telling analysts that the majority of today’s emerging threats are bypassing their anti-virus, firewalls, and intrusion prevention solutions. In response, analysts suggest that IT needs to assume a more proactive stance. Such a shift can involve more tightly integrated defenses, strengthening in-house IT resources, and leveraging appropriate outside resources. In this webinar, Websense will discuss ways to begin this shift today including:
- Expanding ‘inbound’ defenses to include ‘outbound’ controls
- Options for enhancing in-house IT security expertise
- Leveraging research-grade forensic tools such as Websense ThreatScope™
Real-world context will be provided as an actual malware sample undergoes forensic dissection and the Websense CyberSecurity Intelligence™ service is reviewed as a concrete example of the capabilities of today’s threat intelligence marketplace.
The consumerization of IT is hitting hard and Mobile Device Managment (MDM) needs mobile security. Personal and corporate-owned devices are flooding the workplace. Companies need to secure these devices, and they are turning to Mobile Device Management (MDM).
But an MDM solution will not address your primary concerns around securing your data. Learn how to safely allow mobile devices in the workplace while protecting against mobile threats and data loss.
Key topics in the session will include:
· Mobility trends including consumerization of IT
· Profile of a mobile user
· Current approaches to Mobile Security
· The Websense approach
Phish or no phish? That’s the question that employees—and executives in particular—have been asking themselves more frequently. They’ve heard about how high profile organizations and even government agencies have fallen prey to attacks that stemmed from seemingly harmless emails. Has the door been left wide open?
Join Websense on June 20th as we provide guidance on how you can recognize advanced threats and protect yourself from them. Attendees will gain practical insights into:
· Recent Email Phishing Schemes
· Telltale Signs of Advanced Targeted Attacks
· Best Practice Principles to Educate Users
· Technology Capabilities to Minimize Risk of Compromise
CIOs don’t need to be convinced about data loss protection. Compliance, financial implications, brand reputation are all factors that drive this need. The real problem is that people are afraid of failure and wasting time, money, resources. They've heard about the operational nightmares, the complexity and failed deployments over the last several years. In addition, RSA and Symantec both had data stolen publically, implying the integrity of the solutions’ value is uncertain.
During this interactive session attendees will receive valuable insight on how security works and learn the secret of understanding and communicating risk. Equipped with this knowledge, Andrew will provide a practical and measurable framework for managing risk to information assets using Data Loss Prevention.
What attendees will learn:
Guiding Principles of Security and Risk Management
Data Breach Trends from the Last 6 Years
DLP Methodology and Execution Strategy
Success Factors in Addressing the Web DLP Challenge
2011 was arguably the most surprising year in IT security history, with groundbreaking breaches at many of the world's top organizations. In this webinar we will analyze the threats and trends of 2011 while offering guidance for dealing with the evolving security landscape of the future. Key topics will include:
Significant discoveries and events from 2011 and lessons to take away
Detailed threat analysis by threat type, delivery, region, and more
Statistical roll-up of top spam topics by category and email type
Data theft and loss events and how containment defenses continue to evolve
Websense Threat Report findings are fueled by the Websense Advance Classification Engine (ACE) and the Websense ThreatSeeker™ Network, one of the world's largest security intelligence networks with over 850 million end users providing 3-5 billion requests per day for security, data and content analysis.
Today’s ever-evolving Web and age of advanced persistent threats are spelling an end to static defenses focused on inbound known threats. In addition, surging trends such as consumer apps and cloud computing, social networking, plus mobility are redefining the perimeter and making real-time contextual defenses a requirement. Join Websense on February 8th as we discuss Contextual Defenses for Web 2.0 and offer guidance for how you can protect today’s empowered users from advanced malware while containing data theft. This webinar will discuss key requirements for defenses in the modern day including: