Hi [[ session.user.profile.firstName ]]

Web Malware Isolation Technology

  • Date
  • Rating
  • Views
  • Architecting the Holy Grail of Network Security
    Architecting the Holy Grail of Network Security
    Bill Gardner, VP of Product Management Recorded: Jan 20 2016 43 mins
    Can you block ports 80 and 443 to secure your organization’s web browsing and live to tell the tale?

    Trying to secure Internet access for an organization’s users has proven to be a nightmare for IT security professionals. The web browser is THE primary attack vector we all struggle to master. Despite the best efforts of the industry to improve security, browser vulnerabilities continue to proliferate with 25 vulnerabilities in Internet Explorer and 4 in Microsoft Edge patched in November 2015.

    Wouldn’t it be nice if we could just set our perimeter firewalls to block port 80 and 443 without having our users break out the torches and pitchforks?

    Join Bill Gardner, VP of Product Management from Spikes Security as he explores new approaches to network security that allows you to block inbound and outbound web browsing traffic allowing you to say goodbye to browser patching forever. Confused? Join us for this webinar and you won’t be!
  • It’s Time to Think Differently About Network Security
    It’s Time to Think Differently About Network Security
    Franklyn Jones, Vice President at Spikes Security. Recorded: Dec 9 2015 35 mins
    Businesses spend millions on security but still get attacked. Think differently to stop attacks.

    Something is seriously wrong here. Businesses spend millions every year on the latest security technologies to keep their businesses safe – and then they still get attacked! Why does this continue to happen over and over again, and what can we do about it?

    This presentation – loaded with compelling research data from many different industry sources – provides revealing statistics on how bad this cyber security problem really is, and why it has continued to get worse despite your best efforts.

    But, if you’re willing to think differently about network security, there is now a way you can eliminate a huge number of attacks on your network, improve the productivity of your IT staff, keep your business safe, and save a significant amount of money in the process. Skeptical, right? Well attend this session, learn the facts, then decide for yourself.
  • Understanding the Key Attack Vectors Used by Cyber Criminals
    Understanding the Key Attack Vectors Used by Cyber Criminals
    Spikes Security Recorded: Jun 29 2015 3 mins
    Cyber criminals gain access to your network through the #1 attack vector -- insecure web browsers.

    As you create a network security architecture that's right for your organization, it's important to focus on eliminating the key attack vectors used by cyber criminals to gain access to your network -- the web browser.
  • Branden Spikes Interview. How to Solve the Web Malware Problem
    Branden Spikes Interview. How to Solve the Web Malware Problem
    Richard Stiennon and Branden Spikes Recorded: Jun 1 2015 19 mins
    Branden Spikes discusses how isolation technology was created and how it works to protect networks from web malware.
  • New ESG Research Provides Insight Into Browser (in)Security
    New ESG Research Provides Insight Into Browser (in)Security
    Jon Oltsik and Franklyn Jones Recorded: Jun 1 2015 50 mins
    ESG surveyed information security professionals to assess cyber security risks related web browsers.

    The Enterprise Strategy Group (ESG) surveyed and compiled the results from 200 IT and information security professionals to assess cyber security risks related to web browsers.

    Join Jon Oltsik, Senior Principal Analyst at ESG, as he presents key findings from your peers in IT Security. You’ll also get an introduction to the innovative new isolation technology designed to simplify web security.
  • New Ponemon Report Finds Browser Malware Becoming Unstoppable
    New Ponemon Report Finds Browser Malware Becoming Unstoppable
    Larry Ponemon and Franklyn Jones Recorded: Feb 18 2015 58 mins
    Find out what IT security practitioners are saying about the effectiveness of today's security tools?

    Join Larry Ponemon from the Ponemon Institute as he reveals what IT security practitioners are saying about the effectiveness of today's security tools. It also includes an introduction to Spikes Security's AirGap isolation technology.

    Each year, companies spend millions of dollars on network security tools and technologies designed to identify and block malware attacks. It also includes an introduction to Spikes Security's AirGap isolation technology.
  • How to Stop Web Malware Using Isolation Technology
    How to Stop Web Malware Using Isolation Technology
    Franklyn Jones and Scott Martin Recorded: Oct 2 2014 61 mins
    Discover what makes web browsers vulnerable to cyber attacks and how Isolation technology works to prevent web malware from entering your network.

    Discover what makes browsers vulnerable to cyber attacks and how to think differently about network security by using innovative technology.

    It includes a great Q & A session with the SANS Institute audience who participated in the live webcast.

Embed in website or blog