Antivirus Software: Understand Detection Methods Before You Buy
Before you choose an antiviruous solution its important to understand how it goes about detecting malware in the first place.
Join us as we discuss:
- Security in the news
- Modern threat categories and attack vectors
- Endpoint risks, infection methods, payloads
- Detection with signatures and hueristics
- Zero Day Risk
- Technologies that protect removable storage devices
- Best practices
RecordedAug 15 201259 mins
Your place is confirmed, we'll send you email reminders
ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
•PCI and two-factor authentication
•PUAs and scamware
•Privacy by design
•General Data Protection Regulation (GDPR)
ESET North America & Michael Aguilar, Business Product Technical Lead
Winter is coming. Our three-eyed raven answers your top 5 IT security questions based on our most recent survey including email security, ransomware, protecting IoT and more. Additionally, here's your chance to ask our in-house cybersecurity expert, Michael Aguilar, your most challenging questions to help you defend the wall. It’s an open forum just for you!
With a personal record of 34 questions in 30 minutes, Michael will torch your questions like Drogon. Sign up today and get those questions ready.
Michael Aguilar, Business Product Technical Lead, ESET North America
You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
Join an ESET business product technical lead to learn:
•How ransomware has evolved and spread
•Why mobile phones and Apple OS X are increasingly vulnerable
•Best practices for avoiding and dealing with ransomware
•Why to implement backup and recovery solutions now
ESET senior security researcher Stephen Cobb and Larry Ponemon of the Ponemon Institute discuss a new study on healthcare security addressing causes, costs and potential cures for soaring cybercrime rates.
Are you considering a Next-Gen AV solution? Before you make a decision, attend this webcast with an ESET engineer who will examine vendors’ claims and supporting technologies.
Key takeaways include:
1.Next Gen AV technologies – making sense of their claims
2.A deep dive into ESET technology
3.The difference between reactive vs. proactive technologies
4.How ESET leverages the Cloud
5.Best practices in evaluating AV technologies
How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cybersecurity for the upcoming year and discusses the tools and resources available to protect against them.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>
Most organizations making an investment in NetApp Filers count on the system to store user data and host virtual machine datastores from an environment like VMware. In addition these organizations want their NetApp systems to do more and be the repository for the next wave of unstructured data; data generated by machines. NetApp systems are busting at the seams, so these organizations are trying to decide what to do next.
To help you find out what to do next, join Storage Switzerland and Caringo for our live webinar and learn:
1. What are the modern unstructured data use cases
2. The challenges NetApp faces in addressing its customers’ issues
3. Other solutions; can all-flash or object storage solve these challenges
4. Making the move - how to migrate from NetApp to other systems
5. How to re-purpose, instead of replacing your NetApp
The 2016 BCI Horizon Scan, supported by important studies such as the 2016 Allianz Risk Barometer, the World Economic Forum Global Risks Report and the BCI Supply Chain Resilience Report paint a picture of increasing and ever evolving threats to our organizations and the world we live in.
This webinar explores those threats and trends and provides conclusions and key takeaways that shape how we all, as business continuity professionals, need to adjust our focus and initiatives to prepare and respond to the evolving environment we all live in.
Join Brian Zawada and 20/20 white paper Author John Jackson for a compelling look at how our roles will change in the years ahead.
Global enterprises have quietly funneled enormous amounts of data into Hadoop over the last several years. Hadoop has transformed the way organizations deal with big data. By making vast quantities of rich unstructured and semi-structured data quickly and cheaply accessible, Hadoop has opened up a host of analytic capabilities that were never possible before, to drive business value.
The challenges have revolved around operationalizing Hadoop to enterprise standards, and leveraging cloud-based Hadoop as a service (HaaS) options offering a vast array of analytics applications and processing capacity that would be impossible to deploy and maintain in-house.
This webcast will explain how solutions from IBM and WANdisco address these challenges by supporting:
- Continuous availability with guaranteed data consistency across Hadoop clusters any distance apart, both on-premises and in the cloud.
- Migration to cloud without downtime and hybrid cloud for burst-out processing and offsite disaster recovery.
- Flexibility to eliminate Hadoop distribution vendor lock-in and support migration to cloud without downtime or disruption.
- IBM's BigInsights in the cloud, and BigSQL, which allows you to run standard ANSI compliant SQL against your Hadoop data.
Many enterprise organizations are moving beyond antivirus software, adding new types of controls and monitoring tools to improve incident prevention, detection, and response on their endpoints. Unfortunately, some of these firms are doing so by adding tactical technologies that offering incremental benefits only.
So what’s needed?
A strategic approach that covers the entire ESG endpoint security continuum from threat prevention to incident response. A truly comprehensive solution will also include advanced endpoint security controls that reduce the attack surface and tight integration with network security, SIEM, and threat intelligence to improve threat detection and response processes.
Join ESG senior principal analyst Jon Oltsik, Intel Security, and Bufferzone on a webinar on July 21 at 10am PT/1pm ET to learn more about next-generation endpoint security requirements and strategies.
It may be summer, but IT never takes a vacation. As business projects slow, IT takes advantage of the downtime to shore up the infrastructure and overhaul systems. With all eyes on technology these days, everything from security breaches to system outages get outsized attention. It’s a lot to contend with.
While any old cloud can provide a bit of shade, the iland cloud can do more. Our purpose built – and consistently enhanced – iland cloud console provides a welcome reprieve from the pain of managing cloud workloads, ensuring their security – and even answer questions from the executive suite.
Join a webinar from our product experts, showing how the iland cloud console integrates:
- A full complement of proactive security technologies
- Tools to provision and manage VMs, vApps, network and more
- 12 months of performance and capacity data
- On-demand reporting for your executives and auditors
- A host of “bonus features” to make your life easier
Join this webinar to see how the iland cloud, with it’s innovative console, does more than outsource infrastructure. We’ll pour you a tall glass of virtual ice water, turn on the A/C, and make sure that your cloud operation is cool as a cucumber.
The results of the 2016 Cyber Resilience Survey confirm much of what we already suspected about the changing nature of the cyber threat and the way that cyber criminals have found new ways past corporate perimeter security. The increased difficulty of breaching perimeter security and the increased human resources available to cyber criminals has combined to produce a new point of attack. This is focused on the weakest link in the corporate security chain, which is now human beings rather than technology. The research shows clearly that phishing and social engineering is now the single top cause of cyber disruption, with over 60% of companies reporting being hit by such an incident over the past 12 months.
In this webinar, we will be looking at some of the findings from the study, and discussing what actions organizations can take to help improve their cyber resilience.
As the business landscape redefines itself with the adoption of big data, mobile computing and social media, traditional Security Operations Centres (SOC) that only monitor an organisation’s network no longer provide adequate protection.
In a Next Gen SOC, data monitoring extends beyond the organisation, into its cloud services, key executives’ personal email accounts, mobile devices, and more. Equipped with complex tools, strict processes, and experienced security analysts, a Next Gen SOC provides real-time and actionable intelligence, to better protect your organisation from the latest threats.
Join our upcoming webinar and learn about:
- Core requirements for a Next Gen SOC
o Flexible Log Collection
o Big Data Processing
o Advanced Analytics
o Real-Time Intelligence
- SOC-centric services: Incident Response and Advanced Intelligence
- SOC operating models – Building your own SOC, Operating Models & Extending Services
- Developing the next generation of security professionals