Hi [[ session.user.profile.firstName ]]

Digital Guardian

  • Date
  • Rating
  • Views
  • Top 5 Questions About Advanced Cyber Threats Top 5 Questions About Advanced Cyber Threats Patrick Upatham, Global Director, Advanced Cyber Security & Bill Bradley, Director Product Marketing, Digital Guardian Recorded: Jan 20 2016 52 mins
    Threats to your organization’s sensitive data are evolving. Attackers are modifying their tactics, their techniques, and their procedures. How can your organization better detect and respond to these threats? Join Patrick Upatham, Digital Guardian’s Global Director, Advanced Cyber Security to hear how the threat landscape is shifting and how your organization can be better prepared to handle the threats.

    Watch this webcast to learn:
    • How do Advanced Threats and Advanced Persistent Threats differ?
    • What are the typical indicators of compromise or attack; how effective are they?
    • Why traditional response options are often ineffective, at best.
  • A Zero-Day Agnostic Approach to Defending Against Advanced Threats A Zero-Day Agnostic Approach to Defending Against Advanced Threats Eric Hanselman, Chief Analyst, 451 Research & Dave Karp, VP Technical Enablement, Digital Guardian Recorded: Dec 9 2015 51 mins
    As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • Tips to Build Your Data Protection Business Case Tips to Build Your Data Protection Business Case Heidi Shey, Senior Analyst, Forrester Research; Bill Bradley, Director of Product Marketing, Digital Guardian Recorded: Nov 18 2015 62 mins
    Data protection has reemerged as a top solution to the increasing number of data breaches. But how do you persuade your leadership team to adopt a new security technology? Join Forrester Research and Digital Guardian as they discuss the steps to build a business case for data protection, where to gain allies throughout the organization, and how to effectively communicate your business case.

    Watch this webcast to learn:
    · How to establish the success factors for a data protection program
    · How to quantify the top line and bottom line benefits of data protection
    · Who in the organization, aside from the usual suspects, to get on board early in the project timeline
  • 451 Research: Why Data Loss Prevention is Hot Again 451 Research: Why Data Loss Prevention is Hot Again Garrett Bekker, Senior Security Analyst at 451 Research William Bradley, Director of Product Marketing, Digital Guardian Recorded: Oct 29 2015 60 mins
    According to 451 Research, "interest in data security is rising, and one of the earliest approaches to securing data - data loss prevention - is coming back in full force."
    Join this webinar to learn why DLP is "back in vogue" with 451 Research predicting the DLP market growth to $1.7B by 2019 - and why you should consider it as part of your security mix.

    Topics covered:
    - The factors that are making DLP a security spending priority
    - Understanding what DLP is and isn't
    - The challenges of DLP
    - Why not all DLP tools are created equal
    - Key items to consider when selecting a DLP offering
  • Meaningful Data Protection in 90 Days with a Gartner Magic Quadrant Leader Meaningful Data Protection in 90 Days with a Gartner Magic Quadrant Leader Mark Stevens, Senior VP, Global Services, Digital Guardian Recorded: Oct 28 2015 42 mins
    “With the Digital Guardian Managed Security Program we achieved our phase one data protection objectives in less than 120 days. No other vendor we considered was even talking in the same terms.” Mike Ring, Senior IT Manager, Threat and Solution Architect, Jabil.
    In this webinar, Mark Stevens, Senior VP, Global Services, Digital Guardian will detail:
    •Why Digital Guardian is a Gartner Magic Quadrant leader in Content-Aware Data Loss Prevention
    •Real world examples of the reporting, analysis and insights we deliver to our customers to prevent the theft of sensitive data
    •Our delivery methodology that can get your organization to meaningful data protection in 90 days or less
  • Customer Spotlight: How Redner's Markets Secures Their POS Systems Customer Spotlight: How Redner's Markets Secures Their POS Systems Bill Bradley from Digital Guardian & Eric Moody from Redner's Markets Recorded: Sep 24 2015 30 mins
    Customer Spotlight: How Redner's Markets Secures Their POS Systems - Without Slowing Down the Customer

    Redner’s Markets needed to secure their POS systems and align with PCI requirements. They tried A/V, but the overhead bogged down their POS terminals. So they piloted Savant Protection application whitelisting in one store. Seven years and 45 grocery stores later, Savant Protection is still securing Redner’s Markets POS systems and helping maintain PCI compliance.

    Hear from Bill Bradley, Director of Product Marketing, Digital Guardian and Eric Moody, POS Systems/Data Security Manager, Redner’s Markets to learn how Redner’s Markets:

    • Made the switch from A/V to application whitelisting
    • Discovered a more efficient way of managing and updating machines remotely
    • Uses application whitelisting in PCI audits
    • Integrated Savant alert logging into their event management system to stay informed of unusual events in their POS environment
  • 12 Most Common Questions in a Client Data Protection Audit 12 Most Common Questions in a Client Data Protection Audit Tony Themelis, VP of Product Strategy, Digital Guardian Recorded: Aug 26 2015 34 mins
    Are you ready for your next security audit from one of your most important customers? This webinar will help you gauge your readiness and identify areas you need to improve.

    Sophisticated cybercriminals have identified third party suppliers and service providers as a lucrative back door to steal sensitive corporate information. Consequently, many companies are facing increasing pressure to meet stringent data protection audits from their largest clients.

    Based on our experience with a range of customers who have had to meet stringent partner data protection security audits, we’ve identified the most common data protection audit questions.
    – The 12 most common questions in a client data protection audit
    – What the client is really looking for with each question
    – Guidance on your “audit readiness”
  • Why Application Whitelisting is Essential for Advanced Threat Defense Why Application Whitelisting is Essential for Advanced Threat Defense Guest Speaker: Chris Sherman, Analyst, Forrester Research Recorded: Jul 21 2015 47 mins
    According to Forrester, with the right approach and the right technology, application whitelisting can be an essential component for defending against evolving threats, particularly zero-day attacks that endpoint anti-malware products frequently fail to detect.

    In this webinar Chris Sherman, analyst at Forrester Research will examine:
    - The threat landscape and technology adoption trends
    - The benefits of whitelisting and how the technology has evolved
    - The challenges of application whitelisting and how to overcome them
    - The advantages of using application whitelisting in fixed function environments such as retail POS or Industrial Controls Systems
    - How to integrate application whitelisting into your overall endpoint security strategyWh

    John Fox, Director of Engineering at Digital Guardian will briefly explain:
    - How Digital Guardian application whitelisting is designed to address the key problems traditionally associated with application whitelisting
  • How Splunk + Digital Guardian Protect Data from Advanced Threats How Splunk + Digital Guardian Protect Data from Advanced Threats Tony Themelis, VP Product Strategy, Digital Guardian Recorded: Jun 25 2015 41 mins
    Attacks may be inevitable, but with Digital Guardian loss of sensitive data is not.

    This webinar will explore several customer use cases and show how Security Analysts and Incident Responders can harness the power of Splunk® Enterprise search across Digital Guardian event data to:

    - Detect threats
    - Prioritize threats
    - Respond to threats

    Examples include insider attacks and APTs, and will show how Digital Guardian data can provide valuable context for correlation with threat data from other security solutions in Splunk.
  • Sensitive Data Loss is NOT Inevitable Sensitive Data Loss is NOT Inevitable Dan Geer, CISO, In-Q-Tel & featured speaker Heidi Shey of Forrester Recorded: Jun 9 2015 62 mins
    Learn how to prevent the inevitable intrusions from compromising sensitive data! There is no silver bullet, but there is a solution.

    It’s widely accepted that perimeter breaches are inevitable – the bad guys are getting in. There is no silver bullet and there aren’t enough dollars in any IT security budget to address every vulnerability. But the loss of sensitive data from a breach is NOT inevitable.

    Data Loss Prevention (DLP) is a proven solution that stops the theft of sensitive data. The problem is, DLP is not widely deployed. Why? Put simply, DLP is hard. But just because it’s hard, doesn’t make it a less necessary component of your security strategy.

    In this webinar, Dan Geer and featured speaker Heidi Shey of Forrester will discuss:

    • Why and how CISOs need to get past the DLP horror stories and limited usage to prevent the inevitable intrusions from compromising sensitive data

    • What’s required for DLP to be a success

    • New DLP solution deployment options that get you all the data protection, without the deployment and management headaches.