Hi [[ session.user.profile.firstName ]]
Sort by:
    • Symantec Advanced Threat Protection (ATP) Integration with SIEM/Workflow
      Symantec Advanced Threat Protection (ATP) Integration with SIEM/Workflow Alan Lee, Senior Manager, Product Management, Advanced Threat Protection, Symantec Recorded: Oct 20 2016 5:00 am UTC 48 mins
    • Symantec Advanced Threat Protection (ATP) – the industry’s leading network, email and endpoint protection solution – is upgrading its capabilities again this October. The new release of Symantec ATP adds Security Information and Event Management (SIEM) and workflow integration with Public API, Splunk, Service Now and more.

      This upcoming webinar explores how these new integrations can simplify threat management by giving you a better view of your security posture, enabling your security teams to quickly detect and respond to internal and external attacks, minimising the risk to safeguard your business.

      Join our upcoming webinar and learn about:
      •The importance of workflow for Incidence Response
      •How ATP uses data from Symantec Global Intelligence Network to detect potential targeted attacks
      •How integrating ATP with your SIEM solution allows for a unified view into your environment to help uncover attacks
      •The integrated incident response process that supports security incident investigation and remediation
      •The follow up actions required to close an incident

      Read more >
    • Threat Actors Follow The Money | 2018 Human Factor Report
      Threat Actors Follow The Money | 2018 Human Factor Report Patrick Wheeler, Director of Threat Intelligence, Proofpoint Recorded: May 9 2018 5:00 pm UTC 59 mins
    • The human factor—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

      Here are the key findings from Proofpoint’s 2018 Human Factor Report, exploring the ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

      Join Proofpoint Director of Threat Intelligence as we discuss:

      -- Trends in volume and type of attack providing useful insights for both defenders and organizations.
      -- Ransomware and Email Fraud - how effective have they become and who is being targeted the
      most.
      -- How bad actors are using cloud services

      Read more >
    • Dynamic Endpoint Protection for Virtual Environments
      Dynamic Endpoint Protection for Virtual Environments Thomas Bain, Vice President, Marketing at Morphisec Recorded: Mar 20 2018 5:00 pm UTC 31 mins
    • The digital transformation of today's IT environments is forcing IT and Security teams to rethink the fabric, the costs and the risks inherent within virtual environments. Endpoint protection, in virtual, physical or hybrid environments, is becoming a confusing choice for buyers.

      Morphisec offers a truly different level of endpoint protection that fits directly into virtual environments, delivering value that other endpoint solutions cannot to protect organizations from advanced threats within virtual environments.

      Are you part of the IT or IT Security team? Join Morphisec for this session to learn:
      - Best practices for protecting virtual desktop infrastructure (VDI) environments that do not require cumbersome management resources
      - How an endpoint protection solution can deliver enormous value around business continuity to the IT and Operational teams and truly not impact machine or environment performance
      - A rationale to look at technology specifically architected to function at-scale in the cloud or on-premise that prevent advanced threats

      Read more >
    • Advanced Threat Protection:  For all of the Network, All of the Time
      Advanced Threat Protection: For all of the Network, All of the Time Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Feb 25 2016 10:00 am UTC 48 mins
    • The headlines are full of claims by security companies having the key to solving the problem of Advanced Persistent Threats (APT).

      However, on closer inspection it seems that while the technology that they’re touting is interesting, it’s only a partial solution because it only addresses part of the problem.

      In today’s changing threat horizon, attacks can come from anywhere, at anytime and in any form. An effective Advanced Threat Protection (ATP) capability must be able operate in the same manner - everywhere in the network, with any technology and fully collaborative.

      This webinar will present and focus on the following:
      1.The range of technologies needed
      2.How to close off exploitable gaps with common threat intelligence
      3.Technology is only part of the final solution

      Read more >
    • DDoS Attack and Bot Protection: Defending your Applications
      DDoS Attack and Bot Protection: Defending your Applications Chad Lavoie, Senior Support Engineer Recorded: Mar 29 2018 6:30 pm UTC 52 mins
    • We read about DDoS attacks and bot threats causing companies millions in lost revenues and battered reputations almost every day. By leveraging an extremely efficient and innovative design, including extensive ACL and Stick Table tracking systems, HAProxy Enterprise Edition is able to perform the real time behavioral analysis that mitigating today’s threats demands. Rather than being caught off guard, join this webinar to see how you can use HAProxy Enterprise Edition to create an effective, high performance threat protection solution.

      In this webinar we will present how to:

      •Protect against application-based DDoS attacks such as HTTP request flooding
      •Protect against bot threats such as web scraping, brute forcing, and vulnerability scanning
      •Implement an advanced threat response policy with Antibot and Google reCAPTCHA
      •Implement cluster wide threat protection with a Stick Table Aggregator
      •Enhance bot threat protection with WAF and Fingerprint modules
      •Dynamically maintain cluster wide whitelists and blacklists
      •Monitor threat protection status

      Read more >
    • How to Use An Advanced Threat Protection Solution To Keep Your Organization Safe
      How to Use An Advanced Threat Protection Solution To Keep Your Organization Safe Piero DePaoli, Sr. Director, Product Marketing, Symantec | Morgan Wright, Media Analyst, Center for Digital Government Recorded: Dec 9 2015 2:00 am UTC 32 mins
    • Learn how you can uncover, prioritize, and remediate today’s most advanced persistent threats across your endpoints, networks, and email – fast! Combine local intelligence with everything Symantec sees globally, so that you can pinpoint and remediate the most critical threats to your organization – all without deploying any new agents.

      Learn how you can uncover, prioritize, and remediate today’s most advanced persistent threats across your endpoints, networks, and email – fast! Combine local intelligence with everything Symantec sees globally, so that you can pinpoint and remediate the most critical threats to your organization – all without deploying any new agents.

      Join our webcast on December 8, 2015, and you will learn how Symantec's Advanced Threat Protection solution is the first solution that can:

      - Uncover a full range of threats - from persistent threats to zero-day
      attacks-across your endpoints, network, and email

      - Prioritize what matters most by correlating local intelligence with everything Symantec sees through its massive global telemetry

      - Remediate threats quickly from a single console, all without deploying new endpoint agents

      -Leverage existing agents, which means there is no need to deploy agents on top of Symantec Endpoint Protection or Symantec Email Security.cloud

      Read more >
    • How to Combat the 7 Common Emergent Threats
      How to Combat the 7 Common Emergent Threats Keiron Shepherd, Senior Systems Engineer - Security, F5 Networks Recorded: Mar 21 2018 3:00 pm UTC 64 mins
    • In today’s digital marketplace, your applications are the backbone of your business. However, cloud-based apps create a host of complex challenges and new risks. With automated tools and hackers for hire, threats are increasing and cybercrime has turned into a game for profit. The digital world has opened the door to unprecedented threats, putting your corporate data and reputation at risk.

      Join us for this webinar to learn about:
      • The 7 most common threats to your apps and data: Malicious bots, Credential stuffing, DDoS, Ransomware, Web fraud, Phishing, and Malware
      • How you can leverage threat intelligence to secure your apps and data
      • Where to spend your security budget to provide the strongest level of protection

      By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://f5.com/about-us/policies/privacy-policy).

      Read more >