The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Remote office backup presents numerous challenges, including ever-increasing data volumes, network bandwidth constraints, overtaxed IT administrators and complicated, time-consuming backup processes. Compounding all this is a reliance on older technologies that are inefficient and costly. And the more sites your organization has, the challenges multiply.
It's time for businesses to rethink remote office backup; one that meets data and regulatory retention requirements, is easy to deploy and maintain, and is secure and cost effective. Its time to look to the cloud.
Join backup experts Druva to learn how remote office server backup has evolved. Discover how the cloud offers a new, and in most cases, a better approach. In this session you’ll learn:
- How the latest advancements in cloud storage technology scale globally for enterprises of all sizes
- Why advances in cloud security models are addressing stringent global security and data privacy issues, including data residency requirements and more
- How an 'infinite data snapshot model' combined with cost-optimized flexible retention eliminates traditional vendor restrictions.
Hear real-life use cases of how others are leveraging the cloud for remote server backup. Live Q&A will follow to answer your specific questions.
Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
When deploying new WAN access to connect business-critical sites or data centers, you want to have full knowledge of the service level delivered by your provider. In this webinar, we'll show you how to get visibility of service delivery quality, discover potential performance issues, and quickly gather irrefutable data on whether your service provider delivery is meeting SLA guarantees.
Join our live Tech Talk to learn how to:
•Assess network service QoS at delivery time with Ixia's IxChariot software endpoints
•Make this process cost efficient and easy to communicate back to your service provider
•Not only measure throughput, but also qualify network delay/jitter/loss and readiness for advanced services like voice or unified communications
Organisations are becoming increasingly dependent in their use of cloud services for business benefit both internally and when working with third party suppliers across multiple jurisdictions.
However, while these services can be implemented quickly and easily, with increased legislation around data privacy, the rising threat of cyber theft and the requirement to access your data when you need it, organisations will need to have a clearer understanding of where their information is stored and how reliant these services are.
During this webcast, Steve Durbin, Managing Director of ISF Ltd, will provide insights into how you can manage the risks associated with cloud computing to ensure maximum benefit.
Das Jahr 2014 ist aus Sicht der IT Sicherheit Jahr geprägt von einer Reihe größerer Datenverluste, bei denen Millionen von Datensätzen verloren gingen. Was auffällig war: Cyberkriminelle scheinen abzuwarten, bis sich ein lohnendes Ziel ergibt.
Erfahren Sie in diesem Live-Webcast von Lars Kroll, seines Zeichens Cyber Security Strategist bei Symantec, wie Cyberkriminelle ihre Einbruchstaktiken abgewandelt haben. Besprechen Sie mit ihm, was man aus diesem veränderten Strategien lernen kann, um das eigene Netzwerk und die wichtigen Daten besser zu schützen. Sollten Sie zu diesem Zeitpunkt beschäftigt sein, können Sie sich trotzdem registrieren und bekommen automatisch einen Link zur Aufzeichnung zugeschickt.
Registrieren Sie sich noch heute und erfahren Sie die wichtigsten Enwicklungen im Bereich Cyber Sicherheit.
A good strategy relies on you knowing where you want to go. Unless you understand the latest security trends and challenges then your program could be off track. Every year, Symantec distils the expertise from our team of experts into the Internet Security Threat Report. We have recently published our 20th edition and invite you to join this webcast to gain insights to drive your security program.
Our Internet Security Threat Report Webcast summarises he key findings from these trends to help you focus your defences and counter measures. The agenda includes:
• How attacker techniques are evolving
• Why vulnerabilities are still being exploited
• The dramatic rise in ransom ware
• Our simple steps that can yield big improvements across your security
If you are interested in ensuring security contributes to business strategy - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for staff involved in day to day security.
If you’re busy protecting your organisation from IT threats, then it’s natural to focus on the here and now. However, the world of security is changing fast. Symantec’s annual report provides analysis from our team of experts. The report describes the security trends we observed in 2014 to help you be better prepared going forward.
Our Internet Security Threat Report Webcast distils the key findings from these trends to help you focus your defences and counter measures. The agenda includes:
• How attacker techniques are evolving
• Why vulnerabilities are still being exploited
• The dramatic rise in ransom ware
• Our simple steps that can yield big improvements across your security
If you are interested in the role security has to play in the day-to-day - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for executive leaders.
L’évolution permanente des besoins informatiques et la complexité des infrastructures impose le choix de solutions dynamiques et flexibles.
La nouvelle version de Symantec™ Backup Exec 15 arrive à point nommé. Il est peut-être temps de revoir votre infrastructure de sauvegarde/restauration. Que vous soyez ou non un utilisateur de Backup Exec, il est temps d’envisager un choix fiable et reconnu : le choix d’une solution performante et adaptée à tous les environnements, virtuels, physiques et basés sur le cloud.
Découvrez vite comment Backup Exec 15 peut vous fournir la flexibilité nécessaire pour protéger vos données, quels que soient vos besoins en matière de plate-forme, de technologie ou d’application. Protégez vos informations plus vite, restaurez ce dont vous avez besoin, quand vous en avez besoin, de la manière la plus simple qui soit.
Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.
Registrati adesso per il nostro webcast 2015 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.
Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Non mancare a questo importante approfondimento!
Unlike hacktivists and cyberterrorists, who are motivated by promoting a cause or punishing an organization for some perceived wrong doing, cyber gangs’ motivations are more old-fashioned — money. While hacktivists and cyberterrorists use sophisticated, targeted attacks, cyber gangs target the path of least resistance and look for widespread vulnerabilities so they can breach more enterprises with less effort.
Listen to the Get Inside the Minds of Cyber Gangs webinar to find out:
-Why cyber gangs are so successful despite their unsophisticated methods
-What enterprises can do to protect themselves from these damaging cyber gangs
Campus data breaches are on the rise, and education IT professionals like you face a wide array of threats on a daily basis. Join us May 5 for the Secure Your Campus with VIPRE webinar to learn how VIPRE provides the comprehensive protection you need to keep your network secure, and your staff and students focused on learning. Jerry Smith, VIPRE Senior Systems Engineer, will explore the biggest threats facing your institution and how you can overcome them with robust malware defense that won’t consume your budget.
Learn how to leverage AWS capabilities better to operate more securely and safely in the cloud.
In a recent talk at AWS Pop-up Loft in San Francisco, John Martinez highlights the top 10 security best practices compiled from both AWS and Security practitioners over several years protecting large-scale AWS deployments.
You will come away with actionable steps that you can implement right away to help ensure your success on AWS… and discover most of these controls are very easy to implement.
The CyberTECH Cyber+IoT eWeek Roundtable features top industry experts sharing critical updates and information regarding IoT Security. The roundtable will be moderated by eWeek Editor, Chris Preimesberger and includes top cyber, IoT and InfoSec professionals. Special guest speakers include Michael Daniel, Special Assistant to the President and US Cybersecurity Coordinator for the White House, Mark Weatherford, Principal at the Chertoff Group, Enrique Salem, former CEO at Symantec.
Cyber criminals continue to steal data and interrupt business at alarming rates. The average annualized cost of cyber crime is $7.6 million per company per year, with a range of $500K to a staggering $61 million, according to a global study by the Ponemon Institute. That’s an increase in cost of 9 percent over last year’s global results. The most costly criminal activities come from malicious insiders, denial-of-service and web-based attacks – and no industry is immune. It’s not a matter of if you will be attacked, but when. Fortunately, there are ways to fight back.
Watch this short video to learn:
- How proactive security measures can save millions of dollars
- What seven security technologies are key to winning the cyber crime war
- Where to get more information and guidance
What makes a firewall a next generation firewall? How can next gen capabilities help you and what are the gotchas you should know before you turn it all on? Get your basic education on NGFW and some tips you should know before you get started.
Richard Stiennon, Chief Research Officer at IT Harvest, sits down with Tim Prendergast, CEO and co-founder of Evident.io, to talk public cloud security and compliance and why an automated DevOps style approach is now required to keep up with the velocity of change in public cloud deployments.
If you didn't make it to the HIMSS15 healthcare IT conference, but want to hear about the hot topics and key takeaways from this year's many informative sessions, mark this webinar on your calendar to get up to speed! This year's event was full of new and innovative technology solutions for the healthcare industry.
Naveen Sarabu, Product Manager for Liaison Healthcare, was there and will be sharing some of the new trends and technologies he saw for the following hot topics:
Provider & patient engagement
Health Information Exchange
Clinical & business intelligence
Changing payment models
Mobile, connected health & telehealth
Over the past five years, cloud computing has become an essential element in an organization’s IT mix. At the same time, savvy IT decision-makers want to manage potential security risks involved when migrating their organization’s business-critical data to the cloud. Join Johan Hybinette, HOSTING’s Chief Information Security Officer (CISO), and Cliff Turner, Alert Logic’s Solution Architect for this interactive webinar.
Johan and Cliff will answer your cloud security questions including:
•What are key challenges that IT leaders face when planning for a cloud migration?
•What security factors should you consider when considering a hosted vs. on-premises solution?
•As your business moves to a cloud-based infrastructure, how do you adapt your IT security strategy?
•How do you make sure that your security policies are robust and implemented correctly by your teams and partners?
Bring your cloud questions and be prepared to walk away with key insights from two of the industry’s top thought leaders!
When purchasing IT security products and services, it is important to understand not only the initial costs associated with purchase and implementation of the products, but also the ongoing impact to your budget. So how much should be spent on IT Security?
Don't miss this webinar as Forrester Consulting gives a benchmark of how CISOs will find a significant improvement in their 2015 budgets. This webinar will also outline the key findings of the Alert Logic-commissioned Total Economic Impact study, so you can evaluate the potential financial impact of Alert Logic solutions on your organization.
Symantec fournit chaque année une rapport sur les menaces et tendances de sécurité, grâce à la collecte inégalée de données partout dans le monde et à l’analyse effectuée par nos experts en cyber sécurité.
Lors de ce webcast, Laurent Heslault, notre stratégiste sécurité, vous présentera les résultats mondiaux et pour la France de la 20ème édition du Symantec Internet Security Threat Report.
Vous en saurez plus sur :
-Les changements observés dans les techniques d’attaques
-La vitesse d’exécution des nouvelles attaques
-Les cibles privilégiées et les enjeux financiers
-Les tendances à suivre (social media, IoT…)
Si vous êtes intéressé par le rôle que la sécurité doit jouer dans la stratégie d’entreprise pour tendre vers la cyber résilience, ne manquez pas cette opportunité de discuter avec nos experts.
Today's fastest-growing risk category is web application vulnerabilities.
Join this live web event to better understand some of the common misconceptions around application security and hear some war stories from the field that demonstrate today's application security weaknesses.
The presentation will take a look at:
• How hackers are evolving to attack your applications
• The most common application vulnerabilities
• Remediation actions you can take to help limit your attack surface area
• Considerations for designing security into your application.
Join us to review the emerging risks for 2015 as executives facing an environment of unprecedented volatility: market conditions change rapidly and new risks continue to proliferate. To navigate the continually changing and complex risk environment,
The webinar will be led by Ian Beale, Senior Director, CEB Risk
Moving to the cloud is always a difficult decision, but when you look at the impact of solutions as broad reaching as Office 365, chances are your primary concern is going to be about security. There are a number of facets and features (e-mail, OneDrive, Lync) to Office 365 and the security issues can be myriad. Join Intel Security and (ISC)2 on May 7, 2015 at 1:00PM Eastern for a discussion on how to overcome these challenges through critical protection and often overlooked best practices to build the confidence you need to securely deploy Office 365.
The End of Support (EOS) of Microsoft Windows Server 2003 in July 2015 will put millions of enterprise servers at risk. And according to a recent study by leading analyst firm Enterprise Strategy Group (ESG), “More than 80% of enterprise and midmarket organizations still support Windows Server 2003 to some extent.” Newly discovered vulnerabilities will not be patched or documented by Microsoft. Hackers know this and will be targeting new exploits at the considerable number of Windows Server 2003 servers still in use. In this webinar, ESG will share the significant findings from its recent survey of Microsoft Windows Server 2003 customers. Also, Trend Micro will discuss how to protect your legacy Windows 2003 server environment while you plan your move to newer platforms. Join us and learn how to:
· Protect and secure your Windows 2003 Servers after EOS
· Build a comprehensive security strategy with virtual patching (IPS), file integrity monitoring, and anti-malware
· Ensure your organization is protected across physical, virtual, and cloud environments as you migrate to newer platforms such as Windows Server 2012 and Azure
Organizations are moving to the cloud aggressively but many have concerns about security, more basically, how to approach this significant transition. This presentation will cover the leading practices in cloud strategy and cloud data protection.
After a brief introduction to the Europol’s European Cybercrime Centre, this webinar will discuss the challenges and opportunities that law enforcement face in relation to the Cloud.
The webinar will specifically focus on those challenges and opportunities that present themselves to law enforcement in the fight against cybercrime. This will cover, among other things, the need for strong security and protection for privacy while finding the right balance between these essential requirements and the need to investigate criminal activities abusing Cloud services.
If you’re using or considering cloud, you should also be considering security in the cloud. Join our webinar where we will talk through seven practical best practice ideas for ensuring security in any cloud environment, from securing code and creating access management policies to understanding your cloud providers security model and where you need to assume security responsibility.
We will explore real-world data about security incident threats identified in Alert Logic’s Cloud Security Report. This will help you understand the types of attacks happening in the cloud today, how the threat landscape has evolved as cloud adoption has accelerated in the last several years, but also how you can secure your organisation and avoid them.
· 7 Practical actions you can take today for your cloud security
· Understand the threat landscape
· Insight into 2-3 recent high-profile breaches
This webinar is essential for anyone who wants to understand how to build a plan for security and compliance in the cloud.
Join Gemalto in collaboration with Ponemon on May 12th as we reveal recent study results on how hackers are attacking the cloud.
This presentation will use live demos to show how vulnerable cloud and virtual environments can be without the correct controls. Examples will include how password controls can be bypassed and compromised, why software keys are not good enough, and how personal life threatens your business and work life.
The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down. So what can you do today to keep your security ahead of these trends? In this webcast, we will share actionable best practices gleaned from more than 5,000 leading global organizations - including United Airlines, Humana, Sealed Air, British American Tobacco, the United States Marines and NATO. We will also talk about the latest strategies and techniques cyber-criminals are using today and the concrete steps you can take to keep your organization safe.
The evolution of the distributed enterprise network and its ability to deliver for the brand has dramatically changed since 2000. In the past, telephone line infrastructure like V.90 modems were installed to simply process credit cards and the branch office was confined to local content advertising. Then, wired broadband WAN connectivity such as T1, DSL, Cable, and Metro Ethernet was introduced to the mass market, opening up new applications to reach customers. Additionally, the need for private network communications via wired WAN brought about the introduction of technologies like MPLS and Frame Relay networks. The combination of broadband-wired WAN performance, with private network capabilities, offered the brand the ability to provide more secured bandwidth to locations – but at a premium with a level of reliability that greatly varied depending on geography.
Today, wireless broadband WAN connectivity is pervasive across North America and is the wave of the future. 4G/LTE has outpaced MPLS, Cable, DSL, and other means of traditional wired WAN networking at a fraction of the cost.
Now, the ‘Store of the Future’ is here with cutting-edge technology offering Ethernet LAN connectivity over 4G/LTE wireless broadband. With dual active 4G LTE modems, wired Ethernet WAN connectivity, dual-band/dual-concurrent ac WiFi and enterprise-grade security - all in a consolidated, easy-to-manage platform, delivering a reliable and scalable broadband experience.
The convergence of wired and wireless connectivity into a single platform reduces PCI scope, simplifies network complexity, and lowers the carbon footprint of your network; all while leveraging the cloud for remote management and best-in-breed security solutions.
Join us for this webinar to learn about Ultimate Multi WAN DiversityTM, network cost-savings through cutting-edge technology, and how the ‘Store of the Future’ is here.
The copyright monopoly debate has gotten exactly nowhere since the
days of Napster. There's still a copyright industry that insists on
control of the net in the name of lost profits. But what does this do
to the net? More to the point, why are we letting a literal cartoon
industry have any say at all in regulation of our most important piece
In this presentation, Rick Falkvinge, founder of the Swedish and first
Pirate Party, examines how the entire copyright industry position is a
red herring, which is (or should be) completely irrelevant to
policymaking on net issues. He brings up the concept of Analog
Equivalent Rights, and painfully points out that some of the most
crucial civil liberties of our parents are currently not being passed
on to our children, because doing so would interfere with profits of
There's nothing wrong with profit as such. But no entrepreneur should
get to dismantle civil liberties just because they can't make money