NIST ranks Shellshock as highest-level threat. Here’s how to stop it.
Discover how to protect your servers and networks from Shellshock – before it’s too late.
Join this important webcast to learn how to stop this potentially severe vulnerability in a Bash shell that’s commonly found in Unix, Linux and Apple OS X operating systems. It enables attackers to perform the same commands as a legitimate user, and gain complete control of critical systems.
Attend this webcast so you can:
• Understand the details behind this vulnerability
• Recognize how Shellshock exploits organizations
• Identify what steps to take next
• See how next-gen technology can protect you
The National Institute of Standards and Technology (NIST) rates this threat as a 10.0 – its highest ranking – because of its impact and exploitability. So don’t miss this webcast.
RecordedFeb 3 201551 mins
Your place is confirmed, we'll send you email reminders
Not every organization has the in-house resources needed to support IT security. Outsource your network security with SonicWall Security-as-a-Service (SECaaS). This flexible, affordable subscription-based service lets you detect and block a wide range of advanced and emerging threats, including intrusions, viruses, spyware, worms, Trojans, key loggers, rootkits, botnets and “zero-day” malware.
Join this webcast to find out how the SonicWall SECaaS subscription-based service provides organizations of every size with the ability to:you can benefit from:
•Meet all network security needs
•Reduce management time
•Eliminate upfront capital investment
•Utilize subscription pricing for a predictable operating expense model
•Gain valuable network reporting and expert insight
•Have a network security professional manage it all
Modern threats take advantage of all areas of your network to cause maximum harm. Once inside your environment, they propagate freely within your network, as well as transmit information into and out of your network. In order to stop advanced attacks, networks need to be divided into security segments to contain and mitigate threat propagation.
Join this upcoming webcast and discover proven best practices for implementing network security segments as an effective defense against advanced threats.
• Monitor all – including encrypted – communications traversing the network for malicious activity or content.
• Inspect traffic not just from the internet, but also from devices that connect behind traditional security checkpoints.
• Prioritize critical infrastructure communications to ensure successful business operations.
• And much more...
Online shopping will rise sharply to an unprecedented level this coming holiday season. The conversation for consumers and retailers now focus on cyber safety and privacy for all. What actions must you take immediately to elevate your security posture?
In this webinar, you’ll hear from our SonicWall security expert on the best ways to securing your retail business and safeguard your customer privacy information while also meeting the latest PCI standards.
Rasomware is spreading at record pace in 2016 as cybercriminals are actively using it to hold businesses, institutions and even individuals hostage. If you’ve been following the news, you’re probably aware that authorities and security experts are calling this the new crisis in cybercrime today. Research has shown that businesses with more than 100 employees make up 60 per cent of all ransomware attacks and those with more than 1,000 employees are targeted 25 per cent of the time.
Attend our live webcast to learn effective ways to prevent and stop this dangerous and potentially costly threat.
This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security engineer. Once you have seen what the bad guys have been up to today, you will be exposed to a crash course of security policy management and network security architecture design that will help avoid the breach of tomorrow.
Rob will discuss the following:
• Threat landscape 2016 recap
• Fortifying the network
• Security craftsmanship
• Implementing the solution
Educational institutions, businesses and government agencies assume substantial risks when they provide employees or students Internet-capable computers, even when the devices are behind a firewall.
Uncontrolled web access can result in non-productive web surfing, creating tremendous losses in productivity, not to mention the potential for legal liability.
SonicWALL Content Filtering Service (CFS) 4.0 brings you enhanced granular web filtering controls at the policy level along with better policy management. In this webcast led by SonicWALL experts, you will take a deep dive into the new CFS 4.0 features.
• CFS 4.0 powerful new web filtering controls helps school districts and other organizations protect users
• A host of new features delivers enhanced categorized control over your environments
• The upgraded Content Filtering Client (CFC) extends protection and productivity to users outside the firewall
• CFC ensures policy compliance, regardless of where the connection is established
Businesses of all sizes are being attacked with new forms of threats trying to exploit recently discovered vulnerabilities in systems. With over 64 million unique pieces of Malware detected last year, hackers are making it more difficult for traditional anti-malware software to keep up. So how can organizations keep their networks safe? Security researcher and advocate, Brook Chelmo will briefly talk about Network Sandboxing and how to stop unknown threats. Brook will talk about ways to stop advanced persistent threats such as zero-day attacks and how you don’t have to be a security expert to stop them.
1.Learn how to stay safe from current and common attacks with advanced security technology
2.Learn how to practice good security hygiene
3.Understand how the threat landscape changes day to day with a hundreds of thousands of pieces of malware being authored daily.
Companies used to know where their data was at all times: It was in the data center, surrounded by physical walls. But today, your data is everywhere your employees and customers are — on phones, on tablets, on laptops, in the cloud. Anywhere, anytime access provides more work-life balance and helps employees stay productive, but it also puts data security at considerable risk. The challenge companies consequently face is how to provide fast, simple access to enterprise applications, data and resources without compromising security.
Join Mark Hewett, senior product manager for Dell SonicWALL Secure Mobile Access, and Steven Sanderson, senior product marketing manager for Dell SonicWALL Secure Mobile Access, for a webcast on how to manage and provision mobile devices to protect company data and networks from cyber attacks, viruses, malware and other threats.
•Ensure that only authorized users have access to appropriate data and through approved devices
•Quickly and easily provision secure mobile access and role-based privileges
•Keep company data secure in-flight and at-rest on devices
Businesses of all sizes are being attacked with new forms of threats trying to exploit recently discovered vulnerabilities in systems. These are often refered to as Advanced Persistent Threats. Security researcher and advocate, Brook Chelmo will briefly talk about the history of hacking and how the black hat community has gone from pride to profit and from hacking large government agencies to the local dentist office. Brook will talk about ways to stop advanced persistent threats such as zero-day attacks and how you don’t have to be a security expert to stop them.
Learn how to stay safe from current and common attacks with advanced security technology
Learn how to practice good security hygiene
Understand how the threat landscape changes day to day with a million pieces of malware being authored daily.
Learn how Dell SonicWALL can handle your network security for you. Outsource your network security with Dell SonicWALL Security-as-a-Service (SECaaS). This flexible, affordable subscription-based service lets you detect and block a wide range of advanced and emerging threats, including intrusions, viruses, spyware, worms, Trojans, key loggers, rootkits, botnets and “zero-day” malware.
SECaaS bundles a next-generation firewall (NGFW) with a comprehensive security suite, mobile and wireless security, management and reporting, and 24x7 support — all at an affordable monthly rate.
Find out how you can benefit from:
•Anti-virus, anti-spyware, intrusion prevention, content filtering, application control, VPN and more
•Weekly security reports and firewall backup
•Configuration and security analysis by certified engineers
•Proactive monitoring and alerting
•Software, hardware and security signature updates
Steven Sanderson – WW SMA Product Marketing Manager Mark Hewett – WW SMA Product Manager
See how it’s possible to give end-users fast, simple access to enterprise applications, data and resources – without compromising your security.
In this live webinar, you’ll hear from two Dell Security solution experts on how you can manage the proliferation of devices in your workplace.
During the interactive session, you’ll see how to:
• Ensure only authorized users and approved devices are granted access to your business network
• Quickly and easily provision secure mobile access and role-based privileges
• Keep company data secure in-flight and at rest on devices
In light of the recent changes to PCI DSS 3.1 standards, effective June 30, 2016, your retail business needs to ensure it is meeting the latest compliance requirements.
In this live webinar, you’ll hear from our security expert on the best ways to overcome the biggest challenges your business faces as a result of PCI DSS 3.1 changes. Plus, get guidance on how securing your retail business is instrumental to ultimately meeting the latest PCI standards.
Join us to gain insight into how you can:
•Ensure you’re one step ahead of the most notable changes to PCI standards that are likely to impact your retail business
•Best respond to the recent changes in PCI DSS 3.1 to maintain compliance
•Secure your organization, pass audits today and prepare you for future PCI changes with Dell Security solutions
To combat today’s evasive, advanced threats, a new approach is needed. Specifically, threat analysis technology that malicious code can’t detect and evade. Join this session to learn how our recently announced cloud sandbox service, featuring a threat analysis platform that combines multiple malware analysis engines, including not only virtual sandboxing but also full sytem emulation and hyper-vispr level analysis, is more effective at discovering zero-day threats than single- engine sandbox solutions that are easier for malware to detect and evade.
- Learn about the changing threat landscape
- Learn how to protect from new threat vectors and advanced threats
Kent Shuart, Dell Security, Product Marketing Manager
Register for this webinar to see the ways that Dell SonicWALL TZ Series firewalls, Dell SonicPoints, and Dell Networking X-Series switches can help you centrally manage your growing retail network.
You’ll find out how to easily integrate your switches under the firewall umbrella for simplified, consolidated management of your network security.
During the webinar, you’ll learn about:
• Simplifying management of your retail IT network infrastructure
• Managing security, switches, wireless and WAN acceleration from a single pane of glass
• Increasing port density on TZ Series firewalls
• Overcoming your unique security challenges with Dell solutions
Ken Dang, Product Marketing Manager, Dell Security
Do you find yourself regularly worrying if you’ve done a thorough job at vetting your cyber-defense system? Is it really doing its job and keeping up with evolving threats and capacity demands? Attend this webinar to learn what differentiates leading next-generation firewalls and walk away with a greater understanding of key performance indicators essential to the success of your network security strategy.
Join us to explore:
• What is driving NGFW deployment in the enterprise
• Key performance indicators of an effective next-generation firewall implementation
• 2016 NSS Labs independent test results of Dell SonicWALL next-generation firewall (NGFW) platform
Learn how you can prevent malware and security threats from affecting your retail business. Discover more about new security solutions and technologies that can keep you out of the news, and out of trouble.
Scott Grebe, Product Marketing Manager, Dell Security
Find out how to secure the data on your school’s network and protect students from inappropriate web content.
During the session, you’ll:
•Understand the security technologies that are essential to protecting your network
•Find out if your current network security solution is up to par
•Learn about E-Rate approved solutions that are within your budget
SonicWall provides intelligent network security and data protection solutions that enable customers and partners to dynamically secure, control, and scale their global networks. Using input from millions of shared touch points in the SonicWALL Global Response Intelligent Defense (GRID) Network, the SonicWALL Threat Center provides continuous communication, feedback, and analysis on the nature and changing behavior of threats.