Endpoint Management and Security

Channel profile:

Tips to Endpoint Management, Security and Compliance Challenges

This channel provides live and on-demand webcasts on a range of Endpoint Management and Security topics, including: identifying the latest trends and best practices for minimizing insider risks, reducing your threat exposure, managing Web 2.0 threats, reducing your cost of compliance and taking control of your endpoints, from both an operational and security perspective.

Subscribers (7,131)
Bridging the Patching Gap in Microsoft System Center Russ Ernst, Director, Product Management System Center Configuration Manager is the solution of choice for managing today's enterprise environments. But what’s an administrator to do when a security audit includes vulnerabilities in non-Microsoft applications and server platforms?

Introducing the only enterprise-class 3rd party patching solutions designed exclusively for System Center environments that require operationally efficient and reliable security and compliance patching solutions.

Join us for a discussion of practical methods to improve and automate the patch process for your most targeted 3rd party desktop applications and non-Windows server platforms, reduce the time you spend building updates, and improve audit readiness in your Windows environment.
Read more >
Jun 25 2015
38 mins
Play
  • Live and recorded (48)
  • Upcoming (0)
  • Date
  • Rating
  • Views
  • System Center Configuration Manager is the solution of choice for managing today's enterprise environments. But what’s an administrator to do when a security audit includes vulnerabilities in non-Microsoft applications and server platforms?

    Introducing the only enterprise-class 3rd party patching solutions designed exclusively for System Center environments that require operationally efficient and reliable security and compliance patching solutions.

    Join us for a discussion of practical methods to improve and automate the patch process for your most targeted 3rd party desktop applications and non-Windows server platforms, reduce the time you spend building updates, and improve audit readiness in your Windows environment.
  • Security is Complex, Patching with Microsoft® System Center Shouldn't Be

    System Center Configuration Manager is the solution of choice for managing today's enterprise environments. But what’s an administrator to do when a security audit includes vulnerabilities in non-Microsoft applications?

    Introducing the only enterprise-class 3rd party patching solution designed exclusively for System Center environments that require operationally efficient and reliable security and compliance patching solutions.

    Join us for an in-depth demonstration of practical methods to improve the patch process for your most targeted 3rd party desktop applications, reduce the time you spend building updates, and improve audit readiness in your Windows environment—through our newly released Lumension® Patch Manager DeskTop plug-in.

    Key capabilities include:
    Integrated plug-in with automated content subscription and synchronized scheduling—all within the familiar SCCM console but without need for manual SCUP input
    Ensures systems are correctly patched the first time though Patent-pending Patch-Smart™ technology
    Enterprise-class content which delivers in-depth vulnerability information and supports both enterprise and consumer versions of the most widely adopted, highly targeted applications
  • After so many massive data breaches in 2014, it’s small wonder that data protection is such a hot topic today. The fourth annual Data Protection Maturity Trends report delves into the issues and concerns facing IT security teams, how effective their data protection efforts have been to date, and their plans for 2015 and beyond.
  • User-centric risk tops this year’s concerns: what is IT doing about it?
    Endpoint risk is rising and 78% of respondents to the new 2015 State of Endpoint Security study say negligent, careless employees not following policy are IT’s biggest threat.

    The 6th Annual survey, conducted by Ponemon Institute, asked IT practitioners involved in securing endpoints about risks and challenges in 2015. This year’s report reveals why risk has become more challenging over the last 24 months and what IT plans to do about it in 2015.

    Join us Wednesday January 21st at 8am PST / 11am EST, as Larry Ponemon and Chris Merritt reveal analysis from the Annual State of Endpoint Risk, sponsored by Lumension, including:
    • The evolving IT threat landscape and today’s top-5 risks
    • The disconnect between perceived and actual risk, and the corresponding strategies to combat these threats including detect and respond, big data and threat intelligence
    • Insights into new Infosec budgets and their 2015 allocations

    Register Today, and learn how your peers are planning on addressing the endpoint security risks and challenges of 2015.
  • Over the past few years Endpoint Security Management offerings — including patching, configuration, device control, and mobility — have been bundled into suites to simplify management. Protecting endpoint devices continues to get harder, so Securosis has authored new research that now includes anti-malware, BYOD and more.

    Join Mike Rothman, President, Securosis as he shares clear, up-to-date buying criteria for those looking at procuring endpoint solutions in the near future. Included will be a look at the ongoing challenge of securing endpoints, recommended how-to’s on protecting endpoints, reducing attack surface and managing mobile security as well as important buying considerations and a procurement process.
  • The days in which an organization owned and issued all devices accessing its network are long gone. Employees are now using their personal mobile devices to store and access corporate data, but many organizations do not have policies or security in place to mitigate BYOD risk.

    We learned in the 2014 State of the Endpoint Survey by Ponemon that 75% of IT professionals saw mobile device protection as the number one challenge for 2014, and 46% admitted they have no security policies in place for mobile devices.

    Since mobile device security is an increasing priority, Lumension sponsored the second BYOD & Mobile Security Survey with the global LinkedIn Information Security group to hear the community’s views and sentiment on this issue. After surveying over 1,000 respondents, the preliminary results are in, and we want to give a sneak peek to share the findings with you!

    Join Chris Merritt, Director of Solution Marketing at Lumension, in this interactive, 30 minute discussion to learn:

    • Your peers’ big concerns on BYOD and mobile security

    • What they are currently doing to combat mobile device risk

    • What solutions & security policies work in organizations

    We look forward to hearing your thoughts and hope to see you there!
  • Point of Sale (POS) systems have long been the target of financially-motivated crime. And in 2013 the magnitude of cybercrime against POS systems skyrocketed, with 97% of breaches in the retail sector and 47% in the healthcare sector aimed against POS systems. With sensitive financial and personal records getting exposed by the millions, the FBI recently warned that POS systems are under sustained and continued attack.

    During this webcast, we will take you into the three critical entry points to POS system attacks. We’ll discuss how the attacks look, the timelines for these breaches, and what proactive security measures you can take to help your organization minimize the risk to your POS systems.

    •3 Critical Entry Points to POS System Attacks
    •Impacts to an Organization
    •Top 3 Security Measures to Minimize Risk
  • In 2012 we found that the BYOD environment and the consumerization of the workplace had turned traditional notions of corporate IT upside down. In this webcast, we’ll look at the results from the 3rd annual survey and look at how mobility has changed the way IT teams are managing their devices, how effective their efforts are, and their biggest concerns.

    During this webcast we will look at each of data protection trends, helping you define best practices for your organization to address the top concerns. We’ll also show you how you can gauge the maturity of your security systems, allowing you to plug any holes before your valuable data starts to leak through them.
  • Organizations around the world are losing intellectual property and customer data to cyber criminals at mind-boggling rates. How is this happening?

    For 5 consecutive years, the annual State of the Endpoint Report, conducted by Ponemon Institute, has surveyed IT practitioners involved in securing endpoints. This year’s report reveals endpoint security risk is more difficult to minimize than ever before. What are IT pros most concerned about heading into 2014? From the proliferation of mobile devices, third party applications, and targeted attacks/APTs, endpoint security risk for 2014 is becoming more of a challenge to manage.

    Join Larry Ponemon of the Ponemon Institute and Ed Brice of Lumension for a webcast that will reveal statistics on growing insecurity, IT’s perceived areas of greatest risk for 2014 as well as tactical suggestions for how to improve your endpoint security. Specifically, you will learn:

    •IT perspective on the changing threat landscape and today’s Top 5 risks;
    •Disconnect between perceived risk and corresponding strategies to combat those threats;
    •Tips and tricks on how to best communicate today’s threats and subsequent needed responses up the management chain
  • In April 2014, Microsoft ends support for Windows XP. In a perfect world, your organization will have developed a plan by the end of 2013 and will have migrated all XP systems before Microsoft stops providing security patches. Unfortunately, there are many obstacles to making this strategy a reality – time, resources, budget, etc.

    If your organization still uses WinXP – or other applications such as Office 2003 or Internet Explorer 6 for which support also ends – you need a plan B. Join this webinar to:

    •Learn what end of life means to your organization from a security perspective
    •What options are available to secure your organization from vulnerabilities
    •How other organizations are planning to remain secure and compliant until they are fully migrated

    Understand how you can protect your WinXP systems beyond end-of-support. With application whitelisting and advanced memory protection, you can effectively prevent security risks that are inevitable once your organization is no longer receiving Microsoft patches.

Embed in website or blog