Hi [[ session.user.profile.firstName ]]

Micro Focus Enterprise Security Products

  • Date
  • Rating
  • Views
  • Close the gap in your ransomware defense
    Close the gap in your ransomware defense
    Gil Cattelain, Product Marketing Manager and Joe Leung, Product Marketing Manager, Micro Focus Recorded: Mar 21 2019 32 mins
    Ransomware is a global epidemic that is spreading like wildfire. According to the 2019 CyRiM (Cyber Risk Management) Report, ransomware could cause up to $193B in economic damage. The FBI estimates that ransomware infects more than 100,000 computers a day around the world. And in one example, The City of Akron, Ohio experienced public service interruptions, including disruption to the processing of credit card payments, as result of a ransomware attack.

    Organizations can easily neutralize the threat with a holistic 2-step approach by first strengthening protections against intrusions from the start, and by quickly resolving issues with an up-to-the minute copy of data needed to restore systems back to operational status, should the virus manage to get through.

    Join this webinar to learn about:

    • Ransomware challenges and impact
    • Why malware detection alone is not enough
    • How to close the gap with holistic endpoint data and device management
  • 6 Part series - Breach Defense:  Part 1 - Anatomy of a Breach
    6 Part series - Breach Defense: Part 1 - Anatomy of a Breach
    Robert MacDonald, Micro Focus Recorded: Feb 26 2019 49 mins
    Cyber breaches have almost doubled in the past five years, according to the World Economic Forum, which now lists cyberattacks as third on its list of top global risks. But how can organizations keep pace, keep secure? There needs to be a plan! One of the clearest, most comprehensive, most flexible, and most highly-regarded methods we’ve found to approach cybersecurity is the framework devised by the National Institute of Standards and Technology (NIST).

    This webinar provides an overview of market trends facing organizations as they venture into a digital transformation. We will review how organizations can make their digital transformation secure by employing the NIST framework and ways they can to use it to strengthen every facet of their organization’s defenses against a breach.
  • Privacy: An Introduction to Data Protection and Identity Management
    Privacy: An Introduction to Data Protection and Identity Management
    Nathan Turajski, Director Product Marketing, Security Operations and Data Security, Micro Focus Recorded: Feb 26 2019 11 mins
    To help enterprises achieve an end-to-end solution that scales to meet modern privacy mandates such as GDPR, the California Consumer Privacy Act, and beyond, Micro Focus brings together comprehensive technology portfolios. This overview includes Secure Content Management for data discovery and classification; Identity and Access Management to capture and enforce user rights for safe access to sensitive data through identity governance; and Data Security for applying data-centric protection through innovative format-preserving encryption. The flexible solution supports a wide range of use cases to meet organizational maturity needs through a modular approach that grows along with your organization—learn more!
  • Get Started with Seamless AppSec in One Day
    Get Started with Seamless AppSec in One Day
    Brent Jenkins and Harley Adams, Micro Focus Recorded: Feb 13 2019 48 mins
    With software becoming the competitive differentiator for most businesses rather than just a support function, the speed and complexity of it is rapidly increasing. Because of the business demand being put on development teams, often times there is little to no time put into ensuring these applications are secure. However, the biggest and most severe data breaches that have affected both the public and private sectors all operate at the application layer.

    Ensuring your applications are secure doesn’t have to be a cumbersome process, though. With the right program and tools, you can improve or start your organization’s security initiative without getting in the way of developers’ productivity. In this webinar, we will cover:

    • The current state of software and application security
    • How to create or improve your AppSec program in a day
    • Why integration is essential for speed
    • Why it is essential to go beyond the OWASP Top 10
  • Discover, protect, and control access to data to lower privacy risk
    Discover, protect, and control access to data to lower privacy risk
    Nathan Turajski, Director Product Marketing, Security Operations and Data Security, Micro Focus Recorded: Feb 12 2019 17 mins
    Ensuring the privacy of your customer information and IP is critical for protecting the lifeblood of your enterprise. But where to start? Micro Focus offers a comprehensive framework approach that maps products and technologies to each phase of your strategy. Whether just starting out with data discovery and classification to determine your risk, or if ready to apply controls and audit compliance, our security, risk and governance solutions scale to your needs, each step of the way. Begin to unlock new business value safely when data is trusted in the hands of appropriate users and applications, while lowering risk of abuse or loss. This privacy solution overview will illustrate how you can begin your journey!
  • Five Creative Ways that Organizations are using Advanced Authentication
    Five Creative Ways that Organizations are using Advanced Authentication
    Kent Purdy and Troy Drewry, Micro Focus Recorded: Dec 13 2018 61 mins
    As organizations realize that today's users expect their digital interactions to be convenient, seamless, and above all secure, demand for new types of authentication heightens.

    In this session we’ll talk about the new ways organizations are using the latest authentication technologies and how they’re preparing the future.
  • Best Practices for managing privileged identities in a hybrid world
    Best Practices for managing privileged identities in a hybrid world
    Lacy Gruen and Tim Sedlack, Micro Focus Recorded: Nov 14 2018 34 mins
    One of the biggest challenges organizations with hybrid infrastructures face today is managing access across their complex and disparate systems – specifically privileged access. In the name of productivity, privileged access is provisioned to identities who need to perform administrative tasks. Those identities with elevated rights bring the most risk to an organization because they have the ability to do the most harm if their credentials are stolen or misused. This is why organizations must seek out solutions to get their privileged identities under control before they face a major data breach, network incident or, at the very least, a failed audit. However, employing the principle of least-privilege, where identities only have the correct level of access (no more, no less) can be difficult. This session will discuss best practices for privilege management in a hybrid world and how to reduce risk with a comprehensive, identity-based approach.

    Why attend this webinar?
    • Understand the amount of risk privileged identities pose to your organization
    • Hear best practices for managing privileged access across your hybrid infrastructure
    • Learn how Micro Focus can help you implement an identity-powered strategy
  • Five Steps to Efficient and Secure Office 365 Management
    Five Steps to Efficient and Secure Office 365 Management
    Lacy Gruen, Jeff Kistler and Dennis Powell, Micro Focus Recorded: Oct 24 2018 45 mins
    Whether you have already implemented Office 365 or are considering the move, this is a session you don’t want to miss. Organizations who transition to Office 365 as part of a hybrid strategy experience a common set of management challenges. Many struggle to effectively manage privileges in both their Azure AD and on-premises Active Directory. The fact is that challenges around user provisioning, policy enforcement, and governance can prevent you from realizing the full value of your hybrid approach – and open your organization up to unnecessary risk. This session will describe five ways that you can more efficiently and securely manage your cloud and on-premises environment to get more return on your investment.

    Why attend this session?
    • Discover the most common challenges that accompany Office 365 implementations
    • Learn five steps that you can take to improve efficiency, security, and governance
    • Hear how Micro Focus can help you automate Office 365 management
  • Deploying Windows 10 with MDT and ZENWorks 2017 Update 3
    Deploying Windows 10 with MDT and ZENWorks 2017 Update 3
    Todd Laycock and Oscar Sanchez, Micro Focus Recorded: Oct 19 2018 72 mins
    This session will look at how to use the Microsoft Deployment Toolkit in conjunction with ZENworks 2017 Update 3 to deploy Windows 10 to your enterprise. This session will be presented by Todd Laycock and Oscar Sanchez, two of our most experienced engineers who are helping customers do this in their real-world environments.
  • Endpoint Management Roadmap Review
    Endpoint Management Roadmap Review
    Jason Blackett, Micro Focus Recorded: Oct 18 2018 64 mins
    Come and find out what’s happening in Endpoint Management at Micro Focus. This session will be presented by Jason Blackett and other members of the Product Management team. They will discuss the upcoming product roadmap for products including ZENworks, Service Desk, Desktop Containers and ZENworks Mobile Workspace.

Embed in website or blog