Önemli Bilgi: Yaşanılan saat farkı problemi nedeniyle Webinar saati aşağıda 1:00 pm görünmesine rağmen takvimlerinizde 2:00 pm olarak yer alacaktır. Webinarımız Türkiye saatiyle 14:00’te yapılacaktır.
Trend Micro, yeni benzersiz XGen™ Endpoint Security teknolojisiyle çok hassas makine öğrenme teknolojisini şirket ağlarındaki tüm bağlı cihazları koruyan çözümlerine entegre ediyor. Trend Micro olarak çok katmanlı savunma teknolojilerine tamamen yeni bir bakış açısı sunuyoruz.
Doğru zamanda doğru güvenlik çözümünün kullanılmasını temel alan bu teknoloji tehditleri gözlemliyor, öğreniyor ve içinde barındırdığı en uygun çözümü seçerek gerçek zamanlı olarak uyguluyor. Trend Micro’nun şirket ağlarına bağlı tüm cihazları koruyan uç nokta çözümlerine entegre edilen bu yeni teknoloji, siber güvenlik alanında çok katmanlı savunma teknolojisine tamamen yeni bir bakış açısı sunuyor.
Yeni teknolojimiz, bilinmeyen zararlı yazılımların davranışlarını öğrenebilen ve karşı koyabilen “machine learning” üzerine kurulu olup bu yeni teknolojinin sağladığı faydalar konusunda sizleri web seminerimize katılmaya davet ediyoruz.
RecordedNov 10 201659 mins
Your place is confirmed, we'll send you email reminders
Doug Cahill, ESG; Ty Smallwood & Robert Jones, Navicent Health; Wendy Moore, Trend Micro
Eliminating security gaps and providing maximum protection against today’s and tomorrow’s threats requires a new approach. Join Enterprise Security Group’s Doug Cahill, Senior Analyst, as he discusses a strategic approach to endpoint security that will transcend generations and keep pace with the shifting threat landscape and broadening attack surface area. You will also hear from real practitioners from Navicent Health—Ty Smallwood, Information Services Security Officer, and Robert Jones, IT Security Systems Analyst, outline how their organization leverages Trend Micro™ XGen™ endpoint security to effectively protect against the real-world threats they face.
Doug Cahill, ESG; Ty Smallwood & Robert Jones, Navicent Health; Wendy Moore, Trend Micro
Eliminating security gaps and providing maximum protection against today’s and tomorrow’s threats requires a new approach. Join Enterprise Security Group’s Doug Cahill, Senior Analyst, as he discusses a strategic approach to endpoint security that will transcend generations and keep pace with the shifting threat landscape and broadening attack surface area. You will also hear from real practitioners from Navicent Health—Ty Smallwood, Information Services Security Officer, and Robert Jones, IT Security Systems Analyst, outline how their organization leverages Trend Micro™ XGen™ endpoint security to effectively protect against the real-world threats they face.
Mehmet Dağdevirentürk, Trend Micro Akdeniz Ülkeleri Kanal Müdürü
Önemli Bilgi: Yaşanılan saat farkı problemi nedeniyle Webinar saati aşağıda 1:00 pm görünmesine rağmen takvimlerinizde 2:00 pm olarak yer alacaktır. Webinarımız Türkiye saatiyle 14:00’te yapılacaktır.
Trend Micro, yeni benzersiz XGen™ Endpoint Security teknolojisiyle çok hassas makine öğrenme teknolojisini şirket ağlarındaki tüm bağlı cihazları koruyan çözümlerine entegre ediyor. Trend Micro olarak çok katmanlı savunma teknolojilerine tamamen yeni bir bakış açısı sunuyoruz.
Doğru zamanda doğru güvenlik çözümünün kullanılmasını temel alan bu teknoloji tehditleri gözlemliyor, öğreniyor ve içinde barındırdığı en uygun çözümü seçerek gerçek zamanlı olarak uyguluyor. Trend Micro’nun şirket ağlarına bağlı tüm cihazları koruyan uç nokta çözümlerine entegre edilen bu yeni teknoloji, siber güvenlik alanında çok katmanlı savunma teknolojisine tamamen yeni bir bakış açısı sunuyor.
Yeni teknolojimiz, bilinmeyen zararlı yazılımların davranışlarını öğrenebilen ve karşı koyabilen “machine learning” üzerine kurulu olup bu yeni teknolojinin sağladığı faydalar konusunda sizleri web seminerimize katılmaya davet ediyoruz.
Ransomware and business email compromise (BEC) scams have dominated the security threat landscape for the first half of 2016, truly making it the Year of Online Extortion. This webinar is designed to discuss these and other prominent threat trends we are currently seeing, as well as to give organizations possible security strategies and solutions that they can use to better defend their assets and data.
Paul Oliveria, Technical Communications Manager, Trend Micro
Ransomware and business email compromise (BEC) scams have dominated the security threat landscape for the first half of 2016, truly making it the Year of Online Extortion. This webinar is designed to discuss these and other prominent threat trends we are currently seeing, as well as to give organizations possible security strategies and solutions that they can use to better defend their assets and data.
Mehmet Dağdevirentürk, Trend Micro Akdeniz Ülkeleri Kanal Müdürü
Trend Micro Akdeniz Ülkeleri Kanal Müdürü Mehmet Dağdevirentürk, kendinizi ve firmanızı fidye yazılımlara karşı nasıl koruyacağınızı ve fidye yazılımlarla ilgili son gelişmelerin neler olduğunu sizlerle paylaşıyor. Fidye yazılıma karşı savunmanın sihirli bir formulü yok, ancak en yaygın saldırı yöntemlerini bilmeniz, en iyi korumayı sağlamak için atacağınız öncelikli adımları bilmenizi sağlar. Bu webinarda Trend Micro olarak sizlerle tecrübelerimizi paylaşarak karşılaşabileceğiniz olası risklere karşı planınızı şimdiden oluşturmanız için bir yol haritası sunuyoruz.
최근 피해가 확산되고 있는 이메일을 통한 랜섬웨어와 지능형 지속위협의 현황을 살펴보고 이메일 전용 보안 시스템인 Deep Discovery Email Inspector를 통해 랜섬웨어와 같은 알려지지 않은 악성코드로 부터의 위협에 어떻게 사전 대응할 수 있는지를 살펴봅니다.
Bilal Baig, Technical Director for Mediterranean, Middle East, Africa, CIS, Trend Micro
Cyber criminals can hijack your business by encrypting your data and holding your systems hostage until you pay up. Ransomware can enter an organization through many vectors; including via email spam, phishing attacks, or malicious web downloads. Like other high sophisticated threats, organizations are recommended to employ multiple layers of protection on the endpoint, gateway and mail servers for the highest level of protection against ransomware. Ransomware has become increasingly complex and advanced over time and making prevention and protection more challenging. Join our webinar to understand more about this threat and learn best practices to protect your business and combat ransomware!
Forrest McMahon, Director Tech Advisory & Assessment Svcs Coalfire; & Steve Neville, Director Cloud & Data Center Trend Micro
Join Forrest McMahon from Qualified Security Assessor (QSA) Coalfire for an insightful view of PCI DSS 3.1 requirements in the face of increasingly sophisticated cyber-attacks and more complicated deployment scenarios:
1. How to approach the task of PCI DSS 3.1 compliance
2. What the impacts of different deployment environments (physical, virtual, cloud) have on compliance
3. What key tools & approaches can be used to streamline and ease compliance impacts
Forrest McMahon, Director Tech Advisory & Assessment Svcs Coalfire; & Steve Neville, Director Cloud & Data Center Trend Micro
Join Forrest McMahon from Qualified Security Assessor (QSA) Coalfire for an insightful view of PCI DSS 3.1 requirements in the face of increasingly sophisticated cyber-attacks and more complicated deployment scenarios:
1. How to approach the task of PCI DSS 3.1 compliance
2. What the impacts of different deployment environments (physical, virtual, cloud) have on compliance
3. What key tools & approaches can be used to streamline and ease compliance impacts
Михаил Кондрашин, Технический директор Trend Micro Россия
С помощью программ-вымогателей киберпреступники могут зашифровать ваши данные и не давать возможности использовать ваши системы до тех пор, пока вы не заплатите выкуп. Этот вид вредоносного кода попадает в организацию разными путями - по электронной почте, с помощью фишинговой атаки или вредоносной веб-загрузки. Как и в случаях других сложных угроз, для защиты от вымогателей рекомендуется использовать несколько уровней защиты - конечных точек, шлюзов и почтовых серверов. Программы-вымогатели постоянно развиваются и становятся все более сложными, что делает защиту от них также все более сложной задачей. Примите участие в нашем вебинаре, чтобы получить рекомендации Trend Micro по конфигурации средств безопасности и узнать о лучших практиках для защиты от программ-вымогателей!
Ryan Flores, Senior Research Manager, Trend Micro Forward-Looking Threat Research Team
Cyber criminals can hijack your business by encrypting your data and holding your systems hostage until you pay up. Ransomware can enter an organization through many vectors; including via email spam, phishing attacks, or malicious web downloads. Like other high sophisticated threats, organizations are recommended to employ multiple layers of protection on the endpoint, gateway and mail servers for the highest level of protection against ransomware. Ransomware has become increasingly complex and advanced over time and making prevention and protection more challenging.
Join our webinar and get information about Trend Micro's recommended configuration and best practices to better protect and combat ransomware!
Ryan Flores, Senior Research Manager, Trend Micro Forward-Looking Threat Research Team
Cyber criminals can hijack your business by encrypting your data and holding your systems hostage until you pay up. Ransomware can enter an organization through many vectors; including via email spam, phishing attacks, or malicious web downloads. Like other high sophisticated threats, organizations are recommended to employ multiple layers of protection on the endpoint, gateway and mail servers for the highest level of protection against ransomware. Ransomware has become increasingly complex and advanced over time and making prevention and protection more challenging.
Join our webinar and get information about Trend Micro's recommended configuration and best practices to better protect and combat ransomware!
Mike Smith, Director of Modern Data Center Security, Trend Micro
–Like many organizations you may be managing a multi-faceted infrastructure leveraging virtual, private and public cloud environments. Given the complexity of these dynamic environments, you can be faced with limited visibility across platforms, performance lag, difficulty proving compliance and gaps within your security strategy. In this session we will discuss a comprehensive security model specific for VMWare environments that includes: vSphere, Horizon, vCloud and NSX.
Mike Smith, Director of Modern Data Center Security, Trend Micro
- Like many organizations you may be managing a multi-faceted infrastructure leveraging virtual, private and public cloud environments. Given the complexity of these dynamic environments, you can be faced with limited visibility across platforms, performance lag, difficulty proving compliance and gaps within your security strategy. In this session we will discuss a comprehensive security model specific for VMWare environments that includes: vSphere, Horizon, vCloud and NSX.
What is a WAF (web application firewall) and how can it help defend your AWS workloads? In this webinar, you’ll learn how to get started with the new AWS WAF service and where it fits in your security strategy. You’ll see how AWS WAF works with Trend Micro’s Deep Security to provide a strong, layered defense for your web applications.
What is a WAF (web application firewall) and how can it help defend your AWS workloads? In this webinar, you’ll learn how to get started with the new AWS WAF service and where it fits in your security strategy. You’ll see how AWS WAF works with Trend Micro’s Deep Security to provide a strong, layered defense for your web applications.
Chris Sherman, Forrester Analyst and Wendy Moore, Trend Micro
Trend Micro commissioned Forrester Research to perform a survey study of midsize organizations (500 – 5,000) in the U.S. and Europe to evaluate the Evolving Threat Landscape.
Through a Q&A session with Forrester Analyst, Chris Sherman discover the what, when and how companies are implementing the next generation of endpoint protection.
Chris Sherman, Forrester Analyst and Wendy Moore, Trend Micro
Trend Micro commissioned Forrester Research to perform a survey study of midsize organizations (500 – 5,000) in the U.S. and Europe to evaluate the Evolving Threat Landscape.
Through a Q&A session with Forrester Analyst, Chris Sherman discover the what, when and how companies are implementing the next generation of endpoint protection
Although we shall witness many strides in cybersecurity in 2016, there will still be a narrow margin between these and the threats we’re foreseeing. Advancements in existing technologies—both for crimeware and for everyday use—will bring forth new attack scenarios. It’s best for the security industry as well as the public, to be forewarned to avoid future abuse or any monetary or even lethal consequences.
Trend Micro is the global leader in IT security and develops Internet content security and threat management solutions. These solutions make the world safe for businesses and consumers to exchange digital information.
Uç nokta güvenliğinde değişime hazır mısınız?Mehmet Dağdevirentürk, Trend Micro Akdeniz Ülkeleri Kanal Müdürü[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]59 mins