A webinar designed to give you an understanding of good practice online to help understand the threat landscape, the global opportunities and the impact that malware, website vulnerabilities and a lack of security can have on your online conversion rates. Join Symantec for this webinar that details good practice online and how you can convert more browsers to customers.
To complement this webinar we’ve developed two eBooks, which you can download here: https://www.symantec-wss.com/uk/optimise/ext
RecordedFeb 7 201340 mins
Your place is confirmed, we'll send you email reminders
Ben Herzberg, Head of Security Response at Imperva Incapsula and Akhil Verma, Product Marketing Website Security at Symantec
The latest DDoS Threat Report from Imperva Incapsula shows that DDoS attacks continue to grow in size with a significant increase in network layer attacks. With the scale and reach of DDoS threats increasing, enterprises need to be vigilant to protect their assets and customer data. Join our webinar to learn how you can protect your enterprise from global cybersecurity threats.
At the webinar you’ll learn:
• Insights into global DDoS attack patterns
• Best cyber security practices
• How to harden your current security practices
• How to build a scalable cyber security strategy
ECC ist der modernste Verschlüsselungsalgorithmus, der beim Schlüsselaustausch und der Authentifizierung mit den Protokollen SSL und TLS zum Einsatz kommt.
ECC wird RSA voraussichtlich ablösen, da der explosionsartige Anstieg der Mobilgerätenutzung und der Kommunikation zwischen Maschinen (M2M) sowie die Entwicklung des Internet der Dinge die Grenzen der Skalierbarkeit des derzeitigen Standardalgorithmus RSA übersteigen.
Die Zuverlässigkeit und Leistung von ECC sind inzwischen klar erwiesen. Die größte Hürde für den Einsatz des Algorithmus ist mangelnde Kompatibilität mit vorhandener Technik. Deshalb hat Symantec Hybrid-SSL-Zertifikate mit ECC und RSA entwickelt. Mit diesen Zertifikaten können Sie Ihre bisherigen Infrastrukturinvestitionen weiterhin nutzen und gleichzeitig Kompatibilitätsprobleme vermeiden.
In diesem Webcast erfahren Sie,
welche Vorteile ECC in puncto Sicherheit, Zuverlässigkeit und Kapazität bietet,
wie die Zertifikatskette eines Hybrid-SSL-Zertifikats mit ECC und RSA aussieht und
wie Sie ein solches Zertifikat beantragen.
ECC is the latest encryption algorithm used for key exchange and authentication purposes in the SSL/TLS protocols.
ECC is expected to replace RSA (current standard) as the scalability of RSA has become too limited to deal with the explosion of the number of mobile devices, machine-to-machine (M2M) communications and the development of the IoT (internet of the things).
The reliability and performance of ECC no longer needs to be demonstrated. However, a significant obstacle to the adoption of ECC lies on the lack of compatibility for such algorithm. This is why we have created ECC/RSA hybrid SSL certificates, allowing you to protect your current infrastructure investment while mitigating potential compatibility issues at the same time.
Join us in this webcast and find out:
-what are the main benefits of ECC in terms of strength, reliability and capacity
-how ECC/RSA hybrid certificate chains work
-what is the enrolment process
Présent sur un grand nombre de certificats SSL, l'algorithme SHA-1 est aujourd'hui en proie aux compromissions par des cybercriminels. Face à ce danger, Google, Mozilla et Microsoft ont annoncé la fin prochaine de la prise en charge du SHA-1 dans leurs navigateurs, qui se traduira par l'affichage de messages d'avertissement en présence de cet algorithme.
Avec Symantec, vous pouvez d'ores et déjà remplacer vos certificats actuels par des certificats SHA-2 plus résistants pour votre site Web. Profitez de notre webinaire pour faire un point complet. Au programme :
Les dates clés du remplacement de vos certificats SHA-1
Comment obtenir des certificats SHA-2 sans aucun coût supplémentaire
Le processus de remplacement de votre certificat
Vous découvrirez également comment Symantec vous aide à garder un coup d'avance pour protéger votre entreprise contre les cybermenaces.
Everything you need to know about website security and online threats
Symantec Website Security Solutions take SSL protection and trust to a whole new level. Secure your website, increase customers' confidence, and reach the full online potential of your business. You can learn about the threat landscape and Symantec product updates by subscribing to this channel.
Test automation, continuous integration (CI), and reliable test data provisioning are all key elements to making DevOps work, as they provide the necessary capabilities to quickly and securely test and release software. Without these technologies, the DevOps promise of rapidly deploying new services and applications is only a dream.
Join this web seminar to learn how to execute an integrated data management approach that will deliver seamless automation, efficiency, and security to your DevOps and continuous integration efforts.
• How to release applications faster with confidence through improved collaboration, automation and visibility.
•How self-service test data powers DevOps and CI implementations
•Ways to manage test data to reduce risk when implementing CI and DevOps
• Common oversights when employing automation and DevOps
• How organizations have saved millions and slashed development cycles
• Seamless automation tools and processes
Protecting your enterprise data is often referred to as a technology issue, but most cyber attacks begin by fooling a user into doing something, such as unknowingly downloading malware or giving up security credentials. This “social engineering” is the most common way that an online attacker will gain access to your business – and the hardest to defend against, because it exploits everyday human weaknesses, rather than technical vulnerabilities.
How do attackers fool your employees via email, Web, phone, and onsite? What are some of the latest methods they use to trick users and employees into breaking security policy? And most importantly, what can your organization do to keep its employees from being taken in? In this informative Dark Reading webcast, top experts on social engineering will answer these questions and many more. You’ll learn about current social engineering methods and the “human” threats posed by online and physical attackers. You’ll also get insight on how your organization can train and test its users and employees to recognize and turn away these social engineering exploits – before they compromise your business.
Threat actors have discovered that targeting organizations with ransomware can be far more lucrative than extorting small sums from home users. Ransomware is on the rise. But your organization does not have to become a victim. Automated prevention is certainly achievable.
Join us for this live webinar where you will learn:
• Which three steps you must take to successfully prevent an outbreak in your organization
• Why existing endpoint security solutions often fail to prevent ransomware infections
• Which organizations threat actors target most intently with ransomware
• What endpoint protection technology capabilities are necessary to automate ransomware prevention
• Which three delivery vectors attackers use in nearly all ransomware infections
Learn about the exciting new capabilities of the next generation security platform. New features can prevent attacks in more deployments, even faster than before, preventing breaches before they can occur, no matter the location.
We will cover:
•Securing Your Cloud: Lean about new capabilities of the VM-Series to protect your cloud workloads anywhere
•Securing Office 365: Understand how to safely enable Office 365 without fear of threats or data exposure
•Accelerated Threat Intelligence: Learn about the enhancements to the Next Generation Security Platform that makes threat prevention even better than before
•Prevent Breaches by Securing Credentials: Learn how the Next Generation Security Platform makes successful credential theft a thing of the past
FireEye’s Dynamic Threat Intelligence (DTI) has identified a wave of emails containing malicious attachments being sent to multiple banks in the Middle East region. The threat actors appear to be performing initial reconnaissance against would-be targets, and the attacks caught FireEye’s attention since they were using unique scripts not commonly seen in crimeware campaigns.
FireEye now invites you to learn more about what happened from its Director of Mandiant Services in the Middle East. Stuart will elaborate on these targeted attacks, detailing the tools, tactics, techniques and procedures used as well as to discuss the intelligence gained from them to help you better protect your organisation against similar natured attacks now and in the future.
Agile IT service delivery models and mixed infrastructure are presenting new security challenges for many organizations. Old approaches to security don’t work well with automated, on-demand infrastructure in mixed on-premise and cloud environments, all with high rates of change and shared resources.
The webinar, featuring 451 Group Senior Security Analyst, Adrian Sanabria and Chief Product Officer at CloudPassage, Ram Krishnan, will cover:
•A brief overview of the transformation of IT delivery models
•Conversation about why old tools don’t work in this new model
•Specific ways to prepare for securing agile IT delivery models and on-demand IT services
Join Catherine Roy, Director of PMO at HOSTING, and Kellen Amobi, Project Manager at HOSTING, on June 23 at 3 pm EST for Cloud Migration: Tales from the Trenches – an interactive webinar, in which they will discuss:
-Developing scopes and deadlines for complex projects
-Developing realistic schedules
-How to approach and define problems for c-level and team members
Dealing with a large number of IT vulnerabilities is an issue for most organizations. Only 10 Common Vulnerabilities and Exposures (CVEs) account for 97% of the exploits*. Clearly, it is vital for you to identify which of your vulnerabilities are the most critical to address first with fast, effective remediation.
Qualys’ newest solution ThreatPROTECT correlates vulnerability data with a Live Threat Intelligence Feed from multiple industry sources, providing customers with an easy-to-understand dashboard that provides clear insight into which vulnerabilities to fix first.
During this webcast presenters Wolfgang Kandek, and Tim White, will show you how you can use ThreatPROTECT to:
* Quickly identify your most important assets and critical vulnerabilities
* Prioritize remediation efforts so you know which vulnerabilities to tackle first
* Eliminate the guesswork with real-time correlation of active threats