Learn how ESET’s next generation of endpoint security products make protecting and controlling your business systems easier and more cost-effective. Built using the award-winning ESET NOD32® technology. ESET Endpoint Antivirus and ESET Endpoint Security aren’t just updates to existing products, but entirely new ways of approaching your endpoint security.
- Web control
- Data access control
- Remote management and reporting
While it is clear that data on mobile devices should be managed, many organizations struggle to choose between device management and containerization. In this session, an AirWatch expert will discuss the differences between native and proprietary containerization, how each approach addresses different use cases, and how AirWatch can help you meet security requirements with each approach.
Until now, delivering high performance graphics workstations remotely was cost prohibitive and complicated to setup and deliver. With VMware Horizon 6 and NVIDIA GRID vGPU, there has never been a better time to deliver high performance 3D desktops in a cost effective manner that is simple to setup and deploy. Bring your customers the security, performance, reliability, and colloboration needed to transform their business.
Mobility is at the core of business innovation, giving organizations the power to increase the effectiveness of employees, connect with customers in ways previously impossible and transform business processes and operations in ways that challenge industry standards. Join this session to learn how AirWatch is a platform to support your mobile initiatives for iOS and Mac devices, including the latest capabilities in iOS 9 and El Capitan.
Discover AirWatch, the leader in enterprise mobility management. The AirWatch platform enables organizations to transform business processes, drive new revenue streams and create new ways to connect with customers. Join this session to learn how we empower IT with a future-proof mobility platform that provides enterprise-grade security from device to the data center, flexibility to manage multiple use cases, unified management of all endpoints, and seamlessly integrates with existing enterprise systems.
Hear from our PCoIP expert, Paul Barrett as he shares best practices and tips on migrating your PCoIP Zero Client deployment from your existing PCoIP Management Console 1.10 to the new Enterprise Edition 2.0. He’ll provide a step-by-step instructions to make your migration a success. During this live webinar, you’ll learn how to:
•Set up PCoIP Management Console Enterprise Edition in parallel with PCoIP Management Console 1.10
•Recreate groups and auto configure your Tera2 PCoIP Zero Clients
•Export profiles, and import them using the utility function
•Mass upgrade your Tera2 PCoIP Zero Clients to firmware 5.0
•Discover and configure your devices
Q&A will follow at the end of the session.
Follow us on Twitter: #ManageMyZeros
Every operator knows that, to provide the service levels today’s customers expect, they need to improve reliability and availability while reducing Total Cost of Ownership (TCO).
The only question is: How?
Could a power infrastructure and system architecture that maximizes asset utilization, optimizes energy efficiency and simultaneously achieves best-in-class reliability, be the answer?
Join Paul Smith of GE Energy Management as he explores the pros and cons of different power architectures, considers some alternative energy sources and reveals how to:
• Improve both server up-time AND customer service
• Recapture valuable floor space and reduce capital replacement costs
• Slash OPEX and save $millions in TCO with as little as 1% gain in power efficiency.
Red Hat Enterprise Linux 7.2 is on its way to the market. It includes a number of new features and enhancements – while continuing to provide the stability, reliability, and security required to meet the demands of both modern data centers and next-generation IT environments. A focus on security, system administration and manageability, as well as a continued emphasis on the functionality to build and deploy Linux containers, helps Red Hat Enterprise Linux 7.2 to provide enterprises with a trusted path forward.
George Drapeau will walk through the main points in the RHEL 7.2 release, the Intel features that can be found in the release and touch on linkages to other Red Hat products in its infrastructure software portfolio, including the OpenShift Platform-as-a-Service (PaaS) and Red Hat Enterprise Linux OpenStack Platform (RHEL-OSP) products.
The DCD team looks at the most interesting data centers announced last week
- Nuclear energy for data centers
- HostDime's seven story data center in Orlando
- Google buys solar panel from Duke Energy
- HPE announces it will resell Microsogt's Azure cloud.
We're seeing a massive shift in cyber security activity from internal threats to organised gangs and targeted state sponsored activities. Recent news items suggest there is an overwhelming need for organisations to understand their "Situational Awareness".
In this webinar, (ISC)² and IBM will explore what to expect in 2016, focusing on the following key questions:
- How do organisations understand what threats are real?
- How much risk appetite do boards have in this complex, mobile, interconnected near real-time world?
- As more and more devices are connecting to an ever-increasing number of communication channels, how do you ensure you can protect, prevent and respond to cyber security issues, yet provide a transparent easy to use multi-channel experience?
Adrian Davis, Managing Director (ISC)² EMEA
Peter Jopling, Executive Security Advisor, Deputy WW Tiger Team Leader, IBM
Simon Moores, Information Security Futurist
Onze pre-sales consultants laten door middel van een demo zien hoe je ervoor kunt zorgen dat alleen die delen van een profiel worden opgestart die een gebruiker op dat moment nodig heeft, zodat inlogtijden flink worden ingekort. Ook laten ze zien waarom het beter is om persoonlijke instellingen op applicatieniveau te streamen en beheren. De grootte van het gebruikersprofiel wordt hierdoor namelijk kleiner en profielgegevens kunnen onafhankelijk worden beheerd waardoor applicaties eenvoudig kunnen worden geupgrade zonder dat de gebruiker daar iets van merkt.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
Is your business prepared for a disaster? Join ESET and industry expert, StorageCraft, for a research overview presentation of modern business disasters. We'll look at the difference between back up and recovery and discuss best practice for building a recovery plan. Mike Kunz, VP of Sales with StorageCraft, will also look at specific solutions to quickly get your business up and running when disaster strikes.
Lysa Myers, Security Researcher III, ESET North America
ESET security researcher Lysa Myers discusses developments in healthcare IT system security that you may see at the HIMSS conference in Chicago next week. Find out what is being done to better protect patient data privacy and more.
Ayreh Goretsky, Distinguished Researcher, and Don Lewis, Product Marketing Manager, ESET North America
Advanced persistent threats (APT) are a growing concern to the world's companies and networks. This presentation will give an overview on how they work and examine real-world data breaches resulting from APTs. We'll also look at how multi-layered proactive detection can combat this threat and offer a product overview of how ESET's powerful endpoint solutions respond to APTs.
Category: Research overview and ESET product presentation.
Dave Howard, Instructional Designer, ESET North America
From unobtrusive advanced malware detection technologies to automated threat response and actionable mobile-friendly dashboard – manage security from any device, any time, ESET will present new solutions for securing your endpoints and new ways to manage them.
Cybersecurity legislation and related issues received unprecedented attention in President Obama’s 2015 State of the Union address, but what does this legislative agenda mean for businesses? Will your organization’s IT security strategy be impacted? Ahead of the Summit on Cybersecurity and Consumer Protection at Stanford on February 13, security expert Stephen Cobb offers answers to these questions and his perspective on cybercrime deterrence.
What were the biggest takeaways from the annual CES Conference this year? Join Security Researcher, Cameron Camp, as he examines the new technology presented at the show and offers an insider take on the associated security concerns including Internet of Things, privacy security, wearables and more.
How is the landscape changing for cyber security and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cyber security for the upcoming year and discusses the tools and resources available to protect against them.
The potential benefits of mobile medical technology and telemedicine are enormous, from to better quality of life to saving lives, not to mention controlling healthcare costs. Yet keeping data safe when it is beyond the confines of hospitals and clinics is a serious challenge, one that cannot be met merely through regulatory compliance, as ESET Security Researcher Stephen Cobb explains.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>