What is a vulnerability worth? If you are an attacker looking to launch an attack on an unsuspecting organization, your answer will be very different than the IT administrator running the organization. HP DVLabs runs the Zero Day Initiative, the industry’s leading organization for purchasing and disclosing vulnerabilities. In this unique position the DVLabs team must be keenly aware of both the black market for selling vulnerabilities and exploit information, as well as the potential costs to the enterprise affected by such vulnerabilities. Join Derek Brown, security research with HP DVLabs and liaison for the Zero Day Initiative for session on vulnerability disclosure and why it is so important to the security industry.
RecordedMar 14 201243 mins
Your place is confirmed, we'll send you email reminders
TJ Alldridge and Satinder Khasriya, Product Marketing, Trend Micro TippingPoint
The Trend Micro TippingPoint Threat Protection System (TPS) family offers comprehensive threat protection against known and zero-day attacks. Attend this webinar to see the many ways the TPS can be used to protect your environment against the latest threats as well as the old ones too.
TJ Alldridge, Product Marketing Manager, HP TippingPoint
Advanced threats and targeted attacks are wreaking havoc in our networks and desktop machines. High-profile attacks seem to make headlines every few weeks. While no security solution is 100% effective, join us to discuss best practices that could bring your security effectiveness closer to that goal.
To protect their networks and critical data from being compromised, enterprises must be able to acquire and assess new information constantly, and take action to identify vulnerabilities, remediate and minimize the likelihood of attackers permeating through their network. HP TippingPoint Threat Protection System delivers comprehensive network security integrating vulnerability management to provide actionable threat intelligence with unparalleled visibility and analytics.
Robin Layland, Layland Consulting, Steve Povolny, TippingPoint DVLabs, Brian Foster, Damballa
Industry Analyst Robin Layland is joined by Steve Povolny of HP and Brian Foster of Damballa to focus on what you need to do to stop attacks that have made it past your perimeter defenses. We also cover mitigation needs based on your risk profile. We then review how you can spot breaches and how to easily keep your security up to date. Finally we cover what to look for in an advanced threat protection vendor.
Hussain Abduljalil, Manager Solution Architecture at Gulf Air
Since 2006, Gulf Air has used HP TippingPoint Intrusion Prevention System (IPS) to protect their network from external threats. With the passage of time the internal attack vectors were also identified as being a high-risk area. In this webinar, Hussain Abduljalil of Gulf Air explains how Gulf Air evolved their network security from an external IPS setup to a unified IPS solution providing the required levels of protection and throughput needed. And why they did it with HP TippingPoint.
Watch the webinar to learn:
• The evolution of IPS setup in Gulf Air
• How advanced malware threats (like the Conficker worm) were identified as a risk
• Why Gulf Air choose HP TippingPoint for network security
• The way forward
While anonymizers can serve a positive purpose by protecting a user’s personal information by hiding their computer’s identifying information, their use in your network environment can be dangerous. Anonymizers can evade enterprise security devices, and their misuse can make your organization susceptible to malware and unwanted intrusions. Attend this session to learn how you can detect and block elusive anonymizers from wreaking havoc on your network.
Bob Corson, Director, Solutions Marketing, TrendMicro & Patrick Hill, Sr Product Line Manager, DVLabs
Victims of targeted attacks, or advanced persistent threats (APTs), make the headlines. Attend this webinar to learn how APTs work and how to defend your business from them. Pat Hill, HP TippingPoint Product Manager, and Bob Corson, Director, Solutions Marketing, discuss the anatomy of an attack and why it's critical to detect and isolate the attack at "patient zero," the initial point of infection.
Attend this webinar to learn:
· How the bad guys evade your security
· The counter measures you need to detect and block them
· How HP TippingPoint and Trend Micro have partnered to neutralize patient zero
Bob Corson, Director, Solutions Marketing, Trend Micro & Patrick Hill, Senior Product Line Manager for HP Enterprise Security
Target, Sony, Anthem - the biggest recent breaches have taught us all big lessons. Namely, that traditional security solutions are ineffective against advanced threats. And today's targeted attacks not only can rob your organization of sensitive data, customers, reputation - they can cost senior leaders their jobs.
Register for this session to learn the 6 Keys to Success in Fighting Advanced Threats. Hear first-hand from security leaders at HP and Trend Micro how to:
- Monitor all attack phases;
- Mind security gaps;
- Defeat anti-evasion features & more.
A next-generation intrusion prevention system (IPS) shouldn't just keep your company safe, it should be quick to implement and easy to manage. HP TippingPoint is the simple, effective, and reliable solution for network security that protects you faster—when every second matters.
This video explains how TippingPoint stops threats faster. Watch it to learn:
•How HP TippingPoint provides 80% threat coverage out of the box
•How most companies install TippingPoint in less than two hours
•How TippingPoint filters key on vulnerabilities rather than exploits to keep you safer and reduce false positives
John Kindervag, Vice President and Principal Analyst, Forrester Research
Hackers don't have change management, so they can change and deploy threats faster than companies can respond to them. That's the message of Forrester Principal Analyst John Kindervag in this short but important video. He explores the impact of a changing threat environment and new zero-day threats on cyber defenses.
View it to learn:
•Why it's important for security professionals to change their mindset when dealing with the changed threat landscape
•Why conventional defenses based on exploit signatures no longer work
•Why context-aware defenses that correlate incoming attacks to outgoing data exfiltration are required for enhanced security
2014 has been an explosive year riddled with nasty security threats. Some of these you may have heard about like Heartbleed and Shellshock, but others like Sandworm, may have gone unnoticed or worse unprotected on your network. This webcast will offer an explanation of the top vulnerabilities, how they could have infected your network and security precautions to protect your organization. Don’t miss it.
As enterprise network design changes and evolves to incorporate mobile devices, BYOD and cloud solutions, the traditional network perimeter is breaking down. All this, while attacks are getting ever more sophisticated. This session will discuss the challenges facing the modern enterprise network, and show how HP TippingPoint network security products offer solutions that can help.
Joanna Burkey, HP TippingPoint DVLabs Manager & Russell Meyers, Global Product Line Manager, HP TippingPoint
With malware and botnets wreaking havoc worldwide, stopping network infiltration and protecting confidential data is proving increasingly difficult. This session introduces you to a triple-threat triple ally against attackers: HP TippingPoint with ThreatDV. Join us and learn how HP TippingPoint and the power combo of ThreatDV, weekly Digital Vaccine package, and reputation feed help networks stay ahead of attacks by blocking infiltration, phone-home, command-and-control, and data exfiltration.
Russell Meyers, Global Product Line Manager, HP TippingPoint
Security defenses are only effective when you can easily deploy and manage them. HP TippingPoint Next-Generation Intrusion Prevention System and Next-Generation Firewall make it easy. And the TippingPoint Security Management System provides a dashboard to show you the state of your defenses and instantly see attacks that are blocked.
Every second matters. Watch this interactive demo to learn how:
· Easy it is to automatically download the latest Digital Vaccine packages to stay up-to-date with the latest security intelligence
· Simple it is to share security configurations and policies across devices
· The at-a-glance dashboard effortlessly shows your protection status
· To automatically create protection, status and network behavior reports
Joanna Burkey, HP TippingPoint DVLabs Manager & Russell Meyers, Global Product Line Manager, HP TippingPoint
Threats to the network continually evolve, which makes isolating the victimized “patient zero” machine nearly impossible. Today’s advanced threats require an advanced approach to security. This session explores how HP TippingPoint stops these attacks in their tracks by neutralizing patient zero through behavior, static, and dynamic detection. Join us to learn how this layered security approach is the most effective way to minimize the threat of network infiltration and, when it does occur, protect your infrastructure from further damage.
Russ Meyers, Global Product Line Manager for the HP TippingPoint Enterprise Security Management System
Incident response weighs heavily on the minds of security practitioners today. Prompted by the recent data breaches and attacks plaguing enterprises large and small, a new SANS survey project asked IT professionals to explain what steps they take immediately following a breach and to share how successful those steps really are.
Tune into Part 1 of the Incident Response Techniques webcast to hear highlights from the survey results and discussion concerning where we are as an industry in a typical six-step incident response process.
Delivering Advanced Network Defense to the Enterprise
This channel covers the latest topics in network security, virtualization security, and threat research from TippingPoint, DVLabs, and the Zero Day Initiative to help security professionals protect their network against ever-evolving threats.
Hear how wellness corporation Curves Jenny Craig extended an enterprise-wide service delivery strategy beyond the four walls of IT - reducing costs by over $1M annually and improving customer satisfaction. Following up on her successes in leveraging the Cherwell Service Management dashboard capabilities to improve service experience and demonstrating service center value to senior management, Jamie Houlihan will share her recent achievements and insights gained by expanding Cherwell Service Management beyond the IT department to facilities, supply chain, self-service, and human resources.You will learn how Cherwell Service Management enabled Curves Jenny Craig to streamline and organize departmental operations and ultimately increasing the overall efficiency of their organization's many business processes.
Immer größer wird die Anzahl der Unternehmen die ihre IT-Services teilweise oder ganz an Clouddienstleister abgeben. Dies führt zu einem erhöhten Aufwand und einigen Komplikationen wenn es zu Sicherheitsvorfällen kommt.
In diesem Webinar präsentiert Mathias Fuchs Strategien wie Unternehmen trotzdem effizient Sicherheitsvorfälle untersuchen und eindämmen können. Anhand einer Fallstudie wir gezeigt wie sich cloudbasierte Untersuchungen von herkömmlichen unterscheiden.
Recently the president of the American Medical Association referred to healthcare IT as the “snake oil” of the 21st century. He referenced ineffective electronic health records, an explosion of direct-to-consumer digital health products, and apps of mixed quality.
In this webinar, leading healthcare expert, Marion Jenkins, will cover the major causes of this sorry state of affairs, and discuss how healthcare technologies can actually help medical practices deliver better patient care.
Major areas to be covered:
1.Who is to blame? There is plenty to go around. Physicians? Healthcare IT vendors? The government? The solution must get past blame and address solutions.
2.How can clinical users and executives “break through” the logjam of sub-optimal IT systems, poor implementation, and ineffective workflows?
3.Is it possible to utilize new technologies to improve patient care, without breaking the bank and further hurting the clinician/patient experience?
4.What are the necessary changes that enable technology to actually provide benefit in a healthcare setting?
Load balancers occupy an important position (in the path of application traffic) on the enterprise network. Yet, traditional application delivery controllers (ADCs) are unable to provide meaningful application insights to drive business decisions. Avi Networks’ software-defined architecture for load balancing separates the control plane (management layer) from the data plane (load balancers) to generate continuous insights about applications.
In this 30 minute presentation from Avi Networks, learn how you can get rich analytics and actionable insights into end user experience, application performance, resource utilization, security, and anomalous behavior. See how you can benefit from:
• A “Network DVR” to record and replay traffic events to pinpoint app issues
• At-a-glance view of all virtual services throughout the system
• Real-time visibility into DDoS attacks, SSL versions and ciphers used in transactions
• Health scores that give you immediate feedback on application performance
For many businesses, the ability to be agile, offer great customer experiences and create innovations hits a roadblock with EDI. The famously complex messaging standard can hinder effective B2B communication.
But one integrated transportation and logistics company, Redwood Logistics, based in Chicago, partnered with MuleSoft to not only innovate on top of EDI, but harness digital transformation to create an entirely new platform service offering
In this webinar attendees will learn about:
– The business and technical landscape that led Redwood Logistics to pivot to a new service offering and create a better business intelligence platform
– How they overcame the challenges presented by B2B/EDI
– Best practices to apply API-led connectivity to B2B communication
– The positive business outcomes from Redwood’s digital transformation initiatives
IT organizations are being asked to cut costs while increasing productivity and identifying new ways to generate revenue. The first step in delivering value to an organization is empowering IT with the gift of sight. Sure, you can measure just about anything, but should you? More metrics does not equal better metrics. Not tracking trends over time, not setting goals, and not sharing metrics reports are common mistakes. The right metrics, tracked consistently, allow you identify areas for improvement and act on them. Join us as we discuss how an effective IT service management solution, coupled with the right metrics on your radar, can bring a new level of efficiency to IT.
Metrics we’ll focus on: Cost Per Ticket, Customer Satisfaction, Agent Utilization, First Touch Resolution, and Mean Time to Resolve.
To be a high performing business, you require effective metrics and measurements that will help you gain valuable performance insights which will help drive informed and strategic decisions for your organization. Join Andy Jordan, ProjectManagement.com as he discusses what people are doing wrong when it comes to Agile metrics and provide guidance on how to get it right – the first time. Andy will also discuss the risks of using common metrics between Agile and waterfall approaches as well as why organizations need to focus on value-based metrics rather than arbitrary metrics of progress.
This session is approved for 1 Project Management Institute (PMI) PMP PDU Credit.
Insurance companies today are soon to witness their own version of Uberization. In this webcast you will learn...
•The kind of experiences that can stir instant customer love and loyalty
•With customer data everywhere, how can you wisely give your customers the power of decision making?
•Best CX practices to prevent customer break ups
To get an overview on how you can uber-revolutionize your CX, join Finny, Head, Aspire Systems Digital on this webcast.
Chat is an excellent channel to improve service desk productivity, but when dealing with complex issues, it’s sometimes not enough. If your chat solution is implemented in a standalone silo, then customers may have to transfer to phone support when their issues go beyond the point of text, resulting in a disjointed customer experience. But if the chat transitions directly into a screen-sharing session, the support agent can instantly see and resolve the issue while maintaining a seamless conversation. This session will outline how to increase the value and power of chat through integrating it with other solutions such as remote support, knowledge bases, CRM and more. Turn your service desk into a one-stop-shop with a modern, integrated approach to support.
In our first Helion Cloud Suite web event, we introduced you to the new software suite from HPE that brings together a full range of hybrid cloud capabilities, enabling you to deliver and manage the full spectrum of applications and technologies -- from traditional, virtualized, cloud native and containers -- across a broad range of infrastructure environments.
Join this web event for a deeper dive, and be the first to see this new suite in action:
Manage hybrid and multi-cloud environments
Develop, deploy, and scale cloud-native applications
Drive business performance with focused analytics
More than just a hybrid cloud management platform, the HPE Helion Cloud Suite can help you manage any cloud, any environment, and any technology for any application. Go beyond cloud management, and learn what it means to become a cloud master.
View Part 1 of this 2 part series at: http://www.vivit-worldwide.org/members/group_content_view.asp?group=103644&id=600517