Hi [[ session.user.profile.firstName ]]

Armis Security

  • Date
  • Rating
  • Views
  • 3 Steps to IoT Security - Discover, Profile, and Sanction
    3 Steps to IoT Security - Discover, Profile, and Sanction Misha Seltzer - Chief Solutions Architect Recorded: Nov 8 2017 43 mins
    Attacks on Internet of Things devices skyrocketed by 280% in the first part of 2017 - even as their use skyrocketed in our businesses, factories, and hospitals. Armis provides the agentless IoT security platform to let businesses use these new connected devices safely.

    In this webinar learn:
    - Why the legacy security solutions fall short
    - How to bring visibility and control
    - How to identify and stops botnets and other such attacks like Krack, BlueBorne, and more
  • Eliminate the IoT Security Blind Spot with Armis
    Eliminate the IoT Security Blind Spot with Armis Nadir Izrael - CTO Co-Founder Recorded: Oct 24 2017 39 mins
    Our current security architecture is broken. We need a new approach to address the evolving IoT endpoint. Join Armis CTO Nadir Izrael as he discusses:

    -Where current architecture is falling short
    -What next-generation architecture should look like
    -How to address vulnerabilities found in IoT devices/the unmanaged endpoint.

    About Armis:

    Armis eliminates the IoT security blind spot, protecting enterprises from the threat of unmanaged or rogue devices and networks. Customers including Samsung Research America and IDT Corporation trust Armis’ agentless IoT security platform to see and control any device or network. Armis is a privately held company and headquartered in Palo Alto, California.
  • New Attack Vector “BlueBorne” Exposes 5B+ Devices – Learn How It Works
    New Attack Vector “BlueBorne” Exposes 5B+ Devices – Learn How It Works Nadir Izrael, CTO, Armis Recorded: Sep 20 2017 59 mins
    As Fortune reported on Tuesday, the new Blueborne attack vector exposed 5B+ devices to hacking, endangering major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux. Blueborne attacks devices via Bluetooth in a manner never seen before, and spreads through the air (airborne). Users do not need to be on the Internet, take any action, or even pair with another device to be impacted. Blueborne has been called “Bluetooth’s Stagefright moment.”

    Watch this webinar to learn:

    • Understand the 8 zero-day vulnerabilities (4 critical)
    • Which devices are affected
    • How Blueborne can take over a device
    • How BlueBorne can be used for a Man in the Middle Attack
    • What’s involved in protecting your network

    About the Speaker:
    As co-founder and CTO, Nadir Izrael guides the technology vision behind Armis to protect unmanaged and IoT devices. He co-founded the company in 2015 with its CEO, Yevgeny Dibrov. Prior to Armis, worked at Google as senior software engineer. Before Google, Nadir spent six years in the Israeli army, specifically in unit 8200, where he designed and programmed software projects and systems, served as team leader and did officer’s training attaining the rank of captain.
  • NotPetya - 3 Steps to Prepare for the Next Ransomware Attack
    NotPetya - 3 Steps to Prepare for the Next Ransomware Attack Nadir Izrael, CTO & Co-Founder, Armis Recorded: Jul 17 2017 44 mins
    Much of the world was still scrambling to patch and clean up from WannaCry ransomware attack when the (not)Petya attack hit. While (not)Petya relied on Eternal Blue, just as WannaCry did, it had a few new tricks.
    - No Kill Switch – There doesn’t appear to be a kill switch URL, so (not)Petya can’t be shut down simply by purchasing a domain name.
    - Lateral Movement – The new attack includes additional exploits so it can move laterally through the network and infect other devices.
    - New Unmanaged Devices – Reports say the attack hit point of sale devices and ATMs, in addition to the laptops and desktops.

    Join Nadir Izrael, CTO of Armis, and former Captain in the Israel Intelligence 8200 Group, to discuss the 3 steps you should take to prepare for the next ransomware attack. And, why your weakest link now exposures your entire enterprise.

    About the Presenter:
    As co-founder and CTO, Nadir Izrael guides the technology vision behind Armis to protect unmanaged and IoT devices. He co-founded the company in 2015 with its CEO, Yevgeny Dibrov. Prior to Armis, worked at Google as senior software engineer. Before Google, Nadir spent six years in the Israeli army, specifically in unit 8200, where he designed and programmed software projects and systems, served as team leader and did officer’s training attaining the rank of captain.
  • NotPetya Attack - Cybercrime or Cyberwar?
    NotPetya Attack - Cybercrime or Cyberwar? Malcolm Harkins (Cylance), Erika Noerenberg (LogRhythm Labs), Nadir Izrael (Armis), Michael Landewe (Avanan) Recorded: Jul 12 2017 64 mins
    The NotPetya pandemic that started in late June and disrupted the operations across companies, utilities, government agencies across France, Russia, Spain, Ukraine and the United States, happened just weeks after the WannaCry ransomware attack. Was NotPetya a financially motivated ransomware attack or an act of cyberwar?

    Join this interactive Q&A session with industry experts and find out the answers to your Petya/NotPetya questions. The topics up for discussion will include:
    - Difference between cybercrime and cyberwar
    - Industries targeted in the NotPetya attack
    - Short-term and long-term impact of this attack
    - Requirements and recommendations for strengthening cyber defense

    Speakers:
    - Malcolm Harkins, CSO of Cylance
    - Erika Noerenberg, Threat Research Engineer, LogRhythm Labs
    - Nadir Izrael, CTO of Armis

    Moderator:
    - Michael Landewe, Co- Founder of Avanan Cloud Security

Embed in website or blog