Hi [[ session.user.profile.firstName ]]
Sort by:
    • Announcing Traps v3.3: Advanced Endpoint Protection, Evolved. Announcing Traps v3.3: Advanced Endpoint Protection, Evolved. Michael Moshiri - Director, Advanced Endpoint Protection Recorded: Nov 18 2015 7:00 pm UTC 57 mins
    • We are excited to announce the availability of Traps v3.3, the latest release of our revolutionary advanced endpoint protection product.

      Join us for a webinar where you’ll learn how Traps v3.3 brings a wealth of new functionality with its 26 new features and numerous enhancements, including:

      •Extended virtualized desktop infrastructure (VDI) support, including automatic licensing elasticity and support for additional VDI environments
      •Advanced execution restrictions and policy conditions for fine-grain process control
      •Extended OS support, including additional versions of the Windows operating system
      •New role-based access control (RBAC) to enforce administrative separation of duties
      •Enhanced SIEM support, audit logging, and e-mail alerting

      Read more >
    • Understand Customer Needs related to SAP HANA Advanced Analytics Understand Customer Needs related to SAP HANA Advanced Analytics Jordan Cao, Director of Product Marketing, SAP HANA. Ashish Sahu, Director of Product Marketing, SAP HANA Advanced Analytics Recorded: Feb 13 2014 5:00 pm UTC 48 mins
    • Learn about your opportunities for finding more business ideas with SAP Idea Incubator, a unique crowdsourcing community for SAP HANA customers and innovators.

      Do you have strong data mining background or experience? Do you know there are SAP HANA customer are looking for an application or feature but aren't sure how to accomplish it? Do you know SAP HANA integrates with advanced data mining tools to support comprehensive modeling? You can implement these ideas on SAP HANA by leveraging you data mining knowledge. Customers will review your submission and there might be potential opportunities to complete the idea. You can also build up your profile that lists all successful prototypes you built.

      Are you are a great inventor of algorithms and approaches for big data, analytics, data mining, machine learning, etc, and are looking for real business problems to solve? Please join in SAP Idea Incubator. In this webinar, we'll introduce you to the features of SAP Idea Incubator, discuss what kind of projects are right for crowd sourcing, the process, and will explore the advanced analytic choices on top of SAP HANA. We cover important considerations such as non-disclosure agreements, handling intellectual property, and sharing of data sets.

      This webinar is geared towards innovators to help you understand SAP HANA advanced analytics and the perspectives of how to participate into SAP Idea Incubator.

      Read more >
    • Defending Healthcare Against Today’s Advanced Threats Defending Healthcare Against Today’s Advanced Threats Janene Casella, Sr. Product Marketing Manager for Enterprise Security & David Finn,CISA, CISM, CRISC Health ITO from Symantec Recorded: Feb 18 2016 6:00 pm UTC 47 mins
    • With PHI, financial, and demographic information, healthcare is a data-rich environment and a popular target for attackers. Today’s cybercriminals are employing sophisticated tactics to trick unsuspecting victims or otherwise infiltrate healthcare organizations to gain this information. These advanced threats are highly stealthy and persistent, using novel techniques to hide themselves, sometimes for months, before even being detected.

      With the bad guys getting smarter and many healthcare organizations still lagging behind with the proper security measures, security leaders know it’s only a matter of time until they become the target. Watch this live webinar as we discuss the shift in security that is being driven by the changing threat landscape and how organizations are implementing a multi-step approach to uncover, prioritize, and remediate threats facing their environments.

      During this webinar, you’ll learn:

      - What you can do to defend against advanced threats
      - Steps to reduce the number of incidents that require further investigation by knowing what to look at, when to look at them, and where to look
      - How Symantec can help you leverage your existing security investments to uncover advanced threats across your endpoints, networks, and email

      Read more >
    • Advanced Incident Investigation: Lessons Learned From APT Victims Advanced Incident Investigation: Lessons Learned From APT Victims Don Smith, Technology Director, Dell SecureWorks Recorded: Dec 17 2015 5:00 pm UTC 50 mins
    • The increased complexity and frequency of attacks, combined with reduced effectiveness of detective or preventative control frameworks, elevate the need for organizations to roll out enterprise wide incident response initiatives to ensure rapid containment and eradication of threats.

      In this webcast, Don Smith, Technology Director at Dell SecureWorks, describes three organization’s experience with “APT” actors, examining techniques deployed for intrusion, persistence, lateral expansion and exfiltration.

      Don will highlight where changes to the detective or preventative control frameworks could have prevented the attackers from achieving their objectives and outline key steps to building a robust incident response plan.

      Webcast takeaways include:

      · Real-world examples of APT attacks
      · The latest tools and techniques that advanced threat actors are using
      · Recommendations for preventing and responding to APTs

      Read more >
    • How to Use An Advanced Threat Protection Solution To Keep Your Organization Safe How to Use An Advanced Threat Protection Solution To Keep Your Organization Safe Piero DePaoli, Sr. Director, Product Marketing, Symantec | Morgan Wright, Media Analyst, Center for Digital Government Recorded: Dec 9 2015 2:00 am UTC 32 mins
    • Learn how you can uncover, prioritize, and remediate today’s most advanced persistent threats across your endpoints, networks, and email – fast! Combine local intelligence with everything Symantec sees globally, so that you can pinpoint and remediate the most critical threats to your organization – all without deploying any new agents.

      Learn how you can uncover, prioritize, and remediate today’s most advanced persistent threats across your endpoints, networks, and email – fast! Combine local intelligence with everything Symantec sees globally, so that you can pinpoint and remediate the most critical threats to your organization – all without deploying any new agents.

      Join our webcast on December 8, 2015, and you will learn how Symantec's Advanced Threat Protection solution is the first solution that can:

      - Uncover a full range of threats - from persistent threats to zero-day
      attacks-across your endpoints, network, and email

      - Prioritize what matters most by correlating local intelligence with everything Symantec sees through its massive global telemetry

      - Remediate threats quickly from a single console, all without deploying new endpoint agents

      -Leverage existing agents, which means there is no need to deploy agents on top of Symantec Endpoint Protection or Symantec Email Security.cloud

      Read more >
    • Are Advanced Persistent Threats Hiding in Your Network? Are Advanced Persistent Threats Hiding in Your Network? Justin Turner, Delivery Team Manager, Targeted Threat Hunting & Response Recorded: Sep 14 2015 6:00 pm UTC 59 mins
    • How Targeted Threat Hunting Inspects Your Network for Cyber Attacker Presence.

      Many organizations have some form of information security protection in place but also wonder "Have I already been compromised?" A cyber threat such as malware or even a large scale Advanced Persistent Threat could be hiding in file systems and several other areas of your network that may go unnoticed by the untrained eye. A deep inspection of your networks is an excellent way to identify the presence of compromises and entrenched threat actors operating in your environment.

      During this interactive webinar, Justin Turner, Delivery Team Manager from the Targeted Threat Hunting & Response Team, will share why it is critical to identify targeted threat indicators of attacker presence and leverage threat intelligence to provide context to determine how to engage and resist the adversary.

      In addition you will:

      - Learn what Targeted Threat Hunting is and why it is important.
      - Hear real-world examples of previous incidents and how targeted threat hunting was used to remove entrenched adversaries.
      - Receive a standard list of questions that should be answered during an engagement.

      Read more >
    • Advanced Threat Protection:  For all of the Network, All of the Time Advanced Threat Protection: For all of the Network, All of the Time Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Feb 25 2016 10:00 am UTC 48 mins
    • The headlines are full of claims by security companies having the key to solving the problem of Advanced Persistent Threats (APT).

      However, on closer inspection it seems that while the technology that they’re touting is interesting, it’s only a partial solution because it only addresses part of the problem.

      In today’s changing threat horizon, attacks can come from anywhere, at anytime and in any form. An effective Advanced Threat Protection (ATP) capability must be able operate in the same manner - everywhere in the network, with any technology and fully collaborative.

      This webinar will present and focus on the following:
      1.The range of technologies needed
      2.How to close off exploitable gaps with common threat intelligence
      3.Technology is only part of the final solution

      Read more >
    • Secure Your Network Against Advanced Threats Secure Your Network Against Advanced Threats Mike Resong, FireEye Director, Technology Alliances and Amy De Salvatore, ForeScout Senior Director, Strategic Alliances Recorded: Feb 12 2016 9:45 pm UTC 19 mins
    • How do you reveal unknown risks on your network and enforce your security and compliance policies? What’s required to reduce your attack surface, detect and block advanced threats and rapidly respond to security breaches? Good Questions!

      Join us and learn the answers to these real-world problems and discover how ForeScout and FireEye’s joint solution reduces the threat landscape and automates security management and response, allowing you to:
      · Identify devices—including Internet of Things endpoints—the instant they connect to your network
      · Quickly detect advanced threats
      · Scan for indicators of compromise (IOCs)
      · Contain infected endpoints and automate threat response
      · Limit malware propagation and break the cyber kill chain

      Register today and learn to improve your company’s defenses against advanced threats and automate threat response!

      ---
      Speakers:
      Michael Resong, FireEye Director, Technology Alliances
      Michael has been with FireEye since April 2013. Before joining Technology Alliances, he led various systems engineering and architect teams at FireEye. Prior to FireEye, Micheal performed numerous systems engineering and management functions at McAfee, Secure Computing, Network Appliance and other leading technology companies.

      Amy De Salvatore, ForeScout Senior Director, Strategic Alliances
      Amy currently manages a team focused on a discreet portfolio of technology and go-to-market partners. As one of ForeScout’s top strategic partner liaisons, Amy manages the FireEye alliance, and is responsible for all development, marketing, engagement and delivery aspects of the relationship.

      Read more >
    • Pulse on Advanced Threats: Findings from Arbor Networks' WISR Report Pulse on Advanced Threats: Findings from Arbor Networks' WISR Report Paul Bowen, Principal Security Technologist + Arabella Hallawell, Senior Director of Product Marketing, Arbor Networks Recorded: Feb 11 2016 4:00 pm UTC 43 mins
    • A discussion on the current state of advanced threat protection and incident response preparedness that will include both highlights from Arbor's Worldwide Infrastructure Security Report (WISR) as well as original research by Arbor's Security Engineering & Response Team (ASERT). The WISR is a global survey of security professionals, highlighting the key trends in the threat landscape along with the strategies network operators adopt to address and mitigate them. We’ll also provide a deep understanding of two attack campaigns discovered by ASERT. One multi-stage attack campaign was focused on government organizations and a second was focused on financial services organizations.

      This session will cover:

      • The primary challenges facing security teams with emphasis on the balance between technology, people and process.

      • Insight into attack campaigns happening on the broader Internet and an understanding of why it is critical to connect that activity to conversations on internal networks.

      • How businesses are adapting and changing their threat detection and incident response to reduce risk posture

      Read more >