Hi [[ session.user.profile.firstName ]]

Cyber threats – fight back with SonicWall adaptive network security solutions

Ransomware is a form of malware that denies network/data access until a victim pays a ransom fee. Ransomware is spreading at record pace in 2016 as cybercriminals actively use it to hold businesses, institutions and even individuals hostage. Security experts are calling ransomware the new crisis in cybercrime today.
Attend our live webcast with a network security expert to learn:

•How cybercriminals can exploit vulnerabilities in your network
•Actions you can take to prevent and stop this dangerous and potentially costly threat
•The types of companies most at risk for ransomware attacks
•How to protect your data wherever it goes
Recorded Feb 16 2017 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Florian Malecki
Presentation preview: Cyber threats – fight back with SonicWall adaptive network security solutions

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Come proteggere le caselle di posta quando si passa a G Suite Nov 16 2018 9:00 am UTC 75 mins
    Antonio Cancellara
    Guarda questo webinar con una demo live per scoprire come difendere G Suite in modo efficace tramite:

    •Protezione contro minacce avanzate come frodi via e-mail, business email compromise (BEC) e attacchi di phishing mirati
    •Prevenzione della perdita dei dati (DLP)
    •Continuità della posta elettronica
  • Sécuriser votre messagerie lors du passage à G Suite Nov 15 2018 10:00 am UTC 75 mins
    Stephane Julhes
    Ce webinaire vous propose une démonstration en direct et vous dit comment assurer efficacement la sécurité de votre G Suite grâce à :

    •Une protection de pointe contre les menaces évoluées – messages frauduleux, Business Email Compromise (BEC) et attaques de phishing ciblées
    •La prévention contre la perte de données (DLP)
    •La continuité de messagerie
  • Wie Sie beim Umstieg auf G Suite Ihre Postfächer schützen können Recorded: Nov 14 2018 58 mins
    Stephan Kaiser
    Sehen Sie sich dieses Webinar an und erfahren Sie in einer Livedemo, wie Sie Ihre G Suite effektiv mit folgenden Mitteln schützen:

    •überragende Advanced-Threat-Protection-Funktionen zum Schutz vor E-Mail-Betrug, Business-E-Mail-Compromise (BEC) und gezielten Phishing-Angriffen
    •Schutz vor Datenverlust
  • Cómo proteger los buzones de correo durante el traslado a G Suite Recorded: Nov 13 2018 73 mins
    Alex Vazquez
    Vea este seminario virtual, en el que le ofreceremos una demostración en directo y le enseñaremos cómo defender su G Suite de forma efectiva con:

    •Protección superior contra amenazas avanzadas, como el fraude de correo electrónico, el compromiso del correo electrónico de negocio (BEC) y los ataques de phishing específicos
    •Prevención de pérdida de datos
    •Continuidad del correo electrónico
  • How to Secure Mailboxes when Moving to G Suite Recorded: Nov 13 2018 67 mins
    Bob Honour - EMEA Marketing Director; John Aarsen - Solutions Architect
    View this webinar for a live demo and to learn how to effectively defend your G Suite with:

    •Superior advanced threat protection against email fraud, business email compromise (BEC) and targeted phishing attacks
    •Data loss prevention (DLP)
    •Email continuity
  • Closing the Backdoor with Endpoint Security Recorded: Oct 22 2018 63 mins
    Brook Chelmo, Senior Product Marketing Manager, SonicWall Migo Kedem, Senior Director of Products & Marketing SentinelOne
    Threat actors leverage malware to create backdoors into systems for a few key reasons. These forms of malware, even when they fail, can create serious vulnerabilities in systems.

    This webcast will cover the threat landscape and discuss new types of attacks. Come for the news but stay for a live hacking demonstration that will install a backdoor on an unprotected endpoint and later, an attempt on a protected one.

    In this webcast you’ll learn:

    •The current threat landscape
    •What backdoors are
    •How to stop backdoors like Calisto
    •How to roll back the damage of an attack like ransomware
  • Retail Organizations, PCI Compliance, Security & You Recorded: Oct 1 2018 46 mins
    Brook Chelmo, Sr. Product Marketing Manager for SonicWall
    Accepting payment cards is a given for retailers and hospitality businesses. That means complying with the Payment Card Industry Data Security Standard (PCI).

    High-profile security breaches have become the norm along with laws mandating public disclosure in the event of one happening. Attackers, laws and compliance standards create a stressful environment for anyone who wants to do business with credit cards.

    This webcast will cover the threat landscape and discuss how attackers are trying to get the PII data that you hold. Learn how to better protect against advanced cyberattacks and customized malware from the perimeter to the endpoint.

    In this webcast you’ll learn how to:
    • Protect your retail business in the current threat landscape
    • Stop threats at the perimeter
    • Knock out phishing attacks
    • What steps to take to become PCI compliant
    • Discover and stop unknown forms of cyberattacks
  • 2018 SonicWall Cyber Threat Report Recorded: Aug 20 2018 1 min
    On-demand video
    SonicWall President and CEO Bill Conner outlines the critical importance of actionable threat intelligence to deliver favorable security outcomes.
  • SonicWall Capture Security Center Video Data Sheet Recorded: Aug 16 2018 3 mins
    On-demand video
    Capture Security Center provides an enterprise-wide view of your security environment and real-time security data, enabling you to create a centralized security governance, compliance and risk-management strategy
  • Multi-User MIMO with SonicWall SonicWave Recorded: Aug 16 2018 2 mins
    On-demand video
    Learn how SonicWave access points use MU-MIMO technology to simultaneously transmit to multiple wireless clients instead of just one.
  • SonicWall: Securing Organizations in the Cyber Arms Race Recorded: Aug 16 2018 2 mins
    On-demand video
    The cyber arms race affects governments, businesses and organizations of all sizes. SonicWall automated breach detection and prevention protects more than 500,000 organizations around the world, so they can do more with less fear.
  • SonicWall Wireless Solutions for Retail Recorded: Aug 16 2018 3 mins
    On-demand video
    SonicWall wireless access points help you ensure PCI compliance while providing a superior end-user experience and comprehensive threat protection
  • Provide anytime, any-device secure access to any application with SonicWall SMA Recorded: Aug 16 2018 3 mins
    On-demand video
    Move to the cloud, and embrace mobility and BYOD, with SonicWall SMA. Consolidate access control for hybrid IT, federate identities for single sign-on and deliver anytime, anywhere, any-device access to network, web or cloud applications.
  • SonicWall Capture Labs Recorded: Aug 16 2018 5 mins
    On-demand video
    In 2016, the SonicWall Capture Threat Network observed 60 million unique malware samples, 7.9 billion malware attack attempts, 638 million ransomware attacks and showed that 62% of SonicWall customer internet sessions were encrypted using SSL/TLS.
    The SonicWall Capture Labs Threat Research Team:
    •Gathers, analyzes, and vets cross-vector threat information from more than one million sensors around the world,

    • Performs rigorous testing and evaluation,
    • Establishes reputation scores for email senders and content
    • Identifies new threats in real-time.

    Get the most up-to-date protection against new attacks with real-time information from SonicWall Capture Labs.
  • Identificare e bloccare il malware nel modo più veloce e accurato possibile Recorded: Jun 27 2018 32 mins
    Claudio Dell'Ali
    Ascolta gli esperti di sicurezza di SonicWall in questo webinar esclusivo dal titolo “Identificare e bloccare il malware nel modo più veloce e accurato possibile”.
    Scopri come la tecnologia Real-Time Deep Memory Inspection (RTDMI™) di SonicWall consente a SonicWall Capture Advanced Threat Protection di:
    •Rilevare più malware in modo più veloce rispetto ai metodi di sandboxing basati sul comportamento, con un tasso più basso di falsi positivi
    •Bloccare gli attacchi sofisticati estraendo il codice compresso nella memoria in un ambiente sandbox sicuro
    •Arrestare velocemente le minacce incorporate in file Microsoft Office e Adobe PDF
  • So können Sie Ihre Daten optimal schützen Recorded: Jun 26 2018 50 mins
    Sven Janssen-Regional Director Central Europe,SonicWall and Ivonne Ehle-Sales Engineer, SCME, Certified Trainer, StorageCraft
    Laut dem SonicWall Cyber Threat Report 2018 haben Ransomware-Angriffe im Jahresvergleich insgesamt deutlich abgenommen. Allerdings geht der Trend bei der Anzahl der Ransomware-Varianten konstant nach oben und ist 2017 um 101,2 % gestiegen. Damit ist Ransomware nach wie vor eine große Bedrohung für kleine und große Unternehmen!
    Nehmen Sie an diesem gemeinsamen, exklusiven Webcast von SonicWall und StorageCraft teil und lernen Sie effiziente Methoden kennen, um diese gefährliche und potenziell kostspielige Bedrohung zu bekämpfen. Erfahren Sie

    •wie Cyberkriminelle Schwachstellen in Ihrem Netzwerk ausnutzen.
    •wie Sie Ransomware verhindern und stoppen können.
    •wie Sie Ihre wertvollsten Daten optimal schützen können.
  • Cómo identificar y bloquear “Malware” de la forma más rápida y precisa posible Recorded: Jun 26 2018 46 mins
    Maria Garcia
    Escuche a los expertos en seguridad de SonicWall en nuestro seminario virtual exclusivo “Cómo identificar y bloquear malware de la forma más rápida y precisa posible”.
    Descubra cómo la tecnología de Inspección de memoria profunda en tiempo real (RTDMI) de SonicWall permite a nuestra plataforma Cloud “Capture Advanced Threat Protection”:
    •Detectar más ataques de malware con mayor rapidez que otros métodos de sandboxing de la competencia, basados en comportamiento, y ratio de falsos positivos inferior.
    •Bloquear ataques sofisticados desempaquetando el código comprimido en memoria en un entorno seguro de sandboxing
    •Detener de forma inmediata las amenazas incrustadas en archivos de Microsoft Office y Adobe PDF
  • Identifizieren und stoppen Sie Malware so schnell und präzise wie möglich Recorded: Jun 26 2018 49 mins
    Sven Janssen
    Nehmen Sie an unserem exklusiven Webinar „Identifizieren und stoppen Sie Malware so schnell und präzise wie möglich“ teil.
    Erfahren Sie von unseren Sicherheitsexperten, wie SonicWall Capture Advanced Threat Protection mit SonicWall Real-Time Deep Memory Inspection(RTDMI™)-Technologie:
    •mehr Malware erfasst als verhaltensbasierte Sandboxing-Methoden und dabei schneller ist und eine geringere Falsch-Positiv-Rate erzielt.
    •raffinierte Angriffe blockiert, indem im Speicher komprimierter Code in einer sicheren Sandbox-Umgebung entpackt wird.
    •in Microsoft Office- und Adobe PDF-Dateien eingebettete Bedrohungen schnell stoppt.
  • Identifiez et stoppez les logiciels malveillants rapidement et efficacement Recorded: Jun 25 2018 29 mins
    Sylvain Stahl
    Rejoignez les experts en sécurité de SonicWall à l’occasion d’un webinaire exclusif, « Identifiez et stoppez les logiciels malveillants rapidement et efficacement ».
    Découvrez comment la technologie RTDMI™ (Real-Time Deep Memory Inspection) de SonicWall permet à la solution SonicWall Capture Advanced Threat Protection de :
    •capturer davantage de logiciels malveillants plus rapidement que les stratégies de sandboxing reposant sur les comportements, avec un nombre limité de fausses alertes
    •bloquer des attaques très élaborées en étudiant le code empaqueté dans la mémoire au sein d’un environnement sécurisé de sandbox
    •stopper rapidement les menaces embarquées dans les documents Microsoft Office et les fichiers PDF Adobe
  • Identify and Stop Malware in the Quickest and Most Accurate Way Possible Recorded: Jun 21 2018 52 mins
    Bob Honour - EMEA Marketing Director; John Aarsen - Solutions Architect
    Join SonicWall security experts for an exclusive webinar, “Identify and Stop Malware in the Quickest and Most Accurate Way Possible.”
    Learn how SonicWall Real-Time Deep Memory Inspection (RTDMI™) technology enables SonicWall Capture Advanced Threat Protection to:
    •Catch more malware faster than behavior-based sandboxing methods, with a lower false positive rate
    •Block sophisticated attacks by unpacking compressed code in memory in a secure sandbox environment
    •Quickly stop threats embedded in Microsoft Office and Adobe PDF files
Preventing complex network security breaches for more than 25 years
SonicWall has been fighting the cyber-criminal industry for over 25 years defending small, medium-size businesses and enterprises worldwide. Backed by research from SonicWall Capture Labs, our award-winning real-time breach detection and prevention solutions coupled with the formidable resources of over 19,000 loyal channel partners around the globe, are the backbone securing more than a million business and mobile networks and their emails, applications, and data. This combination of products and partners has enabled an automated real-time breach detection and prevention solution tuned to the specific needs of the more than 500,000 organizations in over 150 countries. These businesses can run more effectively and fear less about security. For more information, visit www.sonicwall.com and join SonicWall on Twitter, SonicWall on Facebook and SonicWall on LinkedIn.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cyber threats – fight back with SonicWall adaptive network security solutions
  • Live at: Feb 16 2017 10:00 am
  • Presented by: Florian Malecki
  • From:
Your email has been sent.
or close