Business Continuity / Disaster Recovery

Community information
The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.

Webinars and videos

  • David Moule, Manager of IT Security Operations at Allied Irish Bank, discusses how AIB has leveraged Modulo Risk Manager™ to mature their Vulnerability Management process, remedy “on the fly” VM needs, and successfully navigate an internal audit.
  • Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates.
  • Deploying and managing network security at remote locations can be time consuming and expensive. McAfee Next Generation Firewalls give your organization a simple solution for centrally deploying, managing and updating remote locations. No technical skills are required to install at remote locations, freeing your skilled staff to focus on more important security management.

    Join us for an in-depth look at how plug-and-play deployment and remote management can reduce manual effort, reduce costs, and improve your network service. Steve Smith, Senior Technical Manager at McAfee, will review how the McAfee NGFW can be installed and up and running in a matter of minutes using our cloud-based installation server. He will also review how the McAfee NGFW Security Management Center gives you remote management and enterprise-wide situational awareness.
  • 10 minute "whiteboard" style video that explains what Quorum does and the unique value for mid-market organizations
  • Virtual Desktop Infrastructure (VDI) places unique performance demands on storage. During the course of the day the I/O traffic changes from heavy read, to heavy write and then ends with a mixture of read and write requirements. This workload profile is so unique that many VDI planners end up selecting a dedicated storage solution for their VDI environment.

    Join Storage Switzerland and Fusion-io for the live webinar event "Avoid the Waste of a VDI-only Storage Solution”.

    In this webinar, you will learn:
    1. The challenges associated with deploying storage for VDI
    2. How current solutions attempt to solve these problems
    3. How to save money by supporting VDI and other application workloads on the same storage
  • Autonomic Software significantly expands the capabilities of McAfee ePO. Autonomic’s three suites are all integrated into ePO with no need for separate console, databases, and reports. They are “As McAfee As McAfee”!

    Autonomic Patch Manager, EndPoint Manager and Power Manager suites provide improved security, and managing of end points, at virtually no charge when incorporating Power Manager.

    Join McAfee and its 2013 MVP Partner of the Year to learn how the integrated solution provides:
    • Increases Scalability – Delivery of patches to both large organizations and small-to-mid-sized organizations
    • Reduces Costs - Using Power & Patch Management Suites
    • Simplifies Complexity - Maintains a secure environment with minimal human intervention using EndPoint Suite
    • Easily Customizable Solutions – For unique requirements
  • SQL is a powerful language that you will learn to use to a greater extent in this talk! Join us to explore some of the less well-known features of SQL and see how they can help in some practical situations. We will also look at some common mistakes and misconceptions and discuss ways of avoiding them. Among the topics:
    - tricks with date and time values
    - use of common table expression and recursive queries
    - use of data change tables
    - use of nested tables
    - use of the MERGE statement
    - and more.

    Nick Ivanov is presenting this talk based on his consulting experience with many customers to maximize use of IBM DB2 and other products; move applications to DB2; and tune database and query performance.
  • As more and more companies look to take advantage of all of the benefits afforded with cloud-based infrastructures, the discussion often quickly turns to “How do we get there?” For some companies, this single migration question can create an insurmountable roadblock that either keeps them from moving to the cloud or severely delays their migration. Join Michael McCracken, HOSTING’s Director of Professional Services, as he explores different cloud migration strategies along with the benefits and risks associated with each of those strategies.
  • Join us for the live webinar on April 10th at 11:30AM ET - 8:30AM PT to discuss the importance of business class file sync, share and collaboration and why the storage team should lead the effort. The webinar will feature George Crump, Founder and Lead Analyst at Storage Switzerland and Soonr’s VP of Products and Security Ahmet Tuncay. The key points they will discuss are:
    1.Why IT Can’t Ignore The File Sync and Share Demand
    2.What to Look For in a Business Class File Sync and Share Product
    3.Why Empowering Collaboration is a Key Next Step for File Sync and Share

    All Pre- registrants will receive an exclusive copy of Storage Switzerland’s latest white paper, “Are File Servers Holding Users Back?”
  • Join this webinar and learn why consistency is the hallmark of an effective, agile organisation. With thousands of moving parts, ensuring that every user, every system is being managed consistently is critical. This webinar will show you how a best practice IT systems management software effectively defines, manages, applies and enforces IT policies across groups of machines.

    A state-of-the art Policy Management system streamlines the process of creating, setting and remotely applying IT policies to groups of systems across a distributed organisation. Administrators need to be able to view all policies from a single dashboard, customise them and assign them based on organisation, group, machine type, platform or any dynamic view of machines to ensure all systems are in compliance. By automating management by policies and enforcement, administrators can then take immediate action to remediate any system that is not in compliance.
    Benefits of a modern Policy Management system are:

    • Ensure distributed systems are in compliance with IT policies or recurring services
    • Streamline the process of applying and updating policies to multiple machines based on organisation, group, department or dynamic view
    • Achieve greater confidence that distributed systems are secure and in compliance
    • Manage policy enforcement of multiple groups of machines, applying varying and nested policies depending on security risk, business use or service level
    • New machines can automatically inherit policy settings without any intervention
  • Protiviti has conducted the second-annual Executive Perspectives on Top Risks Survey. We obtained the views of more than 370 board members and C-suite executives about risks that are likely to affect their organisation in 2014.

    Join Managing Director, Mike Purvis and Director, Dirk Verwohlt for a discussion of the report findings.
  • Every application, email, web page and Internet connection relies on information encapsulated into a data packet that can be easily distributed across networks. These packets include information about the sender and receiver, as well as the actual contents, or payload. By manipulating pieces of the packet data, criminals can infiltrate networks, applications, data centers, and individual computers.
    How do you defend your network against advanced threats that manipulate data at the packet level? Join Steve Smith, Senior Technical Marketing Manager at McAfee for a revealing presentation on the current state of threat prevention. Find out why you should be using deep packet inspection (DPI) for protocol identification, normalization, and data stream-based inspection to detect and block threats, in both clear-text and encrypted connections. And stop Advanced Persistent Threats (ATP) that rely on packet manipulation to thwart most common firewall and IPS defenses.
  • Virtual Desktop Infrastructure (VDI) places unique performance demands on storage. During the course of the day the I/O traffic changes from heavy read, to heavy write and then ends with a mixture of read and write requirements. This workload profile is so unique that many VDI planners end up selecting a dedicated storage solution for their VDI environment.

    Join Storage Switzerland and Fusion-io for the live webinar event "Avoid the Waste of a VDI-only Storage Solution”.

    In this webinar, you will learn:
    1. The challenges associated with deploying storage for VDI
    2. How current solutions attempt to solve these problems
    3. How to save money by supporting VDI and other application workloads on the same storage

    All pre-registrants for this webinar will receive an exclusive, advanced copy of Storage Switzerland's latest white paper "VDI Storage Should do More than Just VDI" emailed right after they sign up.

    The live event will be held on April 9th at 1PM ET, 10am PT so sign up now and get your exclusive white paper today!
  • Whether driven by opportunism, greed, a desire for revenge, or a combination of all three, company insiders exploit their positions of trust to obtain access to their organization’s most valued digital assets. Moles, opportunists, contractors, disgruntled employees, and ex-IT personnel—all currently pose a greater risk to corporate intellectual property than state-sponsored hacking and APTs, both in frequency and in damage caused. Hear from Kroll Managing Director Jonathan Fairtlough about the challenges related to insider investigations, and how policies and proof-points can be implemented to lessen the chances of insider-driven data damage.
  • Confidently integrate Cisco’s security portfolio to respond to the increasingly sophisticated attacks being targeted at the data center. This webcast will focus on the new secure data center technologies based on the latest Cisco Validated Design. This solution makes sure of the secure and reliable delivery of business applications across the data center.

    This webcast utilizes several primary technologies, such as the Cisco ASA 5585-X Firewall with Intrusion Prevention, Lancope Stealthwatch, Cisco TrustSec, Cisco UCS Director, and Secure Enclaves Architecture on FlexPod in a design that brings application awareness to the data center fabric and network services.

    Primary attributes of the design:
    •ASA firewall clustering for scalability
    •Fabric integration with virtual port channels (vPCs)
    •Link aggregation for simplified operations
    •Intrusion protection and application visibility
    •Real-time signature updates
    •Secure group tags (SGTs) for policy aggregation

    Customers who deploy the solutions benefit from simplified operations, increased availability, enhanced utilization of fabric resources, and threat mitigation and remediation of advanced persistent threats (APTs).
  • Disaster Recovery is hard to be addressed since it can be seen as something for managing risks but also a competitive business advantage at the same time; so Disaster recovery can be a problem but also an opportunity. First of all Disaster recovery must be discussed not only inside the IT department but the complete process will require collaboration at multiple levels and among different departments. This means that you need to understand what is the cost of downtime for your business. In order to do this methods like BIA (Business Impact Analysis) can help and support your organization for defining goals, purposes and expected benefits. Disaster recovery is a continuous process that involves the complete environment.
  • Richard Stiennon (Chief Research Analyst, IT-Harvest) met with Ruvi Kitov (Tufin's CEO) and Reuven Harrison (Tufin's CTO) to discuss the emergence and benefits of Security Policy Orchestration. As trends such as virtualization and the cloud continue to introduce new risks, more complexity, and more changes to the network, Security Policy Orchestration enables Operations teams to increase agility and efficiency by automating secure, accurate change processes into day-to-day operations.
  • Enterprises are overwhelmed with potential solutions to the corporate file sync and share dilemma. In this live webinar George Crump, Lead Analyst at Storage Switzerland and Arthur Chang from PanTerra Networks will discuss the three requirements that IT professionals should look for when selecting a enterprise class file sync and share solution.
  • Numerous studies show a serious shortage of qualified people to fill the cyber jobs of today, particularly those that require security knowledge and skills. Stephen Cobb looks at the implications and the steps being taken to improve cyber education and training.
  • 1.What will the webcast cover:

    The data security industry has reached a critical tipping point with the average organisation now taking over 200 days to detect a data breach.
    It is no longer effective or realistic to rely solely on static prevention controls to protect business critical assets. True resilience against todays overwhelming cyber threats is based in knowing exactly where to concentrate your security efforts and investments for maximum protection. But which battles should you elect to engage in, and where exactly should you focus to secure your business critical data?

    Data Security Professionals and Data Center Managers who join Symantec and Information Security (ISF) on this webcast will hear directly from leading industry security experts on how organisations should reimagine their data security in order to prepare, protect, detect and respond to cyber threats quickly and effectively.

    2.What are the benefits of attending:

    In addition to thought provoking presentations attendees will learn about the Symantec CyberV Risk Calculator which will help you to:
    • Measure your organisation’s cyber maturity
    • Help you identify areas of potential weakness
    • Prioritize your actions
    • Guide you towards the best cyber resilience solutions.

    3.Who should attend:

    Anyone concerned with data security, be they professionals, IT Managers or C-level
  • Everyone knows computer downtime is unacceptable. The world runs on data and it needs it fast. But securing that growing data network is time-consuming, expensive and often inefficient. Security professionals are looking for answers that can provide high availability and scale as the business changes. And they want solutions that are both highly secure and not a drain on computing and bandwidth resources.

    Join Steve Smith, Senior Technical Marketing Manager at McAfee for an in-depth discussion of how the next generation of firewall technology delivers scale and zero downtime performance. And learn how active-active clustering, dynamic server load balancing, management application redundancy and unique, augmented VPN capability is bringing resiliency to mission critical data networks.
  • Join us to learn:
    -How the scope of your security policy and governance must change.
    -The importance of visibility when you have no control of the physical infrastructure
    -The role of security in a DevOps-centric technology environment
    -How automation can increase both security and agility
    Every 15-20 years the underlying foundation of technology shifts, disrupting the way technology services are built and delivered. Now with the advent of cloud computing and virtualization, most of what you know about network security is going to change.
  • Traditional firewalls have always focused on offering port specific protection (i.e., stateful firewalling). Current day threats are web-based, and often are malicious applications that pass through traditional ports.

    Discover how you can overcome the limitations of traditional stateful firewalls with the comprehensive deep security of Dell SonicWALL next-generation firewalls. See why it is essential for your network protection and increased productivity to have application intelligence and control—one of the key features of our next-generation firewalls.

    This webcast will show you how to:
    •Gain true network protection with deep network security
    •Effectively manage network bandwidth using application intelligence and control
    •Provide granular application control: e.g., allow Facebook, but block Facebook Apps
  • Introducing the EMC Data Protection & Availability Division (DPAD) Portfolio. Formerly named Backup and Recovery Solutions (BRS), the DPAD Family is built around the goals of ensuring recoverability, improving overall efficiency and increasing agility.

    The blue print for customers to drive their data protection transformation with the three needed steps to move to the future.

    •Consolidated storage built for protection – storage of last resort
    •Integration to optimize performance and allow new user interfaces of choice
    •Overarching management services to add value and the oversight the business needs

    It’s a unique differentiator for EMC… a game changer!
  • Gain expert insight into how to leverage the best of cloud and dedicated platforms, SQL 2012 Always On architectures that work, and the metrics necessary to gauge the success of your recovery solution.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
  • Organizations of all sizes face a number of industry and regulatory compliance mandates. Whether its PCI DSS, SOX, HIPPA or FISMA, these regulations are changing to accommodate the ever-growing threat to sensitive data.

    Join Dave Shackleford, IT security consultant and founder of Voodoo Security, as he breaks down these updated requirements and how to remain current while securing your business.

    Attend this webcast and learn:
    - Best practices for protecting data in today’s complex security landscape

    - Latest updates to compliance mandates pertaining to data encryption

    - What these updates mean to your security teams.
  • *On this webcast we're giving away a pass to our partner event: the Chicago Cyber Incident Response Summit, between June 21-23, 2014*

    Let’s face it, there’s unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is ‘How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?’ With the advanced threats that are pervasive today, it’s becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

    In this webinar, William Stewart, Senior Vice President of Booz Allen Hamilton and Jeff Lunglhofer, Principal of Booz Allen Hamilton–a leading management technology and consulting firm driving strategic innovation for clients–will discuss the top trends in cyber threat mitigation, data privacy, data governance, and data security, with Mark Bower, VP Product Management and Solutions Architecture at Voltage Security.

    Attend this webinar to learn more about how to:
    •Increase responsiveness and security in your IT environment and architecture
    •Fight pervasive threats from inside and outside attack with data-centric technologies
    •Raise your organization’s overall data privacy, compliance, and security profile
    •Implement a new data de-identification framework across production, test & dev, and analytics use cases
    •Proactively enable critical business initiatives
    --Can't attend live? Register below to receive a link to the recorded webcast.
  • 85% of enterprises permit BYOD, but only 25-30% of them actually have policies and technology to manage these devices. What is your business doing to ensure that the content on that device stays secure, regardless of what device your employees are using? If you are considering moving to a BYOD strategy or are in the midst of doing so, join this webinar to learn how to develop and execute a BYOD plan in your company. We'll talk about major challenges from creating a BYOD strategy and best practices from ensuring that the content on your device stays secure with Box.
  • Presented by the experts with the facts.

    The Inside Story of the Discovery, the Timeline and Solutions to Protect Your Organization. Finally, All of Your Questions Answered.
  • Protiviti's IT Priorities Survey results reveal 2/3 companies are going through a major IT transformation in 2014. Join Protiviti's IT Consulting managing directors to discuss why.
  • Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • In our webinar, “Stopping Performance Sprawl - How To Develop A Single Point of Performance Management”, George Crump, Lead Analyst at Storage Switzerland and Andrew Flint, Product Manager at Intel, will discuss the role of cache accelerated server-side flash, provide guidance on how to select the right performance solution for your next storage refresh and show you how a server-side cache solution can help establish a single point of performance management.

    All pre-registrants for this webinar will receive an exclusive, advanced copy of Storage Switzerland's latest white paper “How To Choose The Right Application Caching Architecture”.

    In addition, all registrants will be able to access Storage Switzerland's extensive library of on-demand webinars, many with exclusive white papers, without having to re-register.
  • The performance of databases often slows as data and business grows, users find new and demanding ways to leverage applications, and those applications mature and expand in functionality. Whenever a key database slows down, SQL or NoSQL, the business damage can be widespread and it usually becomes a high priority effort to remediate.

    At Taneja Group we’ve noted 5 major ways that IT operations can improve database performance, including a couple of quick and ready ideas that impose little risk or cost. In this 30 minute webcast, we'll look at why IT operations often gets the responsibility for database performance, and the IT-centric options they can pursue.

    Mike Matchett brings to Taneja Group over 20 years experience in managing and marketing IT datacenter solutions particularly at the nexus of performance, capacity and virtualization. Currently he is focused on IT optimization for virtualization and convergence across servers, storage and networks, especially to handle the requirements of mission-critical applications, Big Data analysis, and the next generation data center. Mike has a deep understanding of systems management, IT operations, and solutions marketing to help drive architecture, messaging, and positioning initiatives.
  • - Cache is not just for virtualization anymore (actually it never was)

    Server and Desktop virtualization capture a lot of attention from storage vendors these days, especially Flash or SSD vendors. Server-side flash solutions have vaulted into the market lead and are the most commonly implemented method to solve virtualization performance issues. While the value of using server-side flash is undeniable, the fact remains that most data centers have large numbers of bare metal servers that also require high performance.

    Join us for our live webinar in which experts from Storage Switzerland and SanDisk discuss how to analyze these bare metal systems to determine if they can benefit from a flash based performance boost and which of the many flash options available are best for them (Shared Flash, Server Side Flash or Server Side Caching).

    The live event will be held on April 30th at 1PM ET, 10am PT so sign up now and get your exclusive white paper today!
  • Your network security team must know and manage what is happening on your network at all times. Running back and forth to different devices doesn’t work even if you can log in remotely. It takes too much time and is not coordinated. You have to rely on a centralized management system.

    Join Steve Smith, Senior Technical Marketing Manager, as he shows you how the McAfee NGFW acts as the core of your network security, centralizing the monitor, managing and reporting across diverse virtual, physical and third-party devices. He will show you how a single console view can give your team real-time visualization of network operations, improving response time for recognition and remediation of incidents and threats.
  • Today in order to remain competitive, there is a tremendous demand on lines of business to be able to analyze more aspects of business data and do this very quickly. There is a control shift to the business analyst so they can analyze what they need to, NOW!

    Big Data requirements are also emerging, even as everyone is being asked to accomplish more with less. Join us to learn how the combination of DB2 10.5 with BLU Acceleration and Cognos BI 10.2 can help bring sanity to satisfying these ever increasing demands.

    We will provide an overview and technical deep dive of DB2 10.5 with BLU Acceleration, Cognos BI 10.2 and Dynamic Cubes. Join experts from the DB2 and the Cognos BI teams who will also explain how these two offerings fit together and the benefits they have provided to clients already. See the value that DB2 with BLU Acceleration can bring to Cognos BI, and ask these experts your questions, so you can understand how this solution helps solve business challenges.
  • Join us for a 30 minute webcast on May 1st, 2014 and learn how Isilon Scale-Out NAS offers a full solution to protect and manage your big data environment.
  • The Next Generation Data Center is HERE. These data centers are highly virtualized environments with extremely high virtual machine densities. They thrive on flexibility and cost efficiency. While most of these data centers are in the hands of cloud service providers (CSPs), more traditional enterprises see the benefits of the next generation data center and are adopting much of the CSP mentality. Because of their levels of VM density, these data centers change the storage I/O dynamic and essentially make the traditional storage array obsolete.

    In our upcoming webinar "The Storage Requirements for the Next Generation Data Center" join experts from Storage Switzerland and SolidFire to learn:
    1. What is the Next Generation Data Center?
    2. Why are Next Generation Data Centers ‘The End Game’ of IT?
    3. How Do Next Generation Data Centers Break Storage?
    4. How Does Storage Need to Change to Keep Up?

    All pre-registrants for this webinar will receive an exclusive, advanced copy of Storage Switzerland's latest white paper "How to Design Storage for the Next Generation Data Center" emailed right after they sign up.
  • Data sprawl posts a big challenge to data protection today. Having visibility to data movement and how it is being used is a key step to controlling data at the source. This session will focus on how DLP discovery along with user and file activity monitoring can give you contextual awareness of the file being used.

    1)Learn how event and application monitoring enables visibility into data movement within and out of the enterprise
    2)Leverage McAfee ePO to automate DLP policies based on situational awareness
    3)See how McAfee DLP and ESM work together to provide real-time data protection
  • *On this webcast we're giving away a pass to our partner event: Governance, Risk and Compliance for Financial Services on June 24-26*

    2014 has been called “The Year of Encryption”. The recent data breaches, personal identity theft cases, and email snooping concerns have put a spotlight on the importance of protecting sensitive data, both inside and outside the enterprise. Email is invaluable to enterprises. It’s the easiest mode of communication which also makes it an easy target for data theft.

    As email users communicate sensitive data, often in the form of credit card numbers, social security numbers, phone numbers, personal financial data, and personal health information, it is sent and resent to multiple users and locations. Sometimes this data is secure, but all too often, it is not. This impacts companies of all sizes where email security vulnerabilities are both internal and external to the enterprise.
    The need to protect private information being communicated by email between customers, prospects, patients, loan applicants, and clients is now the norm. Unfortunately, many enterprise email solutions are several years old and using outdated and ineffective security technology.

    This session will explore the key concepts and best practices to protect and maintain private email communications and why you need to rethink your email security. Hear from two email security experts Michael Osterman of Osterman Research, and Mark Schweighardt of Voltage Security and learn:

    - Best practices for securing sensitive email communications.
    - When is the right time to replace your legacy email security.
    - How to protect sensitive email information as it flows to and from the enterprise.
    - Latest insights on Identity-Based Encryption and Stateless Key Management.
    - How other enterprises deploy the world’s most popular email security solution.
  • Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.

    Registrati adesso per il nostro webcast 2014 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.

    Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Hai l’agenda impegnata? Guarda la registrazione on demand ed assicurati di ricevere il nostro rapporto ISTR.
    Non mancare a questo importante approfondimento!
  • Every year, Symantec provides a comprehensive source on Internet threats all across the globe, offering valuable insights into trends and activity from the past year. Don’t miss this annual event.

    Register now for our 2014 Symantec Internet Security Threat Report Webcast to understand the key findings and latest trends that will impact the counter measures that you should consider.

    Tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Can’t make the date? Secure your registration, watch the recording at your leisure and ensure you receive our report. Don’t miss this important annual event.
  • From natural disasters to hacking attacks, your business needs a plan to respond to adverse events and keep on going. That’s the goal of Business Continuity and Stephen Cobb helps you lay the groundwork for a successful strategy for your organization.
  • Das Jahr 2013 ist aus Sicht der IT Sicherheit Jahr geprägt von einer Reihe größerer Datenverluste, bei denen Millionen von Datensätzen verloren gingen. Was auffällig war: Cyberkriminelle scheinen abzuwarten, bis sich ein lohnendes Ziel ergibt.

    Erfahren Sie in diesem Live-Webcast von Lars Kroll, seines Zeichens Cyber Security Strategist bei Symantec, wie Cyberkriminelle ihre Einbruchstaktiken abgewandelt haben. Besprechen Sie mit ihm, was man aus diesem veränderten Strategien lernen kann, um das eigene Netzwerk und die wichtigen Daten besser zu schützen. Sollten Sie zu diesem Zeitpunkt beschäftigt sein, können Sie sich trotzdem registrieren und bekommen automatisch einen Link zur Aufzeichnung zugeschickt.

    Registrieren Sie sich noch heute und erfahren Sie die wichtigsten Enwicklungen im Bereich Cyber Sicherheit.
  • Choosing the best network security solution for your organization can be complicated. Many organizations turn to third party analysts, each offering their unique perspective and insight, to help narrow the choices. However, their different viewpoints and methodology can make it difficult to understand.

    Nat Smith, Director of Network Security at McAfee, will discuss NSS Labs' 2014 Security Value Map for Data Center Intrusion Prevention Systems (IPS) and also touch on other third party analysts reports on IPS, each with a keen value when understood in context.
  • Threat intelligence is a critical tool in the never-ending struggle to protect the world’s networks, but many threat intelligence solutions lack visibility into the parts of the Internet where bad actors operate—the darknets. As the effectiveness of these solutions declines, organizations are exposed to increased risk of security breaches, data ex-filtration, and loss of reputation and revenue from today’s advanced cyber threats.
    McAfee and Norse have developed an integrated threat intelligence approach leveraging the strengths of McAfee GTI along with Norse’s unique ability to provide visibility into the darknet and dark web. This integration of McAfee Network Threat Response Cloud Analysis and Deconstruction Services with Norse IPViking provides the strongest web-based reputation protection available against botnets, distributed denial-of-service (DDoS), and advanced persistent threats. When combined in an automated fashion with machine-to-machine interface, users now have a single-pane-of-glass with rich context to track new organizational threats not detected through traditional means.
    Join McAfee and Norse to learn about:
    •The value of Dark Threat Intelligence and its role in preventing compromise and data breaches
    •Threat intelligence-based strategies for advanced threat prevention and detection
    •Using threat intelligence to streamline and improve the incident response process
  • 2013 – året av Megahacks

    Varje år släpper Symantec en omfattande rapport om de internethot som har ägt rum under det gångna året. Årets rapport visar bl a en omfattande beteendeförändring hos nätbrottslingar, där flera månaders förberedelser tycks ligga till grund för de allt större intrången.

    “Ett megahack kan vara lika mycket värt som 50 mindre” säger Per Hellqvist, säkerhetsexpert hos Symantec. Samtidigt som attackerna fortsätter att vara lika sofistikerade som tidigare ser vi att de riktade attackerna är än mer riktade än tidigare och pågår under längre tid. Nätbrottslingarna är helt enkelt mer fokuserade och uthålliga.

    Registrera dig till vår webcast där du kan lyssna till Symantecs säkerhetsexpert Per Hellqvist.
    Ställ frågor och få råd om hur du bäst kan skydda din organisation.

    Om du inte kan delta, registrera dig ändå och så att du kan ta del av den inspelade webcasten vid ett tillfälle som passar dig.