Hi [[ session.user.profile.firstName ]]
Sort by:
    • Security Hotspots – From Enterprise to Consumerization
      Security Hotspots – From Enterprise to Consumerization Mark Bouchard , VP of Research, Cyber-Edge Group & Kurt Roemer, Cheif Security Strategist, Citrix Recorded: Sep 15 2015 5:00 pm UTC 46 mins
    • Which “hotspots” require greater attention by today’s IT security leaders? What options does IT have for mitigating these hotspots in the era of high-mobility, BYO and Cloud?

      CyberEdge Group’s annual Cyberthreat Defense Report (CDR) is designed to complement Verizon’s annual Data Breach Investigations Report, providing a penetrating look at how IT security professionals perceive different types of cyberthreats - and plan to defend against them.

      This webinar will explore key findings from the recently released 2015 edition of the CDR, paying particular attention to identified “hotspots” requiring greater attention by today’s IT security teams – including enterprise web properties, mobile devices and occasionally careless employees.

      Attend this insightful session to learn:
      •Which types of cyberthreats concern IT security professionals the most
      •What parts of the computing infrastructure they consider to be most exposed
      •Which security defenses are already present or planned for acquisition
      •How virtualization and containerization technologies can address IT Security’s “weakest link”
      •Other strategies and solutions for future-proofing your organization’s defenses

      Read more >
    • What is WBA Next Generation Hotspot Anyway?
      What is WBA Next Generation Hotspot Anyway? Bob Friday, CTO WNBU; Lisa Garza, Mobility Marketing Manager Recorded: Jul 21 2011 5:00 pm UTC 59 mins
    • Tune in to learn more about:
      * The future of Service Provider Wi-Fi networks
      * WFA Hotspot 2.0 Specification
      * WBA Next Generation Roaming Trials
      * How Hotspot 2.0 will open up new revenue opportunities for service providers

      Have you looked at Wi-Fi lately? It has reached a whole new level of scale, security, and sophistication – what the market is calling carrier-grade Wi-Fi. And an industry initiative is underway to make Wi-Fi roaming on par with cellular roaming.

      This webcast will provide an overview of the Wi-Fi Alliance Hotspot 2.0 specification and provide some insight into the upcoming Wireless Broadband Alliance Next Generation Hotspot trials. These trials will set the stage for the future of Wi-Fi, establishing it as a robust, secure technology that will augment and complement 3G and 4G networks for years to come.

      Read more >
    • Proofpoint-Webcast „Mobile Defense“
      Proofpoint-Webcast „Mobile Defense“ Marc Lindenblatt, Presales Engineer, Proofpoint Recorded: Dec 8 2016 9:00 am UTC 38 mins
    • Unternehmen weltweit stehen vor der wachsender Bedrohung durch bösartige Wi-Fi Hotspots und Millionen von Apps auf Mitarbeiter-Geräten. Diese Apps können Malware enthalten oder es kann sich um "riskware“-Apps handeln. Diese sind nicht offensichtlich bösartig, sondern zeigen ein „Verhalten“, das Unternehmen gefährdet und zu Datenverlust, Diebstahl von Zugangsdaten und das Abschöpfen privaten Informationen führen kann.

      Proofpoint Targeted Attack Protection for Mobile (TAP) erkennt und blockiert schadhafte Apps und solche, die unter anderem zu Phishing-Attacken führen und sensible Daten offenlegen können. Entdecken Sie außerdem Geräte-Exploits und gefährliche WLAN-Zugriffspunkte. Mobile Defense wird mit Ihren MDM- und EMM-Tools integriert, um Ihre mobilen Benutzer zu schützen.

      Handeln Sie jetzt!

      • Erkennen und kontrollieren Sie riskante Apps
      Sie erhalten vollständige Übersicht über das Verhalten der Apps in Ihrer Umgebung sowie vollständige Kontrolle darüber, wenn sie sich daneben benehmen.

      Darüberhinaus kann Mobile Defense über invidividuelle Apps hinausblicken und eine vollständige Ansicht der weiteren mobilen Gefahrenlandschaft bieten.

      • Erkennen und schützen Sie sich vor WiFi-Angriffen
      Mit unserer optionalen Client-App für iOS und Android erkennen Sie Wi¬Fi-Angriffe und schützen Benutzer davor.

      • Erkennen Sie Geräteanomalien und Bedrohungen
      Unsere Client-App für iOS und Android erkennt Geräteanomalien, wie z. B. abnormale CPU-Nutzung, unbekannte Konfigurationsprofile und Manipulation der Dateisysteme, die Zero¬day-Bedrohungen darstellen.

      Mehr dazu in unserem Webcast:
      „Mobile Defense“ | 8.12.16 um 10 Uhr | Sprecher: Marc Lindenblatt

      Registrieren Sie sich am besten noch heute!

      Mit besten Grüßen,
      Ihr Security-Team von Proofpoint

      Read more >
    • Recognise your Threats, Regulate your Risks
      Recognise your Threats, Regulate your Risks Vipul Kumra,Consulting Engineer, FireEye India,Shantanu Mahajan, Consulting Engineer, FireEye India Recorded: Jul 26 2016 5:30 am UTC 53 mins
    • Cyberattacks against Banking and Financial Institutions have evolved from annoying pop-ups and machine crashes to denial-of-business events. CxO resignations and losses/damages running into crores of Rupees have heightened the awareness around cyber security, and shifted it from an IT problem to a business priority risk.
      Recently, Asia has been a hotspot for such cyberattacks, with many high-profile attacks being the subject of headlines across the region, including the most recent Bangladesh Bank breach.
      In its latest annexure to banks titled “Cyber Security Framework in Banks”, RBI has outlined a number of proactive measures that Banks in India need to take to ensure a robust cyber security/resilience framework, and to ensure adequate cyber security preparedness on a continuous basis.

      Here are just a few requirements:
      -Board approved cyber security policy
      -Continuous surveillance
      -Cyber crisis management plan
      -Cyber resilience framework
      -Cyber security awareness among stakeholders / top management / board
      FireEye invites all banks and financial institutions to join this exclusive webinar where the speakers will review the RBI guidelines and suggest ideas to bolster your response strategy and limit the consequences of a breach.

      Date: 26th July, Tuesday
      Time: 11:00 am
      Duration: 40 mins. With Q&A
      Vipul Kumra, Consulting Engineer, FireEye India
      Shantanu Mahajan, Consulting Engineer, FireEye India

      Read more >
    • The Future of e-Retailing in Automotive Aftermarket
      The Future of e-Retailing in Automotive Aftermarket Kumar Saha, Industry Principal, Frost & Sullivan Recorded: Jun 19 2014 3:00 pm UTC 66 mins
    • e-Retailing for automotive parts and services is expected to experience double-digit growth in North America and Europe through 2020. The market will not only witness higher online sales, but will also see new forms of aftersales fulfillment, such as mobile service, remote repair, social buying, and so on. These developments may present new revenue opportunities for various aftermarket stakeholders, but there are significant challenges as well.

      Why You Should Attend:

      - Uncover the opportunity hotspots (regions, categories)
      - Learn the best practices of successful e-Retailers
      - Find out how to effectively leverage emerging technologies and business models for building omnichannel presence

      Read more >
    • Today’s new media, new rules and new online realities
      Today’s new media, new rules and new online realities Jerry Hart Recorded: Nov 25 2008 7:30 pm UTC 33 mins
    • Social Media expert Jerry Hart has a word of advice: “Stop begging or paying mainstream media to write about you. Instead, create targeted content that gets you noticed—by Word of Mouse.”

      By understanding the new rules of new media you’ll be in the driver's seat every time you reach out to customers/prospects/stakeholders online. It's all about applying your marketing skills to the latest Web 2.0 hotspots.

      Jerry will teach you how to:
      • Master social-media-driven marketing
      • Add online B2C tactics to your B2B initiatives—and boosting response in a whole new, Web 2.0-driven way.
      • Make blogs, chats, and online buzz work for you—by including you as an authentic participant in online communities
      You already know more than you think you do

      Read more >