Hi [[ session.user.profile.firstName ]]

SonicWall - Customer

  • Date
  • Rating
  • Views
  • The Critical Role of Endpoint Detection and Response
    The Critical Role of Endpoint Detection and Response
    Brook Chelmo, SonicWall & Michael Osterman, Osterman Research Recorded: Jun 26 2019 49 mins
    Join SonicWall and Osterman Research, for a discussion about Endpoint Detection and Response (EDR). We will share the Osterman Research’s findings into what are the top three Endpoint Detection and Reponse (EDR) priorities, as well as top concerns with deploying advanced endpoint anti-malware solutions.

    You will also learn about:
    •Average company threat statisics
    •Various EDR capabilities
    •How modern anti-malware solutions mitigate and remediate attacks
    •How to deploy advanced anti-malware solutions behind and away from perimeter defenses
  • Building a Layered Security Solution
    Building a Layered Security Solution
    Rob Krug, Solution Architect, SonicWall Recorded: Jun 19 2019 61 mins
    Are persistent cyberattacks already lurking in your network?

    To prevent these modern, never-stopping attacks, organizations require a layered security solution that systematically leverage overlapping layers of protection, detection and inspection.
    SonicWall solution architect Rob Krug explains how this end-to-end approach can protect your organization.

    Register now to learn how to:

    •Stop everything from ransomware to encrypted attacks
    •Add overlapping layers to your security strategy
    •Bolster security across your networks and endpoints
    •Protect your business, and your budget
  • How K-12 Districts Use Wireless Security to Protect Students, Faculty and Staff
    How K-12 Districts Use Wireless Security to Protect Students, Faculty and Staff
    Holly Davis, CEO, Komplement Recorded: Jun 6 2019 40 mins
    Safeguarding K-12 networks is a delicate yet critical undertaking. Connectivity is critical. Student safety is paramount. Yet access to budgets, staff and resources is limited. This unique webinar brings together a panel of experts from security, networking and education to outline how districts can expand wireless security to the edge — even without firewalls. The must-attend session will explore:

    •Emerging threats to both network safety, insider threats and student privacy
    •Seamless ways to monitor and manage access to dangerous content
    •How to simplify wireless deployment, management and analytics
    •Methods to enhance campus-wide WiFi performance, coverage and capacity
    •Opportunities to leverage the federal E-rate program to help eligible districts simultaneously stretch budgets, improve security and protect students
  • Secure WiFi Management Revolutionized in the Cloud
    Secure WiFi Management Revolutionized in the Cloud
    Srudi Dineshan, Product Marketing Manager Recorded: May 22 2019 53 mins
    Leverage the ultimate flexibility and reliability of the cloud to simplify WiFi planning, management and network optimization. Join us to understand the capabilities of the all-new SonicWall secure wireless solution, including WiFi Cloud Manager and SonicWave access points. Register today to:

    •Deploy powerful wireless network security — with or without a firewall
    •Learn how to simplify management with single-pane-of-glass visibility
    •Explore the benefits of Zero-Touch Deployment
    •Enhance WiFi user experiences
    •Reduce CapEx with limited-time WiFi promotion
  • Can You Spot and Stop Cryptojacking Before it Causes Damage?
    Can You Spot and Stop Cryptojacking Before it Causes Damage?
    Brook Chelmo and Migo Kedem; passionate security experts from SonicWall and SentinelOne. Recorded: May 14 2019 61 mins
    Join SonicWall and SentinelOne security experts for this live webinar. We will cover the modern threat landscape based on SonicWall’s 2019 Threat Report and discuss the impact that cryptojacking makes on your organization.

    In this webcast you’ll learn:
    •The impact that Cryptojacking makes and how it fits into the current threat landscape
    •How to tell if you have an infection
    •How to stop it from the perimeter to the endpoint
    •How modern endpoints mitigate and remediate attacks
  • The State of Cyber Arms Race: Unmasking the Threats Coming in 2019
    The State of Cyber Arms Race: Unmasking the Threats Coming in 2019
    John Gordineer, Director, Product Marketing, SonicWall Recorded: Apr 17 2019 41 mins
    The cyber arms race does not discriminate or differentiate. If a network, identity, device or data are of value, cybercriminals will identify, target and ruthlessly attack. To promote global awareness and facilitate important dialogues, SonicWall remains steadfast in its commitment to research, analyze and share threat intelligence.
    Join SonicWall security experts as we share findings, intelligence, analysis and research from the 2019 SonicWall Cyber Threat Report.
    This exclusive session will help you improve your security preparations and posture going forward.
  • Securing Office 365 & G Suite against phishing, compromised accounts & data loss
    Securing Office 365 & G Suite against phishing, compromised accounts & data loss
    Ganesh Umapathy, Product Marketing Manager, SonicWall Recorded: Apr 10 2019 57 mins
    Many organizations are adopting cloud platforms such as Office 365 or G Suite. These offer a broad range of productivity tools beyond just email, so email security point solutions alone cannot protect the entire platform from targeted attacks.

    Hear from our SonicWall expert to learn:
    •The key capabilities needed to protect cloud office platforms
    •How SonicWall Cloud App Security can help you protect email, data and user credentials for Office 365, G Suite and other SaaS apps
  • Securing your SaaS landscape
    Securing your SaaS landscape
    Ganesh Umapathy - SonicWall Product Marketing Manager & Michael Osterman, President, Osterman Research Recorded: Apr 3 2019 55 mins
    The growing number of cloud services available in most organizations enable fast time-to-market for productivity and collaboration tools, but the easy availability of these capabilities can pose significant security risks for organizations.

    Join SonicWall and Osterman Research as they collaborate to help you understand the current threats landscape and the best practices to protect against phishing, ransomware, email fraud

    We will cover the following:
    •Major concerns and issues with SaaS adoption
    •What to look for in a CASB solution
    •Overview of SonicWall Cloud App Security
  • Can you stop these two endpoint threat vectors?
    Can you stop these two endpoint threat vectors?
    Brook Chelmo, Sr. Product Marketing Manager, SonicWall | Migo Kedem, Senior Director of Products & Marketing, SentinelOne Recorded: Feb 27 2019 62 mins
    Join us for an informative webcast between SonicWall and SentinelOne, two pioneers in the network and endpoint security space. They will give a live demonstration of two different attack vectors in action to demonstrate the abilities of modern endpoint security solutions.

    In this webcast you’ll learn:

    • How to stop threats that travel through the network without a file
    • How to cut out a common attack method that takes advantage of the good Samaritan in your office
    • Best practices for network security hygene to sanitize traffic before it gets to the endpoint
  • Cyber Risk Management & Response with Single-Pane-of-Glass Visualization
    Cyber Risk Management & Response with Single-Pane-of-Glass Visualization
    Ken Dang, Sr. Product Marketing Manager Recorded: Feb 13 2019 49 mins
    You are deeply concerned with the constant risks of your organization becoming a victim of a security breach. You are also aware that without real-time visibility and knowledge into everything that goes on in your security environment, you face hidden dangers of the unknown that at times, have led to bad outcomes. These risks might be a result of unpatched network and application vulnerabilities, unauthorized intrusions, risky user activities and SaaS applications, and/or malicious malware attacks that could spread ransomware across the organization.

    Successful attacks can halt an entire organization’s momentum, as stakeholders divert their focus from key business priorities to damage control. The inability to uncover and respond to these risks hampers an organization’s ability to protect sensitive information, meet compliance and maintain normal service operations.

    This webcast will discuss how SonicWall’s Risk Meters, Analytics and Cloud Apps Security services give you a direct line of sight into the threat intelligence of your network environment in real time.

    In this webcast, you will discover how to:

    • Get single-pane visibility and knowledge of your network security environment
    • Gain deeper knowledge and understanding of potential and real threats though risk meters
    • Respond to risks with greater precision and speed using extensive analytics

Embed in website or blog