Why Traditional Anti-Virus Protection Is Not Enough
Learn the factors as to why traditional Anti-Virus is no longer enough to protect your businesses from the risks posed by complex security threats of today. Macky Cruz, Lead Security Engineer for TrendLabs, outlines how the changes in digital trends and technologies introduce stealthier and multi-pl
Learn the factors as to why traditional Anti-Virus is no longer enough to protect your businesses from the risks posed by complex security threats of today. Macky Cruz, Lead Security Engineer for TrendLabs, outlines how the changes in digital trends and technologies introduce stealthier and multi-platform threats.
• Discover what kinds of security threats plagued SMBs.
• Understand how malware infection and information theft can impact your businesses
• Learn how comprehensive security can protect your businesses from security risks.
Who should attend this webinar: This webinar has been designed to cater to both technical and non-technical viewers. It is especially useful for IT personnel and SMB owners and/or decision makers.
Cloud adoption in higher education is greater than in any other industry, with 83% using Google Apps or Office 365. As universities move from on-premise to public cloud apps to meet the need for modern collaboration tools and the increasing demand for BYOD, IT leaders are increasingly aware of the security risk to sensitive research data and student personal information.
In this webinar will discuss the unique security issues of higher education including faculty file sharing and employee BYOD.
Intune is the Microsoft Mobile Device Management platform. It is the only MDM solution that can integrate with System Center Configuration Manager. Administrators can manage their on premise and mobile devices using a single console. In this webinar Enterprise Client Management MVP Gerry Hampson will be discussing his favourite features of the solution
A major company has been hacked, suffering a data breach. How do companies the size of Sony handle such situations? Various departments, including legal, tech and PR come together to meet with the management and workout a plan on how to handle the crisis. This presentation will focus on both -- companies with a data breach response plan and those without one. We'll shed some light on what the first 24 hours post-breach looks like for a major company.
Understanding the cybersecurity posture of vendors, suppliers, and third-parties is now a necessity for businesses in all industries. Yet, many businesses do not have a formalized vendor risk management program. There are multiple components needed to create a comprehensive vendor risk management program. These span governance and control, as well as security controls and technology.
Join Jake Olcott, VP at BitSight on February 9 as he highlights best practices and industry standards for vendor risk management programs. Attendees will learn:
- Which frameworks and methodologies can help get you started
- Vital questions you should be asking your vendors
- Why continuous monitoring and verifying vendor security is crucial to mitigate cyber risk
Do you want to learn about new disaster recovery options from Microsoft experts? Have you been putting off trying new technology due to time pressures or not knowing where to start? Do you think your disaster recovery strategy would benefit from a refresh?
If you answered yes to any of these questions, you need to register for this webcast. You will learn:
•How to replicate any workloads to Microsoft's global datacenters
•How to back up data and protect workloads with nearly infinite scalability
•How to implement a hybrid replication using both cloud and on-premises solutions
•How to create a backup without needing to buy more tape
•How to back up your Windows clients (including Windows 10) to remote storage
Register now to watch live or receive notification when this program is available on-demand.
NRF 16 attracted over 33,000 attendees and focused on retail technology, trends, and areas of focus for the coming fiscal year. Hortonworks and Microsoft were visible booth presences, hosting large volumes of visitors. Together, the partnership is uniquely qualified to accelerate retail data collection and management.
Join Hortonworks VP of Industry Solutions, Eric Thorsen, and Microsoft’s Retail Industry Solutions Director, Shish Shridhar, to learn how Data-Centric Retail Trends can impact your business and how Hadoop can help you gain actionable insight from your data. Understand how your peers are using data to drive new levels of customer centricity, real-time inventory predictions, and personalized marketing. Learn about how consumer goods companies are using Hadoop to gain insight from demand signals and analyze data flow.
Chef has quickly become one of the leading delivery methods for DevOps application and infrastructure deployments. As a platform Chef can be used to build compliance, resiliency, analytics, and high availability into your AWS workloads. What if you could also use Chef to automate your security posture within AWS?
Using Trend Micro’s Deep Security we will evaluate different methods of automation using Chef Hosted Server, AWS Auto scaling Policies, and AWS OpsWorks and take security automation to the next level.
Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro; Ed Cabrera VP Cybersecurity Strategy
Hear the latest on the most recent data breaches, web threats, and cyber security topics in the news.
The recent attacks on Ukrainian Power Utility are highlighting a recent shift in destructive attacks against Critical Infrastructure. In this webinar Ed Cabrera, VP Cybersecurity Strategy and former CISO of the US Secret Service, will be joining us to cover this latest trend we’re seeing in the use of destructive malware against both critical infrastructure and commercial organizations. Learn the latest in destructive malware and why this technique is being used by threat actors today.
Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro; and Pawan Kinger, Director, Deep Security Labs
Join host Jon Clay and Pawan Kinger who manages our Deep Security Vulnerability Research team on what threats are affecting the data center servers and cloud infrastructures. Pawan will share which are the top vulnerabilities being exploited by threat actors against the critical servers hosted in data centers and cloud implementations. He’ll also cover differences we’re seeing between the cloud and on-premise servers and give best practices on how best to protect your servers from today’s threats.
What is a WAF (web application firewall) and how can it help defend your AWS workloads? In this webinar, you’ll learn how to get started with the new AWS WAF service and where it fits in your security strategy. You’ll see how AWS WAF works with Trend Micro’s Deep Security to provide a strong, layered defense for your web applications.
Forrest McMahon, Director Tech Advisory & Assessment Svcs Coalfire; & Steve Neville, Director Cloud & Data Center Trend Micro
Join Forrest McMahon from Qualified Security Assessor (QSA) Coalfire for an insightful view of PCI DSS 3.1 requirements in the face of increasingly sophisticated cyber-attacks and more complicated deployment scenarios:
1. How to approach the task of PCI DSS 3.1 compliance
2. What the impacts of different deployment environments (physical, virtual, cloud) have on compliance
3. What key tools & approaches can be used to streamline and ease compliance impacts
Tanweer Surve, Director of End User Services, Essilor; and Steve Neville, Director, Solutions Marketing, Trend Micro
Join us to hear Essilor discuss the challenges of migrating to a virtualized environment and how the company overcame them to achieve cost and performance benefits—while staying secure.
In this webinar, you’ll hear:
•The process Essilor went through to secure the new platform, developing criteria that both the business and technology decision makers were satisfied with.
• How Essilor selected a solution that fit those criteria and allowed for future evolution.
Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro
2016 Security Predictions. Hear the latest on the most recent data breaches, web threats, and cyber security topics in the news for October 2015. The best way to stay secure is to stay informed with Trend Micro experts.
Thomas M. Cifrino Jr., Technical Engineering Manager; Beth Israel Deaconess, Care Organization
Beth Israel Deaconess Care Organization (BIDCO) is one of the nation's preeminent Pioneer Accountable Care Organizations. BIDCO virtualized its data center to create a private cloud for delivering application services. And they did it in a way which mitigates risk and streamlines management of the new infrastructure.
Learn how having the right security strategy for virtual and cloud environments can help you avoid challenges such as vulnerability gaps, lost ROI, performance lag, and difficulty proving compliance. In this webinar, BIDCO will share how their virtualized environment fits their organization's mantra "security should never be a burden."
Watch an on-demand webinar to learn strategies for:
• Optimizing deployment, security, and management
• Relying on a virtual patching layer for ongoing protection
• Adding a necessary extra level of security through file integrity monitoring and log inspection
Smita Deshpande, Sr. WW PLM Manager, VMware; Steve Neville, Director, Cloud and Data Center Security, Trend Micro
Delivering security without compromising performance and efficiency.
Business demands are constantly changing and you need to be able to respond quickly, without compromising agility, efficiency and control. Software-Defined Data Center architecture helps enterprises achieve distinct IT outcomes for greater security, availability and faster service delivery. In this webinar, you will hear how the VMware NSX network virtualization platform and Trend Micro Deep Security work together to enable scalable, high performance security and you will learn how to….
• Simplify orchestration and automation of security controls
• Enforce microsegmentation and unit level security
• Manage network and system based security controls
• Correlate system and security events through a single view
Keith Vidal, Global Business Strategist, Microsoft Azure Steve Neville, Director, Cloud and Data Center Security, Trend Micro
Discover why Trend Micro cloud security works seamlessly in the Azure compute environment so you have what it takes to speed deployments and safely maximize the benefits of the cloud. Join executives from Microsoft and Trend Micro where you’ll learn:
•The security benefits of moving to the cloud on Azure
•Why it’s important to understand your role in shared responsibility
• The security you’ll need for operating system, applications, and data
•Best practices to optimize security for agility and cost effectiveness in the cloud
Mike Smith, Director of Data Center Security, Trend Micro
Like many organizations you may be managing a multi-faceted infrastructure leveraging virtual, private and public cloud environments. Given the complexity of these dynamic environments, you can be faced with limited visibility across platforms, performance lag, difficulty proving compliance and gaps within your security strategy. In this session we will discuss a comprehensive security model specific for VMWare environments that includes: vSphere, Horizon, vCloud and NSX, and you will learn how to:
•Enable automated security across multiple environments
•Correlate IT and security incidents and respond accordingly
•Ease security deployment and management for lower cost of ownership
Jon Oltsik, Sr. Principal Analyst, ESG & Adam DeMattia, Program Manager - Economic Validation, ESG
Cloud and data center security can be dauntingly complex, and selecting the right vendor to engage with is a critical decision for any enterprise. However, cloud and data center security can be a difficult market to navigate. Are vendors backing up their marketing claims? How do different approaches stack up next to each other? What factors need to be taken into consideration when comparing products? Trend Micro has teamed with analyst firm ESG to sort these questions out, and encourage organizations to think differently when it comes to cloud and data center security.
ESG conducted an independent economic evaluation to investigate the differences between Trend Micro and traditional security approaches, and are conducting a live webinar to present their findings. ESG and Trend Micro will give insight into the cloud and data center security market, ESG’s Economic Value Validation methodology, and the conclusions that were reached about the value Trend Micro is providing to their customers. Join us to learn more!
Jason Cradit, VP of Information Services, Willbros Group
Attend this practical webinar by AWS, Trend Micro and Willbros to learn how you can design a flexible, agile architecture that meets compliance requirements and protects your most valuable asset – your data. Jason Cradit from Willbros will share his experience on how they achieved building robust and secure pipeline management systems in the cloud.
Jon Oltsik, Sr. Principal Analyst, ESG Steve Neville, Director of Customer Solutions, Trend Micro
The End of Support (EOS) of Microsoft Windows Server 2003 in July 2015 will put millions of enterprise servers at risk. And according to a recent study by leading analyst firm Enterprise Strategy Group (ESG), “More than 80% of enterprise and midmarket organizations still support Windows Server 2003 to some extent.” Newly discovered vulnerabilities will not be patched or documented by Microsoft. Hackers know this and will be targeting new exploits at the considerable number of Windows Server 2003 servers still in use. In this webinar, ESG will share the significant findings from its recent survey of Microsoft Windows Server 2003 customers. Also, Trend Micro will discuss how to protect your legacy Windows 2003 server environment while you plan your move to newer platforms. Join us and learn how to:
· Protect and secure your Windows 2003 Servers after EOS
· Build a comprehensive security strategy with virtual patching (IPS), file integrity monitoring, and anti-malware
· Ensure your organization is protected across physical, virtual, and cloud environments as you migrate to newer platforms such as Windows Server 2012 and Azure
Bruce Jamieson, Network Systems Manager, Information Systems, A&W
Not having the right security as you migrate to virtual and cloud environments can lead to security gaps, lost ROI, performance lag, and difficulty proving compliance. Working together, Trend Micro and VMware have partnered to deliver the first agentless security platform architected for VMware virtualized data centers (including NSX), virtual desktops, and cloud deployments. A&W Food Services is Canada’s original—and fastest growing— burger chain and they have trusted in VMware and Trend Micro to ensure their modern data center is secure. In this session, A&W will share their story and you will learn how they…
• Shield vulnerabilities before they can be exploited, saving the cost of emergency patching
• Deliver automated security across environments
• Ease security deployment and management for lower cost of ownership
• Automate security deployments while increasing protection for virtual environments.
Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. For the past 25 years, its employees have been inspired to protect individuals, families, businesses and governments as they look to harness the potential of emerging technologies and new ways of sharing information.
· In today’s organizations, information has become the most strategic asset, embodying competitive advantage and powering operational excellence. With the explosion of mobile, social and cloud technologies, protecting this information has become more challenging than ever. Organizations need a smart protection strategy.
· Trend Micro enables the smart protection of information, with innovative security solutions that are simple to deploy and manage, and fits an evolving ecosystem. Trend Micro solutions provide layered content security for mobile devices, endpoints, gateways, servers and the cloud. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.