Third-party tests can be extremely caluable for evaluating anti-malware products. In-fact, more tests are available than most people realize, covering not only detection rates and scanning speeds, but also factors like number of false positives and ability to block zero-day attacks. But an educate
Third-party tests can be extremely caluable for evaluating anti-malware products. In-fact, more tests are available than most people realize, covering not only detection rates and scanning speeds, but also factors like number of false positives and ability to block zero-day attacks. But an educated evaluator can both avoid the snares of misleading tests and find a surprising number of useful third party tests.
RecordedMay 30 201259 mins
Your place is confirmed, we'll send you email reminders
Los datos no estructurados de la empresa son cada vez más un activo imprescindible para los servicios y procesos de negocio. Sin embargo, su crecimiento exponencial hace que las tecnologías tradicionales de protección de este tipo de datos sean no solo ineficientes sino incapaces de responder a las necesidades de disponibilidad en entornos empresariales.
En este webinar veremos tres áreas de innovación de Commvault que permiten responder a las necesidades de protección de datos no estructurados:
-En la primera parte, expondremos las novedades en la tecnología IntelliSnap, que permite la integración con nuevos fabricantes y la gestión de réplicas de volúmenes; asimismo hablaremos de la nueva tecnología de captura de bloques que extiende el concepto de protección continua y consistente a cualquier tipo de sistema de ficheros y base de datos, para disponer de un número ilimitado de puntos de recuperación de acceso nativo.
-En la segunda, revisaremos cómo la nueva versión del software de Commvault expande sus capacidades a entornos de Big Data. De acuerdo con Gartner, más de tres cuartas partes de las empresas tienen iniciativas de Big Data, y por lo tanto la necesidad de gestionar la disponibilidad de estos datos es un reto que debe resolverse a corto plazo.
-Por último, repasaremos cómo las soluciones NAS hiperescalables exigen de tecnologías innovadoras para poder garantizar la protección y acceso a los datos que almacenan.
Únase a nosotros para conocer cómo la Plataforma de Gestión de Datos de Commvault le permite cumplir sus SLA de disponibilidad de datos no estructurados, independientemente de la tecnología que elige para almacenar y gestionar estos activos de su negocio.
Like many organisations, Prudential has to ensure it protects sensitive data. Getting it right results in satisfied customers, regulators and shareholders and avoids the reputational damage and legal penalties associated with a data breach. With the forthcoming EU General Data Protection Regulation now agreed for implementation, we think now is the right time for organisations to review their data governance and protection requirements. During this webinar we will cover today’s challenges in ensuring good data governance and enter into a panel discussion with Prudential about their approach and lessons learned, including their implementation of Symantec Data Loss Prevention and Boldon James data classification technology. There will also be an opportunity to engage in a Question and Answer session.
So if you want to give your data governance program a head start, register today.
High Availability doesn’t trump Disaster Recovery and there is nothing simple about creating a recovery capability for your business – unless you have a set of data protection and business continuity services that can be applied intelligently to your workload, managed centrally, and tested non-disruptively. The good news is that developing such a capability, which traditionally required the challenge of selecting among multiple point product solutions then struggling to fit them into a coherent disaster prevention and recovery framework, just got a lot easier.
Join us and learn how DataCore’s Software-Defined Storage platform provides the tools you need and a service management methodology you require to build a fully functional recovery strategy at a cost you can afford.
The emergence of Big Data has driven the need for a new data platform within the enterprise. Apache Hadoop has emerged as the core of that platform and is driving transformative outcomes across every industry.
Attend this webcast to understand:
•How you could leverage the unique advantages of Open Enterprise Apache Hadoop with an overview of the technology
•How it fits within the enterprise, and gain insight into some of the key initial use cases that are driving these transformations
•How Microsoft Azure provides a first-class support for your Linux-based Apache Hadoop applications
•How easy it is to create a HDP cluster in Microsoft Azure and data movement automation for disaster recovery scenarios between your on-premises HDP cluster and your HDP cluster running in Azure
Join us for a Live Webcast to discover how Veritas Backup Exec™ can deliver a powerful, flexible and easy-to-use backup and recovery solution that is designed for your entire infrastructure regardless of platform: virtual, physical or cloud.
With Backup Exec™ you get fast, reliable backup and recovery of data and systems at every level and advanced integration with the most recent releases of VMware vSphere and Microsoft Hyper-V.
Dridex is one of the most persistent and prevalent threats facing organizations today. Configured to collect victim's banking credentials, it is now one of the most active and dangerous pieces of financial malware in circulation.
Join this webcast as we discuss:
•Dridex propagation methods, in particular its massive spam campaigns.
•How Dridex attempts to steal banking information.
•Guidance on how to protect against Dridex infections.
ESET senior security researcher Stephen Cobb and Larry Ponemon of the Ponemon Institute discuss a new study on healthcare security addressing causes, costs and potential cures for soaring cybercrime rates.
Are you considering a Next-Gen AV solution? Before you make a decision, attend this webcast with an ESET engineer who will examine vendors’ claims and supporting technologies.
Key takeaways include:
1.Next Gen AV technologies – making sense of their claims
2.A deep dive into ESET technology
3.The difference between reactive vs. proactive technologies
4.How ESET leverages the Cloud
5.Best practices in evaluating AV technologies
How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cybersecurity for the upcoming year and discusses the tools and resources available to protect against them.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
Is your business prepared for a disaster? Join ESET and industry expert, StorageCraft, for a research overview presentation of modern business disasters. We'll look at the difference between back up and recovery and discuss best practice for building a recovery plan. Mike Kunz, VP of Sales with StorageCraft, will also look at specific solutions to quickly get your business up and running when disaster strikes.
Lysa Myers, Security Researcher III, ESET North America
ESET security researcher Lysa Myers discusses developments in healthcare IT system security that you may see at the HIMSS conference in Chicago next week. Find out what is being done to better protect patient data privacy and more.
Ayreh Goretsky, Distinguished Researcher, and Don Lewis, Product Marketing Manager, ESET North America
Advanced persistent threats (APT) are a growing concern to the world's companies and networks. This presentation will give an overview on how they work and examine real-world data breaches resulting from APTs. We'll also look at how multi-layered proactive detection can combat this threat and offer a product overview of how ESET's powerful endpoint solutions respond to APTs.
Category: Research overview and ESET product presentation.
Dave Howard, Instructional Designer, ESET North America
From unobtrusive advanced malware detection technologies to automated threat response and actionable mobile-friendly dashboard – manage security from any device, any time, ESET will present new solutions for securing your endpoints and new ways to manage them.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>