Mike Davis, Chief Technology Officer, CounterTack
Organizations lack the protection and controls on mobile endpoints, mainly laptops and mobile devices. As a result, it is difficult for security teams to effectively defend against unknown threats, particularly when executives travel to geographical areas where connecting to seemingly trusted networks only becomes a risky move based on the fact that criminals are ready to pounce on unsuspecting users. In this webinar we will walk through an advanced endpoint attack in real-time, showing how the behaviors and events are detected, while discussing the necessary steps security teams should follow from detection to infection to response. You will learn how real-time endpoint threat detection lets operators understand the context of operating system and network threats; collecting critical information that they can act on if threats start to become more aggressive or pervasive.