10 Ways to Tell If It's Time to Change Your Anti-Virus Software
If you are like most small businesses you have probably experienced issues with anti-malware software in the past. Do any of the issues below ring true when thinking about your current antivirus solution?
• When it performs scans it slows our systems to a crawl
• It creates too many alerts on files that aren’t malicious
• It is hard to manage across all our platforms and devices
• Our users want to turn it off because it is so annoying
If so, join Peter Streips, Network Security Group (ESET’s Gold Partner) President and ESET researchers for a panel discussion and learn why it’s time to change your antivirus solution.
RecordedJun 6 201259 mins
Your place is confirmed, we'll send you email reminders
Ben Reed, Sr. Technical Content Strategist and Sales Engineer and Robert Westervelt, Research Manager, IDC Security Products
Why have two-factor authentication (2FA) in the workplace? Even if you’ve instituted password management best practices, employees will still use their work password on other websites, write their passwords on sticky notes, or use their nicknames or birthdays without a second thought—and put your business at risk.
With new PCI-DSS regulations surrounding multi-factor authentication requirements coming up on Oct. 31, it’s time to get up to speed on this proactive technology.
In this webinar, Robert Westervelt, research manager of IDC’s Security Products group, and ESET’s solutions engineer Ben Reed will provide an in-depth overview of the following:
•Account credential theft: What can be done to prevent employees from falling into a trap?
•How 2FA/multi-factor authentication can reduce the risk of account hijacking, mitigate weak passwords and help satisfy compliance requirements.
•The types of multifactor authentication solutions available on the market and how it can contribute to creating a stronger security culture in the workplace.
ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
•PCI and two-factor authentication
•PUAs and scamware
•Privacy by design
•General Data Protection Regulation (GDPR)
ESET North America & Michael Aguilar, Business Product Technical Lead
Winter is coming. Our three-eyed raven answers your top 5 IT security questions based on our most recent survey including email security, ransomware, protecting IoT and more. Additionally, here's your chance to ask our in-house cybersecurity expert, Michael Aguilar, your most challenging questions to help you defend the wall. It’s an open forum just for you!
With a personal record of 34 questions in 30 minutes, Michael will torch your questions like Drogon. Sign up today and get those questions ready.
Michael Aguilar, Business Product Technical Lead, ESET North America
You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
Join an ESET business product technical lead to learn:
•How ransomware has evolved and spread
•Why mobile phones and Apple OS X are increasingly vulnerable
•Best practices for avoiding and dealing with ransomware
•Why to implement backup and recovery solutions now
ESET senior security researcher Stephen Cobb and Larry Ponemon of the Ponemon Institute discuss a new study on healthcare security addressing causes, costs and potential cures for soaring cybercrime rates.
Are you considering a Next-Gen AV solution? Before you make a decision, attend this webcast with an ESET engineer who will examine vendors’ claims and supporting technologies.
Key takeaways include:
1.Next Gen AV technologies – making sense of their claims
2.A deep dive into ESET technology
3.The difference between reactive vs. proactive technologies
4.How ESET leverages the Cloud
5.Best practices in evaluating AV technologies
How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cybersecurity for the upcoming year and discusses the tools and resources available to protect against them.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>
In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format. They provide insight into the path he took to become CISOs and how they are reinventing the role in the face of accelerating industry change.
Did you attend VMworld 2016? If so, then let us summarize the top trends we observed at the show and compare notes with you.
Missed the event? Don’t worry, we have you covered. Join us as we cover the top trends and highlights of the news and interesting tidbits from VMworld. It’s the next best thing to being there!
Smart Storage for the cloud IT is effortless, efficient and evergreen. In this webinar, learn how operational simplicity, data efficiency, and predictable performance through flash will enable your business to be more competitive in the market at the same cost as traditional disk infrastructure.
We will cover:
- What is possible with flash?
- What flash solutions are available today?
- How do the costs compare?
- Pure Storage architecture overview
- Demonstration of storage provisioning tasks
The term Software Defined Data Center (SDDC) is making the rounds in the IT world. But while most companies may never actually build an SDDC, it’s important that IT organizations understand what this concept means and what it says about the future of IT infrastructure. In this 30 minute webinar, Evaluator Group Sr. Analyst, Eric Slack will define the software-defined data center concept, give some examples of software-defined products and technologies and discuss what how companies of all sizes can take advantage of this trend.
Software Defined Storage (SDS) is one of the most hyped terms in the industry. It is supposed to break vendor lock-in, allowing the use hardware from any vendor. Yet most data centers buy their storage hardware and storage software from a single vendor. Why? Mostly because software defined storage is answering the questions that IT professionals aren't asking. Join Storage Switzerland Lead Analyst George Crump as he discusses the three lies of SDS:
1. Software Defined Storage breaks vendor lock-in (no it doesn't)
2. Hardware doesn't matter with Software Defined Storage (yes it does)
3. There is a TRUE Software Defined Storage solution (no, there isn't)
The only thing you can count on in technology –and life- is change. And change is good! Join this webinar with Nexenta and Western Digital to learn how your options for all-flash software-defined-storage are growing! Learn about the many game-changing technology updates delivering real cost-savings, flexibility and high-performance for customers large and small.
Thomas Cornely, Chief Product Officer at Nexenta and Steve Wilkins, Product & Solutions Marketing at Western Digital will discuss:
* The new features of NexentaStor 5.0
* NexentaFusion 1.0 for simplified storage management and analytics
* The power and cooling savings PLUS high performance with All-Flash SDS
Join NSX experts for a series of engaging videos and learn more about the use cases driving the adoption of network virtualization today. Through the use of a lightboard, we’ll illustrate the technology and business drivers around network virtualization with VMware NSX.
While there are many benefits of a SDDC approach including NSX, micro-segmentation has become the foundation for a dramatic improvement in data center security for many organizations. Join us to learn:
- Why there is no other solution in market that can achieve micro-segmentation in an operationally feasible manner
- How Service Composer, distributed firewall, and service chaining work in concert to bring considerable benefits, implementing micro-segmentation to stop lateral movement in your data center
- The ability to insert third party network and security services to respond to changing conditions in the data center
Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.
During this presentation two areas of development in OpenStack Neutron will be discussed.
The first is Quality of service, we will describe how to enable it, the back end drivers it is implemented on and the features currently available and in development.
Extension interoperability in OpenStack Neutron will also be discussed, specifically in regards to the Open vSwitch driver and the extensions use of the OpenFlow tables.
Microsoft workloads, such as Microsoft SQL and Microsoft Exchange, are two of the main business critical workloads running on Nutanix Enterprise Clouds. It is very important to size their resources correctly, otherwise, availability disruptions might occur, which affect QoS and subsequently cause business damage.
While there are already application-oriented monitoring solutions for Microsoft System Center Operations Manager (SCOM) available, such as Microsoft SQL Management Pack or Exchange Management Pack, they are solely application-oriented and do not offer sufficient insights into underlying Nutanix infrastructure layer monitoring. In this webinar, you will learn how Comtrade's Management Pack for Nutanix simplifies your work by providing answers to these questions:
- Which Microsoft SQL/Exchange platforms are running on Nutanix clusters?
- Which virtual machines are hosting Microsoft SQL/Exchange applications?
- Are the VMs, hosting Microsoft SQL/Exchange applications, properly sized regarding CPU/Memory/Storage?
- Are the MS SQLExchange applications properly replicated for high availability and disaster recovery scenarios?
- Does the latency of hosting Nutanix cluster effect Microsoft SQL/Exchange applications running on it?
- Does the hosting Nutanix cluster have sufficient resources?
- Is the application data hosted on SSD drives?
This information is vital for keeping QoS for Microsoft workloads running on Nutanix Enterprise Clouds at their optimal performance. Comtrade's Management Pack for Nutanix provides this information in SCOM which enables IT administrators to combine it with the information provided by application oriented management packs (MPs) – in short, they get the complete overview over the state of Microsoft workloads running on Nutanix Enterprise Clouds.
SD-WAN can dramatically reduce cost and increases the ability to rapidly bring new services online, connecting users to all types of applications, and speeding up time to market. But the idea of re-architecting the WAN can be daunting and the decision to adopt an SD-WAN solution can be a difficult one.
Join renowned network expert Ethan Banks, Co-Founder of Packet Pushers, and Rolf Muralt, VP Products Management SD-WAN at Silver Peak, in a webinar that discusses the SD-WAN market, lessons learned, and what features to be on the lookout for as you make your decision. They will discuss issues around technology selection and deployment, including:
· How a zero-touch, hybrid or SD-WAN can leverage multiple connectivity forms
· Ways to prioritize and route traffic across different connections
· Quality of Service (QoS), and how to maintain 100% uptime
· Best practices for transitioning with minimal impact on budget and resources
· Real customer examples that demonstrate different deployment stage and benefits