Hi [[ session.user.profile.firstName ]]

Understanding the 2015 NSS Labs Breach Detection Tests

In the past months, a cascade of significant data breaches have occurred resulting in the loss of millions of customer records, intellectual property and financial data.  These losses are usually the result of a targeted attack (sometimes known as an APT) and over the past few years many vendors have addressed this problem through Breach Detection Systems.  Not all solutions to these advanced threats are equal however, but benchmarking their effectiveness can be difficult.  NSS Labs recently put top breach detection systems through a grueling series of real-world tests and evaluated their ability to detect targeted attacks and deliver an effective return on investment.  This webinar will discuss the various approaches vendors take to addressing targeted attacks, and how they performed in the 2015 Breach Detection System tests.
Recorded Oct 20 2015 41 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Steve Duncan, Trend Micro
Presentation preview: Understanding the 2015 NSS Labs Breach Detection Tests

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Beyond Next-Gen – Best Practices for Future-Ready Endpoint Security Dec 14 2016 12:00 pm UTC 60 mins
    Doug Cahill, ESG; Ty Smallwood & Robert Jones, Navicent Health; Wendy Moore, Trend Micro
    Eliminating security gaps and providing maximum protection against today’s and tomorrow’s threats requires a new approach. Join Enterprise Security Group’s Doug Cahill, Senior Analyst, as he discusses a strategic approach to endpoint security that will transcend generations and keep pace with the shifting threat landscape and broadening attack surface area. You will also hear from real practitioners from Navicent Health—Ty Smallwood, Information Services Security Officer, and Robert Jones, IT Security Systems Analyst, outline how their organization leverages Trend Micro™ XGen™ endpoint security to effectively protect against the real-world threats they face.
  • Beyond Next-Gen – Best Practices for Future-Ready Endpoint Security Recorded: Dec 8 2016 59 mins
    Doug Cahill, ESG; Ty Smallwood & Robert Jones, Navicent Health; Wendy Moore, Trend Micro
    Eliminating security gaps and providing maximum protection against today’s and tomorrow’s threats requires a new approach. Join Enterprise Security Group’s Doug Cahill, Senior Analyst, as he discusses a strategic approach to endpoint security that will transcend generations and keep pace with the shifting threat landscape and broadening attack surface area. You will also hear from real practitioners from Navicent Health—Ty Smallwood, Information Services Security Officer, and Robert Jones, IT Security Systems Analyst, outline how their organization leverages Trend Micro™ XGen™ endpoint security to effectively protect against the real-world threats they face.
  • Uç nokta güvenliğinde değişime hazır mısınız? Recorded: Nov 10 2016 59 mins
    Mehmet Dağdevirentürk, Trend Micro Akdeniz Ülkeleri Kanal Müdürü
    Önemli Bilgi: Yaşanılan saat farkı problemi nedeniyle Webinar saati aşağıda 1:00 pm görünmesine rağmen  takvimlerinizde 2:00 pm olarak yer alacaktır. Webinarımız Türkiye saatiyle 14:00’te yapılacaktır. 

    Trend Micro, yeni benzersiz XGen™ Endpoint Security teknolojisiyle çok hassas makine öğrenme teknolojisini şirket ağlarındaki tüm bağlı cihazları koruyan çözümlerine entegre ediyor. Trend Micro olarak çok katmanlı savunma teknolojilerine tamamen yeni bir bakış açısı sunuyoruz.

    Doğru zamanda doğru güvenlik çözümünün kullanılmasını temel alan bu teknoloji tehditleri gözlemliyor, öğreniyor ve içinde barındırdığı en uygun çözümü seçerek gerçek zamanlı olarak uyguluyor. Trend Micro’nun şirket ağlarına bağlı tüm cihazları koruyan uç nokta çözümlerine entegre edilen bu yeni teknoloji, siber güvenlik alanında çok katmanlı savunma teknolojisine tamamen yeni bir bakış açısı sunuyor.

    Yeni teknolojimiz, bilinmeyen zararlı yazılımların davranışlarını öğrenebilen ve karşı koyabilen “machine learning” üzerine kurulu olup bu yeni teknolojinin sağladığı faydalar konusunda sizleri web seminerimize katılmaya davet ediyoruz.
  • 2016 Midyear Security Roundup: The Reign of Ransomware Recorded: Sep 27 2016 38 mins
    Myla Pilao, Director, TrendLabs Marketing Communications
    Ransomware and business email compromise (BEC) scams have dominated the security threat landscape for the first half of 2016, truly making it the Year of Online Extortion. This webinar is designed to discuss these and other prominent threat trends we are currently seeing, as well as to give organizations possible security strategies and solutions that they can use to better defend their assets and data.
  • 2016 Midyear Security Roundup: The Reign of Ransomware Recorded: Sep 22 2016 45 mins
    Paul Oliveria, Technical Communications Manager, Trend Micro
    Ransomware and business email compromise (BEC) scams have dominated the security threat landscape for the first half of 2016, truly making it the Year of Online Extortion. This webinar is designed to discuss these and other prominent threat trends we are currently seeing, as well as to give organizations possible security strategies and solutions that they can use to better defend their assets and data.
  • Fidye Yazılıma HAYIR! Recorded: Jul 26 2016 63 mins
    Mehmet Dağdevirentürk, Trend Micro Akdeniz Ülkeleri Kanal Müdürü
    Trend Micro Akdeniz Ülkeleri Kanal Müdürü Mehmet Dağdevirentürk, kendinizi ve firmanızı fidye yazılımlara karşı nasıl koruyacağınızı ve fidye yazılımlarla ilgili son gelişmelerin neler olduğunu sizlerle paylaşıyor. Fidye yazılıma karşı savunmanın sihirli bir formulü yok, ancak en yaygın saldırı yöntemlerini bilmeniz, en iyi korumayı sağlamak için atacağınız öncelikli adımları bilmenizi sağlar. Bu webinarda Trend Micro olarak sizlerle tecrübelerimizi paylaşarak karşılaşabileceğiniz olası risklere karşı planınızı şimdiden oluşturmanız için bir yol haritası sunuyoruz.
  • 이메일을 통한 랜섬웨어와 지능형지속위협(APT)에 대한 대응 방안 Recorded: Jul 19 2016 53 mins
    기술지원팀 최영삼실장, 기술지원팀 실장
    최근 피해가 확산되고 있는 이메일을 통한 랜섬웨어와 지능형 지속위협의 현황을 살펴보고 이메일 전용 보안 시스템인 Deep Discovery Email Inspector를 통해 랜섬웨어와 같은 알려지지 않은 악성코드로 부터의 위협에 어떻게 사전 대응할 수 있는지를 살펴봅니다.
  • How to Defeat Ransomware Recorded: Jun 2 2016 47 mins
    Bilal Baig, Technical Director for Mediterranean, Middle East, Africa, CIS, Trend Micro
    Cyber criminals can hijack your business by encrypting your data and holding your systems hostage until you pay up. Ransomware can enter an organization through many vectors; including via email spam, phishing attacks, or malicious web downloads. Like other high sophisticated threats, organizations are recommended to employ multiple layers of protection on the endpoint, gateway and mail servers for the highest level of protection against ransomware. Ransomware has become increasingly complex and advanced over time and making prevention and protection more challenging. Join our webinar to understand more about this threat and learn best practices to protect your business and combat ransomware!
  • PCI DSS 3.1 Compliance in Modern Data Center & Cloud: Lessons & Advices Recorded: May 25 2016 49 mins
    Forrest McMahon, Director Tech Advisory & Assessment Svcs Coalfire; & Steve Neville, Director Cloud & Data Center Trend Micro
    Join Forrest McMahon from Qualified Security Assessor (QSA) Coalfire for an insightful view of PCI DSS 3.1 requirements in the face of increasingly sophisticated cyber-attacks and more complicated deployment scenarios:
    1. How to approach the task of PCI DSS 3.1 compliance
    2. What the impacts of different deployment environments (physical, virtual, cloud) have on compliance
    3. What key tools & approaches can be used to streamline and ease compliance impacts
  • PCI DSS 3.1 Compliance in Modern Data Center & Cloud: Lessons & Advices Recorded: May 19 2016 49 mins
    Forrest McMahon, Director Tech Advisory & Assessment Svcs Coalfire; & Steve Neville, Director Cloud & Data Center Trend Micro
    Join Forrest McMahon from Qualified Security Assessor (QSA) Coalfire for an insightful view of PCI DSS 3.1 requirements in the face of increasingly sophisticated cyber-attacks and more complicated deployment scenarios:
    1. How to approach the task of PCI DSS 3.1 compliance
    2. What the impacts of different deployment environments (physical, virtual, cloud) have on compliance
    3. What key tools & approaches can be used to streamline and ease compliance impacts
  • Как не стать жертвой программ-вымогателей (Russian Version) Recorded: Apr 21 2016 36 mins
    Михаил Кондрашин, Технический директор Trend Micro Россия
    С помощью программ-вымогателей киберпреступники могут зашифровать ваши данные и не давать возможности использовать ваши системы до тех пор, пока вы не заплатите выкуп. Этот вид вредоносного кода попадает в организацию разными путями - по электронной почте, с помощью фишинговой атаки или вредоносной веб-загрузки. Как и в случаях других сложных угроз, для защиты от вымогателей рекомендуется использовать несколько уровней защиты - конечных точек, шлюзов и почтовых серверов. Программы-вымогатели постоянно развиваются и становятся все более сложными, что делает защиту от них также все более сложной задачей. Примите участие в нашем вебинаре, чтобы получить рекомендации Trend Micro по конфигурации средств безопасности и узнать о лучших практиках для защиты от программ-вымогателей!
  • Avoid the Cost of being a Ransomware Victim Recorded: Apr 20 2016 35 mins
    Ryan Flores, Senior Research Manager, Trend Micro Forward-Looking Threat Research Team
    Cyber criminals can hijack your business by encrypting your data and holding your systems hostage until you pay up. Ransomware can enter an organization through many vectors; including via email spam, phishing attacks, or malicious web downloads. Like other high sophisticated threats, organizations are recommended to employ multiple layers of protection on the endpoint, gateway and mail servers for the highest level of protection against ransomware. Ransomware has become increasingly complex and advanced over time and making prevention and protection more challenging.

    Join our webinar and get information about Trend Micro's recommended configuration and best practices to better protect and combat ransomware!
  • Avoid the Cost of being a Ransomware Victim Recorded: Apr 14 2016 35 mins
    Ryan Flores, Senior Research Manager, Trend Micro Forward-Looking Threat Research Team
    Cyber criminals can hijack your business by encrypting your data and holding your systems hostage until you pay up. Ransomware can enter an organization through many vectors; including via email spam, phishing attacks, or malicious web downloads. Like other high sophisticated threats, organizations are recommended to employ multiple layers of protection on the endpoint, gateway and mail servers for the highest level of protection against ransomware. Ransomware has become increasingly complex and advanced over time and making prevention and protection more challenging.

    Join our webinar and get information about Trend Micro's recommended configuration and best practices to better protect and combat ransomware!
  • Examining Your Security Posture in the Software Defined Data Center Recorded: Mar 23 2016 46 mins
    Mike Smith, Director of Modern Data Center Security, Trend Micro
    –Like many organizations you may be managing a multi-faceted infrastructure leveraging virtual, private and public cloud environments. Given the complexity of these dynamic environments, you can be faced with limited visibility across platforms, performance lag, difficulty proving compliance and gaps within your security strategy. In this session we will discuss a comprehensive security model specific for VMWare environments that includes: vSphere, Horizon, vCloud and NSX.
  • Examining Your Security Posture in the Software Defined Data Center Recorded: Mar 17 2016 46 mins
    Mike Smith, Director of Modern Data Center Security, Trend Micro
    - Like many organizations you may be managing a multi-faceted infrastructure leveraging virtual, private and public cloud environments. Given the complexity of these dynamic environments, you can be faced with limited visibility across platforms, performance lag, difficulty proving compliance and gaps within your security strategy. In this session we will discuss a comprehensive security model specific for VMWare environments that includes: vSphere, Horizon, vCloud and NSX.
  • Defending your workloads with AWS WAF and Deep Security Recorded: Jan 27 2016 61 mins
    Mark Nunnikhoven
    What is a WAF (web application firewall) and how can it help defend your AWS workloads? In this webinar, you’ll learn how to get started with the new AWS WAF service and where it fits in your security strategy. You’ll see how AWS WAF works with Trend Micro’s Deep Security to provide a strong, layered defense for your web applications.
  • Defending your workloads with AWS WAF and Deep Security Recorded: Jan 19 2016 61 mins
    Mark Nunnikhoven
    What is a WAF (web application firewall) and how can it help defend your AWS workloads? In this webinar, you’ll learn how to get started with the new AWS WAF service and where it fits in your security strategy. You’ll see how AWS WAF works with Trend Micro’s Deep Security to provide a strong, layered defense for your web applications.
  • Q&A w/ Forrester Research on the Evolving Threat Landscape Recorded: Dec 17 2015 49 mins
    Chris Sherman, Forrester Analyst and Wendy Moore, Trend Micro
    Trend Micro commissioned Forrester Research to perform a survey study of midsize organizations (500 – 5,000) in the U.S. and Europe to evaluate the Evolving Threat Landscape.

    Through a Q&A session with Forrester Analyst, Chris Sherman discover the what, when and how companies are implementing the next generation of endpoint protection.
  • Q&A w/ Forrester Research on the Evolving Threat Landscape Recorded: Dec 15 2015 49 mins
    Chris Sherman, Forrester Analyst and Wendy Moore, Trend Micro
    Trend Micro commissioned Forrester Research to perform a survey study of midsize organizations (500 – 5,000) in the U.S. and Europe to evaluate the Evolving Threat Landscape.

    Through a Q&A session with Forrester Analyst, Chris Sherman discover the what, when and how companies are implementing the next generation of endpoint protection
  • The Fine Line: 2016 Trend Micro Security Predictions Recorded: Nov 24 2015 35 mins
    Paul Oliveria
    Although we shall witness many strides in cybersecurity in 2016, there will still be a narrow margin between these and the threats we’re foreseeing. Advancements in existing technologies—both for crimeware and for everyday use—will bring forth new attack scenarios. It’s best for the security industry as well as the public, to be forewarned to avoid future abuse or any monetary or even lethal consequences.
Smart, Simple, Security that Fits
Trend Micro is the global leader in IT security and develops Internet content security and threat management solutions. These solutions make the world safe for businesses and consumers to exchange digital information.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Understanding the 2015 NSS Labs Breach Detection Tests
  • Live at: Oct 20 2015 12:00 pm
  • Presented by: Steve Duncan, Trend Micro
  • From:
Your email has been sent.
or close