Hi [[ session.user.profile.firstName ]]

SonicWall

  • Date
  • Rating
  • Views
  • Under the Hood: How to Responsibly Decrypt & Inspect Encrypted Traffic
    Under the Hood: How to Responsibly Decrypt & Inspect Encrypted Traffic Ken Dang Recorded: May 8 2018 64 mins
    Encrypted traffic is a key battleground for today’s security-conscious organizations. But how and where to fight is not always clear or easy to execute. Join SonicWall for a “fireside chat” to gain a clear understanding of how to establish a security model that can decrypt and inspect encrypted traffic without degrading performance or damage trust.

    Register now for this informal Q&A session that will provide a platform to answer your most pressing questions regarding encrypted attacks and how to responsibly and efficiently decrypt SSL and TLS traffic. This session will:

    • Outline the benefits of inspecting SSL/TLS traffic
    • Explain how to block encrypted malware downloads, including ransomware and zero-day cyberattacks
    • Demonstrate how to set up a typical next-generation firewall with DPI-SSL capabilities
    • Customize inclusion and exclusion lists for compliance or legal requirements
    • Operate a required system digital certificate store
  • Stop Fileless Malware with SonicWall Capture Client
    Stop Fileless Malware with SonicWall Capture Client Brook Chelmo, SonicWall | Daniel Bernard. SentinelOne | Raj Rajamani SentinelOne Recorded: Apr 25 2018 62 mins
    Over the past few years, hackers are increasingly choosing to utilize fileless malware as a highly effective alternative to malware attached to files. See how you can use modern technology to monitor the behavior of a system for malicious abnormalities and rollback systems to a previous uninfected state.

    Join SonicWall & SentinelOne experts to learn how to stay safe from advanced threats like fileless malware.

    1.Learn how the threat landscape has changed in the past three years.
    2.Learn what fileless malware is and how to stop it.
    3.Discover the difference behavior-based security makes.
  • State of Cyber-Security Arms Race: Preparing for what's coming in 2018
    State of Cyber-Security Arms Race: Preparing for what's coming in 2018 Ken Dang Recorded: Mar 21 2018 61 mins
    Examining 2017 to prepare for what's coming in 2018

    The modern cyber war — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. The SonicWall 2018 Cyber Threat Report provides exclusive data that highlights advances by both the security industry and cyber criminals.

    Attend this webinar to gain a better understand the current State of Cyber-Security Arms Race. We’ll share our findings, intelligence, analysis and research to help you improve your security preparations and posture going forward.
  • Technical Deep Dive: Securing Office 365 with SonicWall Email Security
    Technical Deep Dive: Securing Office 365 with SonicWall Email Security Ganesh Umapathy & Keith Johnson, SonicWall Security Experts Recorded: Mar 14 2018 61 mins
    Organizations are increasingly adopting Office 365 as part of the “move to the cloud” endeavor. Many organizations are also evaluating a cloud-based email security solution to close security gaps and mitigate risks from migration to the cloud.

    Join this webinar for a live demo on how SonicWall’s Email Security solution secures Office 365. Learn more about:
    •What to consider while securing your Office 365 email service
    •How SonicWall Email Security offers superior, advanced threat protection, data loss prevention and email continuity for Office 365
  • How Hackers Sneak Past Defenses, and Ways to Evade Them
    How Hackers Sneak Past Defenses, and Ways to Evade Them Brook Chelmo, Product Manager, SonicWall and Andy Norton, Director, Threat Research, Lastline Recorded: Feb 20 2018 61 mins
    The rise of ransomware forced companies to improve their defenses against malware and intrusions. As a result, malware developers seek new ways to evade network security defenses.

    In this webinar, experts from SonicWall and Lastline will show you 6 core evasion tactics, why they work, and how to stop them by using advanced malware analysis tools.

    - Learn about modern hacking, and how it affects companies today
    - Discover how and why hackers break into networks
    - Learn how to apply advanced network sandboxing to discover and stop new threats
  • SonicWall Under the Hood - DPI-SSL Certificate Deployment Deep Dive
    SonicWall Under the Hood - DPI-SSL Certificate Deployment Deep Dive Ken Dang & Rob Krug Recorded: Jan 23 2018 62 mins
    Managing certificate deployment and certificate pinning are among the top challenges when implementing deep inspection of SSL and TLS certificates on a next-generation firewall.

    Join us for a technical deep-dive webcast and demo to learn best practices to a successful SonicWall Deep Packet Inspection of SSL (DPI-SSL) service implementation. This in-depth session will:

    • Help size the firewall accurately for DPI-SSL service
    • Provide multiple methods for certificate deployment
    • Offer guidance for certificate-pinning
    • Educate users on the OS certificate store
    • Explain how to establish trust with devices in BYOD environments
  • Untether Your Corporate Network with Secure Wireless and Mobile Access.
    Untether Your Corporate Network with Secure Wireless and Mobile Access. Scott Grebe & Ganesh Umapathy - SonicWall Security Product Marketing Managers Recorded: Nov 29 2017 60 mins
    Join us to find out how you can embrace mobility and provide access to resources over wireless and mobile networks with the same level of security as your wired network.

    Join this webinar to learn about:
    •How to protect data travelling across wireless and mobile networks
    •What components should be part of every mobility solution
  • SonicWall Capture Labs
    SonicWall Capture Labs On-demand video Recorded: Nov 15 2017 5 mins
    In 2016, the SonicWall Capture Threat Network observed 60 million unique malware samples, 7.9 billion malware attack attempts, 638 million ransomware attacks and showed that 62% of SonicWall customer internet sessions were encrypted using SSL/TLS.
    The SonicWall Capture Labs Threat Research Team:
    •Gathers, analyzes, and vets cross-vector threat information from more than one million sensors around the world,

    • Performs rigorous testing and evaluation,
    • Establishes reputation scores for email senders and content
    • Identifies new threats in real-time.

    Get the most up-to-date protection against new attacks with real-time information from SonicWall Capture Labs.
  • Are You Ready to Do Some Holiday Shopping? The Hackers are Waiting.
    Are You Ready to Do Some Holiday Shopping? The Hackers are Waiting. Scott Grebe - SonicWall Security Product Marketing Manager Recorded: Nov 15 2017 61 mins
    [Landing Page]
    Headline:
    Webinar: Are You Ready to Do Some Holiday Shopping? The Hackers are Waiting.

    Body:
    Holiday shopping is back. From Black Friday, Small Business Saturday and Cyber Monday through the end of the year, your employees will shop online in the office. Are you prepared?

    Learn more about the issues you’re up against during the entire holiday shopping season and how to keep your network secure from cyber criminals, keep your employees focused and ensure that internet bandwidth is reserved for essential activities.

    Join this webinar to learn:

    •How online shopping during the holidays impacts employee productivity, bandwidth consumption and network security
    •About the threats that cyber criminals are using to attack your organization
    •What you can do to protect your data and your network from attack during and after the online buying season
  • Don’t Negotiate with Hackers – How to Fight Back
    Don’t Negotiate with Hackers – How to Fight Back Brook Chelmo Recorded: Nov 8 2017 59 mins
    When a small business is hit with a critical cyber-attack, one in six have to stop business for more than 25 hours. The National Cyber Security Alliance reports that 60 percent of small companies are unable to stay in business six months after a cyberattack.

    Join SonicWall for this live webinar as we outline how one small business owner fought back, and established a smart, cost-effective security strategy for her company.

    Find out how SonicWall can help:
    •Protect your business against both known and unknown cyber threats
    •Bolster your security posture in cost-effective manner
    •Safeguard sensitive information and data
    •Ensure your business remains operational
    •Add peace of mind

Embed in website or blog