Hi [[ session.user.profile.firstName ]]

Trend Micro APAC

  • Date
  • Rating
  • Views
  • Beyond Next-Gen – Best Practices for Future-Ready Endpoint Security
    Beyond Next-Gen – Best Practices for Future-Ready Endpoint Security
    Doug Cahill, ESG; Ty Smallwood & Robert Jones, Navicent Health; Wendy Moore, Trend Micro Recorded: Dec 14 2016 59 mins
    Eliminating security gaps and providing maximum protection against today’s and tomorrow’s threats requires a new approach. Join Enterprise Security Group’s Doug Cahill, Senior Analyst, as he discusses a strategic approach to endpoint security that will transcend generations and keep pace with the shifting threat landscape and broadening attack surface area. You will also hear from real practitioners from Navicent Health—Ty Smallwood, Information Services Security Officer, and Robert Jones, IT Security Systems Analyst, outline how their organization leverages Trend Micro™ XGen™ endpoint security to effectively protect against the real-world threats they face.
  • Beyond Next-Gen – Best Practices for Future-Ready Endpoint Security
    Beyond Next-Gen – Best Practices for Future-Ready Endpoint Security
    Doug Cahill, ESG; Ty Smallwood & Robert Jones, Navicent Health; Wendy Moore, Trend Micro Recorded: Dec 8 2016 59 mins
    Eliminating security gaps and providing maximum protection against today’s and tomorrow’s threats requires a new approach. Join Enterprise Security Group’s Doug Cahill, Senior Analyst, as he discusses a strategic approach to endpoint security that will transcend generations and keep pace with the shifting threat landscape and broadening attack surface area. You will also hear from real practitioners from Navicent Health—Ty Smallwood, Information Services Security Officer, and Robert Jones, IT Security Systems Analyst, outline how their organization leverages Trend Micro™ XGen™ endpoint security to effectively protect against the real-world threats they face.
  • Uç nokta güvenliğinde değişime hazır mısınız?
    Uç nokta güvenliğinde değişime hazır mısınız?
    Mehmet Dağdevirentürk, Trend Micro Akdeniz Ülkeleri Kanal Müdürü Recorded: Nov 10 2016 59 mins
    Önemli Bilgi: Yaşanılan saat farkı problemi nedeniyle Webinar saati aşağıda 1:00 pm görünmesine rağmen  takvimlerinizde 2:00 pm olarak yer alacaktır. Webinarımız Türkiye saatiyle 14:00’te yapılacaktır. 

    Trend Micro, yeni benzersiz XGen™ Endpoint Security teknolojisiyle çok hassas makine öğrenme teknolojisini şirket ağlarındaki tüm bağlı cihazları koruyan çözümlerine entegre ediyor. Trend Micro olarak çok katmanlı savunma teknolojilerine tamamen yeni bir bakış açısı sunuyoruz.

    Doğru zamanda doğru güvenlik çözümünün kullanılmasını temel alan bu teknoloji tehditleri gözlemliyor, öğreniyor ve içinde barındırdığı en uygun çözümü seçerek gerçek zamanlı olarak uyguluyor. Trend Micro’nun şirket ağlarına bağlı tüm cihazları koruyan uç nokta çözümlerine entegre edilen bu yeni teknoloji, siber güvenlik alanında çok katmanlı savunma teknolojisine tamamen yeni bir bakış açısı sunuyor.

    Yeni teknolojimiz, bilinmeyen zararlı yazılımların davranışlarını öğrenebilen ve karşı koyabilen “machine learning” üzerine kurulu olup bu yeni teknolojinin sağladığı faydalar konusunda sizleri web seminerimize katılmaya davet ediyoruz.
  • 2016 Midyear Security Roundup: The Reign of Ransomware
    2016 Midyear Security Roundup: The Reign of Ransomware
    Myla Pilao, Director, TrendLabs Marketing Communications Recorded: Sep 27 2016 38 mins
    Ransomware and business email compromise (BEC) scams have dominated the security threat landscape for the first half of 2016, truly making it the Year of Online Extortion. This webinar is designed to discuss these and other prominent threat trends we are currently seeing, as well as to give organizations possible security strategies and solutions that they can use to better defend their assets and data.
  • 2016 Midyear Security Roundup: The Reign of Ransomware
    2016 Midyear Security Roundup: The Reign of Ransomware
    Paul Oliveria, Technical Communications Manager, Trend Micro Recorded: Sep 22 2016 45 mins
    Ransomware and business email compromise (BEC) scams have dominated the security threat landscape for the first half of 2016, truly making it the Year of Online Extortion. This webinar is designed to discuss these and other prominent threat trends we are currently seeing, as well as to give organizations possible security strategies and solutions that they can use to better defend their assets and data.
  • Fidye Yazılıma HAYIR!
    Fidye Yazılıma HAYIR!
    Mehmet Dağdevirentürk, Trend Micro Akdeniz Ülkeleri Kanal Müdürü Recorded: Jul 26 2016 63 mins
    Trend Micro Akdeniz Ülkeleri Kanal Müdürü Mehmet Dağdevirentürk, kendinizi ve firmanızı fidye yazılımlara karşı nasıl koruyacağınızı ve fidye yazılımlarla ilgili son gelişmelerin neler olduğunu sizlerle paylaşıyor. Fidye yazılıma karşı savunmanın sihirli bir formulü yok, ancak en yaygın saldırı yöntemlerini bilmeniz, en iyi korumayı sağlamak için atacağınız öncelikli adımları bilmenizi sağlar. Bu webinarda Trend Micro olarak sizlerle tecrübelerimizi paylaşarak karşılaşabileceğiniz olası risklere karşı planınızı şimdiden oluşturmanız için bir yol haritası sunuyoruz.
  • 이메일을 통한 랜섬웨어와 지능형지속위협(APT)에 대한 대응 방안
    이메일을 통한 랜섬웨어와 지능형지속위협(APT)에 대한 대응 방안
    기술지원팀 최영삼실장, 기술지원팀 실장 Recorded: Jul 19 2016 53 mins
    최근 피해가 확산되고 있는 이메일을 통한 랜섬웨어와 지능형 지속위협의 현황을 살펴보고 이메일 전용 보안 시스템인 Deep Discovery Email Inspector를 통해 랜섬웨어와 같은 알려지지 않은 악성코드로 부터의 위협에 어떻게 사전 대응할 수 있는지를 살펴봅니다.
  • How to Defeat Ransomware
    How to Defeat Ransomware
    Bilal Baig, Technical Director for Mediterranean, Middle East, Africa, CIS, Trend Micro Recorded: Jun 2 2016 47 mins
    Cyber criminals can hijack your business by encrypting your data and holding your systems hostage until you pay up. Ransomware can enter an organization through many vectors; including via email spam, phishing attacks, or malicious web downloads. Like other high sophisticated threats, organizations are recommended to employ multiple layers of protection on the endpoint, gateway and mail servers for the highest level of protection against ransomware. Ransomware has become increasingly complex and advanced over time and making prevention and protection more challenging. Join our webinar to understand more about this threat and learn best practices to protect your business and combat ransomware!
  • PCI DSS 3.1 Compliance in Modern Data Center & Cloud: Lessons & Advices
    PCI DSS 3.1 Compliance in Modern Data Center & Cloud: Lessons & Advices
    Forrest McMahon, Director Tech Advisory & Assessment Svcs Coalfire; & Steve Neville, Director Cloud & Data Center Trend Micro Recorded: May 25 2016 49 mins
    Join Forrest McMahon from Qualified Security Assessor (QSA) Coalfire for an insightful view of PCI DSS 3.1 requirements in the face of increasingly sophisticated cyber-attacks and more complicated deployment scenarios:
    1. How to approach the task of PCI DSS 3.1 compliance
    2. What the impacts of different deployment environments (physical, virtual, cloud) have on compliance
    3. What key tools & approaches can be used to streamline and ease compliance impacts
  • PCI DSS 3.1 Compliance in Modern Data Center & Cloud: Lessons & Advices
    PCI DSS 3.1 Compliance in Modern Data Center & Cloud: Lessons & Advices
    Forrest McMahon, Director Tech Advisory & Assessment Svcs Coalfire; & Steve Neville, Director Cloud & Data Center Trend Micro Recorded: May 19 2016 49 mins
    Join Forrest McMahon from Qualified Security Assessor (QSA) Coalfire for an insightful view of PCI DSS 3.1 requirements in the face of increasingly sophisticated cyber-attacks and more complicated deployment scenarios:
    1. How to approach the task of PCI DSS 3.1 compliance
    2. What the impacts of different deployment environments (physical, virtual, cloud) have on compliance
    3. What key tools & approaches can be used to streamline and ease compliance impacts

Embed in website or blog