Hi [[ session.user.profile.firstName ]]
Sort by:
    • How to Optimally Configure Email Security.cloud
      How to Optimally Configure Email Security.cloud Jimmy Lin, Product Manager, Email Security.cloud, Symantec Recorded: Jun 26 2018 6:00 pm UTC 43 mins
    • In 2018, organizations worldwide are expected to invest up to $93 billion dollars in security solutions to protect their users and data. Yet, most companies are still vulnerable to the latest cyber-attacks and breaches, in no small part due to service misconfigurations. Attackers are looking for systems that have default settings that are immediately vulnerable.

      Join us for our upcoming webinar, and we will:

      1.Take you through the Symantec Email Security.cloud administration console

      2. Highlight the key protection features that every organization should enable to protect themselves against malware, phish and spam emails.

      Take full advantage of the industry’s most complete email security solution by properly configuring your Email Security.cloud solution.

      Register Today

      Read more >
    • Email Security Gap Analysis: How Do You Know Your Security Is Working?
      Email Security Gap Analysis: How Do You Know Your Security Is Working? Tom McNash, Senior Solution Engineer Recorded: Nov 8 2018 3:00 pm UTC 43 mins
    • A decade ago, email threats were well understood and reasonably under control, leading email security to become “commoditized” and vendors to diversify into other services, losing focus on security. This lack of investment and innovation in email security is evident in the success of modern threats like ransomware and phishing, and begs the question ‘How much malware, phishing and spam is really getting through to my users?’

      Cyren has developed a free Email Security Gap Analysis test in order to measure how well a company’s in-place security is performing relative to detection by Cyren’s global security cloud, and recently published a report with aggregated data on results from assessments done in September and October. The webinar will cover a discussion of the findings in that report, additional insights and threat examples uncovered during assessments (appropriately anonymized), and how to have your own gap analysis done.

      Participants in the webinar will come away with a sense of:

      - How much spam, malware and phishing are current email security systems missing?
      - What was the range of results for different assessment participants, considering different case studies?
      - What factors drive higher or lower “miss” rates for malicious emails, even for systems provided by the same security vendor?
      - What might be an expectation for my own company’s security?
      - How is an email gap analysis conducted?
      - What is involved in terms of configuration and are there any impacts to current email operations?
      - How can I arrange to run an Email Security Gap Analysis for my own company?
      - What are the eligibility requirements?

      Read more >
    • Email Security Gap Analysis: How Do You Know Your Security Is Working?
      Email Security Gap Analysis: How Do You Know Your Security Is Working? Tom McNash, Senior Solution Engineer Recorded: Oct 5 2018 9:15 am UTC 43 mins
    • A decade ago, email threats were well understood and reasonably under control, leading email security to become “commoditized” and vendors to diversify into other services, losing focus on security. This lack of investment and innovation in email security is evident in the success of modern threats like ransomware and phishing, and begs the question ‘How much malware, phishing and spam is really getting through to my users?’

      Cyren has developed a free Email Security Gap Analysis test in order to measure how well a company’s in-place security is performing relative to detection by Cyren’s global security cloud, and recently published a report with aggregated data on results from assessments done in September and October. The webinar will cover a discussion of the findings in that report, additional insights and threat examples uncovered during assessments (appropriately anonymized), and how to have your own gap analysis done.

      Participants in the webinar will come away with a sense of:

      - How much spam, malware and phishing are current email security systems missing?
      - What was the range of results for different assessment participants, considering different case studies?
      - What factors drive higher or lower “miss” rates for malicious emails, even for systems provided by the same security vendor?
      - What might be an expectation for my own company’s security?
      - How is an email gap analysis conducted?
      - What is involved in terms of configuration and are there any impacts to current email operations?
      - How can I arrange to run an Email Security Gap Analysis for my own company?
      - What are the eligibility requirements?

      Read more >
    • Email Security Gap Analysis: How Do You Know Your Security Is Working?
      Email Security Gap Analysis: How Do You Know Your Security Is Working? Tom McNash, Senior Solution Engineer Recorded: Aug 31 2018 8:15 am UTC 43 mins
    • A decade ago, email threats were well understood and reasonably under control, leading email security to become “commoditized” and vendors to diversify into other services, losing focus on security. This lack of investment and innovation in email security is evident in the success of modern threats like ransomware and phishing, and begs the question ‘How much malware, phishing and spam is really getting through to my users?’

      Cyren has developed a free Email Security Gap Analysis test in order to measure how well a company’s in-place security is performing relative to detection by Cyren’s global security cloud, and recently published a report with aggregated data on results from assessments done in September and October. The webinar will cover a discussion of the findings in that report, additional insights and threat examples uncovered during assessments (appropriately anonymized), and how to have your own gap analysis done.

      Participants in the webinar will come away with a sense of:

      - How much spam, malware and phishing are current email security systems missing?
      - What was the range of results for different assessment participants, considering different case studies?
      - What factors drive higher or lower “miss” rates for malicious emails, even for systems provided by the same security vendor?
      - What might be an expectation for my own company’s security?
      - How is an email gap analysis conducted?
      - What is involved in terms of configuration and are there any impacts to current email operations?
      - How can I arrange to run an Email Security Gap Analysis for my own company?
      - What are the eligibility requirements?

      Read more >
    • HIPAA-Aware Security Breach Prevention Policies for Email
      HIPAA-Aware Security Breach Prevention Policies for Email Simon Reddington, Technical Product Manager, Healthcare Practice Recorded: Aug 15 2018 7:00 pm UTC 32 mins
    • Healthcare is the number one industry where employees are the predominant data security breach and compliance threat. 62% of breaches tend to be associated with unintentional outbound email misdelivery. In the context of ever increasing expectations on healthcare workers and reliance on electronic communication, it has become critical for IT security professionals to develop strategies to mitigate security breaches related to the release of protected health information (PHI).

      Join this summit session to learn how organizations are automating security breach policy oversight with pre-defined, HIPAA-aware data leak prevention policies that can be rapidly configured and then applied to a healthcare organization’s entire local or distributed workforce.

      Presenter Info:

      Simon Reddington, Technical Product Manager, Healthcare Practice

      Simon is a Technical Product Manager at Mimecast. Prior to joining Mimecast in 2013, he held technical roles at companies such as WorkShare and Fuel-IT Ltd. He has domain expertise around cloud computing and virtualized environments, Windows Server, Microsoft Exchange, and network administration. He holds a BSc in Computer Science, with Honors, from the University of Essex.
      David Hood, Cyber Security Strategist and Director of Technology Marketing, Healthcare Practice
      David is a Director of Technology Marketing at Mimecast. Previously he was Vice President and General Manager of Data Services at Connotate. David has held senior positions in marketing and product marketing at Kyruus, Memento (acquired by FIS) and additional enterprise software companies. He holds an MBA from Boston College and graduated from Vanderbilt University.

      Read more >
    • Protecting Users from Business Email Compromise Attacks
      Protecting Users from Business Email Compromise Attacks Pete Starr - Global Director of Solutions Engineering Recorded: Aug 13 2018 12:15 pm UTC 26 mins
    • Targeted phishing attacks are a growing concern—in a recently concluded survey of IT and security managers, they estimate the volume of such attacks evading detection of their current security and reaching their users is up 18% over the past 12 months. Join email security industry veteran Pete Starr, Cyren’s Global Director of Solution Engineering, for a half-hour pointed review of the latest developments in Business Email Compromise, attack methods and examples, and how best to prevent them.

      What You Will Learn:

      Participants in the webinar will come away with insight into:

      - What is BEC and how is an attack usually developed?
      - What are the different email spoofing methods employed in such attacks?
      - What kind of special challenges does targeted phishing pose to security solutions?
      - What kind of countermeasures are needed in an impostor protection solution?

      Read more >
    • Impersonation: The Many Masks of Email Threats
      Impersonation: The Many Masks of Email Threats Ken Bagnall, Vice President, Email Security Recorded: Jul 27 2018 1:15 pm UTC 50 mins
    • You can’t always trust that the sender of your email truly sent it. Impersonation threats are becoming more popular and difficult for end users to spot.

      Ken Bagnall, Vice President, Email Security, presents “Impersonation: The Many Masks of Email Threats,” a FireEye webinar that digs into the details behind impersonation attacks:

      • What psychological authentication involves
      • How attackers prey on recipients’ imagination and emotions
      • How impersonation attacks are evolving
      • What is in the future for impersonation
      • How threat intelligence and the speed of email security impact cyber risk

      Read more >
    • Now is the time to revisit your email archiving needs
      Now is the time to revisit your email archiving needs Duncan Mills - Product Marketing Director Cyren Recorded: Oct 11 2018 1:30 pm UTC 33 mins
    • The introduction of the EU GDPR has forced mid-market and smaller enterprises to re-think their data governance processes. Many now recognise the benefits of following similar best practices to those adopted by larger enterprises. Others have seen a significant increase in subject access requests and are struggling to locate information in a timely manner to meet the new response deadline.

      The result is that organisations of all sizes are showing renewed interest in email archiving. However, the options available can be confusing – from the native archiving built into your email service, like Office 365 or G-Suite, to an enterprise scale archive for all data and content types.

      What You Will Learn
      Participants in the webinar will come away with insight into:

      - Trends in email archiving
      - Email archiving options – what to look for in a product
      - The importance of email security in your decision making process
      - The functionality you need to satisfy the requirements of all your stakeholders

      Read more >