What security risks do mobile devices introduce into your organization, and how can you protect against them now that so many employees are using their own devices for work? ESET Distinguished Researcher, Aryeh Goretsky explains.Read more >
Join Distinguished Researcher, Aryeh Goretsky, as we explore what's new in Windows 10 and how to make sure your company is ready to migrate.Read more >
SMB Cybersecurity Challenge - Webcast Series Part 2
Join Stephen Cobb, Security Evangelist at ESET to discover how:
- Vulnerable SMBs like yours really are
- You can establish a cybersecurity policy for your organization
- You can to defend your company – and its employees, partners and customers – against online attacks.
Many small and medium-size businesses (SMB) operate under the mistaken impression that their size, or the minimal security steps that they have already taken, will protect them from cyberattacks. According to the U.S. Chamber of Commerce’s publication, Commonsense Guide to Cyber Security for Small Businesses, “This assumption is both inaccurate and dangerous. Attacks on information systems operated by small and midsize companies are growing rapidly and are having a severe impact on business operations… Neither the size of your company nor the type of your business guarantees protection from an attack. If you use the Internet, you are vulnerable.”
Speakers: Stephen Cobb, Security Evangelist, ESET
Moderator: Steve Kovsky, Technology Journalist and Director of Community Outreach , Securing Our eCity
ESET security researcher Lysa Myers reports on developments in healthcare IT system security that she observed attending the recent HIMSS conference in Orlando. Find out what is being done to better protect patient data privacy.Read more >
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.Read more >
As part of the Threat Management Summit ESET along with Frost & Sullivan will discuss Real-time Threat Detection.
Frost & Sullivan: Making the Case for Endpoint Security
The headline grabbing attacks against firms like RSA, Epsilon, Lockheed Martin, and others have brought a great deal of attention to data protection and tools to protect the data itself. As many organizations look at moving data and services to the cloud, organizations are focusing their energies on securing cloud based services. Unfortunately, focus on the endpoint seems to be waning, leaving a large hole in many organization's defense.
Rob Ayoub, CISSP and Research Director for Frost & Sullivan's Information Security Practice will discuss why protecting the endpoint is still critical in today's changing threat landscape. The endpoint is still the last connection to the end user and without adequate protections against the latest threats, corporate data is still at risk, even with safeguards in place.
ESET: The Best Defense is a Good Offense
With the pace of emerging threats, it’s not good enough to know about the last attack to hit your company, you have to be prepared for the next, with always-on, self-learning, adaptive technology leading your security stance.
Join Stephen Cobb, Security Evangelist at ESET to discover how:
- Vunerable SMB's like yours really are
- You can establish a cyber security policy for your organization
- You can defend your company-and it's employees partners and customers against online attacks
Many small and medium-size businesses (SMB) operate under the mistaken impression that their size, or the minimal security steps that they have already taken, will protect them from cyber attacks.
45% of data breaches reported in 2013 were from the medical and healthcare sector. ESET researcher Lysa Myers looks at information security in the healthcare industry and how we can do better when it comes to protecting the privacy of patient data.Read more >
What cyber threats will your business have to deal with in 2014? From cyber criminals to digital privacy concerns, the landscape is shifting and ESET Senior Security Researcher Stephen Cobb offers his take on the road ahead and the best use of resources to protect your business.Read more >
In advance of October's Executive Women's Forum, Security Researcher Lysa Myers will look at the evolving landscape for women in IT, risk management, information security and other privacy industries.Read more >
Get the information you need to make the right decision through this presentation followed by a 30 minute panel available for your questions about ESET products, services and solutions.
>> Effectiveness/Coverage: What threats does the solution eliminate? Does the solution address the immediate concerns of zero-day attacks while maintaining a legacy database to avoid the re-introduction of known viruses?
>> Performance: Does the solution consume resources that impact your users in order to meet fast scanning requirements or operate in the background to minimize the impact on your users. Is the scanning configurable to achieve a balance between speed and security?
>> Environmental fit and usage: How well does the anti-virus utility conform to the platform, operating system and application environment that you have created for your organization?
>> Management efficiency: How easily and comprehensively can the anti-virus solution be managed across the business and IT infrastructure
>> Services: What added value can the vendor deliver to help an organization remove existing viruses or replace an existing solution to another
With consumers and customers more concerned than ever about their data privacy, you need to be sure your business is doing enough to protect personally identifiable information (PII). ESET security and privacy expert Stephen Cobb explains how smart privacy strategies not only protect your company, but win you more business.Read more >
Learn how ESET Experts would protect their business from Malware. This will be a panel discussion.Read more >
An interview with Stephen CobbRead more >
Antimalware Updates from the Experts: How important are proactive detection test results?Read more >
Antimalware Updates from the Experts: From your perspective, what are the biggest differentiators between individual antimalware products?Read more >
Antimalware Updates from the Experts: Endpoint security products evolved from signature based back in 1980-2000 through HIPS, web reputation, device control to cloud computing and SaaS. What do you think is next?Read more >
Antimalware Updates from the Experts: Currently there are over 45 endpoint security competitors in the industry so it might get challenging to choose the right product to secure the network. When deciding about security software, what are the most important attributes that should be looked at for a business? Do you think the attributes are different for an enterprise vs. a SMB?Read more >
Antimalware Updates from the Experts: What would you say the current state of antimalware industry is? How much do you think antimalware products evolved compared to degree of cybercrime evolution?Read more >
An IT Best Practice Integration of Email and Endpoint Security System to Raise IT Security Levels. SMB’s need to protect both the email system and the endpoint. This provides far better level of protection than just utilizing endpoint protection alone. This webcast will focus on positioning this duel protection as a best practice and what makes sense for your business in today’s threat landscape. We will also discuss how ESET Security Solutions can help mitigate these risks so that you can focus on driving your business.Read more >
ESET Security Days - Part 6Read more >
ESET Security Days - Part 4Read more >
ESET Security Days - Part 8Read more >
ESET Security Days - Part 5Read more >
With the deluge of new mobile smartphones like Android, iPhone, and others hitting the streets, there are thousands of new attack vectors against a company's IT infrastructure that create potential security nightmares. When users download apps by the droves and then want to connect to core critical infrastructure, how should IT handle it? While there is a drive for increased off-hours and/or offsite productivity using mobiles, can we stomach the changes that are coming, and can our organizations remain (or become) secure?Read more >