Protect your IT Infrastructure to Prevent Targeted Attacks
For most organizations, the network perimeter has expanded and blurred with the proliferation of social networking, remote access, and cloud computing. In addition, with the evident constant stream of new viruses, worms, rootkits, denial of service (DDoS) attacks and other security threats achieve substantial publicity; such threats don’t usually receive notice until significant damage has already occurred. And operations like yours are frequently required to provide a degree of network access to vendor partners and customers so that they can access pertinent information. With all of these potential entry points, it has never been more imperative for IT stakeholders to proactively support a comprehensive risk management strategy.
Join Trend Micro and CDW to learn how to protect your organization from the various forms of sophisticated attacks aimed specifically at your users, your gas control systems, your customers’ information, or all of the above. CDW has the expertise, product and the services to help control and mitigate your risk exposure before damage has already occurred with Trend Micro Deep Discovery as a customizable solution specific to your environment as a part of your Defense in Depth strategy. Reduce your exposure.
Technology has changed the game for small businesses. For decades, being “the little guy” has been a disadvantage, but not anymore. The right technology can turn an SMB from a niche player in an industry to a major threat to established enterprise players.
Join us for a special webinar featuring Canada-based EXOCLOUD to learn how they’ve quickly grown their business by finding, winning, and keeping more customers with Salesforce.
Learn how one of Canada’s fastest growing small businesses:
· Developed a repeatable, winning sales process that grew revenue by 258%
· Created a complete 360-degree customer view
· Brought in 79% more qualified sales leads
· Resolved customer issues 75% faster
Who has access to your social media accounts? In order to protect your brand it's vital to secure your social media passwords. Learn how you can use the Azure AD Premium portal to manage access to social media platforms such as Twitter, LinkedIn and Facebook.
This week on White Space, we look back at the news from DCD Converged conference in London. We’ve also brought back a special guest - Cole Crawford, CEO of Vapor IO and purveyor of unusual rack arrangements.
We discuss various ways to reuse server heat and discover that Coca Cola is apparently using Internet of Things to develop new flavors of the sugary drink.
Peter looks at the reasons behind the Telecity outage in the UK - but this outage has nothing on the recent data center fire in Azerbaijan, that left almost the entire country without access to the Internet.
Also mentioned are the news about CA Technologies getting out of the DCIM business, the reinvention of liquid cooling company Iceotope and the fact that the US government has just discovered another 2000 data centers it didn’t know it had.
Whether you are already hosting applications on Amazon Web Services, or looking to expand your enterprise footprint into public cloud services, security and compliance will be top of mind. Like the doors and windows in your building, your web-based applications are the most visible points of entry for cyber attackers.
Therefore they are also the most targeted from cyber attacks, and you need to ensure you have a solid security foundation to be able to continuously monitor and protect your workloads from compromise – especially as vulnerabilities and attacks against your applications are completely up to you to monitor, discover and remediate, and not your cloud service provider.
Register for this impactful webinar presented by James Brown, Director of Cloud Solutions Architecture who will review in detail the Five Reasons why you need to protect web-based applications in AWS:
1.Web applications are the number 1 attack vector in AWS
2.There is no one type of web application attack
3.Successful web attacks can cost you ……… a lot
4.Security responsibility is shared with AWS, but you need to understand what they don’t cover (your application security)
5.Your customers care
Amazon Web Services has provided companies of all sizes with on demand elastic IT infrastructure services in the cloud totaling more than 50 services. This series gives you an opportunity to ask questions from an AWS expert live on any topic and also hear an overview of the subset of services/tools that AWS offers in big data and analytics.
Either submit questions during the session or ahead of time to firstname.lastname@example.org. In the email please include your NAME, COMPANY and JOB TITLE.
Wireless is now the expected medium of choice for network users. Delivering it successfully can be a challenge especially with multiple different approaches and architectures available. What is right for your organisation? Cloud? Controller? How is it all secured?
This session will discuss 3 main Wi-Fi architecture types, their different advantages, the wired edge, and how to secure it all. Importantly, we will finish with what to consider when making the right choice for your needs.
IT organizations face rising challenges to protect more data and applications in the face of growing data security threats as they deploy encryption on vastly larger scales and across cloud and hybrid environments. By moving past silo-constrained encryption and deploying encryption as an IT service centrally, uniformly, and at scale across the enterprise, your organization can benefit from unmatched coverage— whether you are securing databases, applications, file servers, and storage in the traditional data center, virtualized environments, and the cloud, and as the data moves between these different environments. When complemented by centralized key management, your organization can apply data protection where it needs it, when it needs it, and how it needs it—according to the unique needs of your business. Join us on November 25th to learn how to unshare your data, while sharing the IT services that keep your data secure, efficiently and effectively in the cloud and across your entire infrastructure.
Analysts have been advising for many years that all businesses are becoming software businesses and one of the key software platforms that organisations invest in to support this is SAP's Enterprise Solutions. With this transformation, the availability of these mission-critical enterprise services increases every day.
During this webinar, you can learn how:
• SAP and SUSE have collaborated for 16 years to make Linux the preferred operating system upon which SAP applications run.
• SUSE can help you unleash the power of Open Source whilst providing the most performant and resilient platform available for your SAP applications
• Highly-Available SAP HANA, the core of SAP's next generation business suite S4/HANA, is ONLY available on SUSE Linux
One of SUSE’s Platinum Partners – Securelinx – who specialise in the deployment, configuration and support of Linux, are sponsoring this webinar.
Hewlett Packard Enterprise Flexible Capacity is a solution that provides Cloud like agility & economics, in the privacy of your own data centre, across Storage, Server and Networking. It enables you to respond to business demands and scale up capacity in minutes, not months and our advanced metering and billing ensures customers are only paying for what they consume.
In this webcast we will discuss:
•How to reduce operational costs: Free up CAPEX – pay for what you consume, whilst aligning IT cost to business demand
•How to reduce risk: Reduce capacity risk, as we ensure you always have enough to respond to business demand & reduce unplanned downtime through tailored proactive support
•How to maximise business agility: Respond to business & market demands in minutes, not months. Reduce Time to Market through easing procurement cycle from months to days
•And finally we will talk you through the solution and show how it has helped meet our customers’ business challenges.
What is a WAF (web application firewall) and how can it help defend your AWS workloads? In this webinar, you’ll learn how to get started with the new AWS WAF service and where it fits in your security strategy. You’ll see how AWS WAF works with Trend Micro’s Deep Security to provide a strong, layered defense for your web applications.
Forrest McMahon, Director Tech Advisory & Assessment Svcs Coalfire; & Steve Neville, Director Cloud & Data Center Trend Micro
Join Forrest McMahon from Qualified Security Assessor (QSA) Coalfire for an insightful view of PCI DSS 3.1 requirements in the face of increasingly sophisticated cyber-attacks and more complicated deployment scenarios:
1. How to approach the task of PCI DSS 3.1 compliance
2. What the impacts of different deployment environments (physical, virtual, cloud) have on compliance
3. What key tools & approaches can be used to streamline and ease compliance impacts
Tanweer Surve, Director of End User Services, Essilor; and Steve Neville, Director, Solutions Marketing, Trend Micro
Join us to hear Essilor discuss the challenges of migrating to a virtualized environment and how the company overcame them to achieve cost and performance benefits—while staying secure.
In this webinar, you’ll hear:
•The process Essilor went through to secure the new platform, developing criteria that both the business and technology decision makers were satisfied with.
• How Essilor selected a solution that fit those criteria and allowed for future evolution.
FBI cyber special agent guest, and Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro
TREND MICRO LIVE WEBINAR
Findings from the FBI: Information on the Latest Threats and Data Breaches
Join us for a special presentation from Jon Clay and an FBI guest speaker, sharing the latest information on threats the FBI has investigated in recent months. The FBI is directly involved in many high-profile data breaches and in this webinar, you can hear what has been discovered during these investigations.
Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro
2016 Security Predictions. Hear the latest on the most recent data breaches, web threats, and cyber security topics in the news for October 2015. The best way to stay secure is to stay informed with Trend Micro experts.
Thomas M. Cifrino Jr., Technical Engineering Manager; Beth Israel Deaconess, Care Organization
Beth Israel Deaconess Care Organization (BIDCO) is one of the nation's preeminent Pioneer Accountable Care Organizations. BIDCO virtualized its data center to create a private cloud for delivering application services. And they did it in a way which mitigates risk and streamlines management of the new infrastructure.
Learn how having the right security strategy for virtual and cloud environments can help you avoid challenges such as vulnerability gaps, lost ROI, performance lag, and difficulty proving compliance. In this webinar, BIDCO will share how their virtualized environment fits their organization's mantra "security should never be a burden."
Watch an on-demand webinar to learn strategies for:
• Optimizing deployment, security, and management
• Relying on a virtual patching layer for ongoing protection
• Adding a necessary extra level of security through file integrity monitoring and log inspection
Smita Deshpande, Sr. WW PLM Manager, VMware; Steve Neville, Director, Cloud and Data Center Security, Trend Micro
Delivering security without compromising performance and efficiency.
Business demands are constantly changing and you need to be able to respond quickly, without compromising agility, efficiency and control. Software-Defined Data Center architecture helps enterprises achieve distinct IT outcomes for greater security, availability and faster service delivery. In this webinar, you will hear how the VMware NSX network virtualization platform and Trend Micro Deep Security work together to enable scalable, high performance security and you will learn how to….
• Simplify orchestration and automation of security controls
• Enforce microsegmentation and unit level security
• Manage network and system based security controls
• Correlate system and security events through a single view
Keith Vidal, Global Business Strategist, Microsoft Azure Steve Neville, Director, Cloud and Data Center Security, Trend Micro
Discover why Trend Micro cloud security works seamlessly in the Azure compute environment so you have what it takes to speed deployments and safely maximize the benefits of the cloud. Join executives from Microsoft and Trend Micro where you’ll learn:
•The security benefits of moving to the cloud on Azure
•Why it’s important to understand your role in shared responsibility
• The security you’ll need for operating system, applications, and data
•Best practices to optimize security for agility and cost effectiveness in the cloud
Mike Smith, Director of Data Center Security, Trend Micro
Like many organizations you may be managing a multi-faceted infrastructure leveraging virtual, private and public cloud environments. Given the complexity of these dynamic environments, you can be faced with limited visibility across platforms, performance lag, difficulty proving compliance and gaps within your security strategy. In this session we will discuss a comprehensive security model specific for VMWare environments that includes: vSphere, Horizon, vCloud and NSX, and you will learn how to:
•Enable automated security across multiple environments
•Correlate IT and security incidents and respond accordingly
•Ease security deployment and management for lower cost of ownership
Jon Oltsik, Sr. Principal Analyst, ESG & Adam DeMattia, Program Manager - Economic Validation, ESG
Cloud and data center security can be dauntingly complex, and selecting the right vendor to engage with is a critical decision for any enterprise. However, cloud and data center security can be a difficult market to navigate. Are vendors backing up their marketing claims? How do different approaches stack up next to each other? What factors need to be taken into consideration when comparing products? Trend Micro has teamed with analyst firm ESG to sort these questions out, and encourage organizations to think differently when it comes to cloud and data center security.
ESG conducted an independent economic evaluation to investigate the differences between Trend Micro and traditional security approaches, and are conducting a live webinar to present their findings. ESG and Trend Micro will give insight into the cloud and data center security market, ESG’s Economic Value Validation methodology, and the conclusions that were reached about the value Trend Micro is providing to their customers. Join us to learn more!
Jason Cradit, VP of Information Services, Willbros Group
Attend this practical webinar by AWS, Trend Micro and Willbros to learn how you can design a flexible, agile architecture that meets compliance requirements and protects your most valuable asset – your data. Jason Cradit from Willbros will share his experience on how they achieved building robust and secure pipeline management systems in the cloud.
Jon Oltsik, Sr. Principal Analyst, ESG Steve Neville, Director of Customer Solutions, Trend Micro
The End of Support (EOS) of Microsoft Windows Server 2003 in July 2015 will put millions of enterprise servers at risk. And according to a recent study by leading analyst firm Enterprise Strategy Group (ESG), “More than 80% of enterprise and midmarket organizations still support Windows Server 2003 to some extent.” Newly discovered vulnerabilities will not be patched or documented by Microsoft. Hackers know this and will be targeting new exploits at the considerable number of Windows Server 2003 servers still in use. In this webinar, ESG will share the significant findings from its recent survey of Microsoft Windows Server 2003 customers. Also, Trend Micro will discuss how to protect your legacy Windows 2003 server environment while you plan your move to newer platforms. Join us and learn how to:
· Protect and secure your Windows 2003 Servers after EOS
· Build a comprehensive security strategy with virtual patching (IPS), file integrity monitoring, and anti-malware
· Ensure your organization is protected across physical, virtual, and cloud environments as you migrate to newer platforms such as Windows Server 2012 and Azure
Bruce Jamieson, Network Systems Manager, Information Systems, A&W
Not having the right security as you migrate to virtual and cloud environments can lead to security gaps, lost ROI, performance lag, and difficulty proving compliance. Working together, Trend Micro and VMware have partnered to deliver the first agentless security platform architected for VMware virtualized data centers (including NSX), virtual desktops, and cloud deployments. A&W Food Services is Canada’s original—and fastest growing— burger chain and they have trusted in VMware and Trend Micro to ensure their modern data center is secure. In this session, A&W will share their story and you will learn how they…
• Shield vulnerabilities before they can be exploited, saving the cost of emergency patching
• Deliver automated security across environments
• Ease security deployment and management for lower cost of ownership
• Automate security deployments while increasing protection for virtual environments.
Mike Smith, Data Center Product Marketing Manager, Trend Micro; Stephen Koch, Sr. Systems Engineer at University of Pittsburg
Not having the right security as you migrate to virtual and cloud environments can lead to security gaps, lost ROI, performance lag, and difficulty proving compliance. Working together, Trend Micro and VMware have partnered to deliver the first agentless security platform architected for VMware virtualized data centers (including NSX), virtual desktops, and cloud deployments. Founded in 1787, the University of Pittsburgh is one of the oldest institutions of higher education in the US and they have trusted in VMware and Trend Micro to ensure their modern data center is secure. In this session, University of Pittsburgh will share their story and you will learn how they:
- Optimize data center resources with virtualization aware security
- Deliver automated security across environments
- Manage and deploy security efficiently
- Achieve cost effective compliance
David Shipley, Director, Strategic Initiatives, Information Technology Services, University of New Brunswick
Like many large universities, the University of New Brunswick (UNB) found itself increasingly targeted by a vast array of Internet threats. Originally designed to give large numbers of users broad access to data of all kinds, university IT systems like UNB’s are easy targets for cyber criminals.
Join David Shipley from UNB for this live, interactive webinar, as he describes the ambitious process that he and his colleagues undertook to implement a proactive, intelligence-based cyber security strategy that gives them real-time visibility into attacks in progress, along with actionable insights to respond quickly and effectively.
In less than an hour, David will tell you:
• Why simply reinforcing perimeter defenses was not the right approach for UNB
• How they were able to gain better security visibility and intelligence—and use it effectively
• Which solutions combined to dramatically improve UNB’s cyber security without greatly increasing resource demands
• And more…
Don’t miss this opportunity to learn from an accomplished peer, and to discover how you too can create and implement an effective, intelligence-based security strategy for your organization.
Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. For the past 25 years, its employees have been inspired to protect individuals, families, businesses and governments as they look to harness the potential of emerging technologies and new ways of sharing information.
· In today’s organizations, information has become the most strategic asset, embodying competitive advantage and powering operational excellence. With the explosion of mobile, social and cloud technologies, protecting this information has become more challenging than ever. Organizations need a smart protection strategy.
· Trend Micro enables the smart protection of information, with innovative security solutions that are simple to deploy and manage, and fits an evolving ecosystem. Trend Micro solutions provide layered content security for mobile devices, endpoints, gateways, servers and the cloud. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.