Most Internet users have been in contact with malicious software (malware) and most of us understand these threats should be avoided. Far less people understand what happens when a computer is attacked, more precisely, what are the objectives of the attackers and how these attacks could affect your business?
We will present various attacks that have been recently witnessed which illustrate the different motivations of malware creators and operators. We will also show how banking trojans such as Win32/Gataka can attack on alternative operating systems such as OSX/Flashback. Finally, we will cover cases of cyber espionage with the case of ACAD/Medre.
Join Pierre-Marc Bureau, Mallware Researcher at ESET as he shows what happens in an attack and how to protect your business.
RecordedJul 23 201260 mins
Your place is confirmed, we'll send you email reminders
ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
•PCI and two-factor authentication
•PUAs and scamware
•Privacy by design
•General Data Protection Regulation (GDPR)
ESET North America & Michael Aguilar, Business Product Technical Lead
Winter is coming. Our three-eyed raven answers your top 5 IT security questions based on our most recent survey including email security, ransomware, protecting IoT and more. Additionally, here's your chance to ask our in-house cybersecurity expert, Michael Aguilar, your most challenging questions to help you defend the wall. It’s an open forum just for you!
With a personal record of 34 questions in 30 minutes, Michael will torch your questions like Drogon. Sign up today and get those questions ready.
Michael Aguilar, Business Product Technical Lead, ESET North America
You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
Join an ESET business product technical lead to learn:
•How ransomware has evolved and spread
•Why mobile phones and Apple OS X are increasingly vulnerable
•Best practices for avoiding and dealing with ransomware
•Why to implement backup and recovery solutions now
ESET senior security researcher Stephen Cobb and Larry Ponemon of the Ponemon Institute discuss a new study on healthcare security addressing causes, costs and potential cures for soaring cybercrime rates.
Are you considering a Next-Gen AV solution? Before you make a decision, attend this webcast with an ESET engineer who will examine vendors’ claims and supporting technologies.
Key takeaways include:
1.Next Gen AV technologies – making sense of their claims
2.A deep dive into ESET technology
3.The difference between reactive vs. proactive technologies
4.How ESET leverages the Cloud
5.Best practices in evaluating AV technologies
How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cybersecurity for the upcoming year and discusses the tools and resources available to protect against them.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>
Software-defined Storage Service interruptions wreak havoc on business. Enterprises expend huge budgets to deliver datacenter redundancy and continuous application availability and still it is not easy. Storage is often the biggest limiting factor. The good news is that recent storage innovations combined with the flexibility of VMware vSphere simplify and lower the cost of delivering automated mobility of services between sites to ensure downtime avoidance and fault recovery.
Watch this webinar and learn:
• How to deliver real-time virtual machine migration across a geographically stretched cluster with no data loss or service interruption
• How software-defined storage streamlines delivery of vSphere Metro Storage Clusters (vMSC)
• How a multi-site storage system managed as a single logical entity benefits your virtualization deployment
Server virtualization was supposed to consolidate and simplify IT infrastructure in data centers. But, that only “sort of happened”. Companies do have fewer servers but they never hit the consolidation ratios they expected. Why? In one word, performance.
Surveys show that 61% of companies have experienced slow applications after server virtualization with 77% pointing to I/O problems as the culprit.
Now, companies are looking to take the next step to fulfill their vision of consolidating and reducing the complexity of their infrastructure. But, this will only happen if their applications get the I/O performance they need.
This is where DataCore’s Parallel I/O technology comes in. By processing I/Os in parallel leveraging multi-core, multi-processor systems, Parallel I/O delivers industry leading I/O response times as well as price/performance. The net benefit is that fewer storage nodes can provide much better performance, allowing you to reduce and simplify your infrastructure.
Do you run a mix of virtualized and diverse workloads, including block storage? Are you looking to increase density and maintain blazingly fast speeds? If so, this webinar is for you!
In this webinar, speakers from DataCore and SanDisk® will discuss the performance and economic advantages of combining software-defined-storage with all-flash storage. We’ll also share two customer stories on how they were able to:
- Achieve effortless and non-disruptive data migration from magnetic to flash storage.
- Prevent storage-related downtime
- Dynamically control the movement of data from flash to high-capacity storage
- Strike the right economic balance between fast performance and low cost
Don’t let data growth and complex workloads slow you down. Attend this webinar and learn about new possibilities.
The costs of running VMWare have risen to unmaintainable levels for companies that are looking to expand and scale operations. The ESX Tax over burdens IT budgets, hindering their ability to scale and manage OPEX. In this webcast, we will show IT managers how Microsoft Hyper- V and Storage Spaces can be a game changer for their organization, providing a cost effective, stable and easy to manage virtualization platform. LifeStore Bank will tell you how they transitioned from an infrastructure based on VMWare ESX and EMC VNXe to Microsoft Hyper-V and DataON Storage's Cluster-In-Box (CIB) storage to scale their capabilities, optimize service level agreements and lower the cost of running virtual environments by 1.5X
Howard Lo, VP of Sales, Dataon Storage
Aidan Finn – Microsoft MVP
Josh Rountree – IT Manager, LifeStore Bank
Kris Menon - Business Development Manager, HSGT
Shaun Walsh – Managing Partner, G2M Communications
NFS has been the “go to” file system for large data stores but there is a new offering on the horizon...Object Storage. To help ease the transition, many Object Storage vendors have provided a gateway that allows their systems to look like NFS servers. The problem is that most of these implementations are very limiting and often create more problems than they fix. In this webinar Storage Switzerland and Caringo will discuss why object storage systems are the heir apparent to NFS servers and how to make that transition without the typical roadblocks that NFS gateways create.
The use of broadband Internet connections in SD-WAN environment has many benefits, however for any enterprise, performance and reliability cannot be compromised. An SD-WAN solution must include all the functionality needed to meet these essential requirements that deliver outstanding performance and Quality of Service by:
•Actually improving the quality of the bandwidth you already have, instead of routing around it
•Enabling centralized control and administration of network-wide policies
•Providing detailed visibility into real-time and historical application and network trends
•Allowing for the modular deployment of WAN optimization to insure performance when you need it, where you need it
This all adds up to an enterprise-grade, performance-centric offering that allows your SD-WAN to rapidly connect users to the applications they need. Deployment times are reduced significantly and enterprises enjoy enhanced performance, visibility and control over the entire network.
Performance management of Citrix technologies has always been a challenge. Determining if user complaints of Citrix logon slowness, session disconnects, screen freezes, etc. are caused by the Citrix stack or by one of the supporting tiers has often been a time consuming and knowledge intensive process. Virtualization of Citrix applications has only added to the challenge.
Join this webinar "A Deep Dive Into Comprehensive Citrix & VDI Monitoring with eG Enterprise" to learn how eG Innovations, one of the earliest Citrix-focused monitoring software vendors, has been adapting its eG Enterprise solution to keep pace with Citrix technology evolution.
In this webinar, Bala Vaidhinathan, CTO of eG Innovations will join Trond Eirik Haavarstein (aka Eric) of xenappblog.com to discuss how eG Enterprise provides:
– Proactive monitoring of the Citrix user experience, to discover problems before users complain;
– Embedded best practices for end-to-end visibility in the Citrix XenApp & XenDesktop 7.x stack;
– End-to-end performance visibility combined with automated root-cause diagnosis that helps answer even the toughest of Citrix performance questions;
– Performance optimization and right-sizing so you can get the most of your Citrix investments;
– Integration with built-in Citrix monitoring solutions - Citrix Director, Citrix – NetScaler Insight and Citrix SCOM management packs;
– The discussion will also cover new capabilities in the latest eG Enterprise 6.1 release.
OPNFV is an open community project developing solutions for transforming to Network Functions Virtualization (NFV) and Software Defined Networking (SDN). Learn the progress the vendor and service provider communities are making to accelerate the transformation.
Ash Ashutosh with Actifio is our guest on this LIVE MeetTheCEO with Storage Switzerland’s George Crump and Charlie Hodges. The team discusses Mr. Ashutosh’s background, introduces listeners to Copy Data Management as the next stage in data protection and what makes Actifio’s solution different. We will also ask him about his goals for Actifio and get his predictions for the future of IT. NO REGISTRATION REQUIRED.