Hi [[ session.user.profile.firstName ]]

Ransomware in 2018 – Brace yourself

Ransomware, zero day exploits, and phishing attacks, they're among the biggest nightmares facing IT today. The time between exploit, discovery and weaponization is getting shorter and shorter and it’s going to be harder and harder to protect yourself. Last year, 63% of organizations experienced an attempted ransomware attack, with 22% reporting these incidents occurred on a weekly basis.* Attend this webinar and learn four ways you can reduce your exposure to ransomware threats, recover encrypted data more quickly and get employees back to work.

You’ll learn the basics of data protection that Citrix customers are using today, including:
• Publish virtualized, sandboxed and hardened browsers and email clients
• Utilize Hypervisor Introspection (HVI) to detect ransomware techniques
• Protect mobile devices against attacks with containerization
• Provide a secure and robust enterprise data sync and sharing service
Recorded Nov 13 2018 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Florin Lazurca, Sr. Technical Marketing Manager, Citrix; Andrei Florescu, Sr. Solutions Architect, Bitdefender
Presentation preview: Ransomware in 2018 – Brace yourself

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 4 Keys to a Successful Access Security Strategy Oct 17 2019 6:00 am UTC 48 mins
    Akhilesh Dhawan – Director PMM Secure Digital Perimeter
    In this webinar, we will cover Citrix Access Control service that helps consolidate VPN, single sign-on and granular security controls for SaaS, web and virtual applications, as well as web filtering and web isolation controls for the Internet.

    Point products are expensive to maintain and result in poor end user experience. Moreover with the shortage of security skill sets, these technologies are not being used to their full potential and with best practices, leading to gaps in security and increased risk.

    Using Citrix Access Control you can:

    1.Reduce TCO of your security products
    2.Improve retention of your security talent
    3.Provide granular and consistent security policies across all access use cases
    4.Improve the end user experience and increase employee productivity
  • Citrix Security Approach: App and Network Attacks Recorded: Jul 23 2019 46 mins
    Akhilesh Dhawan, Dir of Prod Marketing- Cloud/Security Citrix & Darshant Bhagat, Dir of Prod Management/Strat Citrix
    Find out how the Citrix Security approach brings together the entire Citrix portfolio to address internal and external threats by providing holistic visibility and proactive protection of your company assets.

    This on-demand webinar deep dives into: protection of applications from on-premise to the cloud, hypervisor protection of servers before the threat hits the operating system, and device and user protection from external threats. Proactively counter internal and external threats through analytics.
  • Ransomware in 2018 – Brace yourself Recorded: Jul 18 2019 60 mins
    Florin Lazurca, Sr. Technical Marketing Manager, Citrix; Andrei Florescu, Sr. Solutions Architect, Bitdefender
    Ransomware, zero day exploits, and phishing attacks, they're among the biggest nightmares facing IT today. The time between exploit, discovery and weaponization is getting shorter and shorter and it’s going to be harder and harder to protect yourself. Last year, 63% of organizations experienced an attempted ransomware attack, with 22% reporting these incidents occurred on a weekly basis.* Attend this webinar and learn four ways you can reduce your exposure to ransomware threats, recover encrypted data more quickly and get employees back to work.

    You’ll learn the basics of data protection that Citrix customers are using today, including:
    • Publish virtualized, sandboxed and hardened browsers and email clients
    • Utilize Hypervisor Introspection (HVI) to detect ransomware techniques
    • Protect mobile devices against attacks with containerization
    • Provide a secure and robust enterprise data sync and sharing service
  • Key considerations for SaaS security and performance Recorded: Jul 10 2019 70 mins
    Akhilesh Dhawan, Matt Brooks, Robin Manke-Cassidy, & Wesley Shepherd
    Companies are turning to Software as a Service (SaaS) to ease their cloud transformation and increase agility. According to a Bettercloud survey, 73% of all companies say that nearly all of their apps will be SaaS by 2020. SaaS offers speed to market, great functionality, and lower IT operating costs. However, it can also create IT security and app performance headaches.
    Join us as two Citrix experts in the fields of networking and IT provide industry perspective and their experiences on:
    -How hackers use different techniques to exploit weaknesses in your SaaS, web, and other applications
    -How Citrix can reduce SaaS and web security threats with an integrated solution
    -Key factors that influence SaaS and web app performance
    -How Citrix can improve application performance for more than 4,000 SaaS apps, including O365
    -Why a Citrix-differentiated security approach with a people-centric focus extends the digital perimeter
  • Reduce Exposure to Internal and External App and Network Attacks Recorded: Jun 5 2019 46 mins
    Akhilesh Dhawan, Dir of Prod Marketing- Cloud/Security Citrix & Darshant Bhagat, Dir of Prod Management/Strat Citrix
    Find out how the Citrix Security approach brings together the entire Citrix portfolio to address internal and external threats by providing holistic visibility and proactive protection of your company assets.

    This on-demand webinar deep dives into: protection of applications from on-premise to the cloud, hypervisor protection of servers before the threat hits the operating system, and device and user protection from external threats. Proactively counter internal and external threats through analytics.
  • Scared of data security in SaaS applications? Don’t worry, we have your back Recorded: May 30 2019 38 mins
    Akhilesh Dhawan, Dir. Product Marketing, Networking/Security; Praveen Raghuraman, Dir. Product Management, Networking, Citrix
    Most organizations have some data stored in SaaS applications or are thinking of moving to SaaS. Some of this migration to SaaS is controlled by IT (sanctioned SaaS apps), while most of this migration is undertaken by individual business units (unsanctioned SaaS apps) in order to achieve better productivity or to get some tasks done. While IT has deployed methods like single sign-on to sanctioned applications, they cannot control access to any unsanctioned SaaS applications using the same SSO solution. And traditional single sign-on solutions don’t provide any control on what actions a user can take after they login to SaaS applications, nor do they provide security policies for IT to control user access to the Internet.

    In this session, you will learn about a single solution that helps:

    • Improve user experience with single sign-on to SaaS, web and virtual apps
    • Implement enhanced security policies for SaaS apps to control user actions after login
    • Enable Web filtering to control what users cannot access on the Internet
    • Securely browse the internet
    • Provide end to end visibility and user behavior analytics with Citrix Analytics
  • Hybrid multi-cloud infrastructure for modern app delivery Recorded: Jan 24 2019 58 mins
    Dave Potter, Senior Solutions Architect at Citrix, and Robin Manke-Cassidy, Director of Networking and Security Product Marke
    IT transformation, cloud, and new application development methods are changing the face of application delivery infrastructure. These new infrastructures require flexibility, security, and operational efficiency to uncover the true value to the business. We will discuss the changes driving infrastructure architects to evaluate the application delivery networking and provide a clear strategy on successfully migrating your business to a modern app delivery for hybrid multi-cloud and Cloud Native environments.
  • Taking Charge of GDPR Recorded: Jan 9 2019 59 mins
    Larry Dietz, General Counsel, TAL Global and Stephen Twynam, Senior Sales Engineer, Citrix
    The EU General Data Protection Regulation (GDPR) deadline was 25 May, 2018. If you think you’re immune from its impact, think again. In a Ponemon study, 65% of businesses are concerned about potential fines and 74% say complying with the GDPR will negatively impact their organisation. Whether you’ve prepared or not, attend this webinar to find out best practices, pitfalls, and how companies like yours can achieve some quick wins in their long-term compliance strategy.

    In this webinar, you will learn:

    •What’s different with the current regulations
    •How secure digital workspaces can help
    •Scenarios organisations may encounter
  • GDPR: What You Need to Know Now Recorded: Dec 20 2018 55 mins
    Florin Lazurca, Technical Security Strategist, Citrix and Stephen Twynam ,Senior Sales Engineer, Citrix
    In May 2018, the General Data Protection Regulation (GDPR) takes effect. Are you ready? In a recent Ponemon study, 67% of respondents were aware of the GDPR, but only 50% of the organisations had allocated budget and started to prepare for these new regulations. GDPR will impose new rules on businesses, government agencies, and other organisations that offer goods and services to people in the European Union.

    In this webinar you will learn:

    • More about GDPR and how it will impact you
    • How you can work towards GDPR compliance
  • Ransomware in 2018 – Brace yourself Recorded: Nov 13 2018 61 mins
    Florin Lazurca, Sr. Technical Marketing Manager, Citrix; Andrei Florescu, Sr. Solutions Architect, Bitdefender
    Ransomware, zero day exploits, and phishing attacks, they're among the biggest nightmares facing IT today. The time between exploit, discovery and weaponization is getting shorter and shorter and it’s going to be harder and harder to protect yourself. Last year, 63% of organizations experienced an attempted ransomware attack, with 22% reporting these incidents occurred on a weekly basis.* Attend this webinar and learn four ways you can reduce your exposure to ransomware threats, recover encrypted data more quickly and get employees back to work.

    You’ll learn the basics of data protection that Citrix customers are using today, including:
    • Publish virtualized, sandboxed and hardened browsers and email clients
    • Utilize Hypervisor Introspection (HVI) to detect ransomware techniques
    • Protect mobile devices against attacks with containerization
    • Provide a secure and robust enterprise data sync and sharing service
  • Arming IT security teams with U.S. Secret Service tactics Recorded: Oct 10 2018 53 mins
    Martin Zugec, Senior Architect, Security and Automation, Citrix; Eric Beiers, Lead Security Architect, Citrix
    The U.S. Secret Service has been protecting the leaders of the United States, their families and visiting VIPs for over 100 years with an extraordinary record of success. Attend this webinar to learn about the secret behind their success, the methodology they are using, how you can design your IT environment to achieve the same level of protection and why Citrix is the right partner for this task.

    In the session, you will learn how to:

    • Architect security for a workforce on the move
    • Implement defense-in-depth
    • Deploy best practices for securing your infrastructure, apps, and data
  • Scared of data security in SaaS applications? Don’t worry, we have your back Recorded: Aug 23 2018 39 mins
    Akhilesh Dhawan, Dir. Product Marketing, Networking/Security; Praveen Raghuraman, Dir. Product Management, Networking, Citrix
    Most organizations have some data stored in SaaS applications or are thinking of moving to SaaS. Some of this migration to SaaS is controlled by IT (sanctioned SaaS apps), while most of this migration is undertaken by individual business units (unsanctioned SaaS apps) in order to achieve better productivity or to get some tasks done. While IT has deployed methods like single sign-on to sanctioned applications, they cannot control access to any unsanctioned SaaS applications using the same SSO solution. And traditional single sign-on solutions don’t provide any control on what actions a user can take after they login to SaaS applications, nor do they provide security policies for IT to control user access to the Internet.

    In this session, you will learn about a single solution that helps:

    • Improve user experience with single sign-on to SaaS, web and virtual apps
    • Implement enhanced security policies for SaaS apps to control user actions after login
    • Enable Web filtering to control what users cannot access on the Internet
    • Securely browse the internet
    • Provide end to end visibility and user behavior analytics with Citrix Analytics
  • Scared of data security in SaaS applications? Don’t worry, we have your back Recorded: Aug 23 2018 39 mins
    Akhilesh Dhawan, Dir. Product Marketing, Networking/Security; Praveen Raghuraman, Dir. Product Management, Networking, Citrix
    Most organizations have some data stored in SaaS applications or are thinking of moving to SaaS. Some of this migration to SaaS is controlled by IT (sanctioned SaaS apps), while most of this migration is undertaken by individual business units (unsanctioned SaaS apps) in order to achieve better productivity or to get some tasks done. While IT has deployed methods like single sign-on to sanctioned applications, they cannot control access to any unsanctioned SaaS applications using the same SSO solution. And traditional single sign-on solutions don’t provide any control on what actions a user can take after they login to SaaS applications, nor do they provide security policies for IT to control user access to the Internet.

    In this session, you will learn about a single solution that helps:

    • Improve user experience with single sign-on to SaaS, web and virtual apps
    • Implement enhanced security policies for SaaS apps to control user actions after login
    • Enable Web filtering to control what users cannot access on the Internet
    • Securely browse the internet
    • Provide end to end visibility and user behavior analytics with Citrix Analytics
Secure your digital business. Safeguard your apps and data.
Address cybersecurity threats while proactively protecting information, managing risk, and achieving compliance. Take a people-centric security approach with a unified, contextual and secure digital workspace from Citrix. Learn more at https://www.citrix.com/secure

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Ransomware in 2018 – Brace yourself
  • Live at: Nov 13 2018 7:00 pm
  • Presented by: Florin Lazurca, Sr. Technical Marketing Manager, Citrix; Andrei Florescu, Sr. Solutions Architect, Bitdefender
  • From:
Your email has been sent.
or close