Surviving the Mobile Device Invasion – When Mobile Tries to Connect to IT
With the deluge of new mobile smartphones like Android, iPhone, and others hitting the streets, there are thousands of new attack vectors against a company's IT infrastructure that create potential security nightmares. When users download apps by the droves and then want to connect to core crit
With the deluge of new mobile smartphones like Android, iPhone, and others hitting the streets, there are thousands of new attack vectors against a company's IT infrastructure that create potential security nightmares. When users download apps by the droves and then want to connect to core critical infrastructure, how should IT handle it? While there is a drive for increased off-hours and/or offsite productivity using mobiles, can we stomach the changes that are coming, and can our organizations remain (or become) secure?
Radio Resource Management (RRM) is a feature that automates access point (AP) power and channel configuration. Most enterprise and mid-market Wi-Fi infrastructure providers have this feature, and Wi-Fi engineers are divided on whether or not RRM is beneficial and/or trustworthy, given the extremely diverse range of deployment models and RF environments. In today's market, network stability, dependability, and low TCO are paramount. This presentation takes a comprehensive look at RRM, providing attendees with both immediately useful and longer-term reference information.
Join NetScout and Devin Akin as we deep-dive on this controversial topic.
Devin Akin is the founder of Divergent Dynamics, a Wi-Fi Systems Integrator, Value-Added Reseller (VAR), and Training organization. Akin has over 20 years in IT, with 15 years in WLAN specifically, and was recently named to the TWW Top 100 Wireless Technology Experts list for 2014.
After a record-setting year in 2015, where will the tech M&A market go in 2016? What trends that pushed M&A spending to its highest level since the Internet Bubble burst will continue to drive deals and which ones will wind down? What other sectors are likely to see the most activity this year? And most importantly, what valuations will be handed out in deals over the coming year? Drawing on data and views from across 451 Research, the Tech M&A Outlook webinar maps many of the major developments in the IT landscape (IoT, Big Data, cloud computing) to how those influence corporate acquisition strategies. Join us for a look ahead to what we expect for tech M&A in 2016.
Corporations increasingly rely on their enterprise services bus (ESB) as the communication center to link multiple IT systems, applications and data. Unfortunately, when something goes wrong in the ESB it can have a cascading affect, impacting critical applications. Determining the root cause of the problem is a challenge for most IT organizations, since ESBs serve as a ‘black box’, offering little insight into the issue.
Now, you can assess and resolve performance issues for applications that communicate across your ESB, before they affect your users. Join Richard Nikula, Vice President, Product Development and Support at Nastel, to learn how Nastel AutoPilot for CA Cross-Enterprise APM lets you analyze application behavior in real-time in production, test and development environments.
It’s 2016. If you were born after 1980, you probably don’t remember a time without the Internet and the Web. You reach for your smartphone as your go-to device to answer questions, order pizza, find the score of a football game, and check the address of your child’s next soccer game.
It should come as no surprise, that you reach for your smart phone or use your browser at work to search for an answer when you have a technical issue. The bottom line is that more and more business users are bypassing the service desk and the self-service portal because they believe they can get answers quicker on the web.
Could this be the beginning of the end for IT Self Service as we know it? Join George Spalding, EVP, Pink Elephant and Jim Blayney, Sr. Product Marketing Mgr. CA Technologies, as they tackle the thorny and divisive issue of whether it’s actually more productive for users to get their own solutions from the web.
Please join the DevOps / Agile CoI for a BrightTalk Session, “Enterprise DevOps – Lessons Learned”, scheduled for 1PM EST on Wednesday, January 27, 2016.
DevOps is a cornerstone to concepts used to drive the implementation, with continuous integration and delivery as methods to deliver the actual solution. In a large enterprise, there are many front-end and back-end systems/processes that need to "talk". This presentation focuses on highlighting and breaking down the silos that exist in order to redirect energy and attention on (the more important) outcomes that are generated from lighter methods to delivery IT systems. This includes establishing similar light weight methods for all groups in the organization to publish updates and changes in the environment with, again, a focus on the values, practices, and outcomes.
Jason Walker, the Lead DevOps Engineer at Target Corporation, will discuss many of the lessons learned and best practices during the adoption of DevOps at Target.
APIs have become a strategic necessity for your business because they facilitate agility and innovation. However, the financial incentive associated with this agility is often tempered with the fear of undue exposure of the valuable information that these APIs expose. We will explore in depth the main security concerns API providers and consumers need to consider and how to mitigate them.
Microsoft’s Enterprise Mobility Suite (EMS) allows you to manage devices, applications, and access simply and securely. In this webinar, we will dive deeper into this industry-leading solution and discuss some of the newest features.
Register for this webcast to learn about:
•New EMS features, including Advanced Threat Analytics (ATA) and Mobile Application Management (MAM)
•How to provide remote access and single sign-on to on-premises web applications with Application Proxy
•Azure AD auditing capabilities, and how you can easily report on security events for any Azure-AD protected application or service
Register now to watch live or receive notification when this program is available on-demand.
Reliance on IT to support business’ strategic goals and objectives are continuing to increase year over year. With this heavy reliance, IT organizations are modernizing and transforming the way they deliver services.
Join ServiceNow and Okta, as they review the key strategies and solutions for Identity and Service Management that unite and automate IT processes. Watch this webinar and learn how to:
•Standardize service processes by automating request fulfillment and user provisioning
•Consolidate redundant legacy IT service tools to a single system of record
•Secure connections between people and technology
Identifying social compliance issues, particularly forced labor and human trafficking in supply chains, continues to be a significant problem for business, particularly when sourcing from opaque and non-transparent emerging markets. Civil society is playing a large part in increasing awareness and pressuring politicians to introduce and enforce legislation, and is gradually highlighting the issue as a problem which needs to be addressed both by governments and the business community.
Kroll has been researching and working on this issue for a number of years and believes that businesses should be taking the issue as seriously as other forms of compliance.
Cloud is rapidly entering an entirely new phase, one destined to prove far more transformative and disruptive than the initial phase of cloud computing. It is driving comprehensive transformation of digital assets in organizations of all stripes as IT decision makers begin to view this emerging cloud construct as a proxy for digital transformation. No single vendor can offer the end-to-end services that can satisfy all of a customer’s IaaS, PaaS, SaaS and business processing as a service needs, which is why a multi-cloud approach makes sense. 451 Research's William Fellows will discuss while technology is not the only consideration in cloud transformation – organizational change, risk posture and the adoption of cloud’s operating model are key – the fact is that a Cloud Management Platform which includes automation and orchestration wlll be necessary to navigate this journey. We look at the key trends and technologies which will enable this in 2016.
IT Spending Trends 2016
How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cybersecurity for the upcoming year and discusses the tools and resources available to protect against them.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
Is your business prepared for a disaster? Join ESET and industry expert, StorageCraft, for a research overview presentation of modern business disasters. We'll look at the difference between back up and recovery and discuss best practice for building a recovery plan. Mike Kunz, VP of Sales with StorageCraft, will also look at specific solutions to quickly get your business up and running when disaster strikes.
Lysa Myers, Security Researcher III, ESET North America
ESET security researcher Lysa Myers discusses developments in healthcare IT system security that you may see at the HIMSS conference in Chicago next week. Find out what is being done to better protect patient data privacy and more.
Ayreh Goretsky, Distinguished Researcher, and Don Lewis, Product Marketing Manager, ESET North America
Advanced persistent threats (APT) are a growing concern to the world's companies and networks. This presentation will give an overview on how they work and examine real-world data breaches resulting from APTs. We'll also look at how multi-layered proactive detection can combat this threat and offer a product overview of how ESET's powerful endpoint solutions respond to APTs.
Category: Research overview and ESET product presentation.
Dave Howard, Instructional Designer, ESET North America
From unobtrusive advanced malware detection technologies to automated threat response and actionable mobile-friendly dashboard – manage security from any device, any time, ESET will present new solutions for securing your endpoints and new ways to manage them.
Cybersecurity legislation and related issues received unprecedented attention in President Obama’s 2015 State of the Union address, but what does this legislative agenda mean for businesses? Will your organization’s IT security strategy be impacted? Ahead of the Summit on Cybersecurity and Consumer Protection at Stanford on February 13, security expert Stephen Cobb offers answers to these questions and his perspective on cybercrime deterrence.
What were the biggest takeaways from the annual CES Conference this year? Join Security Researcher, Cameron Camp, as he examines the new technology presented at the show and offers an insider take on the associated security concerns including Internet of Things, privacy security, wearables and more.
How is the landscape changing for cyber security and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cyber security for the upcoming year and discusses the tools and resources available to protect against them.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>