Hi [[ session.user.profile.firstName ]]
Sort by:
    • AV isn't Dead. It's Evolving. AV isn't Dead. It's Evolving. Tyler Moffitt Threat Research Analyst, Webroot Recorded: Jun 26 2014 5:00 pm UTC 36 mins
    • Traditional signature AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks, and micro variant financial threats are just some of the examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. To keep up with modern malware, the methods for discovering and addressing new threats needs to change. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.

      Read more >
    • Avoid AV Storms Avoid AV Storms Grayson Milbourne Security Intelligence Director, Webroot Recorded: Mar 19 2014 5:00 pm UTC 46 mins
    • Most companies deploy virtual environments in order to get the most out of their hardware (maximize utilization). Traditional security was designed to be deployed in a one-to-one fashion, relying heavily on existing computing resources (CPU, RAM, Storage) and often taking full advantage of all resources available. In virtual environments with multiple machines and signature based protection, when a scan runs or signatures are updated (typically daily) and simultaneously, it has the potential to consume all resources available, creating what is called an AV storm. This presentation will explore the modern VM security landscape and the introduction of Agentless Security and associated efficacy.

      Read more >
    • (SE) Öka kampanjförsäljningen genom intelligent analys av köpmönster (SE) Öka kampanjförsäljningen genom intelligent analys av köpmönster IBM SPSS Recorded: Nov 14 2013 8:00 am UTC 25 mins
    • Många företag saknar viktiga detaljer i sina säljkampanjer som gör att de går miste om uppenbara. Det gör att de går miste om uppenbara möjligheter till merförsäljning, och företagen riskerar att kunderna uppfattar deras nyhetsmeddelanden som skräppost eftersom meddelandena sällan innehåller erbjudanden som är relevanta för den enskilda kunden.
      Andra företag använder intelligent analys av köpmönster till att maximera försäljningen till varje enskild kund. De flesta företag har redan de data som en lösning kräver, så det är egentligen bara att sätta igång.

      På det här webbseminariet går vi igenom några exempel från företag som använder analys av köpmönster i sin direktmarknadsföring. Vi studerar vilka resultat de har uppnått och ger en översikt över hur man går från data till skräddarsydda erbjudanden på kundnivå. Slutligen kommer vi in på hur en sådan lösning kan implementeras. Det kan vara en rent molnbaserad tjänst som tillhandahålls via en webbläsare eller en lösning som installeras inom företaget.

      Genom webbseminariet får du insikter om intelligenta metoder för analys av köpmönster och om hur det kan implementeras i din verksamhet.

      Read more >
    • How to Avoid Social Engineering Attacks How to Avoid Social Engineering Attacks Tyler Moffitt, Senior Threat Research Analyst, Webroot Recorded: Mar 25 2015 5:00 pm UTC 39 mins
    • You only have two lines of defense when it comes to blocking threats. Beyond relying on your security solution for protection the only safeguard is you and your decisions. Malware authors aren't too concerned about what your AV is capable of blocking since they've formed reliable tactics to circumvent that protection. Their focus now is social engineering. You'd be surprised what the average user, and even the experienced user might fall for when it's presented in a professional fashion. We'll talk about tactics involved with phishing attachments, Fake AVs, PUAs, Cold Calls, and Encrypting Ransomware. This Webinar will go into detail on the different types of social engineering used in each of these threats to turn you into a reliable clicker.

      Read more >