Browse communities
Browse communities
Presenting a webinar?

E is for Endpoint II: How to Implement the Vital Layers on Your Endpoints

Paul Henry, Security & Forensics Analyst; Eric Ogren, Founder/Principal Analyst, Ogren Group; Doug Walls, CTO, EM Solutions
IT security professionals rank third-party application vulnerabilities as the greatest security risk of 2012. And yet malware continues to exploit these – and other – vulnerabilities to breach our defenses. Clearly there’s a disconnect between knowing the problem and solving it. Yet it does not have to be this way, if we intelligently apply adequate protections against the exploitation of these vulnerabilities.

Join this webcast, led by expert IT security panelists, to learn:

•What are the vital layers of your endpoint defense.
•How to thwart exploitation of your endpoint OS, configuration and 3rd-party application vulnerabilities.
•How to prevent unknown applications from executing on your systems.
May 9 2012
60 mins
E is for Endpoint II: How to Implement the Vital Layers on Your Endpoints
More from this community:

IT Security

  • Live and recorded (5371)
  • Upcoming (112)
  • Date
  • Rating
  • Views
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • With data breaches and data leakage incidents becoming front page news, cyber investigations are taking on more importance within organizations. This calls for a new set of skills to be developed such as the ability to work with all levels of law enforcement, lawyers and attorneys and within the judicial system. Many of these investigations will call for the cybersecurity practitioner to be a witness and give testimony. What's the best way to do this to protect yourself and the organization, while also providing the information that will help law enforcement and the justice system to get the information they need? Join (ISC)2 on March 26, 2015 at 1:00PM Eastern for our next "From the Trenches" webcast where we'll talk about what it means to be an expert witness and the best practices for serving as one.
  • As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation.
  • As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • This webinar draws on Bradford Networks’ extensive BYOD experience to help organizations avoid the landmines that plague BYOD initiatives.

    Attend this webinar and you will learn how to avoid:
    • Organizational Resistance - Establish and manage a cross-functional committee of stakeholders to build consensus
    • Support Burden - Leverage proven techniques to educate end users and minimize help desk calls
    • User Frustration - Implement ultra flexible BYOD policies without compromising security
    • Onboarding Latency - Maximize the end users’ ability to self-administer new and lost/stolen devices
    • Vulnerable Endpoints – Guided remediation for user devices that are under-protected and non-compliant
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers are constantly trying to find new exploits to penetrate network defenses and bypass security controls. In 2014, Mandiant’s M-Trends report indicated that it takes an average of 229 days to detect the presence of a threat actor on an enterprise network. Organizations are starting to realize that the evolution in technologies alone cannot stop such incidents, as the actors continue to change their tactics.

    Organizations need to consider supplementing their security technologies and processes with their people. By leveraging employees as human sensors, we not only adopt “see something, say something”, but we are able to add an extra layer of defense and exponentially reduce detection time as well.

    In this webinar, PhishMe’s Senior Researchers Ronnie Tokazowski and Shyaam Sundhar will discuss:

    • Engaging human sensors as a layer of defense
    • Utilizing user reports to detect malware
    • Real use cases of user detection within our enterprise
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • Channel
  • Channel profile
  • Practical Patch Compliance: Using System Center to Reduce Your Audit Pain Recorded: Feb 19 2015 61 mins
    Chris Merritt, Director of Solution Marketing and Russ Ernst, Director of Product Management for Lumension
    Security is Complex, Patching with Microsoft® System Center Shouldn't Be

    System Center Configuration Manager is the solution of choice for managing today's enterprise environments. But what’s an administrator to do when a security audit includes vulnerabilities in non-Microsoft applications?

    Introducing the only enterprise-class 3rd party patching solution designed exclusively for System Center environments that require operationally efficient and reliable security and compliance patching solutions.

    Join us for an in-depth demonstration of practical methods to improve the patch process for your most targeted 3rd party desktop applications, reduce the time you spend building updates, and improve audit readiness in your Windows environment—through our newly released Lumension® Patch Manager DeskTop plug-in.

    Key capabilities include:
    Integrated plug-in with automated content subscription and synchronized scheduling—all within the familiar SCCM console but without need for manual SCUP input
    Ensures systems are correctly patched the first time though Patent-pending Patch-Smart™ technology
    Enterprise-class content which delivers in-depth vulnerability information and supports both enterprise and consumer versions of the most widely adopted, highly targeted applications
  • 2015 Data Protection Maturity Trends Recorded: Jan 28 2015 72 mins
    Dee Liebenstein, Vice President Product Management, Lumension and Chris Merritt, Director of Solution Marketing, Lumension
    After so many massive data breaches in 2014, it’s small wonder that data protection is such a hot topic today. The fourth annual Data Protection Maturity Trends report delves into the issues and concerns facing IT security teams, how effective their data protection efforts have been to date, and their plans for 2015 and beyond.
  • Greatest IT Security Risks for 2015: 6th Annual State of Endpoint Risk Recorded: Jan 21 2015 85 mins
    Larry Ponemon, President of Ponemon Institute and Chris Merritt, Director of Solution Marketing of Lumension
    User-centric risk tops this year’s concerns: what is IT doing about it?
    Endpoint risk is rising and 78% of respondents to the new 2015 State of Endpoint Security study say negligent, careless employees not following policy are IT’s biggest threat.

    The 6th Annual survey, conducted by Ponemon Institute, asked IT practitioners involved in securing endpoints about risks and challenges in 2015. This year’s report reveals why risk has become more challenging over the last 24 months and what IT plans to do about it in 2015.

    Join us Wednesday January 21st at 8am PST / 11am EST, as Larry Ponemon and Chris Merritt reveal analysis from the Annual State of Endpoint Risk, sponsored by Lumension, including:
    • The evolving IT threat landscape and today’s top-5 risks
    • The disconnect between perceived and actual risk, and the corresponding strategies to combat these threats including detect and respond, big data and threat intelligence
    • Insights into new Infosec budgets and their 2015 allocations

    Register Today, and learn how your peers are planning on addressing the endpoint security risks and challenges of 2015.
  • 2015 Endpoint and Mobile Security Buyer’s Guide Recorded: Jul 31 2014 88 mins
    Mike Rothman, President, Securosis
    Over the past few years Endpoint Security Management offerings — including patching, configuration, device control, and mobility — have been bundled into suites to simplify management. Protecting endpoint devices continues to get harder, so Securosis has authored new research that now includes anti-malware, BYOD and more.

    Join Mike Rothman, President, Securosis as he shares clear, up-to-date buying criteria for those looking at procuring endpoint solutions in the near future. Included will be a look at the ongoing challenge of securing endpoints, recommended how-to’s on protecting endpoints, reducing attack surface and managing mobile security as well as important buying considerations and a procurement process.
  • BYOD & Mobile Security: Sneak Peek of LinkedIn Infosec Community Survey Recorded: Jun 10 2014 36 mins
    Chris Merritt, Director of Solution Marketing, Lumension
    The days in which an organization owned and issued all devices accessing its network are long gone. Employees are now using their personal mobile devices to store and access corporate data, but many organizations do not have policies or security in place to mitigate BYOD risk.

    We learned in the 2014 State of the Endpoint Survey by Ponemon that 75% of IT professionals saw mobile device protection as the number one challenge for 2014, and 46% admitted they have no security policies in place for mobile devices.

    Since mobile device security is an increasing priority, Lumension sponsored the second BYOD & Mobile Security Survey with the global LinkedIn Information Security group to hear the community’s views and sentiment on this issue. After surveying over 1,000 respondents, the preliminary results are in, and we want to give a sneak peek to share the findings with you!

    Join Chris Merritt, Director of Solution Marketing at Lumension, in this interactive, 30 minute discussion to learn:

    • Your peers’ big concerns on BYOD and mobile security

    • What they are currently doing to combat mobile device risk

    • What solutions & security policies work in organizations

    We look forward to hearing your thoughts and hope to see you there!
  • Point of Sale Systems: How to Stop Critical Entry Points for Malware Recorded: Feb 20 2014 62 mins
    Chris Merritt, Director of Solution Marketing, Lumension
    Point of Sale (POS) systems have long been the target of financially-motivated crime. And in 2013 the magnitude of cybercrime against POS systems skyrocketed, with 97% of breaches in the retail sector and 47% in the healthcare sector aimed against POS systems. With sensitive financial and personal records getting exposed by the millions, the FBI recently warned that POS systems are under sustained and continued attack.

    During this webcast, we will take you into the three critical entry points to POS system attacks. We’ll discuss how the attacks look, the timelines for these breaches, and what proactive security measures you can take to help your organization minimize the risk to your POS systems.

    •3 Critical Entry Points to POS System Attacks
    •Impacts to an Organization
    •Top 3 Security Measures to Minimize Risk
  • 2014 Data Protection Maturity Trends. How Do You Compare? Recorded: Jan 28 2014 57 mins
    Chris Merritt, Director of Product Management, Lumension
    In 2012 we found that the BYOD environment and the consumerization of the workplace had turned traditional notions of corporate IT upside down. In this webcast, we’ll look at the results from the 3rd annual survey and look at how mobility has changed the way IT teams are managing their devices, how effective their efforts are, and their biggest concerns.

    During this webcast we will look at each of data protection trends, helping you define best practices for your organization to address the top concerns. We’ll also show you how you can gauge the maturity of your security systems, allowing you to plug any holes before your valuable data starts to leak through them.
  • Greatest IT Security Risks of 2014: 5th Annual State of Endpoint Risk Report Recorded: Jan 8 2014 62 mins
    Larry Ponemon, President of Ponemon Institute and Ed Brice, SVP of Lumension
    Organizations around the world are losing intellectual property and customer data to cyber criminals at mind-boggling rates. How is this happening?

    For 5 consecutive years, the annual State of the Endpoint Report, conducted by Ponemon Institute, has surveyed IT practitioners involved in securing endpoints. This year’s report reveals endpoint security risk is more difficult to minimize than ever before. What are IT pros most concerned about heading into 2014? From the proliferation of mobile devices, third party applications, and targeted attacks/APTs, endpoint security risk for 2014 is becoming more of a challenge to manage.

    Join Larry Ponemon of the Ponemon Institute and Ed Brice of Lumension for a webcast that will reveal statistics on growing insecurity, IT’s perceived areas of greatest risk for 2014 as well as tactical suggestions for how to improve your endpoint security. Specifically, you will learn:

    •IT perspective on the changing threat landscape and today’s Top 5 risks;
    •Disconnect between perceived risk and corresponding strategies to combat those threats;
    •Tips and tricks on how to best communicate today’s threats and subsequent needed responses up the management chain
  • Windows XP is Coming to an End: How to Stay Secure Before You Migrate Recorded: Nov 13 2013 56 mins
    Chris Merritt, Director of Solution Marketing
    In April 2014, Microsoft ends support for Windows XP. In a perfect world, your organization will have developed a plan by the end of 2013 and will have migrated all XP systems before Microsoft stops providing security patches. Unfortunately, there are many obstacles to making this strategy a reality – time, resources, budget, etc.

    If your organization still uses WinXP – or other applications such as Office 2003 or Internet Explorer 6 for which support also ends – you need a plan B. Join this webinar to:

    •Learn what end of life means to your organization from a security perspective
    •What options are available to secure your organization from vulnerabilities
    •How other organizations are planning to remain secure and compliant until they are fully migrated

    Understand how you can protect your WinXP systems beyond end-of-support. With application whitelisting and advanced memory protection, you can effectively prevent security risks that are inevitable once your organization is no longer receiving Microsoft patches.
  • Application Whitelisting Best Practices: Lessons from the Field Recorded: Oct 9 2013 89 mins
    David Murray, Group Product Manager, Lumension and Chris Merritt, Director of Solution Marketing, Lumension
    If you’re like most IT professionals, you’ve probably heard analyst firms like Gartner and Forrester recommend using application whitelisting to defend your endpoints. The latest generation of application whitelisting provides flexible protection against modern, sophisticated malware and targeted attacks. However, application whitelisting is not something you turn on overnight.

    Attend this in-depth technical webcast as we dive into the latest technologies, including reflective memory protection, and other whitelisting approaches, to learn best practices to begin preparing for your 2014 endpoint security strategy and the inevitable transition from traditional signature-based protection to a holistic solution that incorporates whitelisting.

    • Three Best Practice Steps: Prepare, Lockdown and Manage Change

    • Understand how to apply lessons learned during application whitelisting implementations by your peers

    • Gain knowledge of continuous improvements made in best practices for application whitelisting

    *Receive 1 CPE credit for attending this webcast. To earn this credit, viewers must be active participants for the duration of the webcast. Please enter your appropriate membership ID upon registration to ensure relevant credits are allocated to your accounts when we submit them.
  • 2014 Ultimate Buyers Guide to Endpoint Security Solutions Recorded: Oct 2 2013 59 mins
    Mike Rothman, Analyst and President, Securosis
    Last year we offered our thoughts on buying Endpoint Security Management solutions — including patching, configuration, device control, and file integrity monitoring — which are increasingly bundled in suites to simplify management. For 2014, malware and mobility have become the most critical issues facing organizations at they look to protect their endpoint devices. Thus we've updated our research to make sure you have the latest and greatest information on which to base your buying decisions.

    Join Mike Rothman, Analyst & President from Securosis, as he dives into an interactive discussion around endpoint security in 2014, and provides clear buying criteria for those of you looking at these solutions in the near future.

    What you will learn:

    •Protecting Endpoints: How the attack surface had changed, and the impact to your defense strategy

    •Anti-Malware: The best ways to deal with today's malware and effectively protect your endpoints from attack

    •Endpoint Hygiene: Why you can't forget the importance of ensuring solid management of your endpoint devices

    •BYOD and Mobility: The extent that corporate data on smart mobile devices impacts your organization

    •The Most Important Buying Considerations in 2014

    *Receive 1 CPE credit for attending this webcast. To earn this credit, viewers must be active participants for the duration of the webcast. Please enter your appropriate membership ID upon registration to ensure relevant credits are allocated to your accounts when we submit them.
  • BYOD & Mobile Security: How to Respond to the Security Risks Recorded: Jun 4 2013 62 mins
    Chris Chevalier, Group Product Manager & Chris Merritt, Director of Solution Marketing
    Bring Your Own Device (BYOD) is a popular topic in 2013. The trouble is that IT is trying to understand the security risks and prepare strategies to either adopt employee-owned mobile devices or decide against it for security and data control reasons.

    The 160,000 member Information Security Community on LinkedIn conducted the survey “BYOD & Mobile Security 2013” to shed some light on the drivers for BYOD, how companies will benefit from BYOD, and how they respond to the security risks associated with this trend. With 1,600 responses, some interesting insights and patterns into BYOD were uncovered.

    Participate in this interactive webcast to learn:

    •Current Mobile Security Threats
    •Top Trends & Drivers in BYOD & Mobile Security
    •Necessary Features to Minimize these Security Risks
    •Live, Interactive Q&A
  • 3 Executive Strategies to Prioritize Your IT Risk Recorded: May 8 2013 60 mins
    Richard Mason, VP & CSO at Honeywell; Pat Clawson, CEO at Lumension; Roger Grimes, Security Columnist/Author
    Do you want to know how ‘best-of-breed’ enterprises prioritize their IT risk? Join Richard Mason, Vice President & Chief Security Officer at Honeywell, whose team is responsible for global security, during a roundtable discussion with Pat Clawson, Chairman & CEO of Lumension and Roger Grimes, Security Columnist & Author. Uncover strategies beyond traditional antivirus signatures and learn a more holistic approach to effective risk management. Find out ‘how’ and ‘why’ you can make security a prioritized function within your organization.

    Join this expert panel webcast to learn how to:
    1)Understand your business audiences and evaluate their risk tolerance
    2)Leverage reputation management services that are appropriate for your organization
    3)Utilize realistic change management to secure prioritized data depositories
  • Understanding the Ins & Outs of Java Vulnerabilities and What to do About It Recorded: Mar 13 2013 61 mins
    Paul Henry, Security & Forensics Analyst; Russ Ernst, Group Product Manager, Lumension
    Many organizations are jumping on the “Death to Java” bandwagon, ranting about turning off Java to eliminate risk. However, it is important to put the issue in the proper context. The reality is that a Java vulnerability is not the end game for a cyber criminal, it is merely a delivery mechanism in the quest to install and execute bigger malware.

    There is no “one size fits all” recommendation for eliminating Java risks. But, you do want to eliminate as much exploitable surface area as reasonably possible on your critical endpoints. This should be the philosophy engrained in every organization’s security culture. If you’re not having this conversation about Java - and quite frankly all of the third-party applications in your environment - you are missing the mark and not calculating your risk. Join Paul Henry and Russ Ernst as they bring us up to speed on the Java vulnerabilities and how to limit your exposure without going overboard.
  • Defending Your Corporate Endpoints: How to Go Beyond Anti-Virus Recorded: Jan 30 2013 1 min
    Kevin Beaver, Independent Information Security Expert & Chris Merritt, Director of Product Management
    Businesses large and small continue to struggle with malware. As a result, 50% of endpoint operating costs are directly attributable to malware alone[1]. Traditional approaches to malware protection, like standalone antivirus, are proving themselves unfit for the task. Something has to give.

    In this roundtable discussion, independent information security expert Kevin Beaver and Lumension Security’s Chris Merritt will talk about what can be done differently, including:

    • How to get a better grasp of the weaknesses in endpoint security that continue to get overlooked,
    • Examining whether or not anti-virus as we’ve known it is effective, and
    • A comparison between a proactive versus reactive approach to fighting the malware fight.

    [1] Ponemon Institute, 2011 State of Endpoint Risk, December 2010
  • 2013 Data Protection Maturity Trends. How Do You Compare? Recorded: Jan 22 2013 61 mins
    Paul Henry, Security & Forensics Analyst and Chris Merritt, Director of Product Management, Lumension
    In 2012 we found out that the BYOD environment and consumerization of the workplace had turned traditional notions of corporate IT upside down. The 2013 Data Protection Maturity Report will highlight how organizations have managed this trend over the last year and what steps are being taken in 2013 to further enhance data security. Find out how IT teams are developing a holistic model that encompasses policy, education, technology and enforcement.

    During this webcast we look at each of data protection trends, helping you define your organization’s best practice guide to address the top concerns. We will also be showing you how you can gauge the maturity of your security systems, allowing you to plug any holes before your valuable data starts to leak through them.
  • Greatest IT Security Risks of 2013: Annual State of the Endpoint Report Recorded: Dec 5 2012 59 mins
    Larry Ponemon, President of Ponemon Institute and Paul Zimski, VP of Lumension
    What are IT pros most concerned about heading into 2013? The annual State of the Endpoint Report sponsored by Lumension and conducted by Ponemon Institute reveals APTs and mobile devices pose the biggest security threat to organizations in the coming year. Unfortunately, respondents also demonstrated a disconnect between their identified risk and planned security spend as well as a significant need for improved internal collaboration.

    Join Larry Ponemon of the Ponemon Institute and Paul Zimski of Lumension for a webcast that will reveal statistics on growing insecurity, IT’s perceived areas of greatest risk for 2013 as well as tactical suggestions for how to improve your endpoint security. Specifically, you will learn:

    •IT perspective on today’s Top 3 risks;
    •Disconnect between perceived risk and corresponding strategies to combat those threats;
    •Tips and tricks on how to best communicate today’s threats and subsequent needed responses up the management chain
  • SENSATIONAL HEADLINES OR REAL THREATS? What New Attacks Mean For You? Recorded: Oct 22 2012 59 mins
    Richard Stiennon, Security Expert/Author - Pat Clawson, CEO, Lumension - Scott Hammack, CEO, Prolexic
    Well-organized, highly sophisticated cyber attacks continue to make headlines, hitting major U.S. banks and global companies like Adobe to name a few. In support of October as National Cyber Security Awareness Month, Lumension CEO Pat Clawson, Prolexic CEO Scott Hammack, security industry expert and author, Richard Stiennon and industry analyst and webcast moderator Eric Ogren will share their unique insight into these recent news-making attacks and what they mean for enterprises everywhere.

    In this webcast, you will learn:
    •The latest, seemingly extraordinary attacks;
    •How these attacks could escalate to the point where they matter to you and;
    •What you should be doing to secure against them.
  • Developing Best Practices to Device Control & Encryption: Technical Webcast Recorded: Aug 28 2012 74 mins
    Chris Chevalier, Group Product Manager & Chris Merritt, Director of Solution Marketing, Lumension
    The proliferation of USB flash drives and other removable storage devices has increased the porosity of the network perimeter. This has resulted in sensitive corporate and customer data leaking through the corporate firewall, exposing the organization to data loss, data theft and malware propagation. Understanding the powerful data protection tools available to your organization can help you mitigate these risks, while still enabling the flexible and managed use of these productivity devices.

    Join this webcast to learn the practical steps to guide you in the deployment of device control and encryption technology as we dive into a technical discussion of what the critical items to address, including:

    •Laying the Groundwork for Data Security
    •Preparing for Technical Enforcement
    •Enforcing Your Data Protection Policies
    •Managing Your Secure Environment
  • How to Guard Healthcare Information with Device Control and Data Encryption Recorded: Aug 7 2012 61 mins
    Eric Ogren, Founder & Principal Analyst of The Ogren Group, and Chris Merritt, Solution Marketing Director at Lumension
    The need to protect digitized health information is a top priority in the healthcare industry. HIPAA and the HITECH Act put pressure on your organization to maintain the privacy and security of patient data, with the potential legal liability for non-compliance. So how does your healthcare organization meet or exceed industry best practices in guarding healthcare information?

    Join this webcast as Eric Ogren, President of The Ogren Group, and Chris Merritt, Solution Marketing Director at Lumension come together to take you through:

    • What PHI breaches are currently documented by the US Department of Health and Human Resources (HHS) and why these breaches are occurring
    • How a healthcare organization can mitigate costs with encryption technologies
    • What to look for in device control and full disc encryption solutions
Tips to Endpoint Management, Security and Compliance Challenges
This channel provides live and on-demand webcasts on a range of Endpoint Management and Security topics, including: identifying the latest trends and best practices for minimizing insider risks, reducing your threat exposure, managing Web 2.0 threats, reducing your cost of compliance and taking control of your endpoints, from both an operational and security perspective.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: E is for Endpoint II: How to Implement the Vital Layers on Your Endpoints
  • Live at: May 9 2012 3:00 pm
  • Presented by: Paul Henry, Security & Forensics Analyst; Eric Ogren, Founder/Principal Analyst, Ogren Group; Doug Walls, CTO, EM Solutions
  • From:
Your email has been sent.
or close
You must be logged in to email this