Hi [[ session.user.profile.firstName ]]

Prevent Spear-Phishing - Put Your Users in a Bubble

Your users face a constant threat of spear-phishing, zero-day attacks, and APTs. Until now, the answer to the spear-phishing threat has largely been end-user training. Join McAfee and Invincea for a look at a smart new solution to the problem – endpoint security software that puts every user in a bu
Your users face a constant threat of spear-phishing, zero-day attacks, and APTs. Until now, the answer to the spear-phishing threat has largely been end-user training. Join McAfee and Invincea for a look at a smart new solution to the problem – endpoint security software that puts every user in a bubble. In this session, you’ll learn:

• How Invincea and McAfee offer comprehensive protection to every endpoint
• An answer to the threat of zero-day attacks and APTs that protects every user
• Rich threat intelligence that feeds McAfee ePO dashboards to make your security administrator even more effective
Recorded May 15 2012 34 mins
Your place is confirmed,
we'll send you email reminders
Presented by
McAfee and Invincea
Presentation preview: Prevent Spear-Phishing - Put Your Users in a Bubble
Recommended for you:
  • Date
  • Rating
  • Views
  • Bringing IT All Together — Modern Monitoring for Hybrid IT Bringing IT All Together — Modern Monitoring for Hybrid IT Jay Lyman, 451 Research; Kent Erickson, Zenoss Recorded: May 4 2016 46 mins
    The cloud is here to stay. However, that also means more and more companies are realizing that they’ve built two separate IT teams and are struggling to deliver quality services without a unified view. A true hybrid monitoring solution is the answer to this common problem.

    Join Jay Lyman, Analyst at 451 Research, and Kent Erickson, Alliance Strategist at Zenoss, as they discuss what is shaping hybrid IT, where it's going, and what to do about it.
  • How New Devices Can Help You Make the Most of Windows 10 How New Devices Can Help You Make the Most of Windows 10 David Hollway, Mike Brohoski, & Pang Ngernsupaluck Recorded: May 4 2016 23 mins
    Together, Windows 10 and Intel deliver the productivity, security and manageability you need to advance your business.

    Intel and Microsoft have been collaborating for more than 30 years, creating technology that has changed the way we do business.

    With Windows 10, we’ve taken this partnership to a whole new level, with new hardware lighting up key Windows features that help you stay ahead of security threats, while making it easy for you to manage devices across your business.

    The new devices on Windows 10 and the new Intel 6th generation processor (Skylake) deliver:
    •Better Productivity: Do more and be more productive with improved multi-tasking, less waiting, familiar interface and app compatibility
    •Better Security: Helps protect identity, data and devices against modern security threats
    •Better Manageability: Stay current with less effort, manage devices more effectively, remotely provision and deploy applications

    Watch this webcast to:
    •Discover Windows 10 productivity, security and manageability features that new hardware lights up
    •Learn more about the Intel 6th generation processor (Skylake) and how it helps give time and money back to your company
    •Get additional resources to evaluate when it might be time for new devices and what devices are right for you
  • New Rules for Recovery: Setting Expectations for Today's Continuity Platforms New Rules for Recovery: Setting Expectations for Today's Continuity Platforms Jim Whalen, Taneja Group; Dave LeClair, Unitrends Recorded: May 4 2016 47 mins
    Traditionally, when people talk about data protection, they’re talking about some form of backup. However, if those backups effectively end up in a “write-only memory”, they’re not much good. So really, the bottom line is recovery is what people are most concerned about when they talk about data protection. With the degree to which today’s technologies have been refined and the plethora of data protection platforms available, users should maintain a baseline set of simple expectations to be met no matter who or what they choose for the job. In this presentation, Taneja Group and Dave LeClair of Unitrends will discuss the “New Rules for Recovery” that everyone’s solution should adhere to.
  • New Rules for Recovery: Setting Expectations for Today's Continuity Platforms New Rules for Recovery: Setting Expectations for Today's Continuity Platforms Jim Whalen, Taneja Group; Dave LeClair, Unitrends Recorded: May 4 2016 47 mins
    Traditionally, when people talk about data protection, they’re talking about some form of backup. However, if those backups effectively end up in a “write-only memory”, they’re not much good. So really, the bottom line is recovery is what people are most concerned about when they talk about data protection. With the degree to which today’s technologies have been refined and the plethora of data protection platforms available, users should maintain a baseline set of simple expectations to be met no matter who or what they choose for the job. In this presentation, Taneja Group and Dave LeClair of Unitrends will discuss the “New Rules for Recovery” that everyone’s solution should adhere to.
  • New Rules for Recovery: Setting Expectations for Today's Continuity Platforms New Rules for Recovery: Setting Expectations for Today's Continuity Platforms Jim Whalen, Taneja Group; Dave LeClair, Unitrends Recorded: May 4 2016 47 mins
    Traditionally, when people talk about data protection, they’re talking about some form of backup. However, if those backups effectively end up in a “write-only memory”, they’re not much good. So really, the bottom line is recovery is what people are most concerned about when they talk about data protection. With the degree to which today’s technologies have been refined and the plethora of data protection platforms available, users should maintain a baseline set of simple expectations to be met no matter who or what they choose for the job. In this presentation, Taneja Group and Dave LeClair of Unitrends will discuss the “New Rules for Recovery” that everyone’s solution should adhere to.
  • Live Podcast - EMC World - Day 2 Recap Live Podcast - EMC World - Day 2 Recap Charlie Hodges, George Crump Recorded: May 4 2016 28 mins
    No registration required – EMC World 2016 is under way. Join me again as I sit down with George Crump, Lead Analyst at Storage Switzerland. In this live podcast we will give you a recap of EMC World day 2 and give you our analysis of the latest news from EMC.
  • Achieving Management and Operations Excellence Achieving Management and Operations Excellence Lee Kirby Recorded: May 3 2016 7 mins
    No matter how well designed and built your data center infrastructure may be, ultimately it is the day-to-day operations activities and management decisions where the success of your mission stands or falls. In fact, the leading cause of downtime is human error. To mitigate risks, achieve your business goals, and meet uptime requirements, it is critical to unify operating behaviors with the functionality of your infrastructure. These panelists will discuss how they have achieved M&O excellence across their global portfolios leveraging the Uptime Institute M&O Stamp of Approval.
  • DCIM Market Overview and Procurement Strategies DCIM Market Overview and Procurement Strategies Matt Stansberry Recorded: May 3 2016 44 mins
    The pursuit of Data Center Infrastructure Management (DCIM) benefits leads, too often, in a procurement and implementation process take too long, the software costs too much and the tools often under-deliver. Often, organizations fail to define business requirements for DCIM and evaluate options in a holistic and consistent framework. This webinar can help provide insight into why those outcomes occur and how to avoid.
  • Stormy Weather Ahead: How to Navigate the Cloud and Stay Safe, ESG & Tufin Stormy Weather Ahead: How to Navigate the Cloud and Stay Safe, ESG & Tufin Jon Oltsik, senior principal analyst, ESG & Maya Malevich, Director of Product Marketing, Tufin Recorded: May 3 2016 54 mins
    Between constraints of IT security skills and the rise of cloud adoption it is increasingly difficult to control security policies across the heterogeneous network. Network security and operations teams are expected to ensure and initiate connectivity while protecting the attack surface from the next cyber threat and complying with internal policies and industry regulations. Join us for a Webinar session with ESG senior principal analyst Jon Oltsik, as he reviews the latest findings of a recent survey on how cloud adoption is transforming network security operations. In this session we will also examine how security policy orchestration can help address some of the key challenges of managing security and connectivity in the cloud, and across hybrid cloud and physical networks.
  • Live Podcast - EMC World - Day 1 Recap Live Podcast - EMC World - Day 1 Recap Charlie Hodges, George Crump Recorded: May 3 2016 22 mins
    No registration required – EMC World 2016 is under way and StorageSwiss is there. Join me as I sit down with George Crump, Lead Analyst at Storage Switzerland. In this live podcast we will do more than just give you the news, we will give you our analysis of what the news means for EMC and for your organization.

    Join us live on May 3rd at 9am ET or on-demand afterward. No registration required.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Prevent Spear-Phishing - Put Your Users in a Bubble
  • Live at: May 15 2012 5:00 pm
  • Presented by: McAfee and Invincea
  • From:
Your email has been sent.
or close
You must be logged in to email this