Hi [[ session.user.profile.firstName ]]

ESET - Internet Security Threats Channel

  • Date
  • Rating
  • Views
  • Mobile Threat Awareness & ESET Endpoint Security for Android
    Mobile Threat Awareness & ESET Endpoint Security for Android
    Ben Reed, Senior Technical Strategist and Sales Engineer and Lukáš Štefanko, ESET researcher Recorded: Nov 16 2016 49 mins
    Join ESET Malware Researcher Lukáš Štefanko and ESET Solutions Engineer Ben Reed to learn the five components for a winning mobile security strategy and see why replacing your current MDM with ESET mobile solutions can cut costs while boosting security.
  • Webinar: Solving the “password1” Problem: Why Businesses Need 2FA
    Webinar: Solving the “password1” Problem: Why Businesses Need 2FA
    Ben Reed, Senior Technical Strategist and Sales Engineer and Robert Westervelt, Research Manager, IDC Security Products Recorded: Oct 13 2016 62 mins
    Why have two-factor authentication (2FA) in the workplace? Even if you’ve instituted password management best practices, employees will still use their work password on other websites, write their passwords on sticky notes, or use their nicknames or birthdays without a second thought—and put your business at risk.

    With new PCI-DSS regulations surrounding multi-factor authentication requirements coming up on Oct. 31, it’s time to get up to speed on this proactive technology.

    In this webinar, Robert Westervelt, research manager of IDC’s Security Products group, and ESET’s solutions engineer Ben Reed will provide an in-depth overview of the following:
    •Account credential theft: What can be done to prevent employees from falling into a trap?
    •How 2FA/multi-factor authentication can reduce the risk of account hijacking, mitigate weak passwords and help satisfy compliance requirements.
    •The types of multifactor authentication solutions available on the market and how it can contribute to creating a stronger security culture in the workplace.
  • Webcast: Do More with ESET Remote Administrator
    Webcast: Do More with ESET Remote Administrator
    Ben Reed, Sr. Technical Content Strategist and Sales Engineer Recorded: Aug 31 2016 61 mins
    5 ways to do more than JUST manage your AV

    IT Asset Management
    Track Hardware, OS info, Serial Numbers, and Logged-in users across your entire organization

    Software Management
    Applications installed in last 7 days
    Applications versions installed across organization to maintain a good security policy

    Remotely install and uninstall any software
    Automate Software Install and Uninstall based off pre-defined rules

    Update Management
    Manage Windows/Mac and Linux Updates

    User Notification/Communication
    Notify users when downtime will occur
    Notify users when they do something against company policy

    Troubleshoot Users Computers
    Utilize SysInspector to troubleshoot what might be going wrong with a computer.
  • Webcast:  Mid-Year Threat Review
    Webcast: Mid-Year Threat Review
    Stephen Cobb, Senior Security Researcher, ESET Recorded: Jul 27 2016 59 mins
    ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
    •Ransomware
    •Regulatory risk
    •PoS malware
    •PCI and two-factor authentication
    •PUAs and scamware
    •IoT vulnerabilities
    •Privacy by design
    •General Data Protection Regulation (GDPR)
  • Your Top 5 IT Security Threat Questions Answered
    Your Top 5 IT Security Threat Questions Answered
    ESET North America & Michael Aguilar, Business Product Technical Lead Recorded: Jun 29 2016 37 mins
    Winter is coming. Our three-eyed raven answers your top 5 IT security questions based on our most recent survey including email security, ransomware, protecting IoT and more. Additionally, here's your chance to ask our in-house cybersecurity expert, Michael Aguilar, your most challenging questions to help you defend the wall. It’s an open forum just for you!

    With a personal record of 34 questions in 30 minutes, Michael will torch your questions like Drogon. Sign up today and get those questions ready.
  • Encryption decoded: What you need to know before you buy
    Encryption decoded: What you need to know before you buy
    Ben Reed, Partner Sales Engineer Recorded: Jun 8 2016 43 mins
    Interested in encryption, but not sure where to start? Watch “Encryption: Decoded” for insights on how to select the right solution for your environment.

    Join an ESET sales engineer for this in-depth review:
    • What pain points encryption can address
    • What to ask encryption solution providers
    • How to successfully implement encryption policies
  • Ransomware: Dark Money and Emerging Threats
    Ransomware: Dark Money and Emerging Threats
    Michael Aguilar, Business Product Technical Lead, ESET North America Recorded: May 25 2016 55 mins
    You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
    Join an ESET business product technical lead to learn:
    •How ransomware has evolved and spread
    •Why mobile phones and Apple OS X are increasingly vulnerable
    •Best practices for avoiding and dealing with ransomware
    •Why to implement backup and recovery solutions now
  • Encryption decoded: What you need to know before you buy
    Encryption decoded: What you need to know before you buy
    Ben Reed, Partner Sales Engineer Recorded: Apr 27 2016 49 mins
    Interested in encryption, but not sure where to start? Watch “Encryption: Decoded” for insights on how to select the right solution for your environment.

    Join an ESET sales engineer for this in-depth review:
    • What pain points encryption can address
    • What to ask encryption solution providers
    • How to successfully implement encryption policies
  • Webinar: Under Attack: A Report on Cybercrime and Healthcare
    Webinar: Under Attack: A Report on Cybercrime and Healthcare
    Stephen Cobb, Senior Security Researcher, ESET Recorded: Mar 30 2016 59 mins
    ESET senior security researcher Stephen Cobb and Larry Ponemon of the Ponemon Institute discuss a new study on healthcare security addressing causes, costs and potential cures for soaring cybercrime rates.
  • Webcast: Realizing “Next-Gen AV’s” are not new
    Webcast: Realizing “Next-Gen AV’s” are not new
    Ben Reed, Partner Sales Engineer Recorded: Feb 24 2016 60 mins
    Are you considering a Next-Gen AV solution? Before you make a decision, attend this webcast with an ESET engineer who will examine vendors’ claims and supporting technologies.

    Key takeaways include:

    1.Next Gen AV technologies – making sense of their claims
    2.A deep dive into ESET technology
    3.The difference between reactive vs. proactive technologies
    4.How ESET leverages the Cloud
    5.Best practices in evaluating AV technologies

Embed in website or blog