10 Ways to Tell If It's Time to Change Your Anti-Virus Software
If you are like most small businesses you have probably experienced issues with anti-malware software in the past. Do any of the issues below ring true when thinking about your current antivirus solution?
• When it performs scans it slows our systems to a crawl
• It creates too many alerts on files that aren’t malicious
• It is hard to manage across all our platforms and devices
• Our users want to turn it off because it is so annoying
If so, join Peter Streips, Network Security Group (ESET’s Gold Partner) President and ESET researchers for a panel discussion and learn why it’s time to change your antivirus solution.
RecordedJun 6 201259 mins
Your place is confirmed, we'll send you email reminders
ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
•PCI and two-factor authentication
•PUAs and scamware
•Privacy by design
•General Data Protection Regulation (GDPR)
ESET North America & Michael Aguilar, Business Product Technical Lead
Winter is coming. Our three-eyed raven answers your top 5 IT security questions based on our most recent survey including email security, ransomware, protecting IoT and more. Additionally, here's your chance to ask our in-house cybersecurity expert, Michael Aguilar, your most challenging questions to help you defend the wall. It’s an open forum just for you!
With a personal record of 34 questions in 30 minutes, Michael will torch your questions like Drogon. Sign up today and get those questions ready.
Michael Aguilar, Business Product Technical Lead, ESET North America
You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
Join an ESET business product technical lead to learn:
•How ransomware has evolved and spread
•Why mobile phones and Apple OS X are increasingly vulnerable
•Best practices for avoiding and dealing with ransomware
•Why to implement backup and recovery solutions now
ESET senior security researcher Stephen Cobb and Larry Ponemon of the Ponemon Institute discuss a new study on healthcare security addressing causes, costs and potential cures for soaring cybercrime rates.
Are you considering a Next-Gen AV solution? Before you make a decision, attend this webcast with an ESET engineer who will examine vendors’ claims and supporting technologies.
Key takeaways include:
1.Next Gen AV technologies – making sense of their claims
2.A deep dive into ESET technology
3.The difference between reactive vs. proactive technologies
4.How ESET leverages the Cloud
5.Best practices in evaluating AV technologies
How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cybersecurity for the upcoming year and discusses the tools and resources available to protect against them.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>
The Internet of Things (IoT) is empowering businesses with unprecedented ways to serve customers, rapidly solve problems, and optimize operations. Using IoT, savvy companies are transforming their products to enable the delivery of connected services that deliver new customer experiences and unlock new sources of revenue.
From enabling leaders in agribusiness to increase crop yields, to amplifying connected car innovation, Cisco Jasper Control Center cloud platform powers more than 5,000 companies in dozens of industries. Leveraging learnings from a decade of IoT experience, we’ll look at how real-world businesses are using IoT innovation to capture their share of this multi-billion-dollar opportunity.
- How IoT helps you drive successful business outcomes
- Best practices for accelerating your IoT service business
- Lessons from leaders that can help you work smarter and scale faster
I will summarize the stages of analytics maturity that lead an organization from traditional reporting (descriptive analytics: hindsight), through predictive analytics (foresight), and into prescriptive analytics (insight). The benefits of big data (especially high-variety data) will be demonstrated with simple examples that can be applied to significant use cases.
The goal of data science in this case is to discover predictive power and prescriptive power from your data collections, in order to achieve optimal decisions and outcomes.
A few years ago, kik might have seemed like just another messaging app. Today it boasts 275 million users and its very own Bot Shop a platform for companies like Sephora and Weather.com to display their bot prowess. More and more smart companies are sitting up and paying attention, as Yahoo, Facebook, and others get into the messaging bot game.
Today most bots center around the conversational interface offered by Facebook Messenger and the likes of kik, but who knows what tomorrow might mean?
Join our VB Live event as our panel of experts talks about what smart companies know about bots. From messaging to shopping, bots are increasingly part of the business landscape.
In this webinar, you’ll learn to:
* Understand the importance of bots to brands
* Know bot landscape and what it means for your business
* Recognize the potential synergies and pitfalls between bots and brands
* Paul Gray, Director of Platform Services, Kik
* Jon Cifuentest, Analyst, VentureBeat
* Rachael Brownell, Moderator, VentureBeat
Register for this free executive leadership live event today!
Today's supply chains are faced with an increasing number of distribution channels, a broader set of suppliers and ever decreasing product cycles. A new approach is required that delivers a step change in agility. MuleSoft's API-led approach delivers up to 200% faster development cycles through leveraging re-usable assets. Join us for a walkthrough of this approach, including a demo of Anypoint Platform and Anypoint B2B.
Hardware or software applicance-based load balancers do not scale horizontally. They often cause configuration delays, overspending, and overprovisioning. Avi Networks leverages the power of central management and insights derived from distributed load balancing resources to provide predictive autoscaling of load balancers as well as application components. Enterprises can eliminate upfront capital costs and adopt an elastic subscription-based model for load balancing. The Avi Vantage platform alleviates operational complexities inherent in buying hardware and managing multiple appliances.
In this webinar learn new best practices for autoscaling load balancers and applications. Learn the flexibility and cost savings achieved through:
• Software-defined L4-L7 services and central management
• Use of commodity x86 servers for load balancing
• Elastic scaling based on real-time traffic that eliminates overprovisioning
• Avoiding CapEx and significantly reduced OpEx
Current estimates show that there are about 180 billion app downloads per year, which is projected to rise to over 360 billion by 2020. There is no question that the demand for mobile content won't drop off any time soon. Yet, netting high quality mobile users is the fly in the ointment of many app developers and marketers.
Despite the rapid growth of the mobile market, finding the right user (not just any user) can stump even the experts. And user acquisition is expensive--doing it right can be even more so.
Join VentureBeat's panel of experts as we attempt to demystify successful mobile user acquisition. In this webinar you'll learn to:
* Acquire high quality not just large quantities of users
* Understand the power of analytics as a mobile acquisition strategy
* Identify how to uncover the secrets of effective acquisition
* Learn how to build loyalty amongst users
* James Peng, Head of Mobile Acquisition, Match Group
* Christian Calderon, Chief Revenue Officer, Ketchapp Games
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Rachael Brownell, Moderator, VentureBeat
The new competitive battleground for business is customer experience. Your success hinges on ensuring every customer interaction is the best it can be, but for businesses undergoing digital transformations, that means developing comprehensive monitoring across a growing number of channels while gaining valuable insights into all aspects of the customer experience. To successfully deliver a five star experience you need insights that will allow you to optimize the complete buyer’s journey across web, mobile, and wearables and provide flawless operational performance.
Join us for an exclusive webinar with Donnie Berkholz, Research Director from 451 Research to learn about the latest market trends, the importance of becoming a data-driven business and the need for analytics.
If you work as an IT Service and Support professional in higher ed, you are all too familiar with the challenges of the profession. Students, staff and faculty that need help…right away! Staffing and knowledge management challenges that accompany a student support model! Classrooms, dormitories, technology hubs, and administrative offices spread over a wide geographic area! And a huge variety of devices and equipment that require on-demand support! The simple fact is this…You have the most demanding job in the service and support industry…period!
To learn best practices in Service and Support for Higher Ed, register NOW for this first of its kind MetricNet webcast!
With the rising implementations of Agile and DevOps methodologies, many organizations that have more business experts than technical experts are finding it difficult to keep up with the pace of development. These teams need a way to fully engage the business experts in the test automation process without sacrificing speed, quality and scale.
Join Roee Weisbert, Senior Functional Architect, and learn how HPE Business Process Testing is the bridge that provides the ultimate scriptless framework for technical and non-technical users. See how the latest updates to BPT & UFT allow testers to automate in an intuitive and easy to use platform, optimizing efficiency, time, and quality of your applications.