With the growth of ransomware families by 600% in 2016, there is no slowdown in sight for one of the worst malware variants in history.
SonicWall’s security researcher and advocate, Brook Chelmo, will talk about the impact of ransomware as well as other advanced persistent threats such as zero-day attacks. SonicWall has the expertise and resources to help you stay ahead of developing threats.
Learn how to:
•Stay safe from ransomware and other advanced attacks
•Practice good security hygiene
•Use trusted automated tools to protect your network and endpoints
RecordedMar 1 201748 mins
Your place is confirmed, we'll send you email reminders
Organizations face tough choices when evaluating security vendor claims about their next-generation firewall (NGFW) offerings.
Join SonicWall security experts to learn how the NetSecOPEN’s “Benchmarking Methodology for Network Security Device Performance” can help you choose the ideal firewall to meet and exceed your business cybersecurity objectives.
Protect your Remote and Work-from-Home Employees during the COVID-19 Outbreak
Join SonicWall security experts as we explore the challenges you need to address to stay safe — and operational — during the coronavirus outbreak.
Register now to gain actionable best practices to:
•Expand your remote workforce securely
•Defend against fear-based cyberattacks
•Establish a true remote office for employees
•Gain additional operational benefits
•Learn how to apply learnings to critical business continuity and disaster recovery plans
Join SonicWall security experts as we share findings, intelligence, analysis and research from the 2020 SonicWall Cyber Threat Report. This exclusive session will help you better understand how cybercriminals think —and be fully prepared for what they’ll do next.
Amit Bareket (Perimeter 81) and Jayant Thakre (SonicWall)
Introduced by Gartner in 2019, Secure Access Service Edge (SASE) is a cloud architecture model that combines different functions of network and security solutions into a unified cloud security platform to be delivered as a service — without any or minimal hardware involved. This joint session between SonicWall and Perimeter 81 will explain why the SASE model was created, the challenges it's fixing and how the movement is redefining a future of network security without traditional perimeters.
Join us to learn how you can reduce WiFi Radio Frequency (RF) challenges and provide easy guest onboarding in your environment.
SonicWall WiFi Cloud Manager is equipped to resolve these challenges and more. Learn how to:
•Captivate guests via Captive Portal
•Enhance performance with new RF features
•Improve wireless security
Join SonicWall security expert Brook Chelmo as he gives you an inside look into the human-side of a modern ransomware cell, their advice on how to stop them from infiltrating your organization, encrypting your endpoints, and spreading to other drives and segments of your network.
Is your business deploying more and more SaaS applications? Although SaaS applications empower businesses with agility and enhanced productivity, the increased agility isn’t without risks. SaaS apps need to be adopted in a secure, responsible manner.
Join SonicWall security expert Shannon Emmons for an exclusive webinar to learn about:
•Key security risks to address when adopting SaaS applications
•Where proper SaaS security should be applied
•Best practices and guidance for implementing SaaS security solutions
Ken Dang, Product Makreting & John Padilla, IT Director, SonicWall
Shadow IT practices give rise to security risks such as account compromise, malware propagation, data loss and non-compliance.
In this new SaaS-happy world, CSOs, CIOs, CISOs, administrators and IT departments struggle to maintain visibility and access control over data while enforcing strong threat protection, data loss prevention and compliance policies.
Join SonicWall for an exclusive look at the day in the life of a modern IT director and the best practices used to keep shadow IT risks in check.
Ganesh Umapathy - SonicWall Product Marketing Manager & Michael Osterman, President, Osterman Research
The growing number of cloud services available in most organizations enable fast time-to-market for productivity and collaboration tools, but the easy availability of these capabilities can pose significant security risks for organizations.
Join SonicWall and Osterman Research as they collaborate to help you understand the current threats landscape and the best practices to protect against phishing, ransomware, email fraud
We will cover the following:
•Major concerns and issues with SaaS adoption
•What to look for in a CASB solution
•Overview of SonicWall Cloud App Security
Diana Kelley, Microsoft | Michelle Drolet, Towerwall | Peter Dougherty, MantisNet
As the average monetary cost of a malware attack continues to increase and currently costs an organization an average of $2.4 million, it is essential to be up to date on detection and prevention best practices. Join leading industry experts as they discuss the biggest security threats and how to detect and prevent them:
-New on the threat landscape
-How to deploy automated threat detection
-Breach prevention best practices
Diana Kelley, Cybersecurity Field CTO, Microsoft (moderator)
Michelle Drolet, CEO, Towerwall
Peter Dougherty, CISSP, CEO, MantisNet
Wireless networks a mess? Remote Wi-Fi difficult to manage? Join us for a live demo to understand how to simplify wireless installation with Zero-Touch Deployment. Reduce costs and save time spent on rolling out your solution — all while managing it all from the cloud and mobile devices
Join malware expert Brook Chelmo to learn how to identify and stop advanced malware and other modern threats in the quickest and most accurate way possible. Reserve your spot to:
•Discover risks caused by ‘never-before-seen’ threats
•Stop threats embedded in Microsoft Office and Adobe PDF files
•Mitigate future side-channel attacks and processor vulnerabilities
•See which approaches should be leveraged to close these vulnerability gaps
Holly Davis, CEO Komplement Business Development Consulting
How to cost-effectively protect K-12 networks.
The E-rate program is critical for K12 organizations that lack the funding to procure appropriate networking and cybersecurity solutions, such as firewalls and wireless security. But understanding the program — as well as confirming your E-rate eligibility — can be daunting.
In this third episode of our E-rate series, expert Holly Davis discusses:
Holly Davis, CEO Komplement Business Development Consulting
Key elements of the E-rate program.
The E-rate program is a complex and critical process for many K-12 organizations and institutions.
E-rate expert Holly Davis highlights key elements of the E-rate program to help you navigate the process.
In this second episode of our E-rate series, you will learn about:
•Eligible Services List (ESL)
•470 and 471 forms
•Rules of the program
Watch the entire video series for valuable insights to help you confidently approach E-rate funding.
Over the coming weeks, you are invited to join E-rate expert Holly Davis to explore the E-Rate Program and its impact on the digital revolution happening today in our schools.
On this first episode you will learn about:
•The history of the program
•The difference between Category 1 and Category 2 services
We hope this video series provides you with valuable direction to help you confidently approach E-rate funding.
For questions about the SonicWall solutions for K-12, and their E-rate eligibility, please contact Holly Davis, Komplement CEO and E-rate advisor to SonicWall, at firstname.lastname@example.org
Brook Chelmo, Senior Product Marketing Manager, SonicWall Migo Kedem, Senior Director of Products & Marketing SentinelOne
Threat actors leverage malware to create backdoors into systems for a few key reasons. These forms of malware, even when they fail, can create serious vulnerabilities in systems.
This webcast will cover the threat landscape and discuss new types of attacks. Come for the news but stay for a live hacking demonstration that will install a backdoor on an unprotected endpoint and later, an attempt on a protected one.
In this webcast you’ll learn:
•The current threat landscape
•What backdoors are
•How to stop backdoors like Calisto
•How to roll back the damage of an attack like ransomware
SonicWall has been fighting the cyber-criminal industry for over 25 years, defending small, medium-size businesses and enterprises worldwide. Our combination of products and partners has enabled a real-time cyber defense solution tuned to the specific needs of more than 500,000 businesses in over 150 countries, so you can do more business with less fear.