Understanding Vulnerabilities to Better Mitigate Threats
Vulnerabilities that exist in today’s commercial and custom software are the primary target for attackers. The most severe of these vulnerabilities are those that can result in remote code execution – that is an attacker can take complete control of another system for the purposes of stealing information, defacing property or just causing trouble. In this session, Brian Gorenc, will demonstrate how to analyze a vulnerability and the steps required to weaponize it. Centering on a vulnerability in a Microsoft application, the demo will show you how an attacker can quickly move from proof-of-concept to remote code execution. The discussion will also include thoughts on mitigation strategies for reducing risk.
RecordedJun 21 201245 mins
Your place is confirmed, we'll send you email reminders
TJ Alldridge and Satinder Khasriya, Product Marketing, Trend Micro TippingPoint
The Trend Micro TippingPoint Threat Protection System (TPS) family offers comprehensive threat protection against known and zero-day attacks. Attend this webinar to see the many ways the TPS can be used to protect your environment against the latest threats as well as the old ones too.
TJ Alldridge, Product Marketing Manager, HP TippingPoint
Advanced threats and targeted attacks are wreaking havoc in our networks and desktop machines. High-profile attacks seem to make headlines every few weeks. While no security solution is 100% effective, join us to discuss best practices that could bring your security effectiveness closer to that goal.
To protect their networks and critical data from being compromised, enterprises must be able to acquire and assess new information constantly, and take action to identify vulnerabilities, remediate and minimize the likelihood of attackers permeating through their network. HP TippingPoint Threat Protection System delivers comprehensive network security integrating vulnerability management to provide actionable threat intelligence with unparalleled visibility and analytics.
Robin Layland, Layland Consulting, Steve Povolny, TippingPoint DVLabs, Brian Foster, Damballa
Industry Analyst Robin Layland is joined by Steve Povolny of HP and Brian Foster of Damballa to focus on what you need to do to stop attacks that have made it past your perimeter defenses. We also cover mitigation needs based on your risk profile. We then review how you can spot breaches and how to easily keep your security up to date. Finally we cover what to look for in an advanced threat protection vendor.
Hussain Abduljalil, Manager Solution Architecture at Gulf Air
Since 2006, Gulf Air has used HP TippingPoint Intrusion Prevention System (IPS) to protect their network from external threats. With the passage of time the internal attack vectors were also identified as being a high-risk area. In this webinar, Hussain Abduljalil of Gulf Air explains how Gulf Air evolved their network security from an external IPS setup to a unified IPS solution providing the required levels of protection and throughput needed. And why they did it with HP TippingPoint.
Watch the webinar to learn:
• The evolution of IPS setup in Gulf Air
• How advanced malware threats (like the Conficker worm) were identified as a risk
• Why Gulf Air choose HP TippingPoint for network security
• The way forward
While anonymizers can serve a positive purpose by protecting a user’s personal information by hiding their computer’s identifying information, their use in your network environment can be dangerous. Anonymizers can evade enterprise security devices, and their misuse can make your organization susceptible to malware and unwanted intrusions. Attend this session to learn how you can detect and block elusive anonymizers from wreaking havoc on your network.
Bob Corson, Director, Solutions Marketing, TrendMicro & Patrick Hill, Sr Product Line Manager, DVLabs
Victims of targeted attacks, or advanced persistent threats (APTs), make the headlines. Attend this webinar to learn how APTs work and how to defend your business from them. Pat Hill, HP TippingPoint Product Manager, and Bob Corson, Director, Solutions Marketing, discuss the anatomy of an attack and why it's critical to detect and isolate the attack at "patient zero," the initial point of infection.
Attend this webinar to learn:
· How the bad guys evade your security
· The counter measures you need to detect and block them
· How HP TippingPoint and Trend Micro have partnered to neutralize patient zero
Bob Corson, Director, Solutions Marketing, Trend Micro & Patrick Hill, Senior Product Line Manager for HP Enterprise Security
Target, Sony, Anthem - the biggest recent breaches have taught us all big lessons. Namely, that traditional security solutions are ineffective against advanced threats. And today's targeted attacks not only can rob your organization of sensitive data, customers, reputation - they can cost senior leaders their jobs.
Register for this session to learn the 6 Keys to Success in Fighting Advanced Threats. Hear first-hand from security leaders at HP and Trend Micro how to:
- Monitor all attack phases;
- Mind security gaps;
- Defeat anti-evasion features & more.
A next-generation intrusion prevention system (IPS) shouldn't just keep your company safe, it should be quick to implement and easy to manage. HP TippingPoint is the simple, effective, and reliable solution for network security that protects you faster—when every second matters.
This video explains how TippingPoint stops threats faster. Watch it to learn:
•How HP TippingPoint provides 80% threat coverage out of the box
•How most companies install TippingPoint in less than two hours
•How TippingPoint filters key on vulnerabilities rather than exploits to keep you safer and reduce false positives
John Kindervag, Vice President and Principal Analyst, Forrester Research
Hackers don't have change management, so they can change and deploy threats faster than companies can respond to them. That's the message of Forrester Principal Analyst John Kindervag in this short but important video. He explores the impact of a changing threat environment and new zero-day threats on cyber defenses.
View it to learn:
•Why it's important for security professionals to change their mindset when dealing with the changed threat landscape
•Why conventional defenses based on exploit signatures no longer work
•Why context-aware defenses that correlate incoming attacks to outgoing data exfiltration are required for enhanced security
2014 has been an explosive year riddled with nasty security threats. Some of these you may have heard about like Heartbleed and Shellshock, but others like Sandworm, may have gone unnoticed or worse unprotected on your network. This webcast will offer an explanation of the top vulnerabilities, how they could have infected your network and security precautions to protect your organization. Don’t miss it.
As enterprise network design changes and evolves to incorporate mobile devices, BYOD and cloud solutions, the traditional network perimeter is breaking down. All this, while attacks are getting ever more sophisticated. This session will discuss the challenges facing the modern enterprise network, and show how HP TippingPoint network security products offer solutions that can help.
Joanna Burkey, HP TippingPoint DVLabs Manager & Russell Meyers, Global Product Line Manager, HP TippingPoint
With malware and botnets wreaking havoc worldwide, stopping network infiltration and protecting confidential data is proving increasingly difficult. This session introduces you to a triple-threat triple ally against attackers: HP TippingPoint with ThreatDV. Join us and learn how HP TippingPoint and the power combo of ThreatDV, weekly Digital Vaccine package, and reputation feed help networks stay ahead of attacks by blocking infiltration, phone-home, command-and-control, and data exfiltration.
Russell Meyers, Global Product Line Manager, HP TippingPoint
Security defenses are only effective when you can easily deploy and manage them. HP TippingPoint Next-Generation Intrusion Prevention System and Next-Generation Firewall make it easy. And the TippingPoint Security Management System provides a dashboard to show you the state of your defenses and instantly see attacks that are blocked.
Every second matters. Watch this interactive demo to learn how:
· Easy it is to automatically download the latest Digital Vaccine packages to stay up-to-date with the latest security intelligence
· Simple it is to share security configurations and policies across devices
· The at-a-glance dashboard effortlessly shows your protection status
· To automatically create protection, status and network behavior reports
Joanna Burkey, HP TippingPoint DVLabs Manager & Russell Meyers, Global Product Line Manager, HP TippingPoint
Threats to the network continually evolve, which makes isolating the victimized “patient zero” machine nearly impossible. Today’s advanced threats require an advanced approach to security. This session explores how HP TippingPoint stops these attacks in their tracks by neutralizing patient zero through behavior, static, and dynamic detection. Join us to learn how this layered security approach is the most effective way to minimize the threat of network infiltration and, when it does occur, protect your infrastructure from further damage.
Russ Meyers, Global Product Line Manager for the HP TippingPoint Enterprise Security Management System
Incident response weighs heavily on the minds of security practitioners today. Prompted by the recent data breaches and attacks plaguing enterprises large and small, a new SANS survey project asked IT professionals to explain what steps they take immediately following a breach and to share how successful those steps really are.
Tune into Part 1 of the Incident Response Techniques webcast to hear highlights from the survey results and discussion concerning where we are as an industry in a typical six-step incident response process.
Delivering Integrated Advanced Threat Prevention to the Enterprise
This channel covers the latest topics in network security and vulnerability threat research from TippingPoint, DVLabs, and the Zero Day Initiative to help security professionals protect their network against known, unknown and undisclosed threats.
Everybody is joining the microservices bandwagon and only some enterprises truly see the benefits of adopting microservices. The real challenge is not only cultural adoption but also a question of choosing the right technical tools to enable and secure your microservices.
In this webinar we'll provide practical guidance on building and deploying a microservice architecture for speed, scale and safety.
Join this webinar to learn:
- Key considerations of enabling microservices within your enterprise
- How DevOps fits in the microservices lifecycle and how to align team culture
- How to use an API gateway for securing and governing your microservice architecture
Do you feel like the economics of security often favours the attacker? Are you spending more and more, yet still feel like you are not achieving anything? How can you deliver a return on investment (ROI) on what you have chosen to invest and prove that you have delivered a total economic impact from a security perspective?
No one expects a CFO or board to write a blank check for security, which is why explaining the savings that an organization can realize in terms of a more efficient security team, lower hardware costs, and minimized risk - is paramount to understanding its value. In this webinar, we will discuss how a full examination of the effect of technology on the entire organization can present clear opportunities to save critical funds and build a business case that the CFO can understand.
*How traditional ROI analysis to justify security investments is ineffective
*The importance of employing a Total Economic Framework
*How to win the attention of the CFO
*The four vital components to determine investment value
Consumers want payment options that function in all channels—research confirms it. They want to buy things with as little frustration as possible and merchants want to accept payments from legitimate customers. It seems so simple.
As digital wallets emerge, however, security remains the primary hurdle facing mobile payments. How do digital wallets fit into the formula of customer convenience and merchant confidence?
Join Hannah Preston, Solution Strategist, Payment Security Division, CA Technologies and D.J. Murphy, Editor-in-Chief, CardNotPresent.com as they discuss digital wallet adoption and how companies can keep pace with the demands of mobile commerce, while balancing fraud risks.
Learn the "must haves" for any digital wallet solution:
• Specifically designed to fuel the mobile economy, avoiding the frustration and complexity of legacy payment infrastructure
• Securely provisioned with the cardholder's credentials, a vital feature for card issuers who want to offer cardholders digital wallet platforms
• Industry sanctioned to effect a large scale shift in payment culture for merchants, issuers and customers
When applications and desktops are delivered over Citrix, the Citrix administration team becomes the front-line for responding to complaints about slow performance. But more than 60 percent of the time, the root cause of the problem lies outside of the Citrix environment.
In this webinar, you’ll learn how wire data analytics can enable Citrix administrators to not only see end-user experience for ICA sessions, but also dig into application and infrastructure performance to uncover the real reason for slowdowns.
Privilege is at the centre of the attack lifecycle, yet removing Windows users’ local administration rights has a negative impact on the user experience and creates a desktop support headache.
Join this webinar to learn how least privilege, combined with the right application control technologies, can enable you to remove local administrator rights to reduce your attack surface, while keeping your users and support teams happy. The session will cover the technologies required to achieve this and demonstrate how their unique combination can protect you from ransomware.
SMBs have the same security needs and requirements as enterprises, but rarely have the resources or personnel that their larger competitors have. What are some strategies SMBs can take when it comes to next-generation firewalls, intrusion-protection systems, intrusion-detection systems, and other hybrid approaches? Listen to this webcast to learn more.
With the news Yahoo! was breached in 2014 and 500 million user accounts were potentially compromised, this breach became the biggest in history to date. However, the damage extends far beyond Yahoo! properties where the digital identities of users could be compromised on other sites, business documents leaked and other harm could come for users who don’t take immediate steps.
This talk will cover not only the breach, but the aftermath in what users and enterprises should do to protect themselves over breaches affecting other companies.