Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Avoid the Headlines: Best Practices for Securing the Endpoint
    Avoid the Headlines: Best Practices for Securing the Endpoint
    Tom Bain, VP of Security Strategy, CounterTack Recorded: Dec 9 2014 46 mins
    Organizations from eBay to Home Depot are being targeted by cyber criminals - and the attackers are winning. Outdated firewall and anti-virus solutions are being evaded easier and more quickly than ever, how can these attacks be prevented and get ahead of the threats?

    Join CounterTack Security Strategist Tom Bain for a live webinar that will discuss the best practices every organization should be utilizing to take back control of security where they are most susceptible – at the endpoint.

    In this webinar you will learn how to:
    - Cut valuable time from infection to detection to response in your systems
    - Employ stealth endpoint monitoring on every endpoint that sits undetected to the attack and the end-user
    - Capture every component of an attack and produce real-time attack classification
    - Run a full remediation process including isolating the infected endpoint, terminating files or process and denying network access
    - Leverage on-premise, Big Data technology to manage thousands of endpoints at scale
  • Defeating the Four Unfair Advantages of APT’s
    Defeating the Four Unfair Advantages of APT’s
    Tom Bain – VP of Security Strategy at CounterTack Recorded: Sep 25 2014 43 mins
    Cybercriminals, state-sponsored hackers and persistent adversaries who target enterprise systems contribute to the growing problem of what we term advanced persistent threats. (APTs)

    APT’s present a multi-layered challenge to security teams and incident responders who struggle to keep up with the pace of attacks and the volume of incidents they cause.

    Workstation and server endpoints are particularly susceptible to four distinct advantages APT’s hold over defenders:

    1. Techniques that bypass or disable signature-based defenses
    2. The capability to initiate large-scale attacks from a singular endpoint
    3. Evasion of network-based detection or sandboxing
    4. Stealth methods at the operating system level

    This webinar will look at how to counter each of these four unfair advantages specifically, in implementing a continuous and adaptive security approach centered on monitoring endpoint behavior, and leveraging advanced analytics to respond to APT’s, and eliminate the overall impact.
  • Securing the Enterprise with Real-time Threat Detection
    Securing the Enterprise with Real-time Threat Detection
    Mike Davis, Chief Technology Officer, CounterTack Recorded: Jun 25 2014 31 mins
    Organizations lack the protection and controls on mobile endpoints, mainly laptops and mobile devices. As a result, it is difficult for security teams to effectively defend against unknown threats, particularly when executives travel to geographical areas where connecting to seemingly trusted networks only becomes a risky move based on the fact that criminals are ready to pounce on unsuspecting users. In this webinar we will walk through an advanced endpoint attack in real-time, showing how the behaviors and events are detected, while discussing the necessary steps security teams should follow from detection to infection to response. You will learn how real-time endpoint threat detection lets operators understand the context of operating system and network threats; collecting critical information that they can act on if threats start to become more aggressive or pervasive.

Embed in website or blog