In this short video, hear Rufus Connell, Vice President at Frost & Sullivan, discuss highlights from the case study Frost & Sullivan conducted with BrightTALK client, ESET.Read more >
You want to create videos for your customers, but it never seems like there's enough time to get started. Many people and organizations have faced the same demands, including the need to help customers succeed. The truth is, it's not your fault that you don't already have a video library full of content—the implementation is simply broken. What you need is a better way to get started.
Join Scott Abel, The Content Wrangler, and his special guest, Martin Ceisel, Technical Writer for ESET North America, for this free, one-hour webinar. In this webinar, Martin will share the lessons those in the ESET Knowledgebase have learned while implementing video over the last five years. Martin will share some tips on how you can get your stream of video content up and running in less time than you think, including how his company's initial plan to tackle the top issues with video has them on pace to surpass one million views by the end of 2016. Attendees will learn about some top video best practices; tips and techniques for enhancing “traditional documentation” with video; the case for doing (more) video; and how video can start a conversation with your customers.
Today's companies face a confusing array of choices when it comes to IT services, from public to private clouds and different types of virtual environments. ESET Security Researcher Cameron Camp explains your options and the security pros and cons of each.Read more >
As 2014 passes the half-way mark, ESET Distinguished Researcher, Aryeh Goretsky, reviews the new threats that have emerged this year, as well as the perennial favorities that continue to cause security incidents and data breaches.Read more >
How can IT security adapt to fight constantly mutating cyber threats?
As the adversarial relationship between information security professionals and malicious cyberactors intensifies, the security gap between new attack methods and traditional controls will grow in favor of the attackers.
Cyberattacks have become multidimensional in their complexity and sophistication.
Join Forrester Analyst, Chenxi Wang, Ph.D. to:
- Look at the new threats that corporate IT will face in 2012
- Discuss the role of IT in the face of such threats
- Review effective investment and risk management strategies to get ahead of the cyberattacks
- Explore strategies to invest in preventative technologies, not just on reactive controls
More specifically, we will dive into strategies to build a solid layered defense, not just patch-work products. For example, going from firewalls and IDS to log management, building DLP capabilities in your network, and investing in strong host-based controls would help you raise the bar significantly and give you advanced capabilities to identify malicious behaviors before they wreak havoc.
Panel Discussion Points with Forrester and ESET's Research team:
- What sort of new threats (or increase of existing threats) can be expected in 2012?
- What role does the commoditization of IT have, if any, in those threats?
- What role does the social media have, if any, in those threats?
- What can IT departments do to reduce their threat surface profile?
Followed by Q&A session
How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cybersecurity for the upcoming year and discusses the tools and resources available to protect against them.Read more >
What security risks do mobile devices introduce into your organization, and how can you protect against them now that so many employees are using their own devices for work? ESET Distinguished Researcher, Aryeh Goretsky explains.Read more >
Join Distinguished Researcher, Aryeh Goretsky, as we explore what's new in Windows 10 and how to make sure your company is ready to migrate.Read more >
SMB Cybersecurity Challenge - Webcast Series Part 2
Join Stephen Cobb, Security Evangelist at ESET to discover how:
- Vulnerable SMBs like yours really are
- You can establish a cybersecurity policy for your organization
- You can to defend your company – and its employees, partners and customers – against online attacks.
Many small and medium-size businesses (SMB) operate under the mistaken impression that their size, or the minimal security steps that they have already taken, will protect them from cyberattacks. According to the U.S. Chamber of Commerce’s publication, Commonsense Guide to Cyber Security for Small Businesses, “This assumption is both inaccurate and dangerous. Attacks on information systems operated by small and midsize companies are growing rapidly and are having a severe impact on business operations… Neither the size of your company nor the type of your business guarantees protection from an attack. If you use the Internet, you are vulnerable.”
Speakers: Stephen Cobb, Security Evangelist, ESET
Moderator: Steve Kovsky, Technology Journalist and Director of Community Outreach , Securing Our eCity
ESET security researcher Lysa Myers reports on developments in healthcare IT system security that she observed attending the recent HIMSS conference in Orlando. Find out what is being done to better protect patient data privacy.Read more >
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.Read more >
As part of the Threat Management Summit ESET along with Frost & Sullivan will discuss Real-time Threat Detection.
Frost & Sullivan: Making the Case for Endpoint Security
The headline grabbing attacks against firms like RSA, Epsilon, Lockheed Martin, and others have brought a great deal of attention to data protection and tools to protect the data itself. As many organizations look at moving data and services to the cloud, organizations are focusing their energies on securing cloud based services. Unfortunately, focus on the endpoint seems to be waning, leaving a large hole in many organization's defense.
Rob Ayoub, CISSP and Research Director for Frost & Sullivan's Information Security Practice will discuss why protecting the endpoint is still critical in today's changing threat landscape. The endpoint is still the last connection to the end user and without adequate protections against the latest threats, corporate data is still at risk, even with safeguards in place.
ESET: The Best Defense is a Good Offense
With the pace of emerging threats, it’s not good enough to know about the last attack to hit your company, you have to be prepared for the next, with always-on, self-learning, adaptive technology leading your security stance.
45% of data breaches reported in 2013 were from the medical and healthcare sector. ESET researcher Lysa Myers looks at information security in the healthcare industry and how we can do better when it comes to protecting the privacy of patient data.Read more >
Join Stephen Cobb, Security Evangelist at ESET to discover how:
- Vunerable SMB's like yours really are
- You can establish a cyber security policy for your organization
- You can defend your company-and it's employees partners and customers against online attacks
Many small and medium-size businesses (SMB) operate under the mistaken impression that their size, or the minimal security steps that they have already taken, will protect them from cyber attacks.
In advance of October's Executive Women's Forum, Security Researcher Lysa Myers will look at the evolving landscape for women in IT, risk management, information security and other privacy industries.Read more >
What cyber threats will your business have to deal with in 2014? From cyber criminals to digital privacy concerns, the landscape is shifting and ESET Senior Security Researcher Stephen Cobb offers his take on the road ahead and the best use of resources to protect your business.Read more >
Get the information you need to make the right decision through this presentation followed by a 30 minute panel available for your questions about ESET products, services and solutions.
>> Effectiveness/Coverage: What threats does the solution eliminate? Does the solution address the immediate concerns of zero-day attacks while maintaining a legacy database to avoid the re-introduction of known viruses?
>> Performance: Does the solution consume resources that impact your users in order to meet fast scanning requirements or operate in the background to minimize the impact on your users. Is the scanning configurable to achieve a balance between speed and security?
>> Environmental fit and usage: How well does the anti-virus utility conform to the platform, operating system and application environment that you have created for your organization?
>> Management efficiency: How easily and comprehensively can the anti-virus solution be managed across the business and IT infrastructure
>> Services: What added value can the vendor deliver to help an organization remove existing viruses or replace an existing solution to another
With consumers and customers more concerned than ever about their data privacy, you need to be sure your business is doing enough to protect personally identifiable information (PII). ESET security and privacy expert Stephen Cobb explains how smart privacy strategies not only protect your company, but win you more business.Read more >
Learn how ESET Experts would protect their business from Malware. This will be a panel discussion.Read more >
An interview with Stephen CobbRead more >
Antimalware Updates from the Experts: How important are proactive detection test results?Read more >
Antimalware Updates from the Experts: From your perspective, what are the biggest differentiators between individual antimalware products?Read more >
Antimalware Updates from the Experts: Currently there are over 45 endpoint security competitors in the industry so it might get challenging to choose the right product to secure the network. When deciding about security software, what are the most important attributes that should be looked at for a business? Do you think the attributes are different for an enterprise vs. a SMB?Read more >
Antimalware Updates from the Experts: Endpoint security products evolved from signature based back in 1980-2000 through HIPS, web reputation, device control to cloud computing and SaaS. What do you think is next?Read more >
Antimalware Updates from the Experts: What would you say the current state of antimalware industry is? How much do you think antimalware products evolved compared to degree of cybercrime evolution?Read more >