Organizations are looking at their endpoint security with a critical eye these days, with more awareness than ever that traditional signature-based antivirus (AV) alone is not enough against modern threats. Learn about next gen techniques like behavioral analysis / machine learning, application whitelisting / control, vulnerability shielding, memory inspection, endpoint detection & response (EDR), lateral movement protection and what the 2016 Gartner Endpoint Magic Quadrant says about endpoint protection. In this webinar, you’ll also learn about Trend Micro’s 's combination of proven and next gen endpoint capabilities, which will help your organization protect, detect, and respond to threats better in an automated, integrated solution.Read more >
As stewards of financial assets and personal information belonging to their clients, the financial services industry continues to be highly targeted by cyber criminals. Sophisticated threat actors favor the endpoint as it is seen as the weakest link in the security infrastructure as opposed to the hardened network perimeter. Legacy anti-virus deployed on the endpoints have proven to be ineffective against advanced malware and zero-day exploits.
Register today and join this informative webinar, hosted by a former network lead at a global enterprise bank and an advanced endpoint protection expert, to learn about:
•The latest threats facing the financial services industry
•How and why a different approach with a disruptive endpoint technology is necessary to combat advanced malware and exploits
•The importance of protecting the entire organization end-to-end (i.e., from the endpoint up to the network perimeter)
Endpoint Security - New Challenges, New NeedsRead more >
Endpoint Security - New Challenges, New NeedsRead more >
Endpoint Security - New Challenges, New Needs WebinarRead more >
Endpoint Security - New Challenges, New Needs WebinarRead more >
We are excited to announce the availability of Traps v3.3, the latest release of our revolutionary advanced endpoint protection product.
Join us for a webinar where you’ll learn how Traps v3.3 brings a wealth of new functionality with its 26 new features and numerous enhancements, including:
•Extended virtualized desktop infrastructure (VDI) support, including automatic licensing elasticity and support for additional VDI environments
•Advanced execution restrictions and policy conditions for fine-grain process control
•Extended OS support, including additional versions of the Windows operating system
•New role-based access control (RBAC) to enforce administrative separation of duties
•Enhanced SIEM support, audit logging, and e-mail alerting
Traditional endpoint solutions were designed to deal with static, known threats. They accumulate large threat databases and signatures and when matches are found the threat is blocked. This approach simply does not work against today’s advanced and unknown attacks. And while organizations must protect every single endpoint, both traditional and mobile, an attacker only needs to compromise one to cause damage. Register now for this webinar where you will:
• Learn why protecting the multitude of endpoints is an on-going challenge
• Find out the importance behind detection and containment on all types of endpoints from PC to mobile
• Hear how FireEye offerings can help proactively protect against unknown threats on the endpoint
As a managed service provider your customers count on you to know their needs, recommend the right solutions, and keep things affordable. Your challenge is to find the most effective solutions that can be easily delivered as a managed service. McAfee® Endpoint Protection for SMB—a part of the Intel® Security product offering—contains the security performance and robust management of an endpoint product, in a solution that can be easily and cost-effectively rolled out and managed on-premises or through the cloud.
Protecting devices, data and networks from modern threats does not have to be complex and costly. Trust McAfee to help you deliver simple, powerful endpoint protection exclusively for your small to midsize business customers.
Learn more to capture this market opportunity.
As an existing McAfee Endpoint Encryption customer, see what’s new in the encryption product line and what products are available to you! This webcast is provided as a 30 minute overview and includes 5 minutes of Q & A. Prior products that apply to this webcast: (1) McAfee Total Protection for Data (TDA), (2) McAfee Drive Encryption (DED) AKA EEPC, EEMAC and Endpoint Encryption for PCs and Macs, (3) McAfee File & Removable Media Protection (DFF) AKA Files & Folders, EEFF, EERM.
Join this webinar on Endpoint Encryption and learn about:
• McAfee Complete Data Protection Suites – New
• How these new suites are becoming available to you
• How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
• Use cases on leveraging the synergy between Intel® vPro™ and McAfee Data Protection technologies
• Management of Native Encryption v1.0
• Reference material available to you at the Endpoint Encryption Community site
Pat Correia is responsible for Endpoint Encryption Product Marketing at McAfee. Previous to Intel, Pat held various technical and product marketing positions at Intel for 15 years, driving many key projects in Pentium chipset, Pentium and Xeon processors, industry platform initiatives including PCI Express and Ultra Mobile PC, and corporate brand campaigns for Core 2 Duo based multi-core platforms and software, all targeted to OEMs and ODMs world-wide.
Deepak Kolingivadi is a Product Manager in the Management Business Unit at McAfee and responsible for formulating the strategy for products like McAfee ePO Deep Command and McAfee Risk Advisor. Deepak has 15 years of industry experience, of which 11 years have been in the field of Digital Security. Deepak is experienced in developing product strategy and roadmap for security products as well as conceptualizing and engineering them.
Antivirus only stopped 49% of malware in 2012. Is your data safe against the malware tools being deployed by cyber-criminals? Today’s hackers are using targeted attacks, drive-by downloads and exploiting human error to access your organization’s intellectual property. IT Security’s ability to move from reactive to proactive security involves deploying both intelligence and policy based protection. Full protection for both physical and virtual environments requires an integrated, layered defense on the endpoint. Join us to learn best practices and strategies for unrivaled security and blazing performance to defend your organization against today’s complex threats.Read more >
User-centric risk tops this year’s concerns: what is IT doing about it?
Endpoint risk is rising and 78% of respondents to the new 2015 State of Endpoint Security study say negligent, careless employees not following policy are IT’s biggest threat.
The 6th Annual survey, conducted by Ponemon Institute, asked IT practitioners involved in securing endpoints about risks and challenges in 2015. This year’s report reveals why risk has become more challenging over the last 24 months and what IT plans to do about it in 2015.
Join us Wednesday January 21st at 8am PST / 11am EST, as Larry Ponemon and Chris Merritt reveal analysis from the Annual State of Endpoint Risk, sponsored by Lumension, including:
• The evolving IT threat landscape and today’s top-5 risks
• The disconnect between perceived and actual risk, and the corresponding strategies to combat these threats including detect and respond, big data and threat intelligence
• Insights into new Infosec budgets and their 2015 allocations
Register Today, and learn how your peers are planning on addressing the endpoint security risks and challenges of 2015.
Today’s MSPs face a world full of malware, and not many options when it comes to productive and profitable endpoint security. Join us as we dive into the wants, needs and challenges of MSPs, and how Webroot SecureAnywhere Business Endpoint Protection uses a smarter approach to address these pain points. During this webinar you will learn how endpoint security can be profitable for MSPs with the following features:
•Real time threat intelligence
•Detection with a 99.7%+ efficacy
•Multi-tenant cloud based management console
Join Tim Williams, Director of Product Marketing, for a 30 minute overview of HEAT LANrev for Unified Endpoint Management.
What exactly is HEAT LANrev? It is the industry-leading client and mobility management tool that covers in a single console:
- Complete Asset Inventory of hardware and software data points
- Automated patch management of Windows, Mac OS and third party applications
-Mobile Device Management for iOS, Android and Windows
-Software packaging and distribution to Mac and Windows devices
And much more!
Learn how LANrev automates and streamlines endpoint management across all form factors in your organization.
In architecting true next generation endpoint protection, CrowdStrike made a deliberate decision to embrace the Cloud. Why? The Falcon platform was built by people fed up with the limitations of building on-premise products, who realized that ‘Cloud-supported’ wasn’t enough. Only an endpoint security product designed from the ground-up to be based on the Cloud would work.
In this session you will learn:
• Why the Cloud provides the scale, resources and power to protect you
• The privacy, security, control and legal issues to be considered in using the Cloud for endpoint security
• Why the Cloud-based Falcon endpoint protection platform is the right decision for your organization.
Over the past few years Endpoint Security Management offerings — including patching, configuration, device control, and mobility — have been bundled into suites to simplify management. Protecting endpoint devices continues to get harder, so Securosis has authored new research that now includes anti-malware, BYOD and more.
Join Mike Rothman, President, Securosis as he shares clear, up-to-date buying criteria for those looking at procuring endpoint solutions in the near future. Included will be a look at the ongoing challenge of securing endpoints, recommended how-to’s on protecting endpoints, reducing attack surface and managing mobile security as well as important buying considerations and a procurement process.
Learn why true endpoint visibility is so important and what blind spots you may have. We will also show you how Falcon Host provides you with true end-to-end visibility into endpoint activity on your network, allowing you to keep adversaries out of your environment. In this video, CrowdStrike Principal Security Architect Elia Zaitsev demonstrates how Falcon Host eliminates blind spots in your endpoint monitoring, providing you with the speed, scale, detail and context you need to secure your networks against even the most advanced attacks.Read more >
Join executives from CrowdStrike and Optiv in a lively panel discussion on why signature-focused, alert-centric reactive model for endpoint security tools must evolve to meet the growing productivity needs of the enterprise in an increasingly hostile threat environment. Find out how the next generation in endpoint protection is helping some of the world’s top organizations fill the gaps left by their existing security solutions.
Join us and you will learn:
•Why existing leading security strategies barely address 40% of today’s enterprise data breaches.
•Learn the must-have capabilities and features of a successful endpoint security solution strategy.
•How one Fortune 100 financial firm deployed an entirely cloud-based NGE solution to radically improve its security posture.
Are you ready for the next wave in endpoint computing? It’s multi-platform, multi-device, mobile, virtual, - get ready to gain control!
Employees are no longer chained to desktops in one location, but constantly on the move, using a variety of devices, and accessing a multitude of applications. The dramatic growth of Apple technologies in the enterprise, coinciding with the growth of mobility, and the increase in employee-owned devices is making it more challenging for organizations to manage and secure their infrastructure.
Join our webinar to learn about the top challenges and 3 strategies to manage and secure your cross-platform environment and future-proof your organization for the next wave.
Not all threats come through the corporate network. What if you could extend the protection you already get from WildFire to all your endpoints - workstations, servers, and laptops - even when they are not on your network? In this webinar, you will discover:
- How sophisticated threat actors compromise endpoints with zero-day exploits
- Why existing endpoint solutions cannot prevent security breaches on endpoints
- How to prevent known and unknown threats from compromising your systems
- How Palo Alto Networks Traps prevents "patient zero" by blocking unknown threats on the endpoints.
Healthcare organizations have become highly targeted by cyber attackers as the value of stolen protected health information has become greater than the value of stolen credit cards. In fact, 100% of sophisticated cyberattacks at organizations impact the endpoint and antivirus alone is insufficient.
Join this informative webinar workshop led by a former Information Security Lead at a large hospital network and a Traps expert to learn about threats facing Healthcare organizations and how a different approach to endpoint security is necessary to combat the sophisticated malware and exploits currently used to target healthcare organizations.
Register today to learn more about:
• The latest threats facing the Healthcare industry
• A more effective method to stop malware and exploits at the endpoint, compared to the traditional antivirus approach
• Why it’s equally important to protect the endpoint, as it is to protect the network perimeter
Not all threats come through the corporate network. What if you could extend the protection you already get from WildFire to all your endpoints — workstations, servers, and laptops – even when they are not on your network? In this webinar, you will discover:
• How sophisticated threat actors compromise endpoints with zero-day exploits
• Why existing endpoint solutions cannot prevent security breaches on endpoints • How to prevent known and unknown threats from compromising your systems
• How Palo Alto Networks Traps prevents “patient zero” by blocking unknown threats on the endpoints