IT Security

Community information
The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.

Webinars and videos

  • Every application, email, web page and Internet connection relies on information encapsulated into a data packet that can be easily distributed across networks. These packets include information about the sender and receiver, as well as the actual contents, or payload. By manipulating pieces of the packet data, criminals can infiltrate networks, applications, data centers, and individual computers.
    How do you defend your network against advanced threats that manipulate data at the packet level? Join McAfee for a revealing presentation on the current state of threat prevention. Find out why you should be using deep packet inspection (DPI) for protocol identification, normalization, and data stream-based inspection to detect and block threats, in both clear-text and encrypted connections. And stop Advanced Persistent Threats (ATP) that rely on packet manipulation to thwart most common firewall and IPS defenses.
  • Next generation endpoint security. Security and Management beneath the operating system.
  • Immer mehr mobile Mitarbeiter möchten heute von ihren privaten Smartphones, Tablets und Laptops auf geschäftskritische Daten und Anwendungen zugreifen. Dieser Trend birgt erhebliche Risiken: Werden geschäftliche und private Daten und Anwendungen auf dem gleichen mobilen Gerät genutzt, droht der Verlust von Unternehmensdaten und die Infizierung mit Malware. Doch wo genau liegen die Risiken? Und welche Technologien können Unternehmen einsetzen, um die Produktivität zu gewährleisten und gleichzeitig diese Bedrohungen abzuwehren?

    • Erfahren Sie, welche Gefahren lauern, wenn private und geschäftliche Daten und Anwendungen auf demselben mobilen Gerät genutzt werden.
    • Erfahren Sie, mit welchen Technologien und Trends Sie diesen Risiken entgegenwirken können.

    Wir sagen Ihnen, welche Gefahren bestehen, wenn private und geschäftliche Daten und Anwendungen auf demselben mobilen Gerät genutzt werden, und mit welchen Technologien sich Unternehmensdaten schützen lassen.
  • Nos puissantes solutions de gestion des événements et des informations de sécurité (SIEM) associent des données sur les événements, les menaces et les risques pour offrir une connaissance approfondie de l'état de la sécurité, une réponse rapide aux incidents, une gestion transparente des journaux ainsi qu'une fonction de génération de rapports de conformité extensible. Produit phare de notre offre SIEM, McAfee Enterprise Security Manager assure la consolidation, la corrélation, l'évaluation et la hiérarchisation des événements de sécurité pour les solutions McAfee et d'autres éditeurs. Composant essentiel de notre cadre d'implémentation Security Connected, McAfee Enterprise Security Manager s'intègre en toute transparence avec le logiciel McAfee ePolicy Orchestrator (McAfee ePO), McAfee Risk Advisor et Global Threat Intelligence afin de fournir le contexte nécessaire à une gestion des risques de sécurité autonome et adaptatif.
  • Deploy your own cloud based business fully supported by the industry leaders - Dell, OnApp and Peer1
  • De plus en plus, les utilisateurs mobiles ont besoin d’avoir accès à des données et applications stratégiques depuis leurs smartphones, tablettes et ordinateurs portables personnels. Toutefois, la cohabitation de données et applications personnelles et professionnelles sur des appareils mobiles risque d’entraîner une perte de données pour l’entreprise ainsi que l’apparition de programmes malveillants.
    Quels sont les risques et quelles technologies les entreprises peuvent-elles déployer pour garantir la productivité tout en se protégeant de telles menaces ?

    •Découvrez les risques liés à la cohabitation de données et applications personnelles et professionnelles sur des appareils mobiles.
    •Découvrez les technologies existantes et à venir permettant de faire face à ces risques.

    Grâce à Dell, apprenez à connaître les risques liés à la cohabitation de données personnelles et professionnelles sur des appareils mobiles et découvrez les technologies permettant de protéger les données de l’entreprise.
  • As additional details on the Target breach - and other retail attacks - leak out, we see that Point of Sale (POS) malware continues to be a significant threat. There are several attack methodologies at play and many forms of new malware, including Dexter, Project Hook, Alina, BlackPoS/Kartoxa, JackPoS, VSkimmer and others. All continue to compromise organizations large and small. In this webinar, Curt Wilson, Senior Research Analyst for Arbor's Security Engineering and Response Team (ASERT) will explore a newly discovered POS attacker’s toolkit, as well as the structure and behavior of typical POS malware and key indicators of compromise.

    Additionally, this talk will review a survey of observed POS infrastructure vulnerabilities that include well-known and lesser- known POS threats that continue to evolve. Attendees should leave with an expanded sense of the threat surface that retailers – including ecommerce organizations – must face. The session will wrap up with an overview of best practices for protecting, detecting, and addressing these evolving threats.

    Attend this webinar to learn about:

    • The various types of POS malware threats and the implications of experiencing an attack

    • The tools and processes that retail IT infrastructure teams need to have in place to protect their organizations from attacks

    • Best practices for dealing with a POS attack; actionable “now what” steps for organizations who have been compromised by POS malware
  • Businesses in the Financial Services sector are some of the most obvious targets for cyber-attacks. After all, “that’s where the money is.”

    And recent technological advances have brought about the dark side of innovation – the ability of criminals to stealthily attack users and businesses in new ways. Hence, financial institutions around the world are even more at risk to breaches and cyber-attacks than ever before. Are financial institutions in Asia Pacific ready for these threats? What are the areas that financial services should look into for continuous threat protection?

    Bryce Boland will touch on these issues in this webcast; bringing insights from his experience as a former Security CTO in the financial sector.

    Topics that will be covered are:

    1.The Dark Side of Innovation
    2.Recent FSI breaches
    3.Enterprise Threat Report on FSI
    4.FSI Supply Chain Risks
    5.Managing Advanced Threats
    6.Questions & Answers

    This webinar is for both business and IT professionals, interested to have a better understanding of the current state of cyber risks in the financial sector, and how to manage these risks.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Join this webinar on Endpoint Security as we:
    •Understand what AMT-enabled hardware offers
    •Hear how AMT hardware can improve our ability to manage an endpoint
    •Highlight important use cases that are enabled when management extends beyond the operating system
    •Discuss how ePO can be used to easily configure AMT
  • Join Patrick Peterson, Founder & CEO of Agari - a 2014 Gartner "Cool Vendor", as he peels back how criminals are penetrating current security controls and describes intelligence that can detect attacks in real-time and provide the ammunition you need to take action. Whether it’s looking for unusual changes in average URL lengths in hyperlinks or statistically anomalous use of certain names in email FROM fields, specific types of intelligence provides high fidelity signal indicating that malicious activity is at work inside your organization, or attempting to penetrate it. Register to learn more about real-time intelligence that drives attack prevention.
  • This is part 1 of our 2-part series on Big Data Visibility with Network Packet Brokers (NPBs).

    Even as network data has exploded in volume, velocity and variety, network monitoring solutions have been behind the curve in adopting new technologies and approaches to cost-effectively scale and accommodate a widening virtualization trend. Customers are demanding greater freedom in how applications are deployed and are moving to a consolidated, shared model of data using big data frameworks, such as Hadoop, which enable large-scale processing and retrieval for multiple stakeholders.

    Join Andrew R. Harding, VP of Product Line Management at VSS Monitoring, as he discusses:
    - Big data and its implications for network monitoring and forensics
    - Why network monitoring solutions are lagging from a virtualization standpoint and why this is a problem for network owners
    - How certain traditional network monitoring functions will eventually be offloaded to adjacent technologies
    - How Network Packet Brokers can accelerate the adoption of virtualized probes, “open” storage, and big data technologies within network management / monitoring
    • How a Big Data Visibility architecture can enable network data to become part of the “big data store,” allowing it to integrate with the rest of enterprise data
  • The EMV liability shift is fast approaching in the United States. Along with the emerging trend towards innovative mobile payment solutions, this means that core infrastructures need to be enhanced to support new payment methods and channels – often with additional security, risk and lifecycle requirements. Now is the time for financial issuers to develop a future payments strategy that will enable you to migrate efficiently and quickly to EMV chip based technology, and adapt to stay competitive in this period of high disruption.
    Attendees will learn:
    •Facts vs. myths about EMV and how it reduces fraud
    •How the top 5 short-term challenges of EMV migration can be solved
    •The versatility of EMV and real-world examples of how it facilitates so much more than fraud reduction
    •EMV uses beyond cards – mobile (NFC) payments & host card emulation (HCE)
    •Examples of Bell ID and Thales e-Security deployments for EMV card and mobile payments
  • Envisioning how mobility will transform your business in the near future and beyond can be difficult, however there are practical strategies you can adopt today that will help accelerate your mobility transformation.

    Join Arun Bhattacharya, Sr. Director, Product Marketing, Enterprise Mobility, CA Technologies as he discusses the core tenants of a successful enterprise mobility strategy and provides practical guidance for business and IT Leaders on how to manage their businesses’ mobile future.
  • Your network security team must know and manage what is happening on your network at all times. Running back and forth to different devices doesn’t work even if you can log in remotely. It takes too much time and is not coordinated. You have to rely on a centralized management system.

    Join Steve Smith, Senior Technical Marketing Manager, as he shows you how the McAfee NGFW acts as the core of your network security, centralizing the monitor, managing and reporting across diverse virtual, physical and third-party devices. He will show you how a single console view can give your team real-time visualization of network operations, improving response time for recognition and remediation of incidents and threats.
  • This webinar is presented by McAfee and Intel to help customers understand their Data Protection solution from McAfee and to get the most business value out of their Intel based endpoints. Products that apply to this webcast include McAfee Complete Data Protection Suites, featuring Endpoint Encryption, and EPO Deep Command to extend the reach of your IT department to lower your total cost of ownership. The webinar will include a special highlight on Intel® Core™ vPro™ Processors and associated technologies that increase productivity and hardware-assisted security in the enterprise. This webcast is provided as a 35-40 minute overview and includes 5-10 minutes of Q & A.

    Join this webinar on Data Protection and learn about:
    • The key features of Data Protection and how it can provide you with the security you need
    • Use cases on utilizing the synergy between Intel® vPro™ and McAfee Data Protection technologies to reduce your overall TCO
    • How you can extend the reach of your IT team with the ability to remotely wake up or even power on PC’s, remediate “disabled” endpoints and remotely reset pre-boot passwords
    • How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users

    Presenter Info
    Pat Correia is responsible for Endpoint Encryption Product Marketing at McAfee.
    Jason Kennedy is Director of Business Client Platforms Marketing at Intel.
  • Come join the conversation on the pros and cons of commercial and open source options available in AWS, best practices for managing logs and monitoring incidents in the Cloud, and guidance on what to log from two security leaders in the field.

    Learn about:

    · Making security visibility easier based on best practices
    · Yes, host-based firewall policies can improve security
    · See how a reference implementation can be done without tears
  • The topic of security has grabbed headlines over the last few years and indeed the last few weeks, but most of this attention has focused on a small percentage of large enterprises. However, security is not an issue for them alone, as mid-market companies increasingly deal with the same threats as their larger compatriots.
    Join Symantec Website Security Solutions to understand how you can take a proactive website security stance.

    During this webinar we will look at areas of compliance, the size of Ecommerce market opportunity in the Netherlands, and the threat landscape in general.

    We look forward to your participation.
  • Data sprawl posts a big challenge to data protection today. Having visibility to data movement and how it is being used is a key step to controlling data at the source. This session will focus on how DLP discovery along with user and file activity monitoring can give you contextual awareness of the file being used.

    1)Learn how event and application monitoring enables visibility into data movement within and out of the enterprise
    2)Leverage McAfee ePO to automate DLP policies based on situational awareness
    3)See how McAfee DLP and ESM work together to provide real-time data protection
  • Deploying and managing network security at remote locations can be time consuming and expensive. McAfee Next Generation Firewalls give your organization a simple solution for centrally deploying, managing and updating remote locations. No technical skills are required to install at remote locations, freeing your skilled staff to focus on more important security management.

    Join us for an in-depth look at how plug-and-play deployment and remote management can reduce manual effort, reduce costs, and improve your network service. McAfee, will review how the McAfee NGFW can be installed and up and running in a matter of minutes using our cloud-based installation server. He will also review how the McAfee NGFW Security Management Center gives you remote management and enterprise-wide situational awareness.
  • According to CIO Insight, 43% of IT executives believe a failure to integrate with legacy systems is the biggest perceived barrier to future mobile initiatives. These legacy systems contain a tremendous amount of business data and processes that don’t easily align with emerging technologies, specifically mobile devices. In this webinar, Aaron Landgraf, Product Marketing, MuleSoft and DJ Deng, Enterprise Mobility Leader, Pactera will outline a strategy for how to unlock legacy investments to deliver world-class mobile experiences.
  • McAfee Drive Encryption version 7.1 with new and enhanced features for: User Directory, Hardening your Modern Windows Systems from Cold Boot Attacks, TPM Auto Boot, McAfee Endpoint Assistant companion app for iOS and Android and many more.
  • Mobile payments is a wide term which can refer to a multitude of different activities based around a mobile phone (smart phone). These activities can include acquiring (MPOS, QRCodes, NFC and other contactless means of payment), mobile banking, peer-to-peer payment innovations, premium SMS and other pay by phone options and payment/loyalty apps.

    The regulation that covers the above is equally wide ranging from the regulation of payment services and electronic money to the use of personal data and telco regulation.

    The European Commission in its wisdom drafted a very good green paper back in January 2012 entitled "Toward an integrated European market for card, internet and mobile payments" which recognised that mobile was simply a device/medium and not a payment method in itself. The aim of the paper was to increase competition, provide more choice and transparency for consumers, grow innovation and promote payment security and consumer trust. As recently as November 2013, the European Central Bank published its "recommendations for the security of mobile payments" and these have been endorsed by the national banks of the European Union. In the draft Second Payment Services Directive we see a continued push into this space of creating a secure and regulated platform for mobile issuing and acquiring in payments.