Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How Custom Lockdown Profiles help protect your endpoints Adam Sloan, Principal Sales Engineer, APAC, BlackBerry BlackBerry Technical Marketing Director, Adam Sloan discusses an important update to CylanceOPTICS® from BlackBerry which allows Administrators to hav... 2 months ago | 5 mins How to Effectively Monitor and Manage IT Assets in Real-Time Dixitha - SecPod Product Marketing Lead "You cannot protect what you cannot see." Getting complete visibility over the IT assets in your network is crucial for both managing and securing end... 2 years ago | 34 mins Setup for Success with Qualys Express Part 2: Continuous Monitoring Calvin Lam, Technical Account Manager, Qualys In this webcast, we will cover a few steps you could take to identify and filter on key events and/or vulnerabilities and quickly alert the proper sta... 8 years ago | 21 mins Will Windows 10’s Controlled Folder Access Protect Your Data from Ransomware? Nyotron’s Vera Drobov, Security Researcher, & Rene Kolga, Sr. Director, Product Management With the release of Windows 10 Fall Creators Update, Microsoft added a new feature called Controlled Folder Access (CFA) to Windows Defender Exploit G... 5 years ago | 29 mins Steganography + Malware - a Match Made in Hacker Heaven Ira Winkler, Security Evangelist Steganography has been used for centuries to hide a secret message in an otherwise harmless container. Its latest iteration is a malware delivery vehi... 3 years ago | 46 mins What Can You Do When You Can’t Stop Malware? Teresa Wingfield, Director of Product Marketing and Robert Zamani, Director, Solution Architects Malware detection and prevention solutions are necessary in any organization. But, antivirus and even next-generation antivirus solutions can miss unk... 5 years ago | 31 mins NGAV or EDR. What Should We Trust? Nir Shafrir, VP of Global Field Engineering and Customer Success Are you still using “traditional” antivirus to protect your endpoints? Are you losing sleep over what to do next, and how to better protect your organ... 3 years ago | 43 mins Review of Cyberattacks Leveraging the COVID-19 Pandemic Ira Winkler, Security Evangelist Never let a crisis go to waste. That’s the attitude of most attackers being played out in cyberspace in the past few months. In this webinar we are go... 3 years ago | 60 mins Endpoint Detection and Response - Past, Present and Future Michael Osterman, Osterman Research & Rene Kolga, Sr. Director of Product Overview: Endpoint Detection and Response (EDR) has been rising in popularity after the realization of major gaps in the anti-malware technologies. Bu... 4 years ago | 48 mins Cabells Whitelist & Blacklist Demonstration; New Web Interface and Features Lucas Toutloff Cabells introduces two new important features: the Journal Blacklist, the only blacklist of deceptive and predatory academic journals, and Altmetric R... 6 years ago | 48 mins Load more