Antivirus Software: Understand the Detection Methods Before You Buy
Before you choose an antivirus solution it is important to understand how it goes about detecting malware in the first place.
Join us as we discuss:
- Security in the news
- Modern threat categories and attack vectors
- Endpoint risks, infection methods, payloads
- Detection with signatures and heuristics
- Zero day risk
- Technologies that protect removable storage devices
- Best practices
RecordedNov 15 201156 mins
Your place is confirmed, we'll send you email reminders
Ben Reed, Sr. Technical Content Strategist and Sales Engineer and Robert Westervelt, Research Manager, IDC Security Products
Why have two-factor authentication (2FA) in the workplace? Even if you’ve instituted password management best practices, employees will still use their work password on other websites, write their passwords on sticky notes, or use their nicknames or birthdays without a second thought—and put your business at risk.
With new PCI-DSS regulations surrounding multi-factor authentication requirements coming up on Oct. 31, it’s time to get up to speed on this proactive technology.
In this webinar, Robert Westervelt, research manager of IDC’s Security Products group, and ESET’s solutions engineer Ben Reed will provide an in-depth overview of the following:
•Account credential theft: What can be done to prevent employees from falling into a trap?
•How 2FA/multi-factor authentication can reduce the risk of account hijacking, mitigate weak passwords and help satisfy compliance requirements.
•The types of multifactor authentication solutions available on the market and how it can contribute to creating a stronger security culture in the workplace.
ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
•PCI and two-factor authentication
•PUAs and scamware
•Privacy by design
•General Data Protection Regulation (GDPR)
ESET North America & Michael Aguilar, Business Product Technical Lead
Winter is coming. Our three-eyed raven answers your top 5 IT security questions based on our most recent survey including email security, ransomware, protecting IoT and more. Additionally, here's your chance to ask our in-house cybersecurity expert, Michael Aguilar, your most challenging questions to help you defend the wall. It’s an open forum just for you!
With a personal record of 34 questions in 30 minutes, Michael will torch your questions like Drogon. Sign up today and get those questions ready.
Michael Aguilar, Business Product Technical Lead, ESET North America
You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
Join an ESET business product technical lead to learn:
•How ransomware has evolved and spread
•Why mobile phones and Apple OS X are increasingly vulnerable
•Best practices for avoiding and dealing with ransomware
•Why to implement backup and recovery solutions now
ESET senior security researcher Stephen Cobb and Larry Ponemon of the Ponemon Institute discuss a new study on healthcare security addressing causes, costs and potential cures for soaring cybercrime rates.
Are you considering a Next-Gen AV solution? Before you make a decision, attend this webcast with an ESET engineer who will examine vendors’ claims and supporting technologies.
Key takeaways include:
1.Next Gen AV technologies – making sense of their claims
2.A deep dive into ESET technology
3.The difference between reactive vs. proactive technologies
4.How ESET leverages the Cloud
5.Best practices in evaluating AV technologies
How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cybersecurity for the upcoming year and discusses the tools and resources available to protect against them.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>
Next Generation Firewalls are Next Generation Firewalls…or maybe NOT.
In the light of new advanced attacks and the demands to lower security infrastructure costs, just how can one get the most out of the Next Generation Firewall (NGFW) solutions? Are all NGFW solutions the same?
What criteria should one consider for a NGFW solution that is best for your distributed enterprise environment? Join Forcepoint™’s Michael Ferguson and find out key value points when selecting a network security solution catered to your environment:
• Latest trends in NGFW
• Addressing total cost of ownership
• Security effectiveness in increasingly complex threat landscape
• Challenges in policy management
Also, find out why Forcepoint Stonesoft NGFW has won NSS Labs' coveted highest rating of “Recommended” for the 4th year in a row. Learn how it can provide the scalability, protection and visibility needed to effectively manage your distributed networks. Plus, rapidly and easily deploy, monitor and manage thousands of firewalls from a single pane of glass.
Learn how all employees can work and collaborate securely! The new world of work demands that people collaborate faster and more seamlessly than ever before.
Your employees have access to cloud-based apps, personal devices, and pervasive internet connectivity. All these things are great for getting work done, but your company is still held to high standards around security, and auditing, and you can't afford to make a wrong move.
Join this webcast to explore some common security scenarios such as:
•How do you provide access when you can't always control the endpoint?
•How do you know where all your company's files are right now?
•If you terminate an employee, how would you know what files they had in their possession.?
•Could you wipe a terminated employee's corporate data while leaving their personal content alone?
This webcast is part of our Digital security in the modern world webcast series. Sign up for this session, or the entire series today!
Is your BI platform enterprise-ready? Give your IT team a supercharge!
IT oversees, facilitates, and orchestrates all BI solutions to make sure they integrate with existing systems and maximize resources. When you choose a comprehensive, enterprise-ready BI platform, IT is empowered to leverage data more effectively for your business.
Join this webcast to learn how, with the right BI solution, IT can:
•Control and monitor access to data and assets
•Help ensure security and compliance
•Partner with the business to help drive strategic projects
This webcast is part of our Building a Data Culture Leveraging Power BI webcast series. Sign up for this session, or the entire series today!
Join us as we discuss how Trend Micro and VMware have partnered to deliver an optimized hybrid cloud security solution architected for VMware virtualized data centers, virtual desktops, and multi-cloud deployments that include AWS and Microsoft Azure.
In this webinar you will learn how to….
-Optimize data center resources with virtualization-aware security
-Deliver automated security across environments
-Manage and deploy security efficiently
-Achieve cost effective compliance
l est temps de protéger vos utilisateurs contre les menaces qui contournent facilement les antivirus.
Assistez à notre webinar en direct sur la sécurité des terminaux
•Les coûts cachés d'un antivirus classique pour votre entreprise
•Comment déterminer la véritable valeur d'une solution de sécurité des terminaux
•Les cinq fonctions indispensables à la protection de vos utilisateurs, systèmes et terminaux
•Comment Traps v3.4 prévient les failles de sécurité dans votre entreprise sans antivirus classique
Many companies experimenting with agile development methods in their engineering and IT groups are having only mixed success.
Unless you’re implementing agile both upstream (through your portfolio) and downstream (through testing and operations,) you’re not harnessing agile’s full power through Digital Transformation. Being faster to market doesn’t help your bottom line if you deliver the wrong things, and failing to get the right things into production fast means you’re leaving money on the table.
Join this web seminar to gain insight into the benefits of a digital transformation. You’ll discover a strategic, collaborative approach to channel the power of agile and deliver more value to your customers.
Wie können Sie angesichts des neuen Grads an Ausgereiftheit und Bedrohung, den Ransomware im vergangenen Jahr erreicht hat, sicher sein, dass Ihre Infrastruktur davor geschützt und Ihr Unternehmen ausreichend vorbereitet ist, um einen Angriff zu bewältigen?
Sicherheitsverantwortliche haben heute mit diesen Problemen zu kämpfen:
•Nicht genügend umsetzbare Threat Intelligence, um verstehen zu können, welche Akteure und Kampagnen eine Bedrohung für ihre Unternehmen darstellen.
•Zu wenig geschulte Sicherheitsanalysten, die die zunehmende Zahl von Bedrohungen identifizieren können, die in ihre Unternehmen eindringen. Beispielsweise konnte der Einsatz von Crypto-Ransomware als Angriffstool im Jahr 2015 eine weitere Zunahme verzeichnen, und zwar um 35 %. Dennoch brauchen Unternehmen, in denen ein Angriff stattfindet, in der Regel mehr als 200 Tage, um sich dessen bewusst zu werden.
•Zu wenig spezialisiertes Know-how hinsichtlich der Methoden, die erforderlich sind, um auf Bedrohungen zu reagieren und diese unschädlich zu machen, nachdem sie in ihrer IT-Umgebung Fuß gefasst haben.
Die Taktiken von Ransomware-Gangs werden immer ausgefeilter und Unternehmen müssen sich der Gefahr, die sie darstellen, vollständig bewusst sein. Nehmen Sie an einem Webinar von Symantec teil, in dem ein konkreter Ransomware-Angriff behandelt wird. Sie erfahren, was geschehen ist und welche Maßnahmen das betroffene Unternehmen ergriffen hat, um die Bedrohung zu beseitigen.
Ransomware and business email compromise (BEC) scams have dominated the security threat landscape for the first half of 2016, truly making it the Year of Online Extortion. This webinar is designed to discuss these and other prominent threat trends we are currently seeing, as well as to give organizations possible security strategies and solutions that they can use to better defend their assets and data.
Ransomware continues to evolve. Last year, the use of encryption as a weapon to hold companies’ and individuals’ critical data hostage grew by 35 percent.
Take this opportunity to learn directly about what can happen in a ransomware attack based on real-life events. Symantec’s Cyber Security Services experts will lead the discussion and will help you to understand how you can improve your line of defense against ransomware and minimise the loss of key data, money and intellectual property from your organisation.
Gérer le nombre croissant des vulnérabilités est devenu un véritable challenge pour les entreprises.
Cependant, 97 % des attaques exploitent uniquement 10% des vulnérabilités connues.
De toute évidence, il est devenu impératif d'arrêter de jouer aux devinettes et d’identifier les vulnérabilités les plus menaçantes de façon effective afin d’y remédier rapidement.
ThreatPROTECT, dernière solution Qualys, corrèle en temps réel les données de vulnérabilités avec de multiples flux de menaces connues.
Les résultats sont fournis sous forme de tableaux de bord faciles à appréhender et offrent ainsi une vision claire des vulnérabilités à traiter en priorité.
L’objectif de ce webcast est de vous présenter en 3 points les usages et avantages de ThreatPROTECT.
* Identifiez vos assets les plus importants
* Détectez rapidement les vulnérabilités critiques via la corrélation en temps réel avec les menaces actives.
* Priorisez les remédiations et intervenez sur les vulnérabilités à traiter sans tarder