Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date AV1 and streaming codecs IBC In the four years since its initial release, AV1 has become an industry buzzword. Conceived by the Alliance for Open Media as a successor to VP9, AV1 ... 6 months ago | 60 mins Breaking down the AV-Comparatives EPR Evaluation Patrick Bayle, Mgr, Systems Engineering Join our upcoming webinar to get a better understanding of this comprehensive assessment and dive into: - The evaluation criteria for this EPR report... 1 year ago | 36 mins Cisco Umbrella ranked 1st : AV TEST in Security Efficacy Jonny Noble , Technical Marketing Manager at Cisco Umbrella and Andrea Kaiser, Security Research Manager at Cisco Umbrella Lots of network security providers claim they are the best. Well, we’ve got proof! Brand new third-party research from AV-Test reveals Cisco Umbrella ... 3 years ago | 36 mins Protect Yourself from Antivirus webinar (Polish) Seweryn Jodlowski, Systems Engineer EE | CNSE, CISSP, Palo Alto Networks Traditional antivirus (AV) is not the solution to breach prevention on the endpoint – it is the problem. At best, traditional AV gives organizations a... 7 years ago | 63 mins Ep 62: Renewables Expert Peter Fusaro Says Clean Energy Has Arrived Peter Fusaro, Senior Advisor to AV Group Ltd. Fusaro shares key findings from his research: 1) renewables are now affordable with costs declining 40-90%, 2) U.S. corporate buying of renewable ene... 4 years ago | 30 mins Forrester & Arm Survey Insights: From Prototype to Production Frank E. Gillet, VP and Principal Analyst, Forrester Research, Robert Day & Neil Stroud, Arm Co-hosted Webinar with Forrester Consulting. Autonomous Vehicles: From Prototype To Production Forrester conducted 54 online surveys with global AV p... 4 years ago | 59 mins The Threat Landscape of Today and Tomorrow Tyler Moffitt, Sr Threat Research Analyst at Webroot, Inc. Today's advanced malware is increasingly difficult to remove and often even harder to detect in the first place. In this presentation, we examine the ... 7 years ago | 48 mins Attain PCI Compliance without AV Michael Moshiri Director, Advanced Endpoint Protection Many PCI-compliant organizations continue to deploy traditional AV -- not because of its superior security capabilities, but because they wrongly assu... 7 years ago | 51 mins Antivirüsün Ötesinde Uç Nokta Koruması Zekeriya Eskiocak, Rani Hmayssi, Usman Durrani Cyber Security Solutions, Palo Alto Networks Kullanıcılarınızı antivirüsü kolayca atlatan tehlikelere karşı korumanın zamanı geldi. Uç nokta güvenliği ile ilgili canlı web seminerinde bize katıl... 7 years ago | 58 mins Hack Chat Episode 1: The Journey of a Hacker and Entrepreneur with H.D. Moore Marco Figueroa, H.D. Moore H. D. Moore is a network security expert, open-source programmer, and hacker. He is a developer of the Metasploit Framework, the world’s most used pen... 2 years ago | 44 mins Load more