Hi [[ session.user.profile.firstName ]]

Truth or Spin in AV Testing?

Third-party tests can be extremely caluable for evaluating anti-malware products. In-fact, more tests are available than most people realize, covering not only detection rates and scanning speeds, but also factors like number of false positives and ability to block zero-day attacks. But an educate
Third-party tests can be extremely caluable for evaluating anti-malware products. In-fact, more tests are available than most people realize, covering not only detection rates and scanning speeds, but also factors like number of false positives and ability to block zero-day attacks. But an educated evaluator can both avoid the snares of misleading tests and find a surprising number of useful third party tests.
Recorded May 30 2012
59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jon Friedman, Tech Target Aryeh Goretsky, ESET,Righard Zwienenberg , ESET
Presentation preview: Truth or Spin in AV Testing?
Recommended for you:
  • Date
  • Rating
  • Views
  • May Monthly Threat Webinar: Go From Hunted to Hunting May Monthly Threat Webinar: Go From Hunted to Hunting Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro Recorded: May 31 2016 48 mins
    Data breaches and targeted attacks continue to plague organizations across the globe. Threat actors seem to be able to penetrate and then reside within a network for a very long time, siphoning off data they can use to profit from. In this webinar, learn what the latest attack techniques are and how to change your strategy to one which takes you from being hunted to becoming the hunter.
  • Outthink Mobile Malware: Learn how to protect your mobile devices Outthink Mobile Malware: Learn how to protect your mobile devices Adrian Davis, MD (ISC)² EMEA, Kaushik Srinivas, Strategy & Product Management for IBM Security Recorded: May 31 2016 61 mins
    The popularity of the smartphone and the bring your own device (BYOD) phenomena has given way to a new era in cybercrime – the era of mobile in which cybercriminals increasingly target phones and tablets as an attack vector. In fact, at any given time, mobile malware is infecting millions and millions of mobile devices globally, enabling criminals to get their hands on your personal information and money.
    2015 was witness to the largest and most notorious mobile malware attacks in history. Considering that the number of smartphone users worldwide will surpass 2 billion in 2016 (emarketer), mobile app downloads will have increased to 268 billion (Gartner) by 2017, and that most companies have dedicated very little resources towards mobile application security, the industry is ripe for even bigger malicious attacks. Mobile malware will continue to grow, being destructive and costly to corporations and users.
    Join (ISC)² EMEA and IBM as we demonstrate the effects of mobile malware and how to arm organisations to protect themselves against this growing concern.
  • Neue Betrügerische „Hochstapler-Emails“ - Geschäftsführung als Angriffsvektor Neue Betrügerische „Hochstapler-Emails“ - Geschäftsführung als Angriffsvektor Marc Lindenblatt, Presales Engineer Proofpoint Recorded: May 31 2016 40 mins
    Proofpoint stellt neue dynamische Sicherheitslösung gegen betrügerische Emails vor

    Erfahren Sie in unserem Live-Webcast am 31. Mai, mehr über die Motivation und Folgen betrügerischer E-Mails und wie Proofpoint Unternehmen hilft, betrügerische E-Mails automatisch zu erkennen und vor Cyber-Kriminellen geschützt zu bleiben.
    Betrügerische E-Mails sind aufwendig erstellte Anfragen, die vorgeben von der obersten Führungsebene zu kommen und im letzten Jahr um mehr als 270 Prozent zugenommen haben. Die betrügerische E-Mail ist eine Bedrohung, die Mitarbeiter dazu verleiten soll, Gelder oder persönliche Informationen an Cyber-Kriminelle zu senden. Sicherheits-Tool werden sie nicht alarmieren. Es gibt keinen Erpresserbrief. Ihre Systeme laufen weiter und alles scheint wie immer. Das genau ist der Punkt.

    Erfahren Sie in dem Webcast
    • Wie diese betrügerischen Emails aussehen und warum sie so „gut“ funktionieren
    • Welche Auswirkungen diese betrügerische Emails auf die Security-Landschaft haben
    • Warum dynamische Analysen helfen, Unternehmen und deren Mitarbeiter zu schützen
  • Cloud on your terms: make the most of your infrastructure investments Cloud on your terms: make the most of your infrastructure investments Tyler Cooper Technology Architect; Albert Wolchesky Senior Technology Architect, Microsoft Corporation Recorded: May 27 2016 32 mins
    Why choose between your datacenter and the cloud? A hybrid cloud solution gives you both.

    You have already invested in server products that are on premises. You believe that Cloud is the future and the power of the Cloud can open up countless opportunities for people to do more and achieve more. But how can you leverage the Cloud given your current infrastructure?

    Join this webcast to learn Hybrid Cloud options as well as how to extract value from your existing investments by:

    - Expanding your options without adding complexity
    - Easily moving workloads from your datacenter
    - Building hybrid applications that leverage both on-premises and cloud resources
    - Taking advantage of storage, backup, and recovery options with increased efficiency and reduced cost.
  • Savez-vous ce qui est stocké dans votre datacenter? Savez-vous ce qui est stocké dans votre datacenter? Frederic Assuncao, Information Governance Specialist, Veritas France Recorded: May 27 2016 49 mins
    Toutes les données stockées dans votre datacenter n’ont pas la même valeur business ou légale, c’est un fait. Cependant, comment mettre de l’ordre dans ce qui est naturellement non structuré? Veritas vous accompagne dans la découverte de votre Databerg en entreprise, et partage avec vous, sa toute dernière étude Data Genomics. Illuminez les dark datas de votre entreprise!
  • Cyber Lay Of The Land: What The Numbers Tell Us Cyber Lay Of The Land: What The Numbers Tell Us Jay Jacobs, Aloysius Tan, Chad Hemenway Recorded: May 26 2016 61 mins
    What were the overall trends in cyber breaches, and what does this mean for organizations and the third party vendors with whom they work?

    In this webinar, Advisen, an insurance analytics firm, will analyze cyber breaches and identify ebbs and flows throughout 2015 and into 2016. Panelists will then take the unprecedented step of correlating the data Advisen and Bitsight possess to take an even deeper dive to find possible threats to an organization’s cybersecurity — giving all stakeholders greater visibility into the cyber posture of organizations as well as their third party vendors.

    Panelists

    Jay Jacobs, Senior Data Scientist, BitSight
    Aloysius Tan, Product Manager, Advisen
    Chad Hemenway, Managing Editor, Advisen (moderator)
  • Cloud automation in Microsoft Azure with CHEF and Trend Micro Deep Security Cloud automation in Microsoft Azure with CHEF and Trend Micro Deep Security Keith Vidal, Microsoft; Jessica Devita, CHEF; and Jeffrey Westphal, Senior Sales Engineer Trend Micro Recorded: May 26 2016 39 mins
    Join us to hear from Microsoft Azure, Chef and Trend Micro experts on how to best develop a cloud automation strategy in your Azure environment, keeping the agility of the cloud while ensuring that your Azure workloads are protected.

    You will learn how to:
    • Automate your security posture within Azure
    • Use Chef to build compliance and resiliency into your Azure workloads
    • Take security automation to the next level
  • Visibility into the Modern Threat Landscape: Thinking Beyond the Network Visibility into the Modern Threat Landscape: Thinking Beyond the Network Ryan Kalember, Cybersecurity Strategist, Proofpoint Recorded: May 26 2016 47 mins
    Attackers today do not just use one channel to launch their targeted attacks – they use all of them. Emails, links posted to social media, and even apps in public app stores are all part of the modern cybercriminal’s arsenal, and many of these attacks are invisible to traditional security tools. Join this webinar and learn how to protect the cloud-enabled, mobile-friendly, and socially networked way users work today.
  • How Big Data and Machine Learning are Transforming ITSM How Big Data and Machine Learning are Transforming ITSM Lawrence Hall, Distinguished Professor at the University of SF & John Prestridge, VP of Marketing & Product Strategy Recorded: May 26 2016 53 mins
    As we move into a new era of ITSM computing, new big data and machine learning tools and methodologies are being developed to support IT staff by intelligently extracting insights and making predictions from the enormous amounts of data accumulated from the organization. According to Gartner, I&O leaders must take a comprehensive approach to incorporate advanced big data and machine learning technologies into their organizations or risk becoming irrelevant. But what exactly is big data and machine learning all about? How can you introduce these concepts into your existing Service Desk?

    Join USF’s distinguished Computer Science and Engineering Professor Lawrence Hall and SunView Software’s VP of Marketing and Product Strategy John Prestridge as they break down the fundamentals of big data and machine learning and provide real-world examples of the impact the technologies will have on ITSM.

    About Lawrence:

    Lawrence Hall is a Distinguished University Professor of Computer Science and Engineering at University of South Florida. He has authored over 190 publications in journals, conferences, and books. Recent publications appear in Pattern Recognition, IEEE Access, IEEE Transactions on Fuzzy Systems, and the International Conference on Pattern Recognition.

    Lawrence has received funding from the National Institutes of Health, NASA, DOE, National Science Foundation and others. His research interests lie in distributed machine learning, extreme data mining, bioinformatics, pattern recognition and integrating AI into image processing.
  • Using Data Security to address HIPAA and HITECH Regulations Using Data Security to address HIPAA and HITECH Regulations Derek Tumulak, Vormetric VP of Product Management and Tricia Pattee, HOSTING Product Manager Recorded: May 26 2016 38 mins
    Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.

    Discover how:
    • HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
    • Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
    • Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
    • Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
    • The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Truth or Spin in AV Testing?
  • Live at: May 30 2012 5:00 pm
  • Presented by: Jon Friedman, Tech Target Aryeh Goretsky, ESET,Righard Zwienenberg , ESET
  • From:
Your email has been sent.
or close
You must be logged in to email this