Hi [[ session.user.profile.firstName ]]
Sort by:
    • Prevention Week Part 2: Defeat Zero-Day Exploits by Automating Prevention
      Prevention Week Part 2: Defeat Zero-Day Exploits by Automating Prevention Michael Moshiri | Director, Advanced Endpoint Protection at Palo Alto Networks Recorded: Jul 19 2016 5:00 pm UTC 61 mins
    • Your endpoint security should easily prevent known threats. But can it also prevent unknown threats from compromising your environment? More importantly, can it automate this prevention so you don’t have to assign scarce resource to investigate alerts?

      In this webinar, you’ll discover a revolutionary approach to defeating zero-day exploits. We’ll examine current approaches to exploit prevention, discuss the top 10 zero-day exploits of 2015, and analyze unknown threats on the day they became known.

      You’ll learn:
      •How to future-proof your endpoint security to protect your users from unknown threats
      •Why other approaches to endpoint protection cannot prevent zero-day exploits
      •Which applications were targeted by the top 10 zero-day exploits discovered in 2015
      •How to automate threat prevention through a natively-integrated, next-generation security platform

      Read more >
    • Is SaaS Safe? SaaS Security vs Today’s Zero-Day Attack
      Is SaaS Safe? SaaS Security vs Today’s Zero-Day Attack Michael Landewe Recorded: Apr 27 2017 5:00 pm UTC 43 mins
    • Every day, we test popular SaaS like Office365 and GSuite against the latest zero-day threats.
      In this webinar we will answer the questions that CISOs regularly ask:

      • Which SaaS offer the best built-in protection?
      • Is it worth paying more for Microsoft's Advanced Threat Protection?
      • Is there a difference in protection between email and file sharing?
      • Should I scan both inbound and outbound? What about internal email and sharing?
      • How do I add more security if I need it?

      Avanan's Cloud Security Platform is uniquely positioned to understand the security profile of most every cloud provider. Integrated with all major SaaS and partnering with over 70 security vendors, Avanan constantly monitors for the latests security threats and measures the risk profile of each cloud provider.

      We will discuss recent attacks and the speed of each cloud vendor's response. We will compare each SaaS window of vulnerability and adaptation to the changing threat vectors.

      Before and after the webinar, real time vulnerability information will be available at https://avanan.com/gauge

      Read more >
    • Zero-Day Read-Only Cloud Apps
      Zero-Day Read-Only Cloud Apps Rich Campagna, CEO, Bitglass Recorded: Nov 28 2017 6:00 pm UTC 28 mins
    • A common problem in regulated industries is that clients wish to interact with business users via unmanaged consumer applications such Box, Dropbox etc. At the same time, security demands that internal documents not be uploaded to these applications.

      Emerging zero-day technology for unmanaged apps makes any cloud service "read-only." View or download content on any app, but not upload, allowing external collaboration while protecting sensitive data and ensuring regulatory compliance. Join us for this Bitglass Webinar express to learn more.

      Read more >
    • How Bad Can Zero Days Get?
      How Bad Can Zero Days Get? Robert Hansen, VP of WhiteHat Security Labs Recorded: May 27 2015 5:00 pm UTC 38 mins
    • Are you giving the adversary unintended access through vulnerabilities in your system?

      By only having one method of finding vulnerabilities or one way of mitigating them, the chances of the adversary getting through are increasingly high. This webinar will walk you through the current threat landscape, how vulnerabilities can be found, and how to mitigate control.

      In this webinar you'll learn:

      - What types of assessments work at which points in the software development lifecycle.
      - What is the most popular way to deploy a WAF and why that's not a good idea as a single method of defense.
      - Why finding and fixing your vulnerability isn't actually good enough.

      Read more >
    • Zero-Day Attacks and What To Do About It?
      Zero-Day Attacks and What To Do About It? Chris Candaffio, System Engineer, Symantec Recorded: Mar 23 2017 5:00 pm UTC 32 mins
    • 5-Part Webinar Series: Endpoint Protection…what really matters?

      Part 3 of 5: Zero-Day Attacks and What To Do About It?

      All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains unpatched, the greater the risk of a breach, potential loss of information, and damage to reputation.

      Join us to learn what can be done to block exploit attacks on day zero:

      • What behaviors and techniques are used to block attacks
      • Why exploit prevention plays a critical part in endpoint protection
      • How Memory Exploit Mitigation works

      Then see Memory Exploit Mitigation in action with a demo Symantec Endpoint Protection.

      Register Today

      Watch On-Demand:
      • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

      • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223

      Read more >
    • Zero Day, Zero Effect: Examining the Clandestine Wolf Zero-Day
      Zero Day, Zero Effect: Examining the Clandestine Wolf Zero-Day Ben Withnell, Incident Analyst, FireEye as a Service Recorded: Sep 22 2015 3:00 pm UTC 43 mins
    • Triage and remediation of attacks utilizing zero-day vulnerabilities requires technology, intelligence, and expertise that is often beyond the capabilities of most security teams today. With Clandestine Wolf, the name our security team gave to a recent zero-day campaign exploiting an Adobe Flash vulnerability, our analysts were able to validate the alert and begin response within minutes after first observing the attack.
      In this webinar Ben Withnell, a FireEye as a Service (FAAS) incident analyst, will discuss how the Clandestine Wolf campaign was discovered, triaged, and remediated across the FireEye as a Service customer base. Throughout the webinar he will also share his insights into how our analysts handle APT threats, the attacker lifecycle, and remediation tactics.

      Register today for this exclusive insight!

      Read more >
    • Zero Trust Security with Zscaler - ZPA
      Zero Trust Security with Zscaler - ZPA Nathan Howe and Ian Perry Recorded: Dec 6 2018 10:00 am UTC 57 mins
    • Old world access and security models, still allow anyone to knock on doors & rattle the windows of your environment. You’ve tried to fix this by puting fences, gates, hedges, bars on windows around your building to protect them. Sure this made it harder for bad people to get in, but it still meant people could see your building, gates and doors. This never stopped anyone from still trying to pick your locks or smash over your gates.
      Thus learn how Zero Trust Security with ZPA will make your ecosystem and solutions go completely dark & thus ensure only those who have been allowed can get access.

      Read more >
    • Stopping Zero-day Threats
      Stopping Zero-day Threats Dan Maier, Senior Director of Product Marketing, Zscaler Inc. Recorded: Jul 23 2015 3:00 pm UTC 56 mins
    • If Anthem, Sony, Home Depot, Target and Neiman Marcus can fall victim to security breaches, so can you. The bad news is - no company is immune, no matter how big or small you are. Without a proper understanding of zero-day threats, companies have no way of exposing the gaps of overhyped security solutions. These threats are very sophisticated and often leveraging previously unknown attack techniques and vulnerabilities.

      Join us for a compelling webcast that will highlight critical insights combating zero-day threats - including the ability to:

      • Track employee traffic at all times, in real time, irrespective of whether they are inside or outside the corporate network
      • Derive intelligent insights and meaningful data for fast corrective action
      • Avoid a strategy based on "alerting" you about infections - without any guarantees you will notice them
      • Implement a comprehensive approach to stopping zero-day threats - based on protection, (inspecting every byte of traffic and automatically blocking threats), detection and remediation

      Read more >