Hi [[ session.user.profile.firstName ]]

SonicWall

  • Date
  • Rating
  • Views
  • Wireless Best Practices for Your Retail Needs
    Wireless Best Practices for Your Retail Needs
    Srudi Dineshan, Product Marketing Manager Recorded: Nov 27 2018 59 mins
    One of the major challenges for retailers is ensuring Payment Card Industry (PCI) compliance and the need to secure customer data. Poorly managed wireless networks are one of the common PCI mistakes. This webinar will walk through some of the wireless best practices to ensure your data remains secure and compliant.

    This webinar will cover the wireless threats faced by retailers and how you can apply best practices to:

    • Protect your retail business in the evolving cyber threat space
    • Secure wireless connectivity
    • Stop known and unknown threats
    • Ensure that your customers and employees are connected securely
  • How to make your move to the cloud faster and safer
    How to make your move to the cloud faster and safer
    Srudi Dineshan, Product Marketing Manager & Suroop Chandran, Senior Product Manager, SonicWall Recorded: Nov 5 2018 60 mins
    Are you looking to migrate to the cloud? How confident are you that your cloud infrastructure and business applications are secure?

    Join SonicWall experts to learn how to protect your public and private cloud infrastructure from advanced threats. This webinar will include:
    -How to leverage next-gen security for public and private cloud infrastructure and business applications
    -How to gain complete visibility into virtual environment for threat prevention
    -What’s new with NSv and WAF
  • Closing the Backdoor with Endpoint Security
    Closing the Backdoor with Endpoint Security
    Brook Chelmo, Senior Product Marketing Manager, SonicWall Migo Kedem, Senior Director of Products & Marketing SentinelOne Recorded: Oct 22 2018 63 mins
    Threat actors leverage malware to create backdoors into systems for a few key reasons. These forms of malware, even when they fail, can create serious vulnerabilities in systems.

    This webcast will cover the threat landscape and discuss new types of attacks. Come for the news but stay for a live hacking demonstration that will install a backdoor on an unprotected endpoint and later, an attempt on a protected one.

    In this webcast you’ll learn:

    •The current threat landscape
    •What backdoors are
    •How to stop backdoors like Calisto
    •How to roll back the damage of an attack like ransomware
  • Visibility, Knowledge and Control of Your Security Ecosystem is Power
    Visibility, Knowledge and Control of Your Security Ecosystem is Power
    Ken Dang, Sr. Product Marketing Manager Recorded: Oct 15 2018 60 mins
    Managing security and responding to cyber events are major operational challenges. Moreover, insufficient visibility and knowledge of these risks within your network fabric compound the problem. This makes it extremely difficult to detect unsafe network and user activities, and calibrate security policies at the speed and accuracy you need to maintain a robust security posture.

    Making matters worse, you are burdened with operating complex and fragmented security silos. Administrations are cumbersome and labor-intensive. Processes are uncorroborated and non-compliant. This level of technology fragmentation and operation disarray demands an integrated approach for security, management, analytics and real-time threat intelligence.

    Join this webinar to explore how to establish a holistic, connected approach to security orchestration. Learn to take smarter security policy and control actions toward a sharper, safer and compliant network environment. You’ll discover how to:

    • Achieve single sign-on (SSO) access to provision and manage network, endpoint and cloud security services
    • Govern entire security operations and services from one simple, common cloud interface
    • Gain single-pane visibility and situational awareness of the network security
    • Get error-free policy management
    • Deploy and provision firewalls remotely using the cloud
  • How to Secure Mailboxes when Moving to G Suite
    How to Secure Mailboxes when Moving to G Suite
    Ganesh Umapathy, PMM & Ed Gradek Email Security Solutions, Architect, SonicWall Recorded: Oct 10 2018 60 mins
    Organizations are increasingly adopting cloud email services such as Gmail, included in G Suite, as part of their cloud strategy.

    Many organizations are also evaluating cloud-based email security solutions to close security gaps and mitigate risks that arise from the migration between on-premise and cloud email services.

    Join this webinar for a live demo and learn how to effectively defend your G Suite with:

    •Superior advanced threat protection against email fraud, business email compromise (BEC) and targeted phishing attacks
    •Data loss prevention (DLP)
    •Email continuity
  • Retail Organizations, PCI Compliance, Security & You
    Retail Organizations, PCI Compliance, Security & You
    Brook Chelmo, Sr. Product Marketing Manager for SonicWall Recorded: Oct 1 2018 46 mins
    Accepting payment cards is a given for retailers and hospitality businesses. That means complying with the Payment Card Industry Data Security Standard (PCI).

    High-profile security breaches have become the norm along with laws mandating public disclosure in the event of one happening. Attackers, laws and compliance standards create a stressful environment for anyone who wants to do business with credit cards.

    This webcast will cover the threat landscape and discuss how attackers are trying to get the PII data that you hold. Learn how to better protect against advanced cyberattacks and customized malware from the perimeter to the endpoint.

    In this webcast you’ll learn how to:
    • Protect your retail business in the current threat landscape
    • Stop threats at the perimeter
    • Knock out phishing attacks
    • What steps to take to become PCI compliant
    • Discover and stop unknown forms of cyberattacks
  • Next Generation Firewall (NGFW) 8.0 Group Test Results – SonicWall
    Next Generation Firewall (NGFW) 8.0 Group Test Results – SonicWall
    Mike Spanbauer, Vice President, Research Strategy NSS Labs & Lawrence Pingree, Vice President, Product Management, SonicWall Recorded: Sep 12 2018 51 mins
    Firewall technology is one of the largest and most mature security markets, and the next generation firewall (NGFW) is a prime example of how cybersecurity controls continue to evolve in the face of a constantly changing attack surface. These network security products combine firewall capabilities with intrusion prevention system (IPS) functionality, application control, user awareness, and the capability to integrate threat intelligence feeds.

    NSS Labs recently announced the results of our Next Generation Firewall (NGFW) 8.0 Group Test. In this year’s test, products from 10 of the industry’s leading NGFW vendors were examined for security effectiveness, performance, and total cost of ownership (TCO). In this eighth iteration of the NGFW test, evasion testing was expanded to include resiliency against modified exploits, and the test also included secure sockets layer (SSL)/transport layer security (TLS) testing.

    Tune into this webinar to learn how SonicWall performed in NSS Labs' NGFW 8.0 Group Test.
  • Solving Top IT Challenges for K12 Schools, Campuses & Districts
    Solving Top IT Challenges for K12 Schools, Campuses & Districts
    Brook Chelmo, Scott Grebe Recorded: Jul 24 2018 58 mins
    K12 schools and districts encounter IT issues throughout the school year. But what issues really rank highest according to those affected? Security, wireless connectivity and budgets are causing the most fits for IT administrators. IT administrator should be concerned with keeping students safe and connected, not repairing ransomware-infected devices or a network compromised to power a secret cryptocurrency mining operation.

    Join us for this webcast to learn how K12 schools, campuses and districts can implement cost-effective network security, endpoint protection and wireless solutions. In this webcast, you’ll learn:

    • Trends happening in the threat landscape
    • What other IT administrators are saying
    • How to stop and remediate ransomware
    • New risks of cryptojacking
    • How to stop phishing emails
  • Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
    Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
    Ganesh Umapathy, Product Marketing Manager | Michael Osterman, President, Osterman research Recorded: Jun 26 2018 64 mins
    Today, Email is the most common attack vector used by cyber criminals. Join us for this special webinar with guest speaker Michael Osterman to discuss the recently published research on the current state of email threats, best practices you can implement to protect against them, and how SonicWall provides automated threat detection and protection capabilities to stop these threats.
    1.Understand the current threats landscape
    2.Know the best practices to mitigate today’s threats
    3.Gain insights into how SonicWall stops advanced threats
  • Identify and Stop Malware in the Quickest and Most Accurate Way Possible
    Identify and Stop Malware in the Quickest and Most Accurate Way Possible
    Brook Chelmo, Product Marketing Manager, SonicWall Recorded: May 30 2018 62 mins
    Join SonicWall experts for an exclusive webinar, “Identify and Stop Malware in the Quickest and Most Accurate Way Possible.” We will discuss how SonicWall Real-Time Deep Memory Inspection (RTDMI™) technology enables SonicWall Capture Advanced Threat Protection (ATP) to:
    •Catch more malware faster than behavior-based sandboxing methods, with a lower false positive rate
    •Block sophisticated attacks by unpacking compressed code in memory in a secure sandbox environment
    •Stop threats embedded in Microsoft Office and Adobe PDF files

Embed in website or blog