Hi [[ session.user.profile.firstName ]]

Endpoint Management and Security

  • Date
  • Rating
  • Views
  • Managing Apple Devices in a Windows World Managing Apple Devices in a Windows World Steve Brasen - Research Director, Enterprise Management Associates | Tim Williams, Director, Product Marketing HEAT Software Recorded: Oct 6 2016 48 mins
    As Windows support requirements continue to dominate the focus of enterprise endpoint management efforts, an increasing number of Apple device users are becoming frustrated with being treated as second-class citizens. At the heart of the problem are Windows-centric practices and solutions that do not comprehensively translate to supporting Mac and iOS platforms.

    However, adoption of Apple management point solutions that operate independent of existing Windows administration platforms only add to management complexity and fail to achieve service reliability and cost-effectiveness.

    Join Steve Brasen, EMA Research Director from analyst firm, Enterprise Management Associates, and Tim Williams, Director Product Marketing at HEAT Software for a one-hour presentation identifying the optimal practices and solutions that will enable comprehensive management of Apple devices side-by-side with Windows endpoints.

    Key topics of discussion include:

    •What is the current state of Apple device adoption and use in the enterprise?

    •What specific Apple requirements are not being serviced by traditional Windows-targeted management solutions?

    •Which methods should be employed to maintain consistent user experiences across different endpoint architectures?

    •What effect has increased workforce mobility had on emerging Apple support requirements?

    •How can enterprise security requirements be maintained across disparate software and hardware ecosystems?
  • SCCM as a Security Compliance Tool? You can bank on it. SCCM as a Security Compliance Tool? You can bank on it. Logun Baker, System Administrator - Sr., The Huntington National Bank | Duncan McAlynn, Sr. Solutions Specialist, HEAT Softwa Recorded: Jun 23 2016 55 mins
    In this session, 6x Microsoft MVP and Sr. Solutions Specialist, Duncan McAlynn, will have a discussion with Logun Baker, Senior Systems Administrator for The Huntington National Bank, regarding the challenges of 3rd party application patching within their enterprise and how they have solved those problems

    During the webinar, McAlynn will also be demonstrating how PatchLink natively plugs into the SCCM Admin Console, providing seamless integration into existing patch management workflows without any additional client deployment, infrastructure requirements or added consoles.

    Key Takeaways:

    -Hear a real-world case study from a customer that addresses 3rd party patching to protect and defend themselves against malware/randsomware within their enterprise

    -Learn about free add-on tools available from Microsoft and the System Center community to help extend and enhance the core capabilities of SCCM for security compliance monitoring and management
  • Bridging the Patching Gap in Microsoft System Center Bridging the Patching Gap in Microsoft System Center Russ Ernst, Director, Product Management Recorded: Jun 25 2015 38 mins
    System Center Configuration Manager is the solution of choice for managing today's enterprise environments. But what’s an administrator to do when a security audit includes vulnerabilities in non-Microsoft applications and server platforms?

    Introducing the only enterprise-class 3rd party patching solutions designed exclusively for System Center environments that require operationally efficient and reliable security and compliance patching solutions.

    Join us for a discussion of practical methods to improve and automate the patch process for your most targeted 3rd party desktop applications and non-Windows server platforms, reduce the time you spend building updates, and improve audit readiness in your Windows environment.
  • Practical Patch Compliance: Using System Center to Reduce Your Audit Pain Practical Patch Compliance: Using System Center to Reduce Your Audit Pain Chris Merritt, Director of Solution Marketing and Russ Ernst, Director of Product Management for Lumension Recorded: Feb 19 2015 61 mins
    Security is Complex, Patching with Microsoft® System Center Shouldn't Be

    System Center Configuration Manager is the solution of choice for managing today's enterprise environments. But what’s an administrator to do when a security audit includes vulnerabilities in non-Microsoft applications?

    Introducing the only enterprise-class 3rd party patching solution designed exclusively for System Center environments that require operationally efficient and reliable security and compliance patching solutions.

    Join us for an in-depth demonstration of practical methods to improve the patch process for your most targeted 3rd party desktop applications, reduce the time you spend building updates, and improve audit readiness in your Windows environment—through our newly released Lumension® Patch Manager DeskTop plug-in.

    Key capabilities include:
    Integrated plug-in with automated content subscription and synchronized scheduling—all within the familiar SCCM console but without need for manual SCUP input
    Ensures systems are correctly patched the first time though Patent-pending Patch-Smart™ technology
    Enterprise-class content which delivers in-depth vulnerability information and supports both enterprise and consumer versions of the most widely adopted, highly targeted applications
  • 2015 Data Protection Maturity Trends 2015 Data Protection Maturity Trends Dee Liebenstein, Vice President Product Management, Lumension and Chris Merritt, Director of Solution Marketing, Lumension Recorded: Jan 28 2015 72 mins
    After so many massive data breaches in 2014, it’s small wonder that data protection is such a hot topic today. The fourth annual Data Protection Maturity Trends report delves into the issues and concerns facing IT security teams, how effective their data protection efforts have been to date, and their plans for 2015 and beyond.
  • Greatest IT Security Risks for 2015: 6th Annual State of Endpoint Risk Greatest IT Security Risks for 2015: 6th Annual State of Endpoint Risk Larry Ponemon, President of Ponemon Institute and Chris Merritt, Director of Solution Marketing of Lumension Recorded: Jan 21 2015 85 mins
    User-centric risk tops this year’s concerns: what is IT doing about it?
    Endpoint risk is rising and 78% of respondents to the new 2015 State of Endpoint Security study say negligent, careless employees not following policy are IT’s biggest threat.

    The 6th Annual survey, conducted by Ponemon Institute, asked IT practitioners involved in securing endpoints about risks and challenges in 2015. This year’s report reveals why risk has become more challenging over the last 24 months and what IT plans to do about it in 2015.

    Join us Wednesday January 21st at 8am PST / 11am EST, as Larry Ponemon and Chris Merritt reveal analysis from the Annual State of Endpoint Risk, sponsored by Lumension, including:
    • The evolving IT threat landscape and today’s top-5 risks
    • The disconnect between perceived and actual risk, and the corresponding strategies to combat these threats including detect and respond, big data and threat intelligence
    • Insights into new Infosec budgets and their 2015 allocations

    Register Today, and learn how your peers are planning on addressing the endpoint security risks and challenges of 2015.
  • 2015 Endpoint and Mobile Security Buyer’s Guide 2015 Endpoint and Mobile Security Buyer’s Guide Mike Rothman, President, Securosis Recorded: Jul 31 2014 88 mins
    Over the past few years Endpoint Security Management offerings — including patching, configuration, device control, and mobility — have been bundled into suites to simplify management. Protecting endpoint devices continues to get harder, so Securosis has authored new research that now includes anti-malware, BYOD and more.

    Join Mike Rothman, President, Securosis as he shares clear, up-to-date buying criteria for those looking at procuring endpoint solutions in the near future. Included will be a look at the ongoing challenge of securing endpoints, recommended how-to’s on protecting endpoints, reducing attack surface and managing mobile security as well as important buying considerations and a procurement process.
  • BYOD & Mobile Security: Sneak Peek of LinkedIn Infosec Community Survey BYOD & Mobile Security: Sneak Peek of LinkedIn Infosec Community Survey Chris Merritt, Director of Solution Marketing, Lumension Recorded: Jun 10 2014 36 mins
    The days in which an organization owned and issued all devices accessing its network are long gone. Employees are now using their personal mobile devices to store and access corporate data, but many organizations do not have policies or security in place to mitigate BYOD risk.

    We learned in the 2014 State of the Endpoint Survey by Ponemon that 75% of IT professionals saw mobile device protection as the number one challenge for 2014, and 46% admitted they have no security policies in place for mobile devices.

    Since mobile device security is an increasing priority, Lumension sponsored the second BYOD & Mobile Security Survey with the global LinkedIn Information Security group to hear the community’s views and sentiment on this issue. After surveying over 1,000 respondents, the preliminary results are in, and we want to give a sneak peek to share the findings with you!

    Join Chris Merritt, Director of Solution Marketing at Lumension, in this interactive, 30 minute discussion to learn:

    • Your peers’ big concerns on BYOD and mobile security

    • What they are currently doing to combat mobile device risk

    • What solutions & security policies work in organizations

    We look forward to hearing your thoughts and hope to see you there!
  • Point of Sale Systems: How to Stop Critical Entry Points for Malware Point of Sale Systems: How to Stop Critical Entry Points for Malware Chris Merritt, Director of Solution Marketing, Lumension Recorded: Feb 20 2014 62 mins
    Point of Sale (POS) systems have long been the target of financially-motivated crime. And in 2013 the magnitude of cybercrime against POS systems skyrocketed, with 97% of breaches in the retail sector and 47% in the healthcare sector aimed against POS systems. With sensitive financial and personal records getting exposed by the millions, the FBI recently warned that POS systems are under sustained and continued attack.

    During this webcast, we will take you into the three critical entry points to POS system attacks. We’ll discuss how the attacks look, the timelines for these breaches, and what proactive security measures you can take to help your organization minimize the risk to your POS systems.

    •3 Critical Entry Points to POS System Attacks
    •Impacts to an Organization
    •Top 3 Security Measures to Minimize Risk
  • 2014 Data Protection Maturity Trends. How Do You Compare? 2014 Data Protection Maturity Trends. How Do You Compare? Chris Merritt, Director of Product Management, Lumension Recorded: Jan 28 2014 57 mins
    In 2012 we found that the BYOD environment and the consumerization of the workplace had turned traditional notions of corporate IT upside down. In this webcast, we’ll look at the results from the 3rd annual survey and look at how mobility has changed the way IT teams are managing their devices, how effective their efforts are, and their biggest concerns.

    During this webcast we will look at each of data protection trends, helping you define best practices for your organization to address the top concerns. We’ll also show you how you can gauge the maturity of your security systems, allowing you to plug any holes before your valuable data starts to leak through them.